CIO Symmetry


December 16, 2013  3:55 PM

What’s the value of Twitter and an Hour of Code?

Emily McLaughlin Emily McLaughlin Profile: Emily McLaughlin

Did your kids experience their Hour of Code last week? In Friday’s CIO Searchlight column, Senior Features Writer Karen Goulart turned our attention to the timely Computer Science Education Week initiative, during which K-12 teachers were prompted to expose students to at least an hour of computer programming. But, as Harvard economist Edward L. Glaeser argued in The Boston Globe, an hour of programming work is not nearly enough to make an impact.

Getting tikes to tinker with Angry Birds wasn’t the only out-of-the-ordinary idea SearchCIO shared last week. How about a lesson in enterprise business value derived from an analysis of tweets? In this two-part CIO Trailblazer feature with Sherry Emery, senior research scientist at the University of Illinois at Chicago’s Institute for Health Research and Policy, Senior News Writer Nicole Laskowski writes about harvesting the potential and value of Twitter. In part one, Emery explains how her tweet analysis yielded unfiltered chatter on what teens are smoking. In part two, we delved into using tweet analysis to communicate in customer-approved lingo.

Diving deeper into data analytics, Laskowski looked at the next stage in data analytics in last week’s Data Mill. When you think big data, General Electric Co. and Macy’s Inc. might not be the first organizations to come to mind, but big data is fast becoming central to their business models, according to Tom Davenport, president’s chair and distinguished professor of information technology and management at Babson College in Wellesley, Mass. Davenport’s recent research has led him to believe the industry has entered a new era, one he’s calling Analytics 3.0.

Other pieces from last week:

Chatter about big data among IT leaders at the recent SearchCIO360° breakfast revealed that IT self-service can be a gift for CIOs. According to the IBM Digital Analytics benchmark, mobile traffic has increased by 45% over last year and accounts for about one-third of all online traffic. In her CIO Matters column, Executive Editor Linda Tucci explains that we are more likely to use our phones for browsing and our tablets for closing the deal, and that we now prefer to buy via machine rather than face to face.

We rolled out our Essential Guide on data protection, providing CIOs with advice for guarding their organization’s information assets, addressing such areas as mobile, the cloud and data governance strategies.

And over on SearchCompliance: Contributor Ed Moyle explained how integrating data security continuous monitoring processes with regulatory controls provides big benefits for IT compliance; and a video from our ISSA International Conference coverage looked at the bleak future of IT security.

Thanks for catching up with us. Have a great week!

December 10, 2013  1:28 PM

Smart machines, smart process apps and smart CIOs

Emily McLaughlin Emily McLaughlin Profile: Emily McLaughlin

We’d like to think SearchCIO was sounding really intelligent last week with all of our “smart” talk.

For starters: In Senior Features Writer Karen Goulart’s weekly Searchlight roundup, which features top stories and blog posts from around the Web, she highlighted John Markoff’s New York Times article on Google’s plans to get into the robot biz. Robot discussions were already the talk of the Web following Amazon’s Prime Air reveal, and Goulart didn’t shy away from taking on smart machines and the attack of the drones. Also in Searchlight: Apple gets social with its purchase of Topsy Labs and users are outraged about their stolen-and-published Yahoo, Facebook and Google passwords.

Other “smart” talk focused on an emerging breed of apps, smart process applications, which are aimed at streamlining and optimizing human-based behaviors to increase productivity and improve business agility. For our CIO Citings piece on smart process apps, Agile and data, Managing Editor Rachel Lebeaux selected some of the best quotes from our recent CIO Decisions e-zine from Wellesley College CIO Ganesan “Ravi” Ravishanker, Yammer co-founder and CTO Adam Pisoni and other technology heads.

Moving away from smart machines and smart process apps, we also took a look at a smart CIO with a cloud-first vision. Two years ago, the University of Miami brought in CIO Steve Cawley to help centralize IT service management and transform the university’s IT to a cloud-first organization. In this CIO Innovators profile, our Goulart interviews the university’s deputy CIO, Brad Rohrer about its cloud-first philosophy (Part 1) and how Software as a Service got it there (Part 2).

Other news and tips from our sites last week:

SearchCIO contributor and December tweet jam expert Harvey Koeppel discusses how BPM and BPO practices are evolving, converging and changing the nature of work in his CIO Matters column.

In one of our weekly favorites, The Data Mill, Senior News Writer Nicole Laskowski asks readers, “Want better analytics?” The secret, according to John Lucker, a consultant with Deloitte Consulting LLP, is asking “crunchy” questions that align with strategic goals, relate to key performance indicators and are designed to be both actionable and informational.

Last week on CIO Symmetry, Laskowski blogged about a “technology obsessed” world. Read what she had to say, and then put down your handheld device and “be brave in the new world.”

We rolled out a lot of video coverage from the ISSA International Conference, where we sat down with a number of security professionals to discuss cybersecurity’s impact on IT. In this SearchCIO-Midmarket video, Christina Torode asks Randy Sabett, an attorney at ZwillGen PLLC, about the legal limitations of active cyberdefense. At the same show, SearchCompliance reports on predictive security intelligence, an information security plan for 2014 and leveraging free security tools.

Finally, we close out our weekly roundup with a Q&A from SearchCompliance that looks at techniques for adapting data governance strategies to the digital age. Information management expert Jeffrey Ritter, discusses how to improve the connection between modern data governance best practices and business success to boost a company’s overall management activities.

Thanks for catching up with us. Have a good week!


December 4, 2013  4:11 PM

Put down the handheld devices and ‘be brave in the new world’

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski

The world is technology obsessed. So much so that Carl Hammerschlag, a Yale-trained psychiatrist who specializes in psychoneuroimmunology, or mind-body-spirit medicine, believes we’re beginning to experience cultural attention deficit disorder.

“As a culture, we’re having trouble paying attention,” Hammerschlag said during his keynote address at the Society for Information Management’s annual conference. “We have the capacity in this day and age to always be someplace other than where we are, which makes wherever we are never enough because something else might come up.”

People arm themselves with smartphones when waiting in line or standing in front of priceless works of art or … listening to a keynote speaker at a conference. The seductive sights and sounds from incoming text messages, Twitter mentions, Facebook posts and Instagram updates are creating cracks in how we communicate. Today, we talk in sound bites, our personal stories reduced to 140 characters or spit-polished as entries on a timeline.

The effects from cultural ADD and truncated communication are insidious. We’re starting to miss out on important details, which, in the most extreme cases, can literally be the difference between life and death. Recently, in San Francisco, passengers on a train were so entranced by the warm, glowing screens of their handheld devices that they didn’t see a man brandishing his gun before he shot a fellow passenger. In more everyday cases, missed details can be the difference between business as usual and new opportunities. To find those potential gems, Hammerschlag told CIOs to “be brave in the new world”: Step out of the virtual bubble, be present in the moment, ask questions, connect the dots.

And share stories. Hammerschlag told the audience how he came to meet a Mayan healer. He was touring ruins with his family while a guide pointed out the sites. When Hammerschlag asked if there were any Mayan healers left, the guide said yes, one, an uncle who happened to live in a village they would drive through on the way back to the hotel.

“You want to pay attention to those things,” Hammerschlag said. “Every act of insight, every act of creativity, every act of genius is simply the result of a prepared mind and a serendipitous moment.”

When he asked the Mayan healer the most important thing he’s learned that enables him to heal people, the man said: Don’t take a cold drink on an empty stomach on a hot day because it causes “bad belly.” Hammerschlag didn’t understand what that meant at the time; later, he realized the old healer was describing the potential for disconnect between logic and intuition. CIOs are familiar with that topic. As businesses become more data-driven, questions about how facts versus feelings fit into the decision-making process bubble to the surface. CIOs will have to choose on a case-by-case basis but, as Hammerschlag illustrates, they will need to consider both.

Hammerschlag’s storytelling ended with the tale of his recent visit to a Syrian refugee camp. When a fellow volunteer began playing his guitar, a refugee grabbed his flute and started playing along. “They had taken everything, but they had not taken his song. He can still hear the music,” Hammerschlag said. “Those are the kinds of stories we want to be telling. Those are stories of resilience.”

