SlideShare a Scribd company logo
1 of 39
Download to read offline
Alliander IT CIO Office
Michel de Goede
The Connected Utility
Alliander
2
The EU
3
Image: EU
Out there
The Pressure
5
Open Smart Grid Platform
6
Smart Lighting
7
Electric Vehicle Charging
8
Energy Exchange
9
IT has become part of your employees’ daily life
Your employees have become
computer literate. And reviewed or
rated apps are available 24/7.
10
Your employees know better how to perform work
safely and efficiently than your IT department
Source: Alliander Annual Report 2014
11
Your employees are creative and involved
Trying to stop your employees from
creatively managing their work is like
pushing water uphill with a rake.
12
Shifting perspective then: IT in the lead
See also ISO/IEC 25010 for Software Quality considerations
13
Shifting perspective now: user in the lead
See also ISO/IEC 25010 for Software Quality considerations
14
What could possibly go wrong?
Image: www.taxistartup.com
1. Back-end integration
2. Data and file formats
3. API’s
4. Security
5. Privacy
6. Vendor lock-in
7. Non-functionals
15
Your employees write their own apps
16
Video: www.youtube.com/watch?v=WkDCS8xeobg
Counter measure 1: complexity reduction
Adaptation of material from Roger Sessions, Object Watch. Productivity comparison: ISBSG
Total system complexity is a function of the number of
business functions, the number of system connections and
complexity of the platform. Calculation: bf3.1+ sc3.1+ pc3.1
17
Counter measure 2: decouple on interface
specification
Images: Query Surge, Object Watch, Journal Dev, Microsoft, Free Powerpoint Templates, BI Tools
18
Counter Measure 3: maximally autonomous
microservice API’s
19
Image: http://www.grahamlea.com/2015/03/microservices-tyro-evolution-presentation/
Counter measure 4: stop fortification, be resilient
20
Resilience can be obtained by moving away from typical barrier enhancement
risk-measures. Consider the following options:
• Ignore, the ostrich ‘see-no-evil-hear-no-evil’ tactic;
• Accept, the potential impact of some risks may be deemed acceptable to your organization;
• Reduce, e.g. the potential impact or probability of occurrence of a risk, like the banking app;
• Transfer, use insurance or subcontracting to transfer potential consequences of risk;
• Avoid, not entering the type of business that may incur potential risk impact deemed too high;
• Exploit, risk is also an opportunity and high risk investments may yield high returns.
Risk landscape (non exhaustive)
21
UX and Ergonomics
22
The increasing opaqueness of operations
23
Pattern Recognition: e.g. SIEM
24
Image: IBM
The art of isolation and impact reduction
25
Images: European Network for Cyber Security
Counter measure 5: Educate
26
You cannot stop water from flowing, but you CAN
educate staff on privacy and security concerns.
Effect
27
E = Q * A
Counter measure 6: manage orchestration
28
Image: https://jcastellssala.wordpress.com/2012/03/27/webservices-orchestration-choreography/
29
Counter measure 7: share responsibility
Image: www.plainadventure.com
Technology Roadmap
30
Technology Roadmap
31
• Basis: Gartner ± 3000 technologies + additions
• Selection of ±400 (Gartner Disruptive or High-impact) technologies
• Custom Hype-Cycles
Images:Gartner, Alliander
Technology Roadmap
32
Wearable Tech Strategy
33
individual protection
opportunism freedom
collective protection
opportunism freedom
individually
owned &
operated
company
owned &
operated
‘ARTOS’
iOS7
Owner
(I’m not in!)
Saboteur
(I will obstruct!)
Collaborator
(I cooperate!)
North Korea!
(that’s how we do it!)
LAT prevent
seduce force
build trust
50 MpH limit
let go
but be clear
benefit,
comfort, joy
Image:Wim Bouman, Roger Janssen, Alliander
Stand-by
Co-operated
BYO
Technological
34
Images: Wired, iBeacon, Bionym, Designboom, Motorola, Artefact Group, Hexoskin
Technological
Images: Nest, LG, BMW, Siemens, Philips, Sonos, Sumitomo, eMoss
Lifetime recording
36
The Good: no red tape,
The Bad: abuse,
The Ugly: ethical & moral issues.
Images: Softpedia, glassapps.org, HiBot,
Next?
37
Images: Nymi, Motorala, Ifinity, ULC Robotics
Next?
38
Images: BMW
Questions?
Thank you!
39

More Related Content

What's hot

Introduction to the IoT using AWS
Introduction to the IoT using AWSIntroduction to the IoT using AWS
Introduction to the IoT using AWSVolodymyr Rudyi
 
Automated Construction - Why manufacturing is the future of the sector #COMIT...
Automated Construction - Why manufacturing is the future of the sector #COMIT...Automated Construction - Why manufacturing is the future of the sector #COMIT...
Automated Construction - Why manufacturing is the future of the sector #COMIT...Comit Projects Ltd
 
A Digital Future for the Infrastructure Industry #COMIT2019
A Digital Future for the Infrastructure Industry #COMIT2019A Digital Future for the Infrastructure Industry #COMIT2019
A Digital Future for the Infrastructure Industry #COMIT2019Comit Projects Ltd
 
Virtual Property vs. Digital Twin
Virtual Property vs. Digital TwinVirtual Property vs. Digital Twin
Virtual Property vs. Digital TwinTero Järvinen
 
The IoT Transformation and What it Means to You - Nir Dobovizky
The IoT Transformation and What it Means to You - Nir DobovizkyThe IoT Transformation and What it Means to You - Nir Dobovizky
The IoT Transformation and What it Means to You - Nir DobovizkyCodeValue
 
IoT NY - Google Cloud Services for IoT
IoT NY - Google Cloud Services for IoTIoT NY - Google Cloud Services for IoT
IoT NY - Google Cloud Services for IoTJames Chittenden
 
KISS: The Key to Igniting Digital Change Among Field Workers #COMIT2019
KISS: The Key to Igniting Digital Change Among Field Workers #COMIT2019KISS: The Key to Igniting Digital Change Among Field Workers #COMIT2019
KISS: The Key to Igniting Digital Change Among Field Workers #COMIT2019Comit Projects Ltd
 
Product Relationship Management (PRM): What Every Connected Business Needs
Product Relationship Management (PRM): What Every Connected Business NeedsProduct Relationship Management (PRM): What Every Connected Business Needs
Product Relationship Management (PRM): What Every Connected Business NeedsLogMeIn
 
Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...Daniel Zini
 
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not NightmaresHybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not NightmaresAdrian Sanabria
 
Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 mythsDot Net IT
 
Cloud Billing: Enabling consumers for pay for what they use
Cloud Billing: Enabling consumers for pay for what they useCloud Billing: Enabling consumers for pay for what they use
Cloud Billing: Enabling consumers for pay for what they useEduardo Mendez Polo
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or notebuc
 
Watson IoT breifing for HEC 081516
Watson IoT breifing for HEC 081516Watson IoT breifing for HEC 081516
Watson IoT breifing for HEC 081516Brian Dalgetty
 
Infographic: Enterprise mobile deployment shows strong advancements
Infographic: Enterprise mobile deployment shows strong advancementsInfographic: Enterprise mobile deployment shows strong advancements
Infographic: Enterprise mobile deployment shows strong advancementsCitrix
 
Digital transformation buzzword or reality - Alon Fliess
Digital transformation buzzword or reality - Alon FliessDigital transformation buzzword or reality - Alon Fliess
Digital transformation buzzword or reality - Alon FliessCodeValue
 
[Cisco Connect 2018 - Vietnam] Huu thang ho data center transformation - vn
[Cisco Connect 2018 - Vietnam] Huu thang ho   data center transformation - vn[Cisco Connect 2018 - Vietnam] Huu thang ho   data center transformation - vn
[Cisco Connect 2018 - Vietnam] Huu thang ho data center transformation - vnNur Shiqim Chok
 
The use of Asset Management and BIM to Generate Information Requirements #COM...
The use of Asset Management and BIM to Generate Information Requirements #COM...The use of Asset Management and BIM to Generate Information Requirements #COM...
The use of Asset Management and BIM to Generate Information Requirements #COM...Comit Projects Ltd
 

What's hot (20)

Introduction to the IoT using AWS
Introduction to the IoT using AWSIntroduction to the IoT using AWS
Introduction to the IoT using AWS
 
Automated Construction - Why manufacturing is the future of the sector #COMIT...
Automated Construction - Why manufacturing is the future of the sector #COMIT...Automated Construction - Why manufacturing is the future of the sector #COMIT...
Automated Construction - Why manufacturing is the future of the sector #COMIT...
 
A Digital Future for the Infrastructure Industry #COMIT2019
A Digital Future for the Infrastructure Industry #COMIT2019A Digital Future for the Infrastructure Industry #COMIT2019
A Digital Future for the Infrastructure Industry #COMIT2019
 
Virtual Property vs. Digital Twin
Virtual Property vs. Digital TwinVirtual Property vs. Digital Twin
Virtual Property vs. Digital Twin
 
The IoT Transformation and What it Means to You - Nir Dobovizky
The IoT Transformation and What it Means to You - Nir DobovizkyThe IoT Transformation and What it Means to You - Nir Dobovizky
The IoT Transformation and What it Means to You - Nir Dobovizky
 
IoT NY - Google Cloud Services for IoT
IoT NY - Google Cloud Services for IoTIoT NY - Google Cloud Services for IoT
IoT NY - Google Cloud Services for IoT
 
KISS: The Key to Igniting Digital Change Among Field Workers #COMIT2019
KISS: The Key to Igniting Digital Change Among Field Workers #COMIT2019KISS: The Key to Igniting Digital Change Among Field Workers #COMIT2019
KISS: The Key to Igniting Digital Change Among Field Workers #COMIT2019
 
Product Relationship Management (PRM): What Every Connected Business Needs
Product Relationship Management (PRM): What Every Connected Business NeedsProduct Relationship Management (PRM): What Every Connected Business Needs
Product Relationship Management (PRM): What Every Connected Business Needs
 
Waste to Wealth #COMIT2019
Waste to Wealth #COMIT2019Waste to Wealth #COMIT2019
Waste to Wealth #COMIT2019
 
Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...
 
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not NightmaresHybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
Hybrid Cloud Security: Potential to be the Stuff of Dreams, not Nightmares
 
Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 myths
 
Cloud Billing: Enabling consumers for pay for what they use
Cloud Billing: Enabling consumers for pay for what they useCloud Billing: Enabling consumers for pay for what they use
Cloud Billing: Enabling consumers for pay for what they use
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
2016_March_Meeting:Iot product design
2016_March_Meeting:Iot product design2016_March_Meeting:Iot product design
2016_March_Meeting:Iot product design
 
Watson IoT breifing for HEC 081516
Watson IoT breifing for HEC 081516Watson IoT breifing for HEC 081516
Watson IoT breifing for HEC 081516
 
Infographic: Enterprise mobile deployment shows strong advancements
Infographic: Enterprise mobile deployment shows strong advancementsInfographic: Enterprise mobile deployment shows strong advancements
Infographic: Enterprise mobile deployment shows strong advancements
 
Digital transformation buzzword or reality - Alon Fliess
Digital transformation buzzword or reality - Alon FliessDigital transformation buzzword or reality - Alon Fliess
Digital transformation buzzword or reality - Alon Fliess
 
[Cisco Connect 2018 - Vietnam] Huu thang ho data center transformation - vn
[Cisco Connect 2018 - Vietnam] Huu thang ho   data center transformation - vn[Cisco Connect 2018 - Vietnam] Huu thang ho   data center transformation - vn
[Cisco Connect 2018 - Vietnam] Huu thang ho data center transformation - vn
 
The use of Asset Management and BIM to Generate Information Requirements #COM...
The use of Asset Management and BIM to Generate Information Requirements #COM...The use of Asset Management and BIM to Generate Information Requirements #COM...
The use of Asset Management and BIM to Generate Information Requirements #COM...
 

Similar to Alliander CIO Office explores opportunities and risks of emerging technologies

The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsMichel de Goede
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerizationMichel de Goede
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...SolarWinds
 
Network Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom ApproachNetwork Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom ApproachEduardo Mendez Polo
 
Opportunities, Promises and Challenges of the New IT Model for Enterprises
Opportunities, Promises and Challenges of the New IT Model for EnterprisesOpportunities, Promises and Challenges of the New IT Model for Enterprises
Opportunities, Promises and Challenges of the New IT Model for EnterprisesFrank Greco
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...Enterprise Management Associates
 
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...Derek Baron
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd Iaetsd
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009Diontealley
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementDiontealley
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015Inbalraanan
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Symantec Migration infographic
Symantec Migration infographic Symantec Migration infographic
Symantec Migration infographic BHD Creative Ltd
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERPijbuiiir1
 
A research on- Sales force Project- documentation
A research on- Sales force Project- documentationA research on- Sales force Project- documentation
A research on- Sales force Project- documentationPasupathi Ganesan
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and EndpointsSymantec
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 

Similar to Alliander CIO Office explores opportunities and risks of emerging technologies (20)

The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise apps
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerization
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Network Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom ApproachNetwork Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom Approach
 
Opportunities, Promises and Challenges of the New IT Model for Enterprises
Opportunities, Promises and Challenges of the New IT Model for EnterprisesOpportunities, Promises and Challenges of the New IT Model for Enterprises
Opportunities, Promises and Challenges of the New IT Model for Enterprises
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
Ben amaba. cloud mobile v3
Ben amaba. cloud mobile v3Ben amaba. cloud mobile v3
Ben amaba. cloud mobile v3
 
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
Lessons from handling up to 26 Billion transactions a day - The Weather Compa...
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Symantec Migration infographic
Symantec Migration infographic Symantec Migration infographic
Symantec Migration infographic
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERP
 
A research on- Sales force Project- documentation
A research on- Sales force Project- documentationA research on- Sales force Project- documentation
A research on- Sales force Project- documentation
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 

More from Michel de Goede

Maximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and evMaximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and evMichel de Goede
 
Breaking down the layers of cyber security
Breaking down the layers of cyber securityBreaking down the layers of cyber security
Breaking down the layers of cyber securityMichel de Goede
 
Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!Michel de Goede
 
BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?Michel de Goede
 
Enabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timelineEnabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timelineMichel de Goede
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of riskMichel de Goede
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of riskMichel de Goede
 
BYOD: Be your own device?
BYOD: Be your own device?BYOD: Be your own device?
BYOD: Be your own device?Michel de Goede
 
Are you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurshipAre you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurshipMichel de Goede
 
From reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosFrom reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosMichel de Goede
 
Enabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODEnabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODMichel de Goede
 
IT PMI: tips and lessons learned
IT PMI: tips and lessons learnedIT PMI: tips and lessons learned
IT PMI: tips and lessons learnedMichel de Goede
 
Smart data & smart energy
Smart data & smart energySmart data & smart energy
Smart data & smart energyMichel de Goede
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of riskMichel de Goede
 
Exploring the upside of risk: optimize the IT portfolio
Exploring the upside of risk: optimize the IT portfolioExploring the upside of risk: optimize the IT portfolio
Exploring the upside of risk: optimize the IT portfolioMichel de Goede
 

More from Michel de Goede (20)

Maximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and evMaximizing asset life with smart lighting and ev
Maximizing asset life with smart lighting and ev
 
Breaking down the layers of cyber security
Breaking down the layers of cyber securityBreaking down the layers of cyber security
Breaking down the layers of cyber security
 
Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!Turning dreams into reality: it's your choice!
Turning dreams into reality: it's your choice!
 
BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?BYOD: bring your own device or bring your own disaster?
BYOD: bring your own device or bring your own disaster?
 
Enabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timelineEnabling offline app usage within a set budget and timeline
Enabling offline app usage within a set budget and timeline
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
 
BYOD: Be your own device?
BYOD: Be your own device?BYOD: Be your own device?
BYOD: Be your own device?
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
Are you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurshipAre you a player? The EU, energy and entrepreneurship
Are you a player? The EU, energy and entrepreneurship
 
Mobile as a strategy
Mobile as a strategyMobile as a strategy
Mobile as a strategy
 
Mobile as a strategy
Mobile as a strategyMobile as a strategy
Mobile as a strategy
 
From reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosFrom reactive to proactive mobile scenarios
From reactive to proactive mobile scenarios
 
Enabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODEnabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYOD
 
IT PMI: tips and lessons learned
IT PMI: tips and lessons learnedIT PMI: tips and lessons learned
IT PMI: tips and lessons learned
 
Database Technologies
Database TechnologiesDatabase Technologies
Database Technologies
 
Smart data & smart energy
Smart data & smart energySmart data & smart energy
Smart data & smart energy
 
The connected utility
The connected utilityThe connected utility
The connected utility
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
 
Exploring the upside of risk: optimize the IT portfolio
Exploring the upside of risk: optimize the IT portfolioExploring the upside of risk: optimize the IT portfolio
Exploring the upside of risk: optimize the IT portfolio
 

