SlideShare a Scribd company logo
1BigData Analytics Panel-Diskussion DMS EXPO 2013Moderation Dr. Joachim Hartmann
IBT@DMSEXPO
Richard MedinaRichard Medina
Co-Founder & PrincipalCo-Founder & Principal
ConsultantConsultant
Workplace 2025 -Workplace 2025 -
The RealityThe Reality
TV ShowTV Show
© Doculabs, Inc. 2013
The Successful Workplace in 2025
In 2025, the successful mobile and social workplace will:
1.Have a baseline of adequacy in the new technologies
2.Have some solid mobile and social line-of-business applications
3.Will address the serious inefficiencies and risks of mobile and
social
It’s a lot more exciting than it sounds!
© Doculabs, Inc. 2013
The Winners Do 4 Things Right
1. They focus on addressing the Fragmentation Problem
2. They establish the minimal (necessary) conditions for success
with systems of engagement (SOEs)
3. They then pick and successfully implement the right mobile
and social line-of-business applications
4. They focus on controlling the serious inefficiencies and risks of
mobile and social
© Doculabs, Inc. 2013
#1: What is the Fragmentation Problem?
1. The Fragmentation Problem results from the explosion of
SOEs
2. SOEs include mobile applications, social media, wireless
access, “life splicing”, multiple BYOD devices, synching
everything
3. The Problem is uncontrolled diversity, failed enterprise
synching, content stored in multiple locations, multiple and
varied content formats, no security control, no version control,
no process control, no backup, and failed access.
© Doculabs, Inc. 2013
#2: How Do They Establish a Baseline of Adequacy?
1. They assess themselves using SOE categories.
2. They implement general baseline principles.
3. They address over-retention by dividing the monster into 2
more tractable sub-problems: day-forward information
disposition and historical information disposition
– Day-forward information disposition is easier
– Historical information disposition is much harder, takes years, and
requires a solid methodology and mix of technologies
© Doculabs, Inc. 2013
#3: Which SOE Applications Do They Implement?
1. There are 3 kinds of applications:
– 1) “Pure” SORs (systems of record), 2)“Pure” SOEs, and 3) SOEs that
integrate with SORs
1. The 3rd
kind – social-enabled and mobile-enabled ECM
applications – typically beat the other 2 kinds in ROI and
controlling risk.
2. So the Winners in 2025 focused most of their attention on
social/mobile-enabled ECM applications.
3. But they did so one step at a time –
in Content, Process, or Participation.
© Doculabs, Inc. 2013
#4: How Do They Address the Risks and Inefficiencies of SOEs?
1. The Winners in 2025 think of SOEs in terms of optimization
problems.
2. You have an optimization problem whenever you have some
objectives or factors that you want to improve – but you can’t
maximize them all because they conflict with each other.
3. SOEs are full of them: participation vs. quality; usability vs.
security; the needs of “the business” vs. the needs of the “risk
managers” – versus the needs of IT.
4. It’s all about finding and implementing many optimal
compromises that let you get sufficient benefits while
controlling the downside.
5. The Winners in 2025 find the right balance for each problem –
and then “bake them into” the standard solutions and
expected behaviors for each type of application.
© Doculabs, Inc. 2013
#4: How Do They Address the Risks and Inefficiencies of SOEs?
1. The Winners in 2025 think of SOEs in terms of optimization
problems.
2. You have an optimization problem whenever you have some
objectives or factors that you want to improve – but you can’t
maximize them all because they conflict with each other.
3. SOEs are full of them: participation vs. quality; usability vs.
security; the needs of “the business” vs. the needs of the “risk
managers” – versus the needs of IT.
4. It’s all about finding and implementing many optimal
compromises that let you get sufficient benefits while
controlling the downside.
5. The Winners in 2025 find the right balance for each problem –
and then “bake them into” the standard solutions and
expected behaviors for each type of application.

More Related Content

What's hot

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
DImension Data
 
Mobile Myths in Enterprise Development
Mobile Myths in Enterprise DevelopmentMobile Myths in Enterprise Development
Mobile Myths in Enterprise Development
Lucia Stavarache
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITSymplified
 
Research report
Research reportResearch report
Research report
Noopur Maniar
 
Wandera Enterprise Mobile Data Featuring Yankee Group
Wandera Enterprise Mobile Data Featuring Yankee GroupWandera Enterprise Mobile Data Featuring Yankee Group
Wandera Enterprise Mobile Data Featuring Yankee Group
Wandera_Mobile_Data
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and EndpointsSymantec
 
Internet of Things (IoT) Winning Strategy Development Exploiting Patents
Internet of Things (IoT) Winning Strategy Development Exploiting PatentsInternet of Things (IoT) Winning Strategy Development Exploiting Patents
Internet of Things (IoT) Winning Strategy Development Exploiting Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Agile mobility solutions v.1.2
Agile mobility solutions v.1.2Agile mobility solutions v.1.2
Agile mobility solutions v.1.2
Akhil B Singh
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
Phil Reynolds
 