And they are the stories of community, a concept that should not be overlooked by CIOs tasked with building an IT culture that embraces risk and delves into uncharted territory. Because, as Hammerschlag is known to say, those who tell the story define the culture.

So put down the tablet and the smartphone, ask your employees to do the same and make time for face-to-face contact. “We need to be talking to people more. We need to inspire each other more. We need to remember what it is we liked best about who we are and not be captivated solely by the instruments that were intended to liberate us,” Hammerschlag said.


November 26, 2013  6:23 PM

The human factor in data classification

Christina Torode Christina Torode Profile: Christina Torode

It’s human nature to want to categorize the world around us. But is this desire  to classify becoming a bigger part of our nature at the expense of creativity because of … IT?

Computers encourage us to classify and categorize, but following a corporate or coded script doesn’t exactly lend itself to creativity.

Our recent SearchCIO360 breakfast speaker, Professor Gary King, used customer service reps as an example of how data classification or categorization can stifle innovation. Most companies develop categories for customer complaints and the rep is typically asked to type information into a program with fixed complaint categories.

“There are huge efforts to convince [the reps] not to come up with a new idea because, if they do, you have to reclassify millions of previous data points. So what you are doing is taking the people who are good at innovating, the ones with the most insight into the customers, and telling them to please not come up with any new ideas,” King said.

We are allowing computers to make decisions for us, which can be a wonderful thing — if the data being used to make those decisions remains relevant. Many times, it doesn’t.

To err is non-human and human

Take King’s research into the solvency of U.S. Social Security benefits. If you think some of the data classification and management methods in your office are outdated, you might feel a little better about them in comparison to the Social Security Administration’s use of a data analysis method developed 75 years ago, according to King. This method, used to forecast mortality rates, was developed by demographers at a time when obesity was not a problem and smoking was not considered the death knell it is today. Still, this 75-year-old method is the one being used today to determine when Social Security may run out of money.

By King’s calculations, it turns out that date is around 2032. A bit of “a bummer,” as he said, but a more accurate estimate, based on a method that incorporates the deep qualitative knowledge that demographers have used over the last 350 years, updated with new mortality factors (such as the rise in obesity) with automation built into calculations based on his own algorithms.

This is an oversimplification – — King conducted his research not just for Social Security solvency, but also aggregated worldwide mortality data that analyzed 150,00 cross-sections. But his point was he did not seek out new data; he just analyzed existing data better and relied on a combination of qualitative (characteristics identified by humans) and quantitative (characteristics that can be measured) computer-aided methods.

“Fully human is inadequate, but fully automated or fully quantitative — meaning Excel spreadsheet with no labels — fails too. You need some qualitative information to decide what you’re trying to quantify. What really is needed is computer-assisted, human-controlled technology to take qualitative information, systematize it and then provide it back to the human being who actually ends up making the decisions,” he said.

Another case in point on the benefits of combining a human touch with statistically driven tech? One of King’s colleagues was running a complex data analysis that caused him to run out of room on his computer. IT told him that it would cost $2 million to give him a system to support his data analysis needs. Instead, a couple of King’s grad students spent two hours developing a new algorithm that does the job in 20 minutes — on the guy’s laptop!

The title of King’s talk at our breakfast was Big Data is not about the Data. His contention is that you can have all the data you want and the most powerful computer you need, but without the right analytics  — which includes that human, qualitative element — you could be looking at some costly, outdated data.

As one CIO explained, “There is a real sense of urgency to figure out how to build the right skill set to take advantage of qualitative data, qualitative people.”


November 25, 2013  8:52 PM

Study: Many SMBs uncertain of security strategy; risks abound

Karen Goulart Karen Goulart Profile: Karen Goulart

It’s a dangerous cyberworld out there. The news carries weekly, sometimes daily, reminders of the potentially catastrophic impact a data breach can have on even the largest of enterprises. Besides the loss or corruption of information itself, there’s the loss of trust from customers who may well decide to bring their business elsewhere. In this information-driven economy, more than ever before, it’s become abundantly clear that a well-honed security strategy is imperative. It makes findings from a recent Ponemon Institute study (sponsored by Sophos) all the more surprising.