Alliander CIO Office explores opportunities and risks of emerging technologies

  • 1. Alliander IT CIO Office Michel de Goede The Connected Utility
  • 6. Open Smart Grid Platform 6
  • 10. IT has become part of your employees’ daily life Your employees have become computer literate. And reviewed or rated apps are available 24/7. 10
  • 11. Your employees know better how to perform work safely and efficiently than your IT department Source: Alliander Annual Report 2014 11
  • 12. Your employees are creative and involved Trying to stop your employees from creatively managing their work is like pushing water uphill with a rake. 12
  • 13. Shifting perspective then: IT in the lead See also ISO/IEC 25010 for Software Quality considerations 13
  • 14. Shifting perspective now: user in the lead See also ISO/IEC 25010 for Software Quality considerations 14
  • 15. What could possibly go wrong? Image: www.taxistartup.com 1. Back-end integration 2. Data and file formats 3. API’s 4. Security 5. Privacy 6. Vendor lock-in 7. Non-functionals 15
  • 16. Your employees write their own apps 16 Video: www.youtube.com/watch?v=WkDCS8xeobg
  • 17. Counter measure 1: complexity reduction Adaptation of material from Roger Sessions, Object Watch. Productivity comparison: ISBSG Total system complexity is a function of the number of business functions, the number of system connections and complexity of the platform. Calculation: bf3.1+ sc3.1+ pc3.1 17
  • 18. Counter measure 2: decouple on interface specification Images: Query Surge, Object Watch, Journal Dev, Microsoft, Free Powerpoint Templates, BI Tools 18
  • 19. Counter Measure 3: maximally autonomous microservice API’s 19 Image: http://www.grahamlea.com/2015/03/microservices-tyro-evolution-presentation/
  • 20. Counter measure 4: stop fortification, be resilient 20 Resilience can be obtained by moving away from typical barrier enhancement risk-measures. Consider the following options: • Ignore, the ostrich ‘see-no-evil-hear-no-evil’ tactic; • Accept, the potential impact of some risks may be deemed acceptable to your organization; • Reduce, e.g. the potential impact or probability of occurrence of a risk, like the banking app; • Transfer, use insurance or subcontracting to transfer potential consequences of risk; • Avoid, not entering the type of business that may incur potential risk impact deemed too high; • Exploit, risk is also an opportunity and high risk investments may yield high returns.
  • 21. Risk landscape (non exhaustive) 21
  • 23. The increasing opaqueness of operations 23
  • 24. Pattern Recognition: e.g. SIEM 24 Image: IBM
  • 25. The art of isolation and impact reduction 25 Images: European Network for Cyber Security
  • 26. Counter measure 5: Educate 26 You cannot stop water from flowing, but you CAN educate staff on privacy and security concerns.
  • 28. Counter measure 6: manage orchestration 28 Image: https://jcastellssala.wordpress.com/2012/03/27/webservices-orchestration-choreography/
  • 29. 29 Counter measure 7: share responsibility Image: www.plainadventure.com
  • 31. Technology Roadmap 31 • Basis: Gartner ± 3000 technologies + additions • Selection of ±400 (Gartner Disruptive or High-impact) technologies • Custom Hype-Cycles Images:Gartner, Alliander
  • 33. Wearable Tech Strategy 33 individual protection opportunism freedom collective protection opportunism freedom individually owned & operated company owned & operated ‘ARTOS’ iOS7 Owner (I’m not in!) Saboteur (I will obstruct!) Collaborator (I cooperate!) North Korea! (that’s how we do it!) LAT prevent seduce force build trust 50 MpH limit let go but be clear benefit, comfort, joy Image:Wim Bouman, Roger Janssen, Alliander Stand-by Co-operated BYO
  • 34. Technological 34 Images: Wired, iBeacon, Bionym, Designboom, Motorola, Artefact Group, Hexoskin
  • 35. Technological Images: Nest, LG, BMW, Siemens, Philips, Sonos, Sumitomo, eMoss
  • 36. Lifetime recording 36 The Good: no red tape, The Bad: abuse, The Ugly: ethical & moral issues. Images: Softpedia, glassapps.org, HiBot,
  • 37. Next? 37 Images: Nymi, Motorala, Ifinity, ULC Robotics