Acc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile DevicesAcc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile DevicesWendy Wang
 
Cite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_finalCite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_finalIntralinks
 
Smart City Alliance final 09 18 2014 cisco+ibm
Smart City Alliance final 09 18 2014 cisco+ibmSmart City Alliance final 09 18 2014 cisco+ibm
Smart City Alliance final 09 18 2014 cisco+ibm
Rick Huijbregts
 
Misd chap 11 distributed management
Misd chap 11 distributed managementMisd chap 11 distributed management
Misd chap 11 distributed managementEdiey Smile
 

What's hot (15)

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Mobile Myths in Enterprise Development
Mobile Myths in Enterprise DevelopmentMobile Myths in Enterprise Development
Mobile Myths in Enterprise Development
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
 
Research report
Research reportResearch report
Research report
 
Wandera Enterprise Mobile Data Featuring Yankee Group
Wandera Enterprise Mobile Data Featuring Yankee GroupWandera Enterprise Mobile Data Featuring Yankee Group
Wandera Enterprise Mobile Data Featuring Yankee Group
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints
 
Internet of Things (IoT) Winning Strategy Development Exploiting Patents
Internet of Things (IoT) Winning Strategy Development Exploiting PatentsInternet of Things (IoT) Winning Strategy Development Exploiting Patents
Internet of Things (IoT) Winning Strategy Development Exploiting Patents
 
Agile mobility solutions v.1.2
Agile mobility solutions v.1.2Agile mobility solutions v.1.2
Agile mobility solutions v.1.2
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
Acc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile DevicesAcc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile Devices
 
Cite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_finalCite conference intralinks_industrialization_or_consumerization_final
Cite conference intralinks_industrialization_or_consumerization_final
 
Smart City Alliance final 09 18 2014 cisco+ibm
Smart City Alliance final 09 18 2014 cisco+ibmSmart City Alliance final 09 18 2014 cisco+ibm
Smart City Alliance final 09 18 2014 cisco+ibm
 
Misd chap 11 distributed management
Misd chap 11 distributed managementMisd chap 11 distributed management
Misd chap 11 distributed management
 

Similar to DMS Expo: Workplace 2025 -- The Reality TV Show

IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
Cisco Mobility
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021
Learningade
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
Shuja Ahmad
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
Barcoding, Inc.
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
Pomeroy
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Jeremy Siewert
 
Corporate Myths about enterprise mobility solutions to come over
Corporate Myths about enterprise mobility solutions to come overCorporate Myths about enterprise mobility solutions to come over
Corporate Myths about enterprise mobility solutions to come over
iMOBDEV Technologies Pvt. Ltd.
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
Priyanka Aash
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
Livingstone Advisory
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
Chandra Sekhar Tondepu
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15
Tirrah Switzer
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
inside-BigData.com
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
Jose R
 
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
poore120
 
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
openi_ict
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
Trefor Smith
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechUBM (Technology)
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising businessSno Jutt
 

Similar to DMS Expo: Workplace 2025 -- The Reality TV Show (20)

IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
Corporate Myths about enterprise mobility solutions to come over
Corporate Myths about enterprise mobility solutions to come overCorporate Myths about enterprise mobility solutions to come over
Corporate Myths about enterprise mobility solutions to come over
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
 
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
FIA Dublin Presentations: Mobile Innovation Economics: What's the future of p...
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in Tech
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