Released this month, The Risk of an Uncertain Security Strategy indicates that many SMB organizations are simply unclear about their security strategy and the threats they face. Included are about 2,070 responses from individuals in charge of their SMB company’s security and risk management. Among the respondents were CIOs/heads of corporate IT, heads of IT security, heads of risk management, CFOs, CEOs and chief operations officers. CIOs/heads of corporate IT made up 61% of the sample.

If any one of these takeaways sounds like it could be coming from your organization — or if you’re simply not sure — it’s time to start strategizing.

  • One-third of respondents admit they don’t know if their organization experienced a cyberattack in the past year. This lack of knowledge equals a lack of “actionable intelligence” going forward. These respondents claim that in order to remedy the situation, they will invest in big data analytics and network traffic intelligence over the next three years.
  • Respondents in the most senior positions knew the least about cyberthreats to their organization. This uncertainty indicates that the further an individual is from dealing with security on a daily basis, the less they understand the pervasiveness of the risks. According to study findings, 58% of respondents say management doesn’t think cyberattacks are a serious risk.
  • Respondents estimate the cost of disruption to normal operations exceeds the cost of damages or theft of IT assets and infrastructure. This clashes with findings in other Ponemon Institute studies where the theft of intellectual property is the most expensive consequence of cybercrime. In this study, respondents appear unable to determine the actual cost of lost or stolen information assets.
  • Respondents indicated that company-issued mobile devices and bring your own device (BYOD) raise bigger security concerns than do cloud applications and IT infrastructure services. But these concerns fail to translate into extensive adoption and use of mobile devices, especially personal devices. To lower these BYOD risks, respondents claim their organizations will invest in such protections as Web application firewalls for mobile apps and endpoint management.
  • Respondents’ confidence in their cybersecurity awareness and strategies seemed to be similar among specific industries. For example, respondents in financial services, indicated a strong understanding and awareness, which can be attributed to the numerous data protection regulations they deal with on a regular basis. Not surprisingly, the technology sector, too, is more security aware, likely thanks to the IT expertise in these organizations. Retail, education and research and entertainment expressed the lowest levels of awareness.
  • Respondents indicated that chief information security officers and senior management are rarely involved in IT security decision making or priority setting.  Thirty-two percent of respondents said the CIO of their company is responsible for setting these priorities; 31% say no single function owns the responsibility.

So what happens when cybersecurity fails to be a priority in SMBs and no one seems to know the plan, or even if there is one? The study suggests it can become a vicious cycle. “Uncertainty about how these issues affect an organization’s security posture could lead to sub-optimal decisions about security strategy,” the authors note. And even as boards of directors and higher-level management are beginning to show greater interest in cybersecurity and risk, if IT executives don’t use the best available information in order to make decisions, it will be more difficult to make the business case for investing in the right expertise and technologies.


November 20, 2013  6:51 PM

CIOs: Innovation starts with good ole-fashioned communication

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski

Innovation is the term du jour for CIOs, but figuring out the best ways to foster creative, out-of-the box thinking isn’t easy. Maybe that’s why there was an entire session devoted to it at the recent Society for Information Management (SIM) annual conference.

“Accelerating Value with Social Media Led Innovation,” presented by Gartner Inc.’s Christopher Sprague, billed itself as a social media session but, in truth, it could have just been a called a social session. That’s because the real crux of generating new and interesting ideas, it seems, boils down to good ole-fashioned communication.

Here are five quick ideas from Sprague’s session on how to get that communication going.

1. Create a culture of innovation: It starts with leadership. An attendee from a large pharmaceutical company shared how a new president of research and development tied innovation, new ideas and new science to survival. In other words, innovation needed to become part of the department’s DNA. “We started by defining how we wanted to build that culture,” the attendee said, and, once defined, how to help support that culture. A notable aspect of support: the best ideas were backed by financial investment.

