Wal-Mart CIO Karenann Terrell: Data Analysis Key To Customer Insights - InformationWeek
IoT
IoT
IT Leadership // CIO Insights & Innovation
News
4/29/2015
12:03 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

Wal-Mart CIO Karenann Terrell: Data Analysis Key To Customer Insights

After leaving a healthcare firm, Karenann Terrell, the CIO of mega-retailer Wal-Mart, found that data analysis at the company is "at a much higher level of sophistication than I had expected."

10 Trailblazing Companies For Women In IT
10 Trailblazing Companies For Women In IT
(Click image for larger view and slideshow.)

Wal-Mart CIO Karenann Terrell offered glimpse of what it's like moving from a $15 billion healthcare company, Baxter International, to executive vice president and CIO of the $500 billion retailer in a talk on Tuesday at the InformationWeek Conference in Las Vegas.

After formal remarks, a former colleague from the pharmaceutical industry asked Terrell what was different between her previous job at Baxter and Wal-Mart.

"I expected a pervasive use of data in order to drive the business process," at Wal-Mart, Terrell responded. "I have seen it at a much more significant level of sophistication than I had expected. That's one advantage of scale at Wal-Mart."

Wal-Mart CIO Karenann Terrell
(Image: David Harding)

Wal-Mart CIO Karenann Terrell

(Image: David Harding)

Data drives inventory systems for the movement of goods and placement of goods in individual stores, in an effort to ensure merchandise will be available where the demand occurs. Terrell continued that Wal-Mart collects large amounts of data that it needs to constantly analyze in order to stay abreast of retail trends.

"The thing I underestimated was the speed at which customers are changing in the retail business … the expectation of the customer to simplify the (shopping) experience, and especially the speeding up of the mobile experience. The patients at Baxter, not so much," she said.

[Want to learn more about responding to a breach? See How To Develop A Data Breach Incident Response Plan.]

In a footnote to the proceedings, she also compared her former home city of Chicago to Bentonville, Ark. "The quality of life in Bentonville is fantastic. It's a little known place with a fantastic amount of talent."

Classic Vs. Legacy

At one point, Terrell referred to modern Wal-Mart systems versus "classic" rather than legacy systems, explaining the choice of words this way: "Classic is respectful of the people who are actually going to be keeping the lights on," as new business applications are underway. "We don't have a choice about alienating people with language. Does anyone here believe they have all the talent they need? Let me know, 'cause we're interested in your talent," she said, and laughed, knowing there'd be few takers.

The process of modernizing legacy systems is also underway at Wal-Mart, but Terrell said if she put a date on when it would be done, she'd be wrong.

"Our classic environment -- the minute we roll through a modernization of that, we'll see new trends in technology and new capabilities emerge," Terrell said. "I think we're just in a continuous build-and-operate cycle now. I think that probably it's a lifelong venture …" At another point, she said the technology that her industry uses is constantly getting revised: "Think technology just has to be viewed as a continuum."

Wal-Mart is trying to modernize the backend systems that run 11,000 stores serving 250 million customers a week. "A primary motivator for us is the need for us to win, compete, and serve at the intersection of the digital and physical. Consumers want a frictionless experience," she related. In addition to the customer experience, Wal-Mart is constantly trying to lower the cost of technology used in each business unit to serve an overall goal of offering low prices to consumers.

Terrell has a policy of rotating her IT staffers through different requirements from the business, giving them exposure to the nature of logistics, point of sale systems and general ledger accounting.

"Change in technology is something you have to experience from multiple different aspects … We have people that move across store systems from point of sale to the back office and into inventory management," Terrell told the audience.

Despite its size, Terrell insists Wal-Mart IT be able to implement systems rapidly and fix them quickly if things go wrong. It's part of how such a big chain survives smaller and lighter-footed competition. "The one protection that we really focus on at Wal-Mart is speed … That means you're willing to try things. I know I'm looking at a lot of skeptical faces," she said from a stage that allowed her to view 150 of her peers.

By speed, Terrell was referring to IT's ability to implement new software quickly without disrupting production systems or implement new code in production systems themselves. "Imagine trying to roll out a point of sale change. If we were not expert at rolling it out and pulling it back, or rolling it out and fix, we would be releasing once or twice a year against our 100,000 of point of sale systems," she said.

Meantime to recovery from a roll-out gone awry is an important stat to her. With the speed-oriented approach, failures are going to occur. What's important is knowing how to recover quickly from a failure, she said.

But one of her most interesting anecdotes was in response to the question, "What did Wal-Mart learn from the breach at Target?"

"What Target taught the industry was you cannot have any single point of failure that you are not expecting to result in some vector of breach." Target attackers ignored the usual routes of attack and found a way to siphon information from of point of sale data collectors. Terrell said the only adequate defense was defense-in-depth, with system operations and network traffic patterns monitored for unusual or out-of-compliance behavior.

Experiencing a breach, Terrell said, "that goes on undetected for a period of time just exponentially changes the damage that occurs. The public impact and reputational piece went beyond what any of us would have expected. The first mover (Target) was very deeply affected."

Wal-Mart has learned to run monitoring applications that watch actions on the network and data movements between internal systems. It's learned to keep a "white hat" tester, scrutinizing its code on a continuous basis and looking for weaknesses before an intruder appears, she said.

Retailers like Wal-Mart have parts of their operations that look a lot like a bank, she added. "For that and other reasons, it must maintain vigilance against malicious insiders … as the most dangerous vector."

Interop Las Vegas, taking place April 27-May 1 at Mandalay Bay Resort, is the leading independent technology conference and expo series dedicated to providing technology professionals the unbiased information they need to thrive as new technologies transform the enterprise. IT Pros come to Interop to see the future of technology, the outlook for IT, and the possibilities of what it means to be in IT.

Charles Babcock is an editor-at-large for InformationWeek and author of Management Strategies for the Cloud Revolution, a McGraw-Hill book. He is the former editor-in-chief of Digital News, former software editor of Computerworld and former technology editor of Interactive ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
batye
50%
50%
batye,
User Rank: Ninja
7/2/2015 | 12:31:32 AM
Re: Knowledge in to profit
@Bob124, I would have to disagree... I learned something new...   
batye
50%
50%
batye,
User Rank: Ninja
7/2/2015 | 12:30:11 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
@Ashu001... thank you :) it never ending... as with security it always trying to catch up...
Ashu001
50%
50%
Ashu001,
User Rank: Ninja
5/11/2015 | 11:48:41 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
Bateye,

That is a very-very good and rational statement you make here.

We often see that what looks like a super-failsafe option (like Automating everything for instance) is anything but that.

I guess that's why we IT Security Folks still have jobs Don't we?

 
Bob124
50%
50%
Bob124,
User Rank: Apprentice
5/11/2015 | 1:14:55 AM
Re: Knowledge in to profit
This article titled "Data Analysis Key to Customer Insights" - Had no mention of Data Analysis and Customer Insights from a business intelligence perspective - at all.  #Fail
batye
50%
50%
batye,
User Rank: Ninja
5/5/2015 | 2:03:58 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
@Stratustician, yes, as end result in Canada everyone is changing POS to Chip and Pin technology... but it always like catch 22 process...
batye
50%
50%
batye,
User Rank: Ninja
5/5/2015 | 2:01:52 AM
Re: Shows impact of the Target breach
@tzubair, I would say security education of the corporate user should never stops... as with security Humans is a weakest links...
batye
50%
50%
batye,
User Rank: Ninja
5/5/2015 | 2:00:23 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
@Ashu001, from my IT security point of view... - it like never ending game... with only temporary solutions...
batye
50%
50%
batye,
User Rank: Ninja
5/5/2015 | 1:58:53 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
@Li Tan, I would say even with good insurance... nothing 100%... safe...
Li Tan
50%
50%
Li Tan,
User Rank: Ninja
5/4/2015 | 9:07:22 AM
Re: Malicious Insiders are the most dangerous Threat Vector.
There is possibility that things can go wrong, then it will go wrong - this is very true. Every IT professional is trying hard to figure out more automated way of doing things and more robust system. But in the end we still need a strong IT army to keep the light on. I think that's life, though.
Ashu001
50%
50%
Ashu001,
User Rank: Ninja
5/3/2015 | 12:21:07 PM
Re: Malicious Insiders are the most dangerous Threat Vector.
Stratustician,

What you have suggested here-

Back end systems like those that handle logistics (procurement, shipping, inventory etc) could cause significant damage if they went down.

That is so true!

Its also a really,really good sign that Most Large Retailers are now taking the Supply Chain Back-end Seriously after the Target Breach.

The harder it becomes for malicious attackers to access such systems the better it is for all of us concerned.

For that if you need an Army of IT Folks to police everything so be it.

The cost is worth the loss in Reputation if something goes very wrong.

 

 

 
Page 1 / 2   >   >>
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends for 2018
As we enter a new year of technology planning, find out about the hot technologies organizations are using to advance their businesses and where the experts say IT is heading.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll