The document discusses the evolution of technology and the role of the modern technologist. It describes the author's personal journey with technology from 1986 to present day. It then provides statistics on internet and device usage that illustrate how ubiquitous technology has become. The document outlines the many roles and challenges of a technologist, such as ensuring business continuity, managing teams, and justifying security needs. It emphasizes that technologists must be technically savvy, business-oriented, and able to adapt to constant changes in both technology and business landscapes. The conclusion reflects on the many challenges technologists face and stresses the importance of structure, training, communication, and a problem-solving mindset.
CIO Advisory Services Guide | White Paper from Brittenford SystemsBrittenford Systems
IT departments are under stress as the need for financial resources becomes overwhelming and technology departments are required to do more with less, using existing IT systems while having to also move or keep systems online. This white paper serves as a guide to CIO advisory services and discusses the current stress on the IT industry.
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Livingstone Advisory
Ensuring the alignment between the various ‘best practice’ technology implementation methodologies supported by appropriate ongoing IT management and business engagement frameworks is key to the delivery of a robust, truly agile and cost effective IT environment. Achieving this without compromising security or exposing the organisation to greater risks is a given in the eyes of the business.
In this presentation, Rob Livingstone explores the key systemic and technical risks associated with the concurrent adoption and management of agile application development methodologies, project management, hybrid cloud, on-premise IT and mobile devices within the enterprise. He also suggests some practical approaches that CIOs, CTOs, CSOs and CFOs should be taking to successfully orchestrate this transition.
how i managed to Develop a Analytics story for services about 4 years back. Contains
Maturity Model, Business Potential, Services Structures Areas that analytics can be applied to
20150108 create time stamp
Building the Information Governance Business Case Within Your CompanyAIIM International
Information Governance is a critical component in today’s business world to ensure that ALL information is visible, organized, and compliant. This solution can help your business to gain a competitive edge through the strategic and economic use of information. Despite the critical need, many companies still struggle to get funding and buy-in from upper management to move initiatives forward. This presentation will highlight key focus points for IG advocates to get internal stakeholders on board.
BIG DATA is having an enormous impact on the profile of workforces around the world. If you've ever seen the technology and experienced the impact it has on the pace of innovation in a business then the predictations made by McKinsey Global Institute will come as no surprise ( and just in case you've been on holiday for around two years, McKinsey is suggesting that by 2018 the US will face a shortfall of close to 200,000 analysts and 1.5 million managers with the right skills. In this presentation I outline the impact of BIG DATA on workforce design. I hope you find it informative and fun to read. Ian.
Data is the lifeblood of every organization yet many either fail to backup their data or they are not doing so properly. Losing data can be catastrophic for a business. This white paper explains why backups are important and the challenges they face.
CIO Advisory Services Guide | White Paper from Brittenford SystemsBrittenford Systems
IT departments are under stress as the need for financial resources becomes overwhelming and technology departments are required to do more with less, using existing IT systems while having to also move or keep systems online. This white paper serves as a guide to CIO advisory services and discusses the current stress on the IT industry.
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Livingstone Advisory
Ensuring the alignment between the various ‘best practice’ technology implementation methodologies supported by appropriate ongoing IT management and business engagement frameworks is key to the delivery of a robust, truly agile and cost effective IT environment. Achieving this without compromising security or exposing the organisation to greater risks is a given in the eyes of the business.
In this presentation, Rob Livingstone explores the key systemic and technical risks associated with the concurrent adoption and management of agile application development methodologies, project management, hybrid cloud, on-premise IT and mobile devices within the enterprise. He also suggests some practical approaches that CIOs, CTOs, CSOs and CFOs should be taking to successfully orchestrate this transition.
how i managed to Develop a Analytics story for services about 4 years back. Contains
Maturity Model, Business Potential, Services Structures Areas that analytics can be applied to
20150108 create time stamp
Building the Information Governance Business Case Within Your CompanyAIIM International
Information Governance is a critical component in today’s business world to ensure that ALL information is visible, organized, and compliant. This solution can help your business to gain a competitive edge through the strategic and economic use of information. Despite the critical need, many companies still struggle to get funding and buy-in from upper management to move initiatives forward. This presentation will highlight key focus points for IG advocates to get internal stakeholders on board.
BIG DATA is having an enormous impact on the profile of workforces around the world. If you've ever seen the technology and experienced the impact it has on the pace of innovation in a business then the predictations made by McKinsey Global Institute will come as no surprise ( and just in case you've been on holiday for around two years, McKinsey is suggesting that by 2018 the US will face a shortfall of close to 200,000 analysts and 1.5 million managers with the right skills. In this presentation I outline the impact of BIG DATA on workforce design. I hope you find it informative and fun to read. Ian.
Data is the lifeblood of every organization yet many either fail to backup their data or they are not doing so properly. Losing data can be catastrophic for a business. This white paper explains why backups are important and the challenges they face.
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Cognizant
Innovating in a post-pandemic world will pose new challenges — from unpredictable shifts in customer behavior to development teams that work from home by necessity or choice. Adapting quickly to new risks and opportunities requires a modern infrastructure and application architecture, new processes and a culture that rewards experimentation.
Highlights from the EMC & VMware CIO Summit | ATLANTA 2013, where 50 CIOs discussed topics such as the Software-defined Data Center, Cloud, Converged Infrastructure, Big Data, Security, and IT in 2020.
Terabytes, Petabytes and now Zetabytes worth of files? Need to manage your chaos? Learning how to tame the information deluge of files - Unstructured and Semi-Structured Data. Like most IT professionals, you're being challenged to keep up with the rapid growth of file-based data in file shares, home directories and unstructured data repositories across your enterprise. You've probably been tasked to make that data more accessible to an increasingly mobile workforce - while controlling costs and ensuring that your security policies are enforced.
Gartner recently forecasted a number of developments that will significantly impact the IT function in years to come, spanning mobile device management, hybrid cloud integration and software-defined networking. As these disruptive technologies continue to mature, IT is well-positioned to drive overall corporate success, enabling organizations’ innovative capabilities to really shine through.
What suggestions do you have or can provide? What solution direction would you like to see?
Investing in AI: Moving Along the Digital Maturity CurveCognizant
Digitally mature businesses are more likely to consider themselves at an advanced stage of AI adoption, according to our recent study, enabling them to turn data into insights at the scale and precision required today.
Data Con LA 2019 - Innovating with Data by Joey BeitdashtooData Con LA
There are three classes of business models for leveraging data:1) Data as a Competitive Advantage (use of Data, advanced analytics and data science capabilities create competitive advantage.)2) Data as Improvement of Existing products or services 9Use of data into exiting offerings, effectively differentiating the value in the market.)3) Data as the Product (this class of business is a step beyond utilizing data for competitive advantage or plugging data into existing products.) Data becomes the asset or product to be monetized.)
Did you know? The litigation software tools and business of law software tools have been combined into a single software division headquartered in our new Software Center of Excellence in Raleigh, NC. These slides were part of the presentation by the top LexisNexis software executive, Michael Lipps, at ILTA 2014. In it he maps what LexisNexis sees as top 5 technology trends in the legal community against a number of product updates in the software portfolio.
Finance Crunsh Time Reporting | Deloitte Indiaaakash malhotra
Reporting is an essential function of every organization because it tracks an employee's performance. But superiors are wasting a lot of time in creating and updating reports; rather, they should use that time to communicate with subordinates. This can be possible only when the whole reporting function gets automated in the organization.
Join Decision Management Solutions, Velocity Business Services and Datarobot as we discuss the importance of operational decisions, industrialized predictive analytics and business learning in creating a predictive enterprise.
As our digital records are likely to be cyber-breached several times and/or we all have to deal with legal proceedings, learn how to use digital forensics experts efficiently.
Becoming a Software-Centric Business - Best Path Forward in an Uncertain Post...Cognizant
Innovating in a post-pandemic world will pose new challenges — from unpredictable shifts in customer behavior to development teams that work from home by necessity or choice. Adapting quickly to new risks and opportunities requires a modern infrastructure and application architecture, new processes and a culture that rewards experimentation.
Highlights from the EMC & VMware CIO Summit | ATLANTA 2013, where 50 CIOs discussed topics such as the Software-defined Data Center, Cloud, Converged Infrastructure, Big Data, Security, and IT in 2020.
Terabytes, Petabytes and now Zetabytes worth of files? Need to manage your chaos? Learning how to tame the information deluge of files - Unstructured and Semi-Structured Data. Like most IT professionals, you're being challenged to keep up with the rapid growth of file-based data in file shares, home directories and unstructured data repositories across your enterprise. You've probably been tasked to make that data more accessible to an increasingly mobile workforce - while controlling costs and ensuring that your security policies are enforced.
Gartner recently forecasted a number of developments that will significantly impact the IT function in years to come, spanning mobile device management, hybrid cloud integration and software-defined networking. As these disruptive technologies continue to mature, IT is well-positioned to drive overall corporate success, enabling organizations’ innovative capabilities to really shine through.
What suggestions do you have or can provide? What solution direction would you like to see?
Investing in AI: Moving Along the Digital Maturity CurveCognizant
Digitally mature businesses are more likely to consider themselves at an advanced stage of AI adoption, according to our recent study, enabling them to turn data into insights at the scale and precision required today.
Data Con LA 2019 - Innovating with Data by Joey BeitdashtooData Con LA
There are three classes of business models for leveraging data:1) Data as a Competitive Advantage (use of Data, advanced analytics and data science capabilities create competitive advantage.)2) Data as Improvement of Existing products or services 9Use of data into exiting offerings, effectively differentiating the value in the market.)3) Data as the Product (this class of business is a step beyond utilizing data for competitive advantage or plugging data into existing products.) Data becomes the asset or product to be monetized.)
Did you know? The litigation software tools and business of law software tools have been combined into a single software division headquartered in our new Software Center of Excellence in Raleigh, NC. These slides were part of the presentation by the top LexisNexis software executive, Michael Lipps, at ILTA 2014. In it he maps what LexisNexis sees as top 5 technology trends in the legal community against a number of product updates in the software portfolio.
Finance Crunsh Time Reporting | Deloitte Indiaaakash malhotra
Reporting is an essential function of every organization because it tracks an employee's performance. But superiors are wasting a lot of time in creating and updating reports; rather, they should use that time to communicate with subordinates. This can be possible only when the whole reporting function gets automated in the organization.
Join Decision Management Solutions, Velocity Business Services and Datarobot as we discuss the importance of operational decisions, industrialized predictive analytics and business learning in creating a predictive enterprise.
As our digital records are likely to be cyber-breached several times and/or we all have to deal with legal proceedings, learn how to use digital forensics experts efficiently.
Palestra sobre conceitos Big data no evento IDETI em SP. Aborda o que é Big data, debate alguns beneficios e desafios. Debate também o papel do CDO- Chief Data Officer.
Discussion of information Security risks in current business and technology environments.
presented to ISSA Ireland conference attendees in Dublin on 12 May 2011.
This presentation was discussed in a Webinar with MetricStream in September 2016. It is applicable for small, medium and large businesses when considering information and cyber security risk.
The rapid rate of technological change can be overwhelming. Everyone sometimes needs to have a virtual CIO on call.
A virtual CIO can help the CIO, IT director, or business owner evaluate new technology, translate between IT and the business units, motivate and mentor effectively, and keep the big picture in focus. This holistic approach helps to create value, integrate systems, save costs, lower risks, increase innovation and produce successful outcomes.