2. Talk horizontally and vertically: The “if you build it, they will come” IT Hail Mary doesn’t work. Getting IT together with the business just to talk, on the other hand, can generate good ideas. That’s precisely how one SIMposium employee described overcoming the barriers of siloed, top-down communication. “Once you bring people together to talk horizontally, that’s what sparks the ideas,” he said. The danger here, he noted, is falling into a trap of all talk and no action; employees need a way to funnel their ideas into the hands of decision makers. “If it stays with the worker bees, it never gets sponsored,” he said.

3. A catchy name helps: IT employees at Computer Aid Inc. call it “Future Fridays.” That’s when 16 or so IT thought leaders — a mix of idea generators and builders — spend an hour brainstorming. The program turned out to be so successful that the IT department built a formal framework for the submission and evaluation process, and prizes were awarded to the best ideas. Future Fridays is about a year old now, and in that time 400 ideas have been submitted and about 100 of them have been implemented, a Computer Aid employee said.

4. Get down and dirty, if you have to: Sometimes, communication can be the biggest impediment. Personalities clash and people disagree and getting everyone in a room together for an hour of idea generation just doesn’t work all that well. That’s why one SIMposium attendee advised doing the unthinkable: Take the people who don’t get along and turn them into office mates. Getting through an hour-long meeting is one thing; sharing an office is another. “We took our director of supply chain and he got an office with the plant manager of one of our manufacturing facilities,” she said. “What we started to see were real results because they had to ‘live’ together.'”

Gartner’s Sprague could see the wisdom in the decision: “Bad behavior permeates the cycle. … The stone throwers have to [realize] at some point if you don’t play socially, well, you’re not in the game.”

5. Crowdsource the problem: Here’s where the social media part comes into play. Think about third-party platforms from companies such as InnoCentive and Kaggle to overcome technical challenges or roadblocks. There, businesses can post problems for a community of analytics and tech junkies to grind through. Not comfortable making proprietary data public? InnoCentive, for one, has a Software as a Service option so that businesses can bring the platform in-house and use it internally.


November 5, 2013  3:07 PM

Open data, big money

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski
CIO

In a new research report, McKinsey Global Institute projects that open data can “help unlock” $3 trillion to $5 trillion in economic value annually across transportation, consumer products, electricity, oil and gas, health care and consumer finance.

How does McKinsey see value being created? McKinsey researcher Michael Chui, co-author of Open Data: Unlocking Innovation and Performance with Liquid Information, counted the ways during his presentation at Strata Conference + Hadoop World 2013 in New York.

1. Open data creates transparency. Openness and transparency are words commonly heard in connection with governmental agencies, and for good reason: The public sector is a leader in the open data trend. “In the United States, California and Texas have identified millions of dollars a year in savings by releasing budgetary information and enabling citizens to spot potential opportunities to cut costs,” according to the report. But Chui argues open data can be useful to the private sector as well. Businesses that open up data can build deeper relationships with their customers by, for example, giving greater visibility into household energy spending, medical expenses and how financial products are built.

2. Open data improves performance. Open data can help businesses compare performance. Several of the examples contained within the report suggest sharing benchmarking data to create operational and even project management efficiencies. For example, sharing budgetary information can help keep procurement costs in check or opening up manufacturing benchmarks can help businesses increase precision in production. “About a third of the value from open data comes from benchmarking,” Chui said.

3. Open data creates new products and services. Think The Climate Corporation. Established by two former Google employees and purchased by the Monsanto Company for about $1 billion, The Climate Corp. supplies farmers with weather insurance by incorporating years and years of open data from places like the National Weather Service into its analysis. Insuring against harsh weather conditions isn’t new, but how Climate Corp. doles out that insurance is. The process is a more streamlined, self-service model. Farmers can purchase coverage online; the policy is customized to their specific location and the policy pays out after the coverage period ends.

4. Open data matches supply and demand. “We’ve studied a problem we’ve called ‘education to employment,'” said Chui. The problem, in short: Students don’t know what skills are needed to acquire a job and employers don’t know what skills potential employees have. In fact, according to the McKinsey report, “Today, school reputation is often used by many employers as a proxy for a candidate’s skill level.” Open data could help change that. How? The report points to Mozilla’s Open Badges platform as an example: Users earn badges by demonstrating mastery of certain skills, such as proficiency in a programming language. Businesses can study the badges earned by their own employees and seek out others who match the profile.