DMS Expo: Workplace 2025 -- The Reality TV Show

  • 1. 1BigData Analytics Panel-Diskussion DMS EXPO 2013Moderation Dr. Joachim Hartmann IBT@DMSEXPO Richard MedinaRichard Medina Co-Founder & PrincipalCo-Founder & Principal ConsultantConsultant Workplace 2025 -Workplace 2025 - The RealityThe Reality TV ShowTV Show
  • 2. © Doculabs, Inc. 2013 The Successful Workplace in 2025 In 2025, the successful mobile and social workplace will: 1.Have a baseline of adequacy in the new technologies 2.Have some solid mobile and social line-of-business applications 3.Will address the serious inefficiencies and risks of mobile and social It’s a lot more exciting than it sounds!
  • 3. © Doculabs, Inc. 2013 The Winners Do 4 Things Right 1. They focus on addressing the Fragmentation Problem 2. They establish the minimal (necessary) conditions for success with systems of engagement (SOEs) 3. They then pick and successfully implement the right mobile and social line-of-business applications 4. They focus on controlling the serious inefficiencies and risks of mobile and social
  • 4. © Doculabs, Inc. 2013 #1: What is the Fragmentation Problem? 1. The Fragmentation Problem results from the explosion of SOEs 2. SOEs include mobile applications, social media, wireless access, “life splicing”, multiple BYOD devices, synching everything 3. The Problem is uncontrolled diversity, failed enterprise synching, content stored in multiple locations, multiple and varied content formats, no security control, no version control, no process control, no backup, and failed access.
  • 5. © Doculabs, Inc. 2013 #2: How Do They Establish a Baseline of Adequacy? 1. They assess themselves using SOE categories. 2. They implement general baseline principles. 3. They address over-retention by dividing the monster into 2 more tractable sub-problems: day-forward information disposition and historical information disposition – Day-forward information disposition is easier – Historical information disposition is much harder, takes years, and requires a solid methodology and mix of technologies
  • 6. © Doculabs, Inc. 2013 #3: Which SOE Applications Do They Implement? 1. There are 3 kinds of applications: – 1) “Pure” SORs (systems of record), 2)“Pure” SOEs, and 3) SOEs that integrate with SORs 1. The 3rd kind – social-enabled and mobile-enabled ECM applications – typically beat the other 2 kinds in ROI and controlling risk. 2. So the Winners in 2025 focused most of their attention on social/mobile-enabled ECM applications. 3. But they did so one step at a time – in Content, Process, or Participation.
  • 7. © Doculabs, Inc. 2013 #4: How Do They Address the Risks and Inefficiencies of SOEs? 1. The Winners in 2025 think of SOEs in terms of optimization problems. 2. You have an optimization problem whenever you have some objectives or factors that you want to improve – but you can’t maximize them all because they conflict with each other. 3. SOEs are full of them: participation vs. quality; usability vs. security; the needs of “the business” vs. the needs of the “risk managers” – versus the needs of IT. 4. It’s all about finding and implementing many optimal compromises that let you get sufficient benefits while controlling the downside. 5. The Winners in 2025 find the right balance for each problem – and then “bake them into” the standard solutions and expected behaviors for each type of application.
  • 8. © Doculabs, Inc. 2013 #4: How Do They Address the Risks and Inefficiencies of SOEs? 1. The Winners in 2025 think of SOEs in terms of optimization problems. 2. You have an optimization problem whenever you have some objectives or factors that you want to improve – but you can’t maximize them all because they conflict with each other. 3. SOEs are full of them: participation vs. quality; usability vs. security; the needs of “the business” vs. the needs of the “risk managers” – versus the needs of IT. 4. It’s all about finding and implementing many optimal compromises that let you get sufficient benefits while controlling the downside. 5. The Winners in 2025 find the right balance for each problem – and then “bake them into” the standard solutions and expected behaviors for each type of application.

Editor's Notes

  1. First, do a – focused, quick -- Current State Assessment of your organization’s situation, particularly with respect to ECM and SOEs – mobile, social, and the cloud. Address the ECM categories: people, process, technology, and content. There’s a solid methodology for doing this. But address and document the important SOE issues. Look for your Social Media policy and provide one if you don’t have one. (If you don’t have one, download a starter policy and tweak it.)   Assess and document the important SOE categories and issues, such as: the division of labor between IT and users, the capabilities used, the configurations, the types of devices (such as smart phones, Blackberries, iPads), and the types of users and user scenarios.   You’ll see lots of Fragmentation : uncontrolled diversity , failed enterprise synching , and lots of system of engagement problems. For basic ECM health these need to be managed at the enterprise level. You can tackle them while you address the Specific Applications , but these are more important than Specific Applications because the Fragmentation Problem will destroy you if you ignore it.   Second, Implement general baseline principles across information silos, content formats, devices, business units, and organizations.   Third, address over-retention. This is a huge problem that would have plagued us without the explosion of SOEs and fragmentation -- but it’s far worse with them. Think of email and twitter feeds, distributed repositories inside and outside of your firewalls and organizations, and so on. Organizations have been over-retaining electronic information and failing to dispose of it in a legally defensible manner when business and law will allow. It’s an issue you must address if you’re going to be letting folks seriously “engage” with Systems of Engagement.   Almost all organizations over-retain but this problem is far worse for bigger organizations. So if you’re a small firm you may be in pretty good shape. But if you’re big, you may have hundreds of TBs or even PBs of information that is compounding. So you must address it to meet General Adequacy.   The best way to address this monster problem of over-retention is to break it into 2 more tractable sub-problems: day-forward information disposition and historical informational disposition.   Addressing day-forward over-retention is much easier to address than historical retention -- even though addressing it messes with employees’ day-to-day activities. The key is to initiate information lifecycle (ILM) practices on a “day-forward” basis first, so any new content created or saved is assigned a disposition period. Then provide employees with very clear and explicit guidance for the acceptable use of available tools for dynamic content and their associated retention periods. An example is “retain non-records for 3 years, and retain official records per the retention schedule.”   Address historical content over-retention by using a defensible disposition methodology. The good news is that there’s a methodology to follow. It’ll be a long haul and you may be at it for years, but you can tackle it incrementally and you’ll start getting immediate benefits