IT is often hesitant about taking new directions because of the number of unfamiliar technologies competing for attention, budgetary constraints, fear of change, and skepticism about which new direction will actually provide value. Pick the right technologies to deploy in 2011 and stay ahead of the curve.
•Understand which new technologies provide clear organizational value.
•Identify the candidate new technologies the organization should consider in 2011.
•Assess technology which should be retired in preparation for the new technology.
Use this solution set to help plan technology adoption for 2011 and beyond. An assessment tool for helping with the selection process is also included in this set.
The Work Ahead in Manufacturing: Fulfilling the Agility MandateCognizant
According to our research, manufacturers are well ahead of other industries in their IoT deployments but need to marshal the investment required to meet today’s intensified demands for business resilience.
IoT: Powering the Future of Business and Improving Everyday LifeCognizant
New survey shows IoT at scale is a critical path, but many companies struggle to realize value. See how 10 companies are overcoming these challenges and succeeding in the new normal.
Modernizing IT Operations for Digital EconomyBojan Simic
Research study based on insights from more than 900 organizations. Includes analysis of 14 key areas for making IT Operations effective in Digital Economy.
The Work Ahead in Manufacturing: Fulfilling the Agility MandateCognizant
According to our research, manufacturers are well ahead of other industries in their IoT deployments but need to marshal the investment required to meet today’s intensified demands for business resilience.
IoT: Powering the Future of Business and Improving Everyday LifeCognizant
New survey shows IoT at scale is a critical path, but many companies struggle to realize value. See how 10 companies are overcoming these challenges and succeeding in the new normal.
Modernizing IT Operations for Digital EconomyBojan Simic
Research study based on insights from more than 900 organizations. Includes analysis of 14 key areas for making IT Operations effective in Digital Economy.
Just as computing and the World-Wide Web progressed through stages of maturity on the way to full acceptance, artificial intelligence is destined to do the same. By understanding the comparable challenges that were overcome and benefits achieved with earlier technologies, organizations can better see today where AI is heading and ensure that they are properly positioned to reap its full value.
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedCognizant
Changing market dynamics are propelling Asia-Pacific businesses to take a highly disciplined and focused approach to ensuring that their AI initiatives rapidly scale and quickly generate heightened business impact.
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Cognizant
Amid constant change, industry leaders need an upgraded IT infrastructure capable of adapting to audience expectations while proactively anticipating ever-evolving business requirements.
Policy Administration Modernization: Four Paths for InsurersCognizant
The pivot to digital is fraught with numerous obstacles but with proper planning and execution, legacy carriers can update their core systems and keep pace with the competition, while proactively addressing customer needs.
The Post-Recession Call Center – The Focus, the Spend and the Opportunity After 18 months of a grim economy, companies are emerging from one of the most volatile business environments in recent history. Some are still feeling the pinch, while others are optimistic about what 2010 will bring. Regardless, companies are – for the first time in a long while – looking ahead, exiting survival mode and focusing on how they are going to gain a competitive advantage in a post-recession environment.
Rising Above the Tide of Emerging TechnologiesFrontRange
Take a look at some of the key emerging technology trends and drivers that are impacting the "business" of IT and help you find a safe harbor to not only help you stay on top of, but ahead of these fast moving technology waves.
Watch the full webinar: http://go.frontrange.com/FRSMWWCDALLRiseAbovetheTideofEmergingTechnologiesOnDemandWebinar_Reg.html
Why IT Struggles With Digital Transformation and What to Do About Itrun_frictionless
To win the digital transformation race, successful CIOs need to overcome three immense challenges: Massive backlogs, legacy debt and scarce resources. And, at the same time they need to embrace new methods, better suited to fast-paced innovation.
www.runfrictionless.com
Shared Service Centers: Risks & Rewards in the Time of CoronavirusCognizant
Our recent research reveals that organizations are reassessing the pros and cons of captive services. Companies are twice as likely to reduce than increase their use of shared service centers.
What are the Benefits of Enterprise ArchitectureSian Harding
The Benefits of Enterprise Architecture include:
• More Effective and Efficient Business Operations
• More Effective and Efficient Digital Transformation and IT Operations
• Better Return on Existing Investment and Reduced Risk for Future Investment
• Faster Simpler and Cheaper Procurement
Manufacturers were hard hit by COVID-19, but our research reveals the next best steps to take, based on the investments digital leaders in the industry have made and plan to make.
As the rise in sophisticated digital technologies drives an exponential change in online customer behaviour, the need for businesses to embrace digital transformation has never been greater.
Serving the long tail white-paper (how to rationalize IT yet produce more apps)Newton Day Uploads
Businesses benefit from having fewer technology tools in their 'enterprise stack'. Yet CIOs still need to encourage innovation and employ software tools as an enabler for growth and cost reduction. This white paper focuses on the role of Situational Applications platforms to reduce the number of technology platforms whilst increasing opportunities to serve the long-tail of applications demands from individuals and communities of users whose needs are unfulfilled by core enterprise platforms.
Are you managing GRC in the most effective manner? Is it contributing to business governance or becoming a burden ? We will discuss the current state of GRC and recognized business drivers as well as supportive risk management infrastructures. Strategies for the alignment of business interests with enterprise GRC programs to establish a complete, auditable, less time consuming program which benefits from management visibility and compliance readiness will additionally be presented. Utilize GRC to manage your business, not to burden it.
James P Finn, Modulo
James has twenty five years experience in security and disaster recovery consulting, managing and delivering enterprise solutions to more than 200 worldwide commercial and government clients.
He has held various management and consulting positions in the information security field including as a worldwide IBM Corporate Auditor for Information Security reporting to the Corporation’s Board of Directors and the as the founding Principal of both the IBM and Unisys Security Consulting Practices and as Vice President of Risk Management for Modulo.
He has consulted in more than 38 countries (U.S., Asia, Europe, South America) on business, technical security and recovery solutions to assist clients to achieve and maintain effective goverance across the full spectrum of security and business recovery disciplines. James is a Microsoft MSRA trained assessor, a KPMG trained SOX auditor and also holds Business Continuity certifications.
He is frequently requested as a speaker at international industry conferences, live webcasts and TV and radio news shows and is the author of over 50 media articles on computer security
The paper outlines a practical “how-to” guidance to strategize and implement more effective mobile enterprise programs and details the robust capabilities that mobile enterprise partners can bring to the development and support of your corporate owned device or BYOD mobile enterprise programs.
CHIME LIVE Webinar: Digital Maturity in Health Systems – The DigiM Framework ...Damo Consulting Inc.
CHIME LIVE Webinar
Digital Maturity in Health Systems – The DigiM Framework and How to Use it with Sara Vaezy and Paddy Padmanabhan
Learn Objectives:
- Understanding digital maturity in health systems
- Applying an objective, structured assessment tool such as DigiM to evaluate digital maturity
- Developing a roadmap for accelerating technology-led transformation
Health systems have been on a digital transformation journey for the past few years. However, there is no structured framework to assess the maturity of health systems, specifically from a technology enablement standpoint. Damo Consulting’s DigiM framework addresses this gap with an online assessment tool that helps healthcare leaders benchmark themselves against their peers. The framework also assesses the relative maturity of the digital transformation vision against the execution of the strategy.
Using recently concluded research and data points from self-assessments by several health systems, this session will provide a roadmap for digital transformation leaders looking to take an objective view of their progress and prioritize their investments to meet their enterprise goals.
For queries, write to info@damoconsulting.net
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...Capgemini
The Internet is expanding. And this is not just in terms of getting accessible to more people; it is expanding beyond humans. Machines are becoming connected. Machines are talking to humans, but increasingly, they are also talking to one another. And this interconnectedness of machines, or the Internet of Things (IoT), is a potential multi-trillion dollar market that organizations can now tap into.
However, do organizations realize the scale of the opportunity? Capgemini Consulting conducted an extensive survey of IoT products and services of over 100 leading companies across North America and Europe. We also spoke at length with several industry executives at companies developing IoT solutions to understand the challenges companies face. This article presents the results of the survey and highlights the key hurdles companies are facing.
e-commerce - lead generation case study movingDneedle
movingDneedle campaign strategy in the Personalized Email marketing frame helps one of the industry pioneers in E-Commerce and Business Process Solutions move the needle on Deals.
DIGITAL TRANSFORMATION IN THE NEXT NORMAL: How consumerism, technology and th...Damo Consulting Inc.
What was assumed to be a transformation journey stretching over several years has now shrunk to a matter of months, and the pace of change is accelerating. Paddy Padmanabhan and Ed Marx, the authors of the first book published on healthcare digital transformation since the pandemic hit us, discuss 5 major themes in healthcare’s digital transformation, and what the next normal looks like.
They will present findings from recent research on how mid-tier systems must approach transformation.
1. How COVID-19 accelerated the timelines for transformation
2. Why health systems must go beyond just telehealth
3. Why digital leaders must develop enterprise roadmaps
4. How CIO’s can transform IT to support digital health
5. How technology decisions must deliver enterprise-level impact
At any given moment it is easy to look back to see how technology has changed over time. At the same time it is difficult to see what transformations are taking place in current moment, and even more difficult to see where things are going.
We will explore what technology is. For us it may be the latest tech stuff we see, something new. But what about everyday objects that we take for granted. Are those not technologies also?
How does technology evolve? We look at some ideas on evolution of technology and how it is similar to biology in some ways. We will also look at the origin of the word technology. Finally we will define the term we will use in the course. Terms defined are technology, product performance, and innovation to name few.
Just as computing and the World-Wide Web progressed through stages of maturity on the way to full acceptance, artificial intelligence is destined to do the same. By understanding the comparable challenges that were overcome and benefits achieved with earlier technologies, organizations can better see today where AI is heading and ensure that they are properly positioned to reap its full value.
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedCognizant
Changing market dynamics are propelling Asia-Pacific businesses to take a highly disciplined and focused approach to ensuring that their AI initiatives rapidly scale and quickly generate heightened business impact.
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Cognizant
Amid constant change, industry leaders need an upgraded IT infrastructure capable of adapting to audience expectations while proactively anticipating ever-evolving business requirements.
Policy Administration Modernization: Four Paths for InsurersCognizant
The pivot to digital is fraught with numerous obstacles but with proper planning and execution, legacy carriers can update their core systems and keep pace with the competition, while proactively addressing customer needs.
The Post-Recession Call Center – The Focus, the Spend and the Opportunity After 18 months of a grim economy, companies are emerging from one of the most volatile business environments in recent history. Some are still feeling the pinch, while others are optimistic about what 2010 will bring. Regardless, companies are – for the first time in a long while – looking ahead, exiting survival mode and focusing on how they are going to gain a competitive advantage in a post-recession environment.
Rising Above the Tide of Emerging TechnologiesFrontRange
Take a look at some of the key emerging technology trends and drivers that are impacting the "business" of IT and help you find a safe harbor to not only help you stay on top of, but ahead of these fast moving technology waves.
Watch the full webinar: http://go.frontrange.com/FRSMWWCDALLRiseAbovetheTideofEmergingTechnologiesOnDemandWebinar_Reg.html
Why IT Struggles With Digital Transformation and What to Do About Itrun_frictionless
To win the digital transformation race, successful CIOs need to overcome three immense challenges: Massive backlogs, legacy debt and scarce resources. And, at the same time they need to embrace new methods, better suited to fast-paced innovation.
www.runfrictionless.com
Shared Service Centers: Risks & Rewards in the Time of CoronavirusCognizant
Our recent research reveals that organizations are reassessing the pros and cons of captive services. Companies are twice as likely to reduce than increase their use of shared service centers.
What are the Benefits of Enterprise ArchitectureSian Harding
The Benefits of Enterprise Architecture include:
• More Effective and Efficient Business Operations
• More Effective and Efficient Digital Transformation and IT Operations
• Better Return on Existing Investment and Reduced Risk for Future Investment
• Faster Simpler and Cheaper Procurement
Manufacturers were hard hit by COVID-19, but our research reveals the next best steps to take, based on the investments digital leaders in the industry have made and plan to make.
As the rise in sophisticated digital technologies drives an exponential change in online customer behaviour, the need for businesses to embrace digital transformation has never been greater.
Serving the long tail white-paper (how to rationalize IT yet produce more apps)Newton Day Uploads
Businesses benefit from having fewer technology tools in their 'enterprise stack'. Yet CIOs still need to encourage innovation and employ software tools as an enabler for growth and cost reduction. This white paper focuses on the role of Situational Applications platforms to reduce the number of technology platforms whilst increasing opportunities to serve the long-tail of applications demands from individuals and communities of users whose needs are unfulfilled by core enterprise platforms.
Are you managing GRC in the most effective manner? Is it contributing to business governance or becoming a burden ? We will discuss the current state of GRC and recognized business drivers as well as supportive risk management infrastructures. Strategies for the alignment of business interests with enterprise GRC programs to establish a complete, auditable, less time consuming program which benefits from management visibility and compliance readiness will additionally be presented. Utilize GRC to manage your business, not to burden it.
James P Finn, Modulo
James has twenty five years experience in security and disaster recovery consulting, managing and delivering enterprise solutions to more than 200 worldwide commercial and government clients.
He has held various management and consulting positions in the information security field including as a worldwide IBM Corporate Auditor for Information Security reporting to the Corporation’s Board of Directors and the as the founding Principal of both the IBM and Unisys Security Consulting Practices and as Vice President of Risk Management for Modulo.
He has consulted in more than 38 countries (U.S., Asia, Europe, South America) on business, technical security and recovery solutions to assist clients to achieve and maintain effective goverance across the full spectrum of security and business recovery disciplines. James is a Microsoft MSRA trained assessor, a KPMG trained SOX auditor and also holds Business Continuity certifications.
He is frequently requested as a speaker at international industry conferences, live webcasts and TV and radio news shows and is the author of over 50 media articles on computer security
The paper outlines a practical “how-to” guidance to strategize and implement more effective mobile enterprise programs and details the robust capabilities that mobile enterprise partners can bring to the development and support of your corporate owned device or BYOD mobile enterprise programs.
CHIME LIVE Webinar: Digital Maturity in Health Systems – The DigiM Framework ...Damo Consulting Inc.
CHIME LIVE Webinar
Digital Maturity in Health Systems – The DigiM Framework and How to Use it with Sara Vaezy and Paddy Padmanabhan
Learn Objectives:
- Understanding digital maturity in health systems
- Applying an objective, structured assessment tool such as DigiM to evaluate digital maturity
- Developing a roadmap for accelerating technology-led transformation
Health systems have been on a digital transformation journey for the past few years. However, there is no structured framework to assess the maturity of health systems, specifically from a technology enablement standpoint. Damo Consulting’s DigiM framework addresses this gap with an online assessment tool that helps healthcare leaders benchmark themselves against their peers. The framework also assesses the relative maturity of the digital transformation vision against the execution of the strategy.
Using recently concluded research and data points from self-assessments by several health systems, this session will provide a roadmap for digital transformation leaders looking to take an objective view of their progress and prioritize their investments to meet their enterprise goals.
For queries, write to info@damoconsulting.net
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...Capgemini
The Internet is expanding. And this is not just in terms of getting accessible to more people; it is expanding beyond humans. Machines are becoming connected. Machines are talking to humans, but increasingly, they are also talking to one another. And this interconnectedness of machines, or the Internet of Things (IoT), is a potential multi-trillion dollar market that organizations can now tap into.
However, do organizations realize the scale of the opportunity? Capgemini Consulting conducted an extensive survey of IoT products and services of over 100 leading companies across North America and Europe. We also spoke at length with several industry executives at companies developing IoT solutions to understand the challenges companies face. This article presents the results of the survey and highlights the key hurdles companies are facing.
e-commerce - lead generation case study movingDneedle
movingDneedle campaign strategy in the Personalized Email marketing frame helps one of the industry pioneers in E-Commerce and Business Process Solutions move the needle on Deals.
DIGITAL TRANSFORMATION IN THE NEXT NORMAL: How consumerism, technology and th...Damo Consulting Inc.
What was assumed to be a transformation journey stretching over several years has now shrunk to a matter of months, and the pace of change is accelerating. Paddy Padmanabhan and Ed Marx, the authors of the first book published on healthcare digital transformation since the pandemic hit us, discuss 5 major themes in healthcare’s digital transformation, and what the next normal looks like.
They will present findings from recent research on how mid-tier systems must approach transformation.
1. How COVID-19 accelerated the timelines for transformation
2. Why health systems must go beyond just telehealth
3. Why digital leaders must develop enterprise roadmaps
4. How CIO’s can transform IT to support digital health
5. How technology decisions must deliver enterprise-level impact
At any given moment it is easy to look back to see how technology has changed over time. At the same time it is difficult to see what transformations are taking place in current moment, and even more difficult to see where things are going.
We will explore what technology is. For us it may be the latest tech stuff we see, something new. But what about everyday objects that we take for granted. Are those not technologies also?
How does technology evolve? We look at some ideas on evolution of technology and how it is similar to biology in some ways. We will also look at the origin of the word technology. Finally we will define the term we will use in the course. Terms defined are technology, product performance, and innovation to name few.
Wearable Technology Futures 2020: A New Path for Public Health?Ogilvy Health
This report, Wearable Technology Futures 2020: A New Path for Public Health?, lends insight into some difficult but important questions currently challenging the health technology industry. For example, how can wearable technology better appeal to those who could most benefit from it—like the inactive or those fighting obesity—in addition to the health enthusiasts and technophiles currently embracing these wearable gadgets? Ogilvy health specialists brought their knowledge and expertise to bear on this question, as well as many others whose answers could help shape the future development of the technology.
Wearable Technology Futures 2020: A New Path for Public Health? is a three-part report: Part 1 analyses the approach developers are currently using and how this aligns with published thinking and evidence on behavior change techniques; Part 2 fuels the debate by suggesting, through six different scenarios, that the true potential of wearable technology can only be realized when we approach its application beyond the device and truly align around public health directives; and Part 3 takes an in-depth look at four popular devices and their associated apps as experienced by Ogilvy’s own user panel, clocking up a total of 23,040 hours.
Authors: David Davenport-Firth, Lexi Fletcher, Matt Balogh, Ritesh Patel, Simon Stebbing
History has many examples of powerful companies that seem to be unbeatable. Then in a short time they become irrelevant due to new companies with new ideas. One of the factors in such transformation is technology. Never in history has technological change been so important in building and destroying companies.
We look at few examples of successful companies that fail to address the changing times and become disrupted. We also look at why technology emerges when it does and why some ideas can only be realised when certain conditions are met.
In this first lecture we set the tone for the course and define the themes that we will be looking at.
App Platforms and Bimodal Strategies Can Help CIOs Fuel Digital InnovationAppian
The technology demands of the modern enterprise are so great that IT departments can have a difficult time keeping up which makes digital innovation in technology and business processes critical.
Read the full blog to learn how a digital transformation platform can help you keep up with the demand for digital innovation: http://ap.pn/2jazcze
Industry 4.0 is the name of the next industrial revolution which is fueled by the advancement of digital technologies. It
is dramatically changing how companies engage in business activities. As a result, the disruptive nature of Industry 4.0
demands a reassessment of the requirements for IT. On the one hand, there is the possibility that the responsibilities of Chief Information Officers (CIOs) could be taken over by other executives such as the Chief Digital Officer (CDO) or the Chief Technology Officer (CTO). On the other hand, this
recent development creates entirely new perspectives for positioning themselves and their IT departments
within the business.
The impact of digital technologies is reaching a magnitude at which IT is considered a substantial
business driver, potentially placing CIOs in the driver’s seat.
10 Application Modernization Principles that Enhance the Digital JourneyCognizant
The COVID-19 crisis has made experience-centricity and IT agility paramount to nearly every business. But getting there with ancient applications infrastructure is easier said than done. Here's how organizations can overhaul heritage applications to meet customers' lofty digital experience and service expectations.
New technology trend opportunities and challengesSaeed Al Dhaheri
This presentation is part of another presentation titled "Roles of ICT in Real Life Scenarios" which was presented during the International Conference on Next Generation Computing & Communication Technologies 2014 in Dubai. The presentation address the opportunities and challenges of the new technology forces: Cloud, Mobile, Social Media and Information and their impact of the traditional role of the IT.
Welcome to the future of the Internet of Things. IoT Viewpoints 2018 is a collection of Ovum’s newest thought leadership on emerging IoT trends, technologies and opportunities.
AppSphere 15 - Shining a Light on Shadow IT: A New Way of Working for "Busine...AppDynamics
Brandon Bichler, a Partner at London-based consulting firm Elixirr, will walk through what this new operating model looks like and provide some real examples of where it has been implemented and is working. Furthermore, he will outline what you can do to:
- Sense check how healthy your company is in terms of the relationship between business and IT
- Start to build out the components of this new operating model, factoring in the culture and organisational nuances of your company
- Engage key stakeholders on this topic and secure their support for change
This deck was originally presented at AppSphere 2015.
How Intelligent Operations Enables Proactive Data Center ManagementITOutcomes
CIOs often live and die by the data center’s performance and availability numbers.
Nine out of 10 respondents to a 2014 survey of data center professionals showed that service availability is highly critical to their performance.
But at the same time, 41 percent of organizations missed their service availability goals for mission-critical systems in 2013. Not surprisingly, organizations with higher service availability goals were significantly less successful in meeting their goal.
But here’s a new way of thinking about improving data center metrics: IT departments should no longer be concerned with improving system performance and reducing downtime for its own sake. Rather, consider these as metrics for enabling IT to deliver more of what the business needs, when it needs it.
In other words, it’s time to transform infrastructure and application measurements from tactical to strategic metrics.
Building it infrastructure framework that drives innovation and business perf...GlobalStep
Whitepaper on Building IT infrastructure framework that drives innovation and business performance by GlobalStep.
The first trend is the buyer’s increased perception of IT Infrastructure service as a commodity which lowers perceived value and forces cost reductions. The second trend is that of increased complexity which is driven by disruptive technologies like cloud, virtualization and others along with innovative service models such as software-as-a-service and desktop-as-a-service.
The challenges of cost, complexity, and compliance are nearly overwhelming today's CIOs. Instead of devising business aligned IT programs, they are forced to concentrate on maintaining and managing a sloppy infrastructure. To tackle these challenges and to align with business goals, IT must shift its focus to become a business-centric line of business. From the large variety of our clients and our interaction with their IT Infrastructure leaders, we understand that they strongly believe that consistent innovation is their only means of meeting user expectations and rapidly evolving business demands within budgetary constraints. This innovation is not just about using a new technology but also about doing the same thing differently, which involves new way of interacting with the customers and vendors.
www.globalstep.com
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
This new report on enterprise mobility applications highlights the alarming gap between Central IT and line-of-business IT environments. Millennials in particular are showing signs of growing frustration with the devices and software tools available to support them in the workplace. Many are making their own mobility arrangements, through ‘shadow IT’, despite growing regulatory risk. The advent of the ‘Internet of Things’ will further exacerbate the situation as mobile staff seek access to real time data from their phones and tablets.
Our recent survey of over 100 financial service organizations, conducted by Forbes Insights in the UK and North America, indicates that despite current business and employee demand, enterprise mobile applications remain at a very early stage of maturity, with less than a quarter of employees eligible to access such facilities. The implications here are profound, given the need to support mobile working with appropriate tools in every sphere of corporate activity today.
Many employees complain that the only advance over the last ten years has been to ‘mobilize the laptop’. This merely emulates the traditional desktop environment outside the office. Set against this stark background of underperformance in the mobility area, Central IT appears to be preoccupied with legacy issues such as costly infrastructures and aging systems. Our survey reveals that despite having developed policies and tools to address enterprise mobility, Central IT has little visibility of what is actually going on within the lines of business or at the end user level.
Nor does it have the necessary resources currently to respond rapidly to the growing pressures for workplace mobility. External agencies appear to be stepping in to fill this gap, frequently circumventing Central IT. Mobility remains low on the Central IT agenda.
Research study based on insights from more than 900 organizations. Includes analysis of 14 key areas for making IT Operations effective in Digital Economy
Similar to Adopt new technology for 2011 and beyond (20)
Your Challenge
As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating.
Vendors use a lot of marketing jargon, buzzwords, and statistics to sell their solutions, making objective evaluation rather difficult.
The endpoint protection (EPP) market is overcrowded and fragmented, resulting in information overload and consequently, a difficult vendor assessment.
Disparate product solutions are being bundled into one-off solutions or suites, often resulting in less efficient solutions than the more niche players.
Imminent obsolescence is an issue. Previous EPP solutions have not adapted with the rapidly evolving threat landscape and are no longer relevant, resulting in breaches or vulnerabilities.
Critical Insight
Don’t let vendors and market reports define your endpoint protection needs. Identify the use cases and corresponding feature sets that best align with your risk profile before evaluating the vendor marketspace.
Your security controls are diminishing in value (if they haven’t already). Develop a strategy that accounts for the rapid evolution and imminent obsolescence of your endpoint controls. Plan for future needs when making purchasing decisions today.
Endpoint protection is a matter of defense in depth and risk modelling, there is no silver bullet protection and mitigation solution. As end-client-technology providers release regular product/software updates, security tools will become outdated. Multiyear endpoint protection commitments will leave you playing a constant game of catch up.
Impact and Result
The solution is a holistic internal security assessment that not only identifies, but satisfies, your desired endpoint protection feature set with the corresponding endpoint protection suite and a comprehensive implementation strategy.
Use this blueprint to walk through the steps of selecting and implementing an endpoint protection solution that best aligns with your organizational needs.
Your Challenge
Companies understand the importance of business process improvement (BPI) and recognize the touted benefits: cost savings, waste elimination, and process efficiency.
With this said, 70% of companies that embark on process improvement initiatives fail.
The high probability of failure is attributed to a number of factors, including lack of continuous improvement and failing to define measurable outcomes.
Our Advice
Adopt a forward-facing outlook. Don’t focus solely on the current state, set improvement targets upfront to drive the initiative.
Break problems down into root-cause variables. Don’t look at the symptom, dive deeper and alleviate the root cause.
Empower business analysts. Create a practical process improvement methodology that your analysts can follow.
Impact and Result
Kick off process improvement by identifying the goals and defining the improvement targets.
Start by referring to the operating model and identifying level 1, 2, and 3 processes. Once the team understands the relationship between processes, they can begin to map a level 3 process using a standard mapping notation.
Use qualitative and quantitative techniques for analyzing the root cause rather than the symptoms.
Ensure the design is aligned with the initial improvement targets. Focus on value-added activities.
Consistently monitor the process and assess the root-cause variables to gauge the success of the process improvements.
Your Challenge
Internal stakeholders usually have different – and often conflicting – needs and expectations that require careful facilitation and management.
Vendors have well-honed negotiating strategies. Without understanding your own position and leverage points, it’s difficult to withstand their persuasive – and sometimes pushy – tactics.
Software – and software licensing – is constantly changing, making it difficult to acquire and retain subject matter expertise.
Our Advice
Critical Insight
Conservatively, it’s possible to save 5% of the overall IT budget through comprehensive software contract review.
Focus on the terms and conditions, not just the price.
Learning to negotiate is crucial.
Impact and Result
Look at your contract holistically to find cost savings.
Guide communication between vendors and your organization for the duration of contract negotiations.
Redline the terms and conditions of your software contract.
Prioritize crucial terms and conditions to negotiate.
Your Challenge
Infrastructure managers and change managers need to re-evaluate their change management process due to slow change turnaround time, too many unauthorized changes, too many incidents and outages because of poorly managed changes, or difficulty evaluating and prioritizing changes.
IT system owners often resist change management because they see it as slow and bureaucratic.
Infrastructure changes are often seen as “different” from application changes, and two (or more) processes may exist.
Our Advice
Critical Insight
ITIL provides a usable framework for change management, but full process rigor is not appropriate for every change request.
You need to design a process that is flexible enough to meet the demand for change, and strict enough to protect the live environment from change-related incidents.
A mature change management process will minimize review and approval activity. Counterintuitively, with experience in implementing changes, risk levels decline to a point where most changes are “preapproved.”
Impact and Result
Create a unified change management process that reduces risk and takes a balanced approach toward deploying changes, while also maintaining throughput of innovation and enhancements.
Categorize changes based on an industry-standard risk model with objective measures of impact and likelihood.
Establish and empower a change manager and change advisory board with the authority to manage, approve, and prioritize changes.
Establish easy-to-follow intake, assessment, and approval processes, and ensure that there is visibility into changes across the organization.
Your Challenge
Infrastructure, by focusing on the reliability, availability, and serviceability of existing platforms, is perceived as a cost center rather than a business enabler.
Business stakeholders look to external vendors, rather than Infrastructure, to exploit emerging technologies. This leads to duplication of effort, inconsistent standards, and ineffective IT governance.
Infrastructure directors are unable to draw a line showing how their activities directly support the overall business goals.
Our Advice
Critical Insight
Think of the roadmap as a service, not a product. Its value is inversely proportional to the time since its last update.
Alignment perception issues can be addressed by having the infrastructure practice formally engage and communicate with business stakeholders.
Shadow IT can provide business-ready initiatives that need only to be tweaked to align with Infrastructure’s internal goals.
Impact and Result
This blueprint will help you build:
A formal channel and way of communicating value bottom-up and top-down between IT and the executive team.
A methodology to prioritize and create projects that generate business value.
A tool that can produce multiple outputs of value for different audiences using the same data.
An ongoing roadmap process, rather than a static document, that is able to adjust and react to evolving business circumstances.
Your Challenge
Risk is an unavoidable part of IT. And what you don't know, can hurt you. The question is, do you tackle risk head-on or leave it to chance?
Get a handle on risk management quickly using Info-Tech's methodology and reduce unfortunate IT surprises.
Our Advice
Critical Insight
1. IT risk is business risk.
Every IT risk has business implications. Create an IT risk management program that shares risk accountability with the business.
2. Risk is money.
It’s impossible to make intelligent decisions about risks without knowing what they’re worth.
3. You don’t know what you don’t know.
And what you don’t know can hurt you – so find out. To find hidden risks, you need a structured approach.
Impact and Result
Stop leaving IT risk to chance. Transform your ad hoc IT risk management processes into a formalized, ongoing program and increase risk management success by 53%.
Take a proactive stance against IT threats and vulnerabilities by identifying and assessing IT’s greatest risks before they happen.
Involve key stakeholders including the business senior management team to gain buy-in and to focus on IT risks that matter most to the organization.
Share accountability for IT risk with business stakeholders and have them weigh-in on prioritizing investments in risk response activities.
Your Challenge
Service desk managers with immature service desk processes struggle with:
Low business satisfaction.
High cost to resolve incidents and implement requests.
Confused and unhappy end users.
High ticket volumes and a lack of root-cause analysis to reduce recurring issues.
Wasted IT time and wages resolving the same issues time and again.
Ineffective demand planning.
Our Advice
Critical Insight
Don’t be fooled by a tool that’s new. A new service desk tool alone won’t solve the problem. Service desk maturity improvements depend on putting in place the right people and processes to support the technology.
Service desk improvement is an exercise in organizational change. Engage specialists across the IT organization in building the solution, and emphasize how everyone stands to benefit from the initiative.
Organizations are sometimes tempted to track their work under a single ticket type. Unfortunately, the practice obscures the fact that incidents, requests, and projects require radically different amounts of time and resources, and can create the impression that IT is underperforming. Distinguish between incidents, requests, and projects, and design specific processes to support and track the performance of each activity.
Remember, the value of any IT service management (ITSM) tool is a function of the processes it supports and the adoption of those processes. The ITSM tool with the best functionality is worth little if you do not build the right processes, configure the tool to support them, and work to improve tool adoption in your organization.
Impact and Result
Increase business satisfaction.
Reduce recurring issues and ticket volumes.
Reduce average incident resolution time and average request implementation time.
Increase efficiency and lower operating costs.
Enhance demand planning.
Your Challenge
Companies are approving more projects than they can deliver. Most organizations say they have too many projects on the go and an unmanageable and ever-growing backlog of things to get to.
While organizations want to achieve a high throughput of approved projects, many are unable or unwilling to allocate an appropriate level of IT resourcing to adequately match the number of approved initiatives.
Portfolio management practices must find a way to accommodate stakeholder needs without sacrificing the portfolio to low-value initiatives that do not align with business goals.
Our Advice
Critical Insight
Failure to align projects with strategic goals and resource capacity are the most common causes of portfolio waste across organizations. Intake, approval, and prioritization represent the best opportunities to ensure this alignment.
More time spent with stakeholders during the ideation phase to help set realistic expectations for stakeholders and enhance visibility into IT’s capacity and processes is key to both project and organizational success.
Too much intake red tape will lead to an underground economy of projects that escape portfolio oversight, while too little intake formality will lead to a wild west of approvals that could overwhelm the PMO. Finding the right balance of intake formality for your organization is the key to establishing a PMO that has the ability to focus on the right things.
Impact and Result
Eliminate off-the-grid initiatives by establishing a centralized intake process that funnels requests into a single channel.
Improve the throughput of projects through the portfolio by incorporating the constraint of resource capacity to cap the amount of project approvals to that which is realistic.
Silence squeaky wheels and overbearing stakeholders by establishing a progressive approval and prioritization process that gives primacy to the highest value requests.
Read this Executive Brief to understand why your team should make the case to modernize your communications and collaboration infrastructure.
Understand why it's time to move forward with modernizing your communications infrastructure.
Discover the productivity and efficiency gains you can achieve.
Redefine how you think about communications.
Learn how to build a strategy that addresses both unified communications and collaboration.
Understand Info-Tech's methodology and approach to modernizing communications and collaboration infrastructure.
Your Challenge
Organizations have to adapt to a growing number of trends, putting increased pressure on IT to move at the same speed as the business.
The business, seeing that IT is slower to react, looks to external solutions to address its challenges and capitalize on opportunities.
IT and business leaders don’t have a clear and unified understanding or definition of an operating model.
Our Advice
Critical Insight
The IT operating model is not a static entity and should evolve according to changing business needs.
However, business needs are diverse, and the IT organization must recognize that the business includes groups that consume technology in different patterns. The IT operating model needs to support and enable multiple groups, while continuously adapting to changing business conditions.
Impact and Result
Determine how each technology consumer group interacts with IT. Use consumer experience maps to determine what kind of services consumer groups use and if there are opportunities to improve the delivery of those services.
Identify how changing business conditions will affect the consumption of technology services. Classify your consumers based on business uncertainty and reliance on IT to plan for the future delivery of services.
Optimize the IT operating model. Create a target IT operating model based on the gathered information about technology service consumers. Select different implementations of common operating model elements: governance, sourcing, process, and structure.
Info-Tech is the most innovative firm in the industry, and we pride ourselves on delivering better research than anyone.
Become a member and unlock a range of data-driven tools and resources to drive systematic IT improvement.
Your Challenge
It is difficult to start the project, engage the right people, and find the necessary requirements to drive the value of an enterprise architecture operating model.
It is challenging to navigate the common enterprise architecture (EA) frameworks and right-size them for your organization.
The EA practice may struggle to effectively collaborate with the business when making decisions, resulting in outcomes that fail to engage stakeholders.
Our Advice
Critical Insight
The benefits of an EA program are only realized when all components of the operating model enable the achievement of the program goals and objectives. Many times organizations overplay the governance card while ignoring the motivational aspects that can be addressed through the organization's structure or stakeholder relations.
Info-Tech’s methodology ensures that all components of an EA operating model are considered to optimize the performance of the EA program.
Impact and Result
Place and structure your EA team to address the needs of stakeholders and deliver on the previously created strategy.
Create an engagement model by understanding each relevant process of COBIT 5 and make stakeholder interaction cards to initiate conversations.
Recognize the need for governance and formulate the appropriate boards while considering various policies, principles, and compliance.
Develop a unique architecture development framework based on best-practice approaches with an understanding of the various architectural views to ensure the creation of a successful process.
Build a communication plan and roadmap to efficiently navigate through enterprise change and involve the necessary stakeholders.
Your Challenge
Business transformations are happening, but CIOs are often involved only when it comes time to implement change. This makes it difficult for the CIO to be perceived as an organizational leader.
CIOs find it difficult to juggle operational activities, strategic initiatives, and involvement in business transformation.
CIOs don’t always have the IT organization structured and mobilized in a manner that facilitates the identification of transformation opportunities, and the planning for and the implementation of organization-wide change.
Our Advice
Critical Insight
Don’t take an ad hoc approach to transformation.
You’re not in it alone.
Your legacy matters
Impact and Result
Elevate your stature as a business leader.
Empower the IT organization to act with a business mind first, and technology second.
Create a high-powered IT organization that is focused on driving lasting change, improving client experiences, and encouraging collaboration across the entire enterprise.
Generate opportunities for organizational growth, as manifested through revenue growth, profit growth, new market entry, new product development, etc.
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsInfo-Tech Research Group
Your Challenge
Data center operating costs continue to escalate as organizations struggle with data center sprawl.
While data center consolidation is an attractive option to reduce cost and sprawl, the complexity of these projects makes them extremely difficulty to execute.
The status quo is also not an option, as budget constraints and the challenges with managing multiple data centers continues to increase.
Our Advice
Critical Insight
Despite consolidation being an effective way of addressing sprawl, it is often difficult to secure buy-in and funding from the business.
Many consolidation projects suffer cost overruns due to unforeseen requirements and hidden interdependencies which could have been mitigated during the planning phase.
Organizations that avoid consolidation projects due to their complexity are just deferring the challenge, while costs and inefficiencies continue to increase.
Impact and Result
Successful data center consolidation will have an immediate impact on reducing data center sprawl. Maximize your chances of success by securing buy-in from the business.
Avoid cost overruns and unforeseen requirements by engaging with the business at the start of the process. Clearly define business requirements and establish common expectations.
While cost improvements often drive data center consolidation, successful projects will also improve scalability, operational efficiency, and data center redundancy.
Your Challenge
Organizations are struggling to keep up with today’s evolving threat landscape.
From technology sophistication and business adoption to the proliferation of hacking techniques and the expansion of hacking motivations, organizations are facing major security risks.
Every organization needs some kind of information security program to protect their systems and assets.
Organizations today face pressure from regulatory or legal obligations, customer requirement, and now, senior management expectations.
Our Advice
Critical Insight
Performing an accurate assessment of your current security operations and maturity levels can be extremely hard when you don’t know what to assess or how to assess it.
Alignment can be a difficult area for security to get right when it’s trying to balance both regular IT and the business.
Communication is needed between the business leaders, IT leaders, and the security team for an effective security strategy to be in place.
Impact and Result
Info-Tech has analyzed and integrated regulatory and industry best practice frameworks, combining COBIT 5, PCI DSS, ISO 27000, NIST SP800-53, and SANS to ensure an exhaustive approach to security.
Through this process, a comprehensive current state assessment, gap analysis, and initiative generation ensures that nothing is left off the table.
This project will elevate the perception of the security team from being a hindrance to the organization to an enabler.
Your Challenge
Even though organizations are now planning for Application Integration (AI) in their projects, very few have developed a holistic approach to their integration problems resulting in each project deploying different tactical solutions.
Point-to-point and ad hoc integration solutions won’t cut it anymore: the cloud, big data, mobile, social, and new regulations require more sophisticated integration tooling.
Loosely defined AI strategies result in point solutions, overlaps in technology capabilities, and increased maintenance costs; the correlation between business drivers and technical solutions is lost.
Our Advice
Critical Insight
Involving the business in strategy development will keep them engaged and align business drivers with technical initiatives.
An architectural approach to AI strategy is critical to making appropriate technology decisions and promoting consistency across AI solutions through the use of common patterns.
Get control of your AI environment with an appropriate architecture, including policies and procedures, before end users start adding bring-your-own-integration (BYOI) capabilities to the office.
Your Challenge:
As Portfolio Manager, you’re responsible for communicating portfolio results and future capacity to your steering committee.
Business and IT leaders need more accurate information on project status and resource availability to decide when to start and stop projects.
You need to better understand the needs of the PMO and assess the costs and benefits associated with different tools and approaches to PPM.
Our Advice - Critical Insight:
PPM is a practice, not a tool. Before succeeding with a commercial tool, you need to establish discipline and trust around reporting processes, which can be done using spreadsheets and other simple tools.
Portfolio management is separate from project management. Think of it as the accounting department for time. Project managers report into the portfolio and are held accountable to it, but it isn’t simply an extension of project management.
Our Advice - Impact and Result:
Decrease the wasted portfolio budget by reducing the number of cancelled projects and other sources of efficiency.
Establish the portfolio as the “one source of truth” for project reporting by increasing rigor around project status updating and reporting.
Align project intake with resource capacity to improve throughput, quality of estimates, and stakeholder satisfaction.
Your Challenge:
Implementing a shared services model is a difficult process to undertake, and is comprised of many different components. Becoming a shared services provider is comparable to becoming a vendor and most IT groups don’t have the capabilities to easily make the transition.
Most companies look to achieve cost reductions through offering a shared services model. Adopting a shared services model doesn’t always result in these intended cost reductions. Simply combining the operations of two IT organizations doesn’t necessarily result in economies of scale and cost efficiencies. Before leaping forward with your shared services implementation, determine if the project will deliver value to your organization.
Our Advice - Critical Insight:
Implementing a shared services model needs to be viewed as more than simply extending a current service to other sites. The organization providing services essentially turns into a vendor. As a vendor, think of the IT service you’re offering as the “product.”
Remember that there are people, process, and technology capability pre-requisites to successfully becoming a shared services provider. These capabilities are not typical for the average IT shop, and need to be taken into consideration when you look to transition to a shared services model.
Our Advice - Impact and Result:
Before jumping into the implementation of your shared services project, assess your customer requirements and your current people, process, and technology capabilities to assess whether your organization is ready to implement a shared services model.
Understand the financial implications of moving to a shared services model prior to implementing. Make sure there is a strong case for implementation.
Your Challenge:
Situation
Enterprise Architecture increases the organization’s ability to provide consistent services, accessible information, scalable infrastructure, and flexible technology integration on demand. It helps bridge the gap between business and IT and creates a shared enterprise vision.
Complication
EA programs that are run without the required EA capability level are prone to failure.
EA capability optimization and EA operating model design skills are not common, as they are not everyday tasks.
Our Advice:
Critical Insight
Using this research while assessing and optimizing your EA capability will help you:
Architect the EA capability by applying four architectural perspectives: Contextual, Conceptual, Logical, and Physical. Develop an EA Operating Model starting at the contextual level, and proceeding through to the physical.
Develop a sponsored mandate for EA capability. Identify and engage EA capability stakeholders. Determine organizational scope, i.e. responsibility and authority of EA. Identify business drivers for optimizing an EA capability. Analyze organizational context. Secure executive support and authorization to execute.
Establish EA capability purpose and strategic direction. Write EA capability vision statement. Craft EA capability mission statement. Define EA capability goals and measures. Create EA principles. Assess current and determine target EA capability level.
Document EA management process. Define EA management practices. Define interactions between EA management and other processes. Define EA capability performance and value measurement approach.
Design EA organization and roles. Design EA organization structure. Define EA roles. Define required skills and proficiency levels for EA roles. Determine required EA staff capacity.
Standardize EA tools and work products. Establish an EA repository. Decide on EA tools to be used. Define EA artifacts and work products.
Develop an EA capability improvement plan. Consolidate and refine steps required to roll out the target EA operating model and improve EA capability. Draw an EA capability improvement roadmap.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
How world-class product teams are winning in the AI era by CEO and Founder, P...
Adopt new technology for 2011 and beyond
1. Adopt New Technologies for 2011 and Beyond Practical IT Research that Drives Measurable Results
2.
3.
4.
5. Recognize the forces & challenges that make the adoption of new technologies relevant Continued innovation by both major vendors and niche players provides new opportunities to extend the uses of technology, as well as enabling the effective management of increasingly complex environments. Robust Vendor Market Corporate Appetite Organizational pressure for more services from IT at lower costs is top of mind. The economic situation drives not only cost concerns but a recognition that enhanced IT capabilities are essential for competitive success. The expectations of users and clients for enhanced technology capability such as functionality, accessibility, and empowerment. User Appetite Three Forces of Technology Adoption There are many technologies worth looking at for 2011. Recognize the forces that will contribute to the organization’s decisions around adopting them. RVM CA UA Info-Tech Research Group
6.
7. Periodic Table of Technologies for 2011 Technologies for 2011 include a broad range of applications and new means of delivering them to end users Technologies for 2011 include proven innovations that may just now be ripe for mass adoption. 2 3 4 5 Info-Tech Research Group 6 1 7 VDI Desktop Virtualization CC Cloud Computing ECM Enterprise Content Management TC Thin Client CS Cloud Storage BPM Business Process Management AV Application Virtualization CP Cloud Platforms PaaS MA Mobile Applications SM Social Media MD Mobile Devices SC Social Collaboration Platforms MP Mobile Platforms SP Social Media Plug-ins BI Low cost analytics tools SV Server Virtualization
8. Percentage of respondents who selected business objective (x) as primary reason for adoption of technology (y) Improved productivity overwhelmingly drives the adoption of technology for 2011 Improved employee engagement and customer retention did not figure heavily into expected benefits of technologies for 2011. IT leaders that overlook the potential for technologies to impact clients risk getting bypassed by external IT solutions. Info-Tech Research Group Improved Productivity Improved Service Cost Reduction Improved Product or Design Improved Employee Engagement Improved Customer Retention Simple Analytics Tools Enterprise Content Management Virtual Desktop Infrastructure Cloud Solutions Mobile Applications 0-19% 20-39% 40-69% 70%-100%
9. *Note: The interest in technologies was calculated by taking the average “interest $” spent on each technology. *Note: The adoption was calculated by calculating the % of organizations that are in the process of adopting or have already adopted these technologies. Implementation of business analytics using simple tools had the highest amount of interest on average, while also having been highly adopted by organizations. Though much hyped as the future of IT, BYOC is not going to see widespread adoption in 2011. The combination of high interest in Virtual Desktops and low interest in Bring Your Own Computer (BYOC) reflects IT’s continued focus to simplify support challenges and suggests a low interest in reducing device lockdown. The high interest in leveraging simple analytic tools indicates increasing pressure from management to use available organizational data held by IT for better decision-making. This also highlights the recognition that sophisticated business intelligence tools are not essential. In 2011, focus deployment on the practical rather than hyped technologies High Info-Tech Research Group High Low Adoption Interest Source: Info-Tech Research Group N = 254
10. Info-Tech Research Group Why now? Technologies for 2011 were highly impacted by changes in vendor offerings, user and corporate appetite The playbook, which is yet to be released by RIM ( M obile ), and Citrix Xen Client (VDI ), which was released near the end of 2010, but was too late to catch enterprises that were ready to make the leap to Windows Seven, were both innovations that were of interest to enterprises. These laggards forced enterprises to wait for technology they may have been ready to adopt in 2010. Social media tools have reached a user critical mass both internally, as collaboration tools, and externally, as marketing tools. Facebook’s landmark 25% of all page views in the US means marketing departments are looking for IT involvement with Facebook integration. Info-Tech believes that many organizations will hit the tipping point in 2011 where the need for a thorough information spring cleaning and reorganization will become essential. ECM solutions fill this need. Corporations recognize the business value of ECM and that will drive adoption. Additionally, Simple Business Analysis Tools are primed for adoption from a market perspective thanks to Microsoft and are recognized as adding value to the business.
11. Adopt some 2011 technologies immediately while waiting for natural replacement to drive adoption of others Initial planning for desktop virtualization, data management, and the selective use of the cloud should be well underway in 2011, but full deployment will take several years. VDI Desktop Virtualization ECM Enterprise Content Management BI Simple Analytics Tools A number of evolving technologies can be deployed quickly. The use of simple analytic tools, further leveraging of social media, and the extended use of mobile devices for applications beyond e-mail should be in every IT department’s 2011 plans. CC Cloud Computing SM Social Media Short term Long term Deployment within 2011 Deployment 2012 and beyond MA Mobile Applications Info-Tech Research Group
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31. Anticipate the “magic moments” for reconsidering technology choices Example . Inadequate server reliability Example. Expired building lease Example . Need to add storage capacity Example . ERP vendor went bankrupt Technology becomes functionally inadequate A major facility move Need to replace or add 25% to current capacity Vendor is terminating support for the technology Look to a broader set of opportunities than just a newer version of the current solution (e.g. leverage the cloud in place of in-house solutions; virtual desktop instead of PC replacement). Assess different options such as outsourcing or co-location. Assess possible alternatives before buying more of the current technology. Either live with the support challenges or propose a replacement technology. Proposals to replace existing technology have traction only at certain times. Info-Tech Research Group
32. Anticipate the inadequacy of private network viability in a world of cloud vendors and mobile users Data Center Office 1 Office 2 Office 3 Data Center Office 1 Office 2 Office 3 Public Network Cloud Supplier B Cloud Supplier A Customer Mobile Staff Private Network Organizations using a variety of cloud suppliers with many mobile staff can no longer consider private networks as the key element of their wide area networks. The Old World The New World Info-Tech Research Group
33. Consider alternative solution before replacing aging desktops PC Office 1 Office 2 Office 3 Local Area Network Rather than continue periodic upgrade of desktop computers, consider desktop virtualization, thin-clients, or employee-provided equipment as alternatives. The Old World The New World Info-Tech Research Group Employee Provided Device Kiosk Virtual Desktop Thin-client Desktop Desktop Desktop Local Area Network Laptop
34.
35.
36. Info-Tech Research Group Focus on new technologies where there is real opportunity for the organization and adequate capability to support them Base the 2011 Technology Plan on supporting technology directions that will provide real value to the organization. Business Value Organizational capability to support new direction Low Average High High Emphasize now Address low competency with external help Improve internal competency You’re good to go Average Consider Defer Verify value after adjusting for costs of becoming competent Verify value; you’re ready Low Defer consideration Don’t spend any effort on this Don’t spend any effort on this Avoid using readiness as a reason for deployment
37.
38.
39.
40.
41.
42. Info-Tech’s technology sleeper picks for 2011 “ After being freed from Yahoo, VMware will find great success with Zimbra as both an Exchange and SharePoint alternative. Due to nothing more than sheer probability, the Chicago Cubs will win the World Series in 2011 for the first time in over 100 years. “ Zimbr a “ Bandwidth usage just keeps scaling and ISPs need some way to effectively manage that growth.” “ D2L recently settled a suit with another education software firm and are growing quickly.” Desire2Learn Sandvine Rob Dreyer, Research VP Eric Wright, Director Consulting Services Code Green “ Massive hype 2 years ago for DLP in general, flat-lined last year, due for a nice rebound as vendors and clients figure out the play and the value. Despite the attention given to zombie attacks - Info-Tech predicts that no significant zombie outbreaks will occur in 2011.” “ Data center water cooling is making a come back. What’s old is new again.” James Quin Lead Analyst Timothy Hickernell Lead Analyst Gamatronic “ MPLS network without the price. Bonds multiple Internet connections together giving reliable private networks.” Talari Networks Derek Silva, Research Analyst Darin Stahl, Lead Analyst “ Open source content management community with immense community support and resources.” Drupal. org Refael Keren, Research Analyst We let our analysts off the leash to make bold tech predictions for 2011
43. Info-Tech’s forecasts of the future have been a reliable guide to action… most of the time A retrospective look at Info-Tech’s past predictions Predictions Did it take off? Why? Hybrid Use of Off-Premise Application Services Big time! Vendors have realized there’s money to be made in subscription pricing and more and more applications are only available in a subscription model (e.g. salesforce.com). Social Computing (e.g. Facebook) for Business Collaboration About to blow up The biggest contributor to the take off of social computing in the workplace will be demand from the younger generation who use social collaboration tools to get their jobs done – as 20 and 30 year olds move up to management positions, they are more likely to influence technology decisions. In-Memory Analytics Yes Microsoft BI was a great example of how organizations can use existing Office products to avoid investing in traditional BI. Rich Internet Applications Big time Applications are being delivered over the Web, and the browser is no longer the medium. Integration of the Cloud Looking good The idea of the internal cloud as a means for integration with external services has definitely been adopted by vendors and IT organizations threatened by external cloud. The Netbook Sayonara Priced in the same range as tablets and laptops (whose prices have come down even more in the past few years). Netbooks fail to deliver either the portability of a tablet or the power of low cost laptops.
44. Info-Tech Research Group Free tools for data visualization are readily available for public consumption over the web Info-Tech asked which technology or cultural trends will have the greatest impact on IT over the next three years: Tools like Wordle , used above, allow users to create word clouds based on their existing data source, it’s free and may be republished with no strings attached.