5. Open data helps to collaborate at scale. “Those of us who are geeks remember the Eric S. Raymond thing about open source: With enough eyeballs, all bugs are shallow,” Chui said. “That’s in code.” Extend that argument to data, and could open data make all insights shallow? “That’s probably not exactly true, but if you have more eyeballs working on data, you’re more likely to get better insights and better analysis,” he said.


October 31, 2013  6:13 PM

3-D printing will be a big deal for smaller businesses, too

Karen Goulart Karen Goulart Profile: Karen Goulart

For midmarket and small-business CIOs, hearing about the latest technologies or IT strategy trends sometimes amounts to little more than cacophonous buzz. What’s cutting edge in tech is often explained or measured in relation to its effect on the enterprise — and is often well outside a midmarket budget.

One example of this (or so I thought) is three-dimensional printing. It’s getting a lot of buzz these days, especially as the types of objects that can be created move beyond plastic tchotchkes and headline-grabbing 3-D-printed guns to things as stunningly complex and useful as artificial limbs and replacement organs for humans.

So, naturally, my ears perked up when analyst Daryl Plummer listed 3-D printing among Gartner’s top IT predictions — things expected to be real game-changers in the next few years — at the recent Gartner Symposium/ITxpo. Yes, IT people, this is something you need to pay attention to, Plummer said. For large companies, especially manufacturers and retailers, this is going to change if not everything, then at least a heck of a lot. As Plummer pointed out, when you start printing products, distribution systems change, the software changes, the way the work is done changes. “Just like the industrial revolution, people will begin to change where they live, what jobs they do, what products they produce, and I can guarantee that will affect an enterprise,” he said.

Right, but what about smaller companies? Well , Plummer hit right on my thought that 3-D printing sounds like something for really big companies with really big bucks to worry about. And for the most part right now, it is. But like every other way-out-there technology, prices are coming down. While high-end models (the sort you’d use to print an organ, for example) run well into the tens of thousands of dollars, consumer versions — albeit obviously smaller, slower and less complex — can now be had for less than $3,000. And that price point is why CEOs and CIOs of smaller businesses need to start paying  attention to this technology, even if they never plan to print so much as a plastic figurine.

As Plummer put it, technically, 3-D printing is “simply an additive process for building up physical layers, based on a digital template.”  That’s technically speaking. Let loose upon the world, Plummer opined, it will also most likely be a really easy way to counterfeit physical goods. As such, it could be a really easy way to cause big-time damages.

“What about the small business that creates little artistic designs? Maybe a bowl or cup or some kind of wall hanging, and they have a digital template for that and it’s stolen and now people are printing out their own?” Plummer said.  “Those people are being affected directly and immediately by the loss of business they could otherwise have had.”

How fast does he think people will start stealing ideas and using 3-D printing to create business-busting fakes? Pretty fast. The U.S. already sees about $300 billion in stolen intellectual property each year. Gartner predicts that by 2018, globally, 3-D printing alone will account for $100 billion per year in stolen intellectual property.

It will become easy to steal an entire business, Plummer stressed — not just a product, but a whole business. “So 3-D printing becomes a risk point for us on intellectual property,” he said.  This means CEOs and CIOs, especially those in manufacturing and retail,  need to start thinking now about how they plan to protect intellectual property. The designs of bowls and decorative wall hangings were one example, but others include things like car parts and all the little things that make up the bigger things in products all around us.

It sounds pretty doom and gloom, but preparing now will go a long way later. And lest we get too pessimistic about how 3-D printing is just going to complicate lives, remember that it can save lives too. As Plummer summed it up: The threats are real, but so are the opportunities.

So how are you preparing for the 3-D printing revolution? Leave a comment and let us know.


October 17, 2013  6:49 PM

The future of big data: The ‘end of anonymity’ is already upon us

Rachel Lebeaux Rachel Lebeaux Profile: Rachel Lebeaux

This report is by Bianca Rawson, a fourth-year student at Northeastern University in Boston, Mass., and an editorial assistant with SearchCIO-Midmarket.com.