IT Consultation — Expert, unbiased advice on a breadth of operational and strategic areas. This is tailored to the organization’s need, size, culture, and cost preferences. It may consist of providing a second opinion; briefing on industry best practices (e.g., for disaster recovery); building a support infrastructure (e.g., for mobile device support); or doing the problem analysis, plan, cost justification and presentations to the Board, among other possibilities.
Cloud Readiness Audits — Assessment of existing systems architecture, recommendations on which operational, financial, and accounting processes that could be moved to the cloud, and how to do so.
Rescue Assessments — Highly focused, impartial review of breakdowns in systems, applications, infrastructure and more. No finger-pointing, just a solid plan to fix the problem and get you back on track.
Support for Relocations — Experienced and thorough guidance in planning and executing the relocation of servers, networking and other computing assets to ensure efficiency, safety and continuity of operations.
Mentoring — Skills assessment and development; executive coaching; linking business and technology objectives to team performance; and requirements definition for strategic staffing.
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
Many time consuming IT problems can be side-stepped by establishing a solid network from the get-go rather than playing catch up with problems as they arise..find out how with these IT solutions.
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
Project 3 – Hollywood and IT
· Find 10 incidents of Hollywood portraying IT security incorrectly
· You can use movies or TV episodes
· Write 2-5 paragraphs for each incident. Use supporting citations for each part.
· What has Hollywood portrayed wrong? Describe the scene and what is being shown. Make sure to state whether it is partially wrong or totally fictitious.
· How would you protect/secure against what they show (answers might include install firewall, load Antivirus etc.)
· Use APA formatting for your sources on everything.
· Make sure to put your name on assignment.
Big Data and Social Media
Colgate Palmolive
Agenda Of socail media use
Buisness intellegence and Social media concenpts
Intellegent organization
Data Anaylysis and Data trustworthiness
Conclusion
Buisness intellegence and Social media concenpts
No-Hassle Documentation
Gain Trusted Followers
Spy on Competition
Learn Customer Demographics
Research and Analyze Events
Advertise More Accurately
Intellegent organization
They consistently use (big) data proactively
They know exactly where they want to go: all-round vision
They continuously discuss business matters: alignment
They talk to each other regarding positive and negative performance
They know their customers through and through
They think and work in an agile way
Data Anaylysis and Data trustworthiness
Data completeness and accuracy
Data credibility
Data consistency
Data processing and algorithms
Data Validity
Conclusion
How Colgate benefit from Big Data and Social Media
Social media increases sales and customers
Big data shows popular trends and popular companies
All around they are both beneficial
Big Data can find trends that can benefit you greatly
Criteria
Title Page:
Name, Contact info, title of Presentation
Slide 1
Adenda : Topic you going to cover in order
Slide 2
Discuss how big data, social media concepts and knowledge to successfully create business intellegence (Support your bullets points with data, analysis, charts)
Slide 3
Describe how big data can be used to build an intelligent organization
Slide 4
Discuss the importance of data source trustworthiness and data analysis
Slide 5
Conclusion
Slide 6
Big Data And Business Intelligence
Business Value With Big Data
For business to survive in a competitive environment, organizational change requires improved governance, sponsorship, processes, and controls, in addition to new skill sets and technology all work in harmony to deliver the benefits of big data. See Fig. 13.2
Data science has taken the business world by storm. Every field of study and area of business has been affected as companies realize the value of the incredible quantities of data being generated. But to extract value from those data, one needs to be trained in the proper data science skills. The R programming language has become the de fac to programming language for data science. Its flexibility, power, sophistication, and expressiveness have ma ...
Despite mid-size business’ desire to leverage the speed, scalability, and economic value of the cloud, many well-established organizations still struggle to keep pace with in a rapidly changing business environment. To remain competitive in a cloud-first world, organizations will need to adopt a different approach to Modern IT in order to manage the ever-present change, risk, and opportunities before them.
There are three main factors that influence how information security is dealt with these days – (1) the presumed risk if we don’t do it (or do it badly), (2) the pace at which technologies and business styles change and (3) the lack of a structure behind any infosec activities.
It’s clear to me that these are just some of the challenges infosec teams must deal with nowadays. This talk will open the floor to a discussion of blockers, challenges and drivers discussing the evolution of the roles associated with infosec and later merging best practice recommendations with an infosec strategy to dealing with risks. Finally, once a strategy is adopted, the presentation will present some ideas on how to gauge progress– such that efforts to improve are both meaningful and measurable.
Information security is often misunderstood, undervalued and often tackled as an afterthought. This presentation was given in 2014 during an ISACA educational event.
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
Information Security
1.Why the need to think about it?
2.What exactly are we talking about?
3.How do we go about doing something about it?
4.Is there a one-size-fits-all framework?
1. The 21st Century Technologist
DONALD TABONE
12/03/2015
DTABONE@GMAIL.COM
2. A story of tech evolution
1986, Memotech 512s2
1990, Goldstar 286 12Mhz PC
1994, dan 486DX 66Mhz PC
…
To a state wherein each family member (inc. my four year
old) now has two or more electronic devices we use on a
daily basis – connected to the web
Have we all evolved into technologists?
3. Some recent stats..1
Sources:
We are social - Social, Digital &
Mobile in Europe, Feb 5 2015
In total we spend
close to
6 Hours online!
Necessity vs. habit
4. Some recent stats..2
Regular internet
users are 73.2% of
the population
aged 16 to 74
Sources:
Internet access in 81% of Maltese
households, Maltatoday, Mar 3 2015
We are social - Social, Digital &
Mobile in Europe, Feb 5 2015
5. “
”
A thirsty crow found a pitcher containing some water,
albeit too little and low to reach. As it seemed she would
die within sight of the remedy, so the crow struck upon
an idea to drop pebbles into the pitcher. The water level
rose and the crow was able to drink.
Necessity is the mother of invention – Aesop
The crow and the pitcher
And as tech continues to evolve so do businesses and the way we do business.
Lest we forget, so does the technologist (out of necessity) …
6. Define: technologist
Pronunciation: /tɛkˈnɒlədʒɪst/
A specialist in the field of Information
Technology
Information technology (IT) is the
application of computers and
telecommunications equipment to store,
retrieve, transmit and manipulate data,
often in the context of a business or
other enterprise
Which gave birth to what we like to call the IT professional …. (generically)
7. Zooming in
CTO/CIO
Systems/Infrastructure Engineer
IT Manager
Systems Administrator
Systems Support Executive
Developer / Software Engineer
Technical Architect
Information Security Analysts
Database Administrator
Network Engineer
Some duties include:
Ensuring business continuity
Ecommerce development
Establishing Legal safeguards
Managing teams
Improving process efficiency & effectiveness
Developing an IT and digital strategy
The identification & communication of IT risks
Budgeting
Major distinction is between technologies that a firm
seeks to actually develop to commercialize itself vs.
technologies that support or enable a firm to carry out
its ongoing operations
8. The challenges
RESOURCES Limited technical, human and financial resources
FOCUS Changing landscape of the business
PEOPLE Team management – performance and people problems
QUANTIFICATION Quantifying risks and proposed solutions
IT GOVERNANCE Policy implementation / establishing standards
SECURITY Justifying the need for security
CHANGE MANAGEMENT Acting as agents for change
SOLUTIONS AND TECHNOLOGY new technologies in favour of legacy systems
ANALYTICS Leveraging big data, BI and data mining techniques
& TIME
!
10. Resources
There is a technical solution for everything… BUT
clearly we need
TIME TO DEVELOP / IMPLEMENT SOLUTIONS
FINANCING
HUMAN RESOURCES + KNOWLEDGE + ADEQUATE
SKILL SETS
ADEQUATE SUPPOTING TECHNICAL
INFRASTRUCTURE
How should we manage expectations?
COBIT basic principle and identified IT resources
Applications, Information, Infrastructure, People
11. Focus
Companies change focus too often
Adopt a ‘react or die’ approach
Doing things by default
As a consequence
Resources are spread thinly
Not dedicating enough time for any one project
Motivation & demoralisation issues ?
Overworked & underutilised staff ?
Productivity issues?
Perhaps we should be making our highest contribution
where it really matters.
Image source: http://www.amazon.com/Essentialism-The-Disciplined-Pursuit-Less/dp/0804137382
13. People
The organisation
of team dynamics
Skill sets that are
hard to find
Flexitime
Mobility
Device
independence
Company
hierarchy structure
constraints
15. Quantification (of risks)
Adopting a risk based approach to quantify risks is difficult to drive
Risks can be quantified when looked at from various angles:
Financial (though cost/benefit analysis)
Reputation
Business
Customer base
Loss of market share
Indirect / direct dependencies
Legal liability
Risks would always be relative to the business
Such an approach is also beneficial to prioritise
16. IT Governance
COBIT5 enables a
company to take
a holistic
approach to IT
Governance
Provides a
structured control
framework
against which you
can benchmark
the activities in an
IT Department
17. Security
Information security is often
Downplayed
Misunderstood
Taken for granted
Assumed to be only applicable in the digital world
Security awareness sessions are rare and very fruitful
The answer to – How secure are we? – is vague at the very minimum
The result of security exercises (when done) are often left on shelf 13
Sometimes we actually prefer NOT TO KNOW..
Security policies are rarely upheld or embraced and controls are ineffective
Balancing security and usability is a feat…
We prefer to take a reactive approach rather than proactive
The business always wins…
Quote source: Executive Priorities – Balancing Security and Usability, Rafal Los, 17 Mar 2015
"No one should ever have
to fight against a set of
security tools to
accomplish their job.
Ever.”
“ without security the
business still most
likely can survive.
Without the business,
security is
unemployed.”
18. Change management
General resistance to change
The old adage of ‘if it ain’t broke, don’t fix it’ still very much applies
Image source: Applying COBIT framework in change management,
Madhav Kulkarni, CISA
Accelerants to the process of change
management
Revamping of business strategies such as
diversification, acquisitions, mergers
Competitive pressure
Rising customer expectation
Emergence of new tech
19. Solutions and technologies
We are living in a mobile-fist, cloud-first
world
Cloud computing is driving business agility
(positively)
Reducing (if not eliminating) capital
expenditure
Transforming
Domiciling information out-of-the-office
But also creating increased dependencies on
third parties
Image source: Harvard Business Review, the digital transformation of business
20. Solutions and technologies
Internet of Things (IoT)
There is more risk being
seen as wearables and
other connected
devices are increasingly
making their way into
the workplace
Embracing the
benefits requires:
Preparation
Education
Governance
Source: ISACA, Internet of Things: Risk and Value
considerations
21. Analytics
Business Intelligence is driving management to take data driven
decisions
BIG data allows management to gauge and benchmark performance
in a wider context (rather than just local)
Analytics through data mining
Further allows the company to get to know its online audience
Provide better targeted products vs. a one size-fits-all approach
Understand and respond to customer concerns
Embrace customer engagement (on social media)
(Market) trends are easily deduced over time
Facilitates decisions related to diversification efforts
There must be an effort to transform data into information through
management systems
SOME FACTS
Data is increasing
at nearly 50-80%
year over year
Storage capacity is
doubling every 18
months and
dropping in cost
by 50% a year
Fact source: Introduction to Associative Information Systems, Jean Michel Letennier, CTO AtomicDB Corp.
22. With doubt, with MANY CHALLENGES!
A plethora of designations to choose from (related to IT)
A warrantless profession that is continually evolving
And in need of several skill sets
Managerial
Business (development) oriented
Legal oriented
Technically savvy and up to date
Sanity is achieved with structure – by adopting a framework such as COBIT
Training, leading by example and a general can-do aptitude are essential
Communication in general is vital for survival
Conclusion
Where does all this leave the technologist?
A FEW LESSONS LEARNT