Ted Schadler

Vice President, Principal Analyst serving Application Development & Delivery PROFESSIONALS

Ted serves Application Development & Delivery Professionals. He has 27 years of experience in the technology industry, focusing on the effects of disruptive technologies on people and on businesses. His current research agenda analyzes the expanding role of content and content delivery in a mobile-first, digital-always world, including the effects on web content management and digital experience delivery platforms.

Ted is the coauthor of The Mobile Mind Shift: Engineer Your Business to Win in the Mobile Moment (Groundswell Press, June 2014). Your customers now turn to their smartphones for everything. What's tomorrow's weather? Is the flight on time? Where's the nearest store, and is this product cheaper there? Whatever the question, the answer is on the phone. This Pavlovian response is the mobile mind shift — the expectation that I can get what I want, anytime, in my immediate context. Your new battleground for customers is this mobile moment — the instant in which your customer is seeking an answer. If you're there for them, they'll love you; if you're not, you'll lose their business. Both entrepreneurial companies like Dropbox and huge corporations like Nestlé are winning in that mobile moment. Are you?

Ted is also the coauthor of Empowered: Unleash Your Employees, Energize Your Customers, and Transform Your Business (Harvard Business Review Press, September 2010). Social, mobile, video, and cloud Internet services give consumers and business customers more information power than ever before. To win customer trust, companies must empower their employees to directly engage with customers using these same technologies.

Previous Work Experience

Previously, Ted analyzed the consumerization of IT and its impact on a mobile-first workforce, the future of file services in a mobile-first, cloud-enabled world, mobile collaboration tools, workforce technology adoption and use, and the rise of cognitive computing. In 2009, Ted launched Forrester's Workforce Technology Assessment, the industry's first benchmark survey of workforce technology adoption. This quantitative approach helps professionals and the teams they work with have a fact-based conversation about employees' technology adoption.

Prior to joining Forrester in April 1997, Ted was a cofounder of Phios, an MIT spinoff. Before that, Ted worked for eight years as CTO and director of engineering for a software company serving the healthcare industry. Early in his career, Ted was a singer and bass player for Crash Davenport, a successful Maryland-based rock-and-roll band.

Education

Ted has a master's degree in management from the MIT Sloan School of Management. He also holds an M.S. in computer science from the University of Maryland and a B.A. with honors in physics from Swarthmore College.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

38 results in Everything

  • IT Infrastructure & Operations
  • Andras Cser
  • For Security & Risk Professionals

    Charts & Figures:Layered Defenses In Risk-Based Authentication Solutions And Cloud Services

  • For Security & Risk Professionals

    Report:Evolve Your Identity Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook

    The rapid adoption of mobile devices and cloud services, together with a multitude of new partnerships and customer-facing applications, has "extended" the identity boundary of today's digital...

    • Downloads: 996
  • For Security & Risk Professionals

    Report:Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

    • Downloads: 63
  • For Security & Risk Professionals

    Charts & Figures:Capabilities Of Participating Vendors And CDP Solutions

  • For Security & Risk Professionals

    Report:Introducing Forrester's Customer IAM Security Maturity Assessment Model

    Assessment: The Identity And Access Management Playbook

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer. If your customers can't register for or log into your website, mobile app, or phone system, or...

    • Downloads: 359
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Enterprise Cloud Identity And Access Management, Q3 2012

    Six Vendors That Matter Most And How They Stack Up

    In Forrester's 15-criteria evaluation of cloud identity and access management (IAM) vendors, we identified the six most significant solution providers in this category — Covisint, Lighthouse...

    • Downloads: 1651
  • For Security & Risk Professionals

    Report:Quick Take: Stem The "Heartbleed"

    How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs

    To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive information...

    • Downloads: 393
  • For Security & Risk Professionals

    Charts & Figures:Centralized Drive Encryption In The Cloud At A Virtual Or Physical Level

  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 846
  • For Security & Risk Professionals

    Charts & Figures:CDP Encryption Gateway On-Premises

  • For Security & Risk Professionals

    Charts & Figures:Step Through An IAM Risk Framework

  • For CIO Professionals

    Report:Quick Take: Apple's WWDC 2014 Tour De Force

    New Developer Tools And Business Features Will Strengthen Apple's Leading Position In The Age Of The Customer

    Introduced by Apple CEO Tim Cook, Apple software leader Craig Federighi motored through a dense list of new operating systems, iOS 8 and OS X Yosemite, compelling new customer features such as the...

    • Downloads: 139
  • For Security & Risk Professionals

    Report:Forrester's Customer IAM Security Maturity Model

    Customer identity and access management (IAM) is essential to providing customers an easy-to-use, easy-to-administer, cost-effective, and most importantly, secure, experience. This Customer IAM...

    • Downloads: 48
  • For Security & Risk Professionals

    Report:An S&R Pro's Guide To Security To, In, And From The Cloud

    Embrace Cloud As Part Of The Shift To Business Technology

    As organizations rapidly adopt cloud-based infrastructure, platform, and application services, cloud security continues to be a major concern. Now, security and risk professionals need to provide a...

    • Downloads: 745
  • For CIO Professionals

    Report:Predictions For 2014: Cloud Computing

    Cloud Formally Joins The IT Portfolio — Whether IT Likes It Or Not

    As we head into 2014, cloud computing is no longer a "future" but a "now." Investments are up, enterprise use is widespread, and the hybrid cloud model has arrived. While the bulk of cloud...

    • Downloads: 1513
  • For Security & Risk Professionals

    Charts & Figures:Indicators Of Risk During Certification

    Process: The Identity And Access Management Playbook

  • For Security & Risk Professionals

    Report:Market Overview: Cloud Data Protection Solutions

    CDP Solutions Are A Mandatory Security Control

    Security and risk (S&R) professionals must protect data that business and technology management leaders store in cloud services — services that they have little control over or visibility into....

    • Downloads: 219
  • For Security & Risk Professionals

    Report:Critical Questions To Ask Your Privileged Identity Management Solution Provider

    Cloud Support, Threat Management, And Behavioral Analytics Are Now Mandatory Features

    Technology management professionals with administrator privileges have the responsibility to ensure that their critical business technology is secure, available, and achieving performance...

    • Downloads: 183
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: 2014

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research projects...

    • Downloads: 672
  • For Security & Risk Professionals

    Charts & Figures:Cloud Data Governance Platforms

  • For Security & Risk Professionals

    Report:Forrester's Risk-Driven Identity And Access Management Process Framework

    Processes: The Identity And Access Management Playbook

    Identity and access management (IAM) processes have always been convoluted. They affect many people, systems, and organizations, and this complexity makes it difficult to protect against new or...

    • Downloads: 377
  • For Security & Risk Professionals

    Report:Source Your Identity And Access Management Capabilities

    Reducing the costs of an identity and access management (IAM) solution has been a top priority for security and risk professionals for a long time. Although IAM solutions have matured significantly...

    • Downloads: 1092
  • For Security & Risk Professionals

    Charts & Figures:CDP Encryption Using A User-Side Plug-In

  • For Security & Risk Professionals

    Report:The 15 Most Important Questions To Ask Your Cloud Identity And Access Management Provider

    During the past three years, cloud-based identity and access management (IAM) solutions have become a viable and cost-effective alternative to on-premises, commercial off-the-shelf (COTS), or...

    • Downloads: 554
  • For Security & Risk Professionals

    Charts & Figures:CDP Encryption Gateway In The Cloud