Big data presenters at MIT’s EmTech 2013 conference expressed great enthusiasm about the power and evolution of big data — but they were also forceful in their assertion that it needs to be used cautiously.

“We’ve said that this year, the next frontier of big data will be the individual,” said Jason Pontin, editor of the MIT Technology Review, who moderated the kick-off big data discussion at the Oct. 9-11 conference, which focuses on emerging technologies. He noted that, in areas such as health care and data accessibility, big data is becoming highly personalized.

Panelists took Pontin’s sentiments a step further: They said that we’re already there, and, while extremely useful, “highly personalized” data should raise some concerns.

Kate Crawford, a principal researcher at Microsoft Research, was the main voice in identifying those big data concerns and clarifying why individuals, and the companies they work for, need to be aware that that personal data is everywhere. Crawford specifically focused on some of the biggest big data myths: the myths of objectivity, data discrimination and the end of anonymity.

Pointing to Google Flu Trends, Crawford relayed that, by using an objective stance in calculating data to predict flu patterns through mobile, Twitter and Internet users, Google predicted twice as many flu cases as the Centers for Disease Control and Prevention actually recorded for the year. How did Google get it so wrong? Crawford claims it comes back to the myth of objectivity, wherein “[data] requires an enormous amount of care and thinking in terms of how we use it.”

Drawing on a big data study conducted by the University of Cambridge and intended to raise awareness about data discrimination, Crawford said that solely by studying Facebook “likes,” researchers were able to predict somebody’s sexuality, ethnic background, religious beliefs and physical as well as mental health. Not only that, but they did so with incredible accuracy.

In the wrong hands, that data can be a powerful deal maker or deal breaker. If that information were accessed by a bank or a landlord, an individual with what’s considered an undesirable data profile might never see a loan offer or apartment agreement, Crawford argued.

In a technological age in which it takes 12 points on a fingertip to identify an individual but takes only four pieces of cell phone data to do the same, organizations big and small must establish strong data safeguards and policies, and individuals should have the freedom to “opt out,” rather than hand an organization the complete freedom to track them and draw conclusions — and not always correctly.

You may think we’ll never get to that point, but it’s already happening — just look at how the European principality of Andorra is handling its big data. Alas, the end of anonymity is already here.


October 15, 2013  8:40 PM

Eric Schmidt talks ‘incumbents’ vs. startups

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski

From driverless cars to the new old age to the end of privacy, there doesn’t seem to be a cultural hot button Eric Schmidt, the executive chairman of Google Inc., can’t opine on. He was one of a handful of “mastermind keynotes” at the 2013 Gartner Symposium/ITxpo, but his talk wasn’t all philosophy. When asked what he’s learned in the last couple of years about the needs of the enterprise, here’s how he began his response:

Eric Schmidt

“Let’s talk about incumbents versus brand new startups. If you’re starting a new company, literally as a founder or a small team, you would never have the traditional IT data center room. What you would do is use cloud-based services, which are Workday, Amazon Web Services, Google, Salesforce, Netsuite. And you would build your company out of that. It looks to me like companies up to on the order of 1,000 people can operate that way with pretty reliable systems that are scaled for the level of operations that sized company would have.

It’s not surprising to hear newer, smaller companies are taking a more non-traditional IT route compared to older, bigger companies. And yet I couldn’t help wonder if the real nugget for CIOs was in what wasn’t said: Is the division between new companies and established enterprises getting so big, those large, entrenched and relatively inflexible companies are destined to falter, done under by the weight of their legacy technology? What is the tipping point? When exactly should these incumbents, as Schmidt called them, cut their losses with legacy systems and go the way of the upstarts?

Alas, for the larger enterprise, Schmidt didn’t have much advice beyond “start small.” Here’s what he said: A typical adoption venture for our stuff is either an email replacement because the email systems are inflexible with respect to the existing customer problem … and the other choice is the data sharing model, as in [Google Drive] and so forth. People typically start there and then they expand over time.

Oh, and another thing Schmidt noted about companies that aren’t tied to the traditional IT model: In those kinds of companies, you give the employees a budget and say, ‘Go buy your own computer, and connect it into the Internet and off you go.’ It’s that simple of a model.”


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: