The Digital Platform is the best way to reach masses in case of governance and administration. This is what the latest move by the governing party in the center signals. There are many things that BJP is doing in India which no other party could do so far. Definitely, if you have good intentions for the masses, you need to take serious steps towards that. And those steps need to be big in shape. Because smaller steps lead to smaller achievements for a smaller group. But when the group size reaches to billions, there have to be bigger moves. Obviously, digital is the key in today’s world. The people reading physical newspapers is shrinking. And the volume of online communities is increasing exponentially. Even in the remotest of locations, people have plasmas, smartphones, and they do online shopping too. The world is changing fast.
The Kerala state BJP unit comes out with a master plan. This plan focuses on citizen welfare schemes by means of digital media. It also intends to take up environmental issues on digital platforms so as to have larger participation and contribution. The digital platform helps you to connect faster and to much larger audiences. Evidently, BJP’s hold in southern cities is weaker. This might help them to strengthen their position in upcoming central elections in 2019. As per the master plan, there will be 1000 digital service centres across the state. The focus will be helping people in removing their doubts and sharing more knowledge about various welfare schemes like pension and insurance.
Kummanam Rajasekharan, BJP Kerala President says, “The mechanism will be implemented at the booth level. The state-level programme has already started and the plan is to implement the digital help-desk, titled Deendayal Helpline, across the state in the next one month.”
In addition, the digital centres will also provide a number of useful e-services to people. Of course, the digital platform has a great potential.
Information security frameworks questions are quite common across the globe. Technology and business keep raising concerns about the information security. The information security framework comes into picture for that purpose. It is entirely dependent on the business framework and security needs. Hence a common framework will never suffice all businesses in general. It has to have precisely as per the needs. For instance, the information security framework in banking would be quite different from any other business as far as transactions and customer information are concerned.
Here is a recent question on ITKE regarding the same. Would you give me guidelines on development steps and initial requirements of information security framework? The answer as per my knowledge goes like this. Information not only talks about digital information but the physical information too. Hence the three spectra that you need to take care of while creating your policies must include – all critical data in devices (databases, emails etc.), all information on paper/files/physical, and all key personnel in the organization having critical business information. Logically, there are two kinds of risks as far as information security is concerned. Firstly, there is an internal security risk that you need to mitigate. Secondly, there is an external set of risks.
Information Security Framework
Though the security needs might be same in both the cases on a broader level. But there has to be a different set of processes and procedures to tackle both. It is apparently true that the risks from the people inside are higher than outside. The reason for this is that there is a high level of data and information exposure to employees. Therefore, you have to handle rights and access quite wisely. In fact, there is another prominent concern in this regard. That is about sharing of passwords. There are many cases where a manager shares his or her password with subordinates just to shred off some of the responsibilities. Information Security Framework is definitely a serious concern. Also, there has to be a constant review policy for the same.
External auditing happen almost in all organization. It is probably a legal requirement under company act. But then is it possible to audit an external company auditing your organization. Obviously external auditors are the kings. They can ask and demand any information, data, and user rights. In case of physical information too, they can seek files and documents to any extent. Logically, when such audits happen, it is an audit of your practices, proedures, and policies. Basically, it is a check of what you say and what you do. These ideas came into my mind when i came across this question on ITKE. The title of the question is External IT company auditing security and policies.
The question is – We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors? In the nutshell, is it possible to audit an external company auditing your organization? I think, in an organized scenario, it is very much possible. There is a written agreement between the two parties – auditor and auditee. Everything is being taken care in that agreement. There is no need to audit the auditors. But you just need to ensure that you record every requirement from them in black and white along with the reason for which it is required. In any case, when you give them admin user/password you always have audit trail for all your critical data and actions.
Is it possible to audit an external company
Moreover, as the maturity level increase, the auditors inform you the key areas they would be looking into. Also, in most of the cases, they list down the information they would be seeking. This information might include an access to your key business application. They might like to access the application with differnt role level to check if the authorizations and alerts are working correctly of there are any gaps.
Just now came across a question on ITKE seeking clarity on Cyber Security and its connection with Business Continuity. There is definitely a strong connection between the two. The question title was Aligning cyber security incident plans with BCM. The question is – How can I integrate cybersecurity practices into a BCM program? In my opinion Cybersecurity or for that sake any security in terms of data, transactions and critical manpower come under Business Continuity. No enterprise can afford to ignore it while creating policies in that regard.
In today’s era where most of the business transactions happen from multiple locations, the internet plays a major role. The moment your data is exposed to the external world, that is the moment it is out of your local area network and floats on wide area network, it is exposed to risk. You might be using encryption and secure connection but then there is always a chance of hacking the data by miscreants. You never know who are your enemies in this world of masks. Though even if you have an on-premise server and transactions are happening within the LAN but still there would be some ports talking to the external world for various reasons. Cyber Security is of prime concern and a small breach can impact business heavily.
As a matter of fact, a fraction of leakage can create a big risk for a business. For instance, it can be an email, a document about a business deal, a travel itinerary of a key position holder etc. Therefore you need to create a risk assessment charter. Segregate risks on the basis of their severity. the severity comes from the loss or damages a risk can cause to an organization. Higher the loss of damage, higher would be the severity. In fact, this loss or damage need not necessarily be in the form of money. It can be a bigger damage in terms of reputation. Hence, taking cyber security in your business continuity charter is essential.
Samsung in Spain announces I&G or Infill and Growth Project. The innovative projects collaborate two communication giants in India. The project by Samsung is for Reliance Jio Infocomm, India. The project aims to upgrade existing LTE mobile communication services across India with a stupendous increase in capacity as well as network coverage. As the need for this is increasing at a fast pace in the country, some strong steps need to be taken in this regard. In fact, the project aims to set a new benchmark for LTE services in India. This is to happen via wider coverage, deeper penetration of signals, and high speeds. The uniformity in experience is very important in telecom services. You can’t provide an excellent experience at one place and then it worsening at other locations.
The spectrum in 850, 1800, and 2300 MHz bands targets to enable flawless indoor and outdoor coverage even in highly populated areas. The Infill and Growth project, as its name suggests, will help Jio to expand in rural areas by extending its reach to more than 90 percent of the population. As a matter of fact, this is not the first time Samsung is working with Reliance on a large project. Earlier it provided the LTE core, base station, and various solutions for Reliance’s VoLTE services. They also provide huge deployment services for establishing the large network for Jio. In fact, the two companies earlier deployed the world’s largest greenfield LTE network in India.
Infill and Growth Project
Regarding Infill and Growth Project, Youngky Kim, President and Head of Networks Business at Samsung Electronics says, “As Jio’s end-to-end LTE solutions partner, it is a great pleasure for Samsung to contribute to Jio’s tremendous success.” He further adds, “The massive deployment of over a million cells across India is especially remarkable. We will strive to create new paradigms for LTE-Advanced Pro and 5G by closely cooperating with Jio as a unified workforce.”
Jyotindra Thacker, President of Reliance Jio Infocomm, while talking about Infill and Growth Project says, “I am excited to announce our new project with Samsung. We successfully achieved 100 million subscribers in 170 days, making us the fastest-growing company in the world, and the numbers continue to rapidly grow. It was possible because we introduced a truly effective LTE service, Pan-India. We are committed to bringing game-changing digital experiences to India with superior ecosystems, mobile content, all-IP networks and ongoing process innovations.”
We are talking about smart cities, smart nations, smart buildings, smart homes, smart transportation, and so on. With so much of connectivity increasing, we must also think about how to secure data in the world of IoT. Firstly, users have to come out of their habit of using default passwords. The phenomenon is so common that very less percent of users follow the rule. The rule is simple and the risk is high. Keeping your data safe, especially now in the era of IoT, is very important. The IoT age is wonderful but is equally unsafe in terms of data and security. These days, when devices and household equipment are having passwords, we must be highly alert in assigning the passwords. For hackers, it has become a simple challenge to crack a router and other devices in a fraction of seconds.
Leave aside the non-IT people but even the IT professionals at senior positions use default passwords. The same applies to IoT vendors whether they are device sellers or service providers. A password must be as complex as possible. Mostly the habit of using names, common nouns, and a small set of numbers prevails as a habit. These kind of passwords are quite easy to crack in no time. In fact, a password must be long and complex having a combination of numbers, symbols, and different letter case multiple times. This can definitely help you in keeping your data safe to a large extent. Learning how to secure data is important but more important is to understand the risk of not doing it.
How to Secure Data
IoT device manufacturers should follow this practice. In fact, forcing a user to set a password before using the device is a good practice. Also, while resetting a password there must be guidelines to ensure a strong and complex password. Such policies make it difficult for hackers to crack a device though if not impossible. With so many devices getting interconnected a strong password for each device is more important. A single device in the network with a weak password can call for a big trouble. How to secure data is not merely important for the device owner but for the complete ecosystem of large networks, they become part of.
Internet of Things is not merely a buzzword. In fact, a lot is happening in this area worldwide. But at the same time, there is another issue. The rising security concerns with the rise in IoT projects is creating a different set of threats for industry. As a matter of fact, there are many unanticipated risks that are yet not perceived by the technologists and risk experts. A recent article talks about this at length and it is important to understand it properly. Though Internet of Things is a revolution, it is causing certain safety concerns. Of course, any convenience comes with a pain. And we, importantly, need to address to it. There are certain alarming issues that consumers and manufacturers need to take care of in this regard.
Over a 50 billion IoT devices will be talking to each other by the year 2020. This figure comes from a whitepaper by Cisco. In fact, consumers and industries are already feeling the necessity of connecting devices. This necessity arises to bring a big amount of comfort factor in our daily lives. Smart homes, smart cities, smart transport, and smart buildings bring in a lot of devices sharing information with each other in a fraction of a second. This information thus enables you to take timely decisions and actions. Smartphone companies are already releasing new generation devices having inbuilt IoT applications.
Rising Security Concerns
But while these devices tend to increase convenience, they also imbibe with some serious security risks. The uptrend in rising security concerns is alarming, in fact. More devices on the internet mean more liberty to hackers to put their hands on. It is the sensitive data lying on or traveling through IoT devices that are at stake. As a matter of fact, weak infrastructure and insufficient security in these devices is an open invitation to hackers. As we all know that hacking an IoT device is easier than a computer or phone. That is why there is a tremendous increase in IoT botnets. In fact, a vast level of connectivity of these devices invites for more lucrative hacking tasks. Because it opens a plethora of systems inviting them for this challenge. In fact, rising security concerns demands an immediate focus from security experts.
IDC’s report FutureScape: Dawn of the DX Economy and the Digital Native Enterprise talks majorly about few things that are going to change the world in a big way. These are IoT, Digital Transformation, AI, Big Data, Analytics, and Cognitive technologies. In fact, most of these create the base of the IT Industry Predictions from IDC. The evolution of the third platform is on the rise. It comprises of the cloud, mobility, big data/analytics, AI, and social technologies. As a matter of fact, any enterprise committing for digital transformation will have to adopt the third platform. The size and velocity of adoption will depend on the size and urge of the enterprise respectively.
Following are the IT industry predictions from IDC:
Information-based products and services will control more than half of the Global 2000 businesses by 2020. Such companies will have to bank on their ability to build a digitally-enhanced product, services, and experiences.
Third Platform technologies and services will involve more than 75 percent of IT spending by 2019.
67 percent of enterprise spending in IT infrastructure and software will focus on the cloud.
The extent of experimenting by consumer-facing global companies with Artificial Reality (AR) or Virtual Reality (VR) will increase to 30 percent by 2017.
The AR/VR is bound to reach mass adoption levels by 2021. Over a billion users will be accessing apps, content, and data via AR/VR.
Industry Collaborative Clouds (ICCs) will reach to a phenomenal figure of 450 by 2018. In fact, by 2020, more than 80 percent of the Global 500 companies will be supplying digital services using ICCs.
More than 70 percent of the Global 500 companies will build organized digital transformation teams by the end of 2017.
The performance of any enterprise will have an additional factor i.e. its digital transformation initiatives.
One-third of health, life sciences, and consumer product businesses will start developing products and services integrating third platform technologies with the human body.
IT Industry Predictions
These IT Industry Predictions are going to be true looking at the current trends and expectations on the global front. In fact, the time is not that far.
IDC says IoT and AI together can deliver wonders to IoT and IIoT projects that IoT alone can’t. Probably it seems to be a fact that IoT needs AI capabilities. The conclusion arrives on the basis of research by them in this area. It predicts that by 2019, all initiatives pertaining to IoT (Internet of Things) and 40 percent of efforts in the field of digital transformation will require the support of cognitive and artificial intelligence (AI) capabilities. The market intelligence and advisory enterprise International Data Corporation (IDC) reports it in their IT industry predictions for 2017 and beyond. What it means is that IoT and AI will have to work together in all IoT initiatives to be effective in this spectrum of innovation.
Big Data is a major contributor to the flood of data. In addition, IDC believes, IoT devices and digital transformation projects will add a plethora of data to it. Therefore, it is advisable to AI technologies to filter valuable data. This itself proves IoT needs AI capabilities to a large extent in order to deliver better results. Even the developer communities are favoring to include cognitive or AI in their applications. In fact, by 2018, this will increase to 75 percent. As a matter of fact, the time is not far when prominent cloud players like Amazon, Google, and IBM start providing standard AI platforms to their customers.
IoT Needs AI Capabilities
The comprehensive report from IDC FutureScape: Dawn of the DX Economy and the Digital Native Enterprise carries all such conclusions. Frank Gens, senior vice president and chief analyst at IDC says, “We are at an inflection point as digital transformation efforts shift from ’project’ or ’initiative’ status to strategic business imperative.” He further adds, “Every (growing) enterprise, regardless of age or industry, must become ’digital native’ in the way its executives and employees think, what they produce, and how they operate. At the same time, 3rd Platform technology adoption and digital transformation are happening much faster than most expected and early competitive advantages will go to those enterprises that can keep pace with the emerging DX economy.”
There are many other factors to provide ample number of evidence that prove IoT needs AI capabilities to deliver the best.
IIoT Initiatives or Industrial Internet of Things infrastructure initiatives can happen in various areas. The spending and initiatives will vary from industry to industry. In fact, it will be different even within the same industry segment. For instance, a car manufacturing company will have a larger set of needs in comparison to its vendor supplying components. As a matter of fact, most of the enterprises have already been taking ample IIoT initiatives and provisions in their budgets for such spendings. A survey in this regard shows some remarkable results. The findings from the survey suggest that Telecom, manufacturing, construction, high-tech and similar enterprises must actively deploy IoT solutions at a faster pace.
When we talk about IIoT initiatives, we must align them well with the IT infrastructure budget. As a matter of fact, every industry segment has to keep its customers and end users in mind while taking such initiatives. For instance, existing networking elements have already started losing their sanctity in this regard. There is a high demand for newer networking devices that must address the needs of IoT projects. Secondly, Bluetooth Low Energy (BLE) and Wi-Fi would be fitting almost in all IIoT or IoT projects. These two will be the most economical and highly effective connecting tools.
But the requirement changes for long-range wide-area networks (LoRaWAN) and narrowband IoT (NB-IoT). Probably in these cases, vendors will have to think beyond BLE and wi-fi. The vendor selection will depend on their capabilities in providing solutions for data analytics and pattern recognition. The Demand for edge servers and cloud-based services will increase tremendously. Security will remain a concern, as usual. But then it has to be taken care of in a significant manner.
Sathya Atreyam, research manager, mobile and IoT infrastructure, IDC says, “Given the strong uptake in IoT-based technology solutions, enterprise IT buyers are looking for vendors who can add IoT capabilities to the current networking and edge IT infrastructure.” He adds further, “Further, the success of IoT initiatives will also depend on how IT buyers can effectively leverage newer frameworks of low power connectivity mechanisms, network virtualization, data analytics at the edge, and cloud-based platforms.”
I think a lot of IoT initiatives will become an integral part of various IIoT Initiatives subsequently to provide benefit to enterprise and consumers in a single shot.
Internet of Things or IoT Infrastructure Spending is increasing. And the speed at which it is increasing is tremendous, we must admit. IT infrastructure spending that does not align with this will not suffice meaningful purposes for businesses. In fact, Enterprise IT heads have to start thinking in this direction sooner or else they will fall apart from the mainstream of business. And soon they will become an obsolete entity for their organization. And, as a matter of fact, the same will happen to the IT infrastructure spendings having no capacity for IoT alignments.
This means, your IT infrastructure budget must have a provision for IoT Infrastructure spending. Whether it is a service organization or a manufacturing business, all need such provisions. This emphasis comes from a recent research from International Data Corporation (IDC).
On the same lines, an IoT IT Infrastructure survey shows similar trends. It concludes that IoT data management, improved business offerings, and IoT networking components are the key focus areas to embark your IoT initiatives. These will, in turn, lead to the success of an enterprise. The study considers existing and future IT plans including IoT infrastructure spending. It says end users engagement and knowledge of IoT needs will play a major role in deploying IoT strategy. In fact, vendors also need to play a crucial role in educating and influencing enterprises for IoT initiatives.
IoT Infrastructure Spending
Natalya Yezhkova, research director, storage, at the market intelligence and advisory firm says, “The survey revealed that IoT will have a significant impact on end-users’ decisions and strategies related to IT infrastructure across all three major technology domains: networking, software, and storage.” She further adds, “Increase in budgets, broader adoption of public cloud, and open source solutions are the most anticipated results of IoT initiatives.”
Overall, it is a crucial phase of the end user industries and IoT firms. They need to collaborate in a significant manner to gain fruitful results from IoT Infrastructure spending.
Is NFC IoT. Somebody asks this question on Quora and the question lands in my mailbox because of my subscription on few keywords. I have done few pilots on NFC and hence feel confident in answering queries on NFC. IoT is again my favorite topic. A lot is happening in discussions and perhaps in actions when we talk about IoT. But as of now, this all seems to be superficial. If it is not able to solve existing issues then it can’t talk about the solutions of future. NFC i.e. Near Field Technology is not IoT i.e. Internet of Things. NFC can help in creating IoT. And when we say IoT it is nothing but smart cities, smart homes, smart buildings, smart nation, and so on. IoT is all about real-time communication between various devices. Though it is much beyond merely enabling devices to talk to each other.
Is NFC IoT?
As a matter of fact, the question Is NFC IoT is good for clarity point of view. One is technology, and the other is the solution. NFC is a technology that makes an active device, say a smartphone, talk to a passive device, say a tag. Now, IoT is all about connected devices. So if you are able to make your home devices as active or passive devices so that they can communicate to each other, you can achieve IoT to a larger extent. It is useless if devices talk to each other and do nothing beyond that. It is useful only if they are able to pass useful information and create alerts in case of any deviation. Can NFC make it happen? Then the answer is ‘Yes’. So can NFC help in building IoT? The answer is again ‘Yes’.
Is NFC IoT? The answer is ‘No’. NFC is a technology using which we can build IoT. In fact, NFC can make IoT happen with the help of devices.
How can I start to learn BI? This question is quite vague in many aspects. Firstly, it doesn’t tell if the person is from technology field or some other field. Secondly, it doesn’t reflect the age and experience of the person asking this question. Because, it will make a lot of difference if the person is having technology background or not. It also makes a big difference if the person is totally a fresher or having some experience. In fact, this question itself leads to a tree structure having multiple branches and sub-branches. And unless you get to know the answer to those queries properly you can’t answer to this question How can I start to Learn BI?
Still, I feel, if the person has this query, it is important to answer it. And if I have to answer to this question, I would go this way. I think it is better to understand where you stand in technology right now before answering this question. There are two scenarios. Firstly, if you belong to technology, start at home. Understand your business needs and discuss with what kind of dashboards would they like to have in place to make quicker and better business decisions. In case, a BI tool is already in place in your organization, study it properly and how it is benefiting your business.
How can I start to learn BI?
Secondly, if you are not from technology, then get into technology first and see what all technology does for business. Because, when you understand how a core business application like an ERP functions only then you can understand the gravity of any BI tool or BI outcomes for a business. There could be many more scenarios, in fact. If you are having the same query How can I start to learn BI? And your scenario is different, you can directly post your scenario in the comments section. I would be more than happy to reply to your any such kind of queries.
– Name and title of person(s) answering questions
Bob Spurzem, Director of Product Marketing, Archive360
– Archive360 recently announced your Archive2Anywhere Digital Safe edition. Could you tell me a bit about the solution? And, are you finding there are a lot of customers on this platform looking to move away from it, and if so, why?
Digital Safe is a hosted email archiving platform that successfully targets the financial services market that is regulated by the SEC and FINRA. Beginning in the 2000 era, the SEC issues new rules that required all of its Broker-Dealers members to keep a copy of all electronic communication, including email and instant messaging. Digital Safe (under the Autonomy Zantaz company name) was one of the first companies in this new market. The other was Iron Mountain. Remember, that in 2010, Autonomy acquired the Iron Mountain electronic archiving assets, so in effect Autonomy possessed both Digital Safe and Iron Mountain hosted email archiving assets, totaling 100’s of PBs of email compliance records.
Fast forward to 2016/2017, the email compliance records comprised of Digital Safe and Iron Mountain are under the ownership of HPE and are being sold under the single Digital Safe brand name.
The technology used in the solution dates back to 2000 and is aging. Customer report frustration with discovery performance, support, and overall cost. And in general terms, customers are looking for new options for storing the email records that the SEC requires them to preserve.
It is this customer demand that we (Archive360) are starting to see. Starting in late 2016, financial service companies approached us about migrating the email archive data currently in Digital Safe to a new hosted email archive platform.
– In addition to Digital Safe, what other platforms are customers looking at to leverage for their legacy email archives?
The market for financial services email compliance archiving is a highly specialized market that is served by HPE Digital Safe. Other platforms that also address this market are Mimecast, Proofpoint, and Smarsh.
– What role are regulatory compliance and eDiscovery playing in the increase of enterprises seeking to migrate their email out of legacy archives?
As a factor causing customers to migrate legacy archives, performance dominates. Legacy email archiving platforms such as Digital Safe were designed over 17 years ago, and generally, lack the performance and functionality customer expect from new platforms. Digital Safe is further challenged by multiple changes in ownership in recent years, which complicates product development and support.
– Other factors in play?
Cost is a major factor. Recent advances in storage technology have greatly reduced the potential cost of hosted email archiving. New “cold” storage solutions from AWS and MS Azure, for example, cost as little as $0.01 – 0.02 per GB per month – 10x-20x cheaper that current solutions.
– Cloud vs. on-premises?
Cloud archiving is preferred over on-premises archiving for email compliance archiving and this is true for Digital Safe, which has always been a hosted solution.
– What advice would you offer to an IT, compliance or legal professional evaluating potential long-term solutions?
If you are currently a Digital Safe customer, new migration technology makes it possible to migrate legacy email archives currently hosted in Digital Safe to new archiving platforms. New archiving platforms benefit from advanced technology that offers improved discovery and reduced total cost. As always we recommend you evaluate any new platform carefully.
Though there are a number of project management methodologies, not all fit into Agile Project Management Methodologies. While you adopt the Agile approach, it is important to understand how to start, conduct and finish a project in that prospect. The top most priority, as per first principle is to satisfy the customer through an early and continuous delivery of valuabe software. As I always recommend, a software is useless if it does not cater to business needs. The sole purpose of a software is to enhance business process thereby saving time, money, and manpower. It should always aim to add value to business.
When we discuss Agile Project Management, let us look at Principle number two. It says we should welcome changing requirements howsoever late they come during ddevelopment. Remember that if a change is adding a big value to customer, go for it. It talks about a non-rigid approach. Principle number three mentions about delivery. It says you must deliver working software frequently. This iteration can vay between a fortnight to a month. The shorter the timescal, the better it is. But remember, there has to be substantial value in the piece you are delivering. It should not be just for the sake of it.
Agile Project Management Methodologies
The next principle in agile project management talks about collaboration. It says business key users and developers have to go hand in hand throughout the project development phase. In fact, I would add quality to this from the latter end and management from the former end. The next principle talks about space. You need to provide space to your team members. Only then you will get what you intend to.
This is a beautifully curated article. I would recommend every one who has interest in project management must read it. In fact, it will provide great insights for agile project management methodologies. In fact, the article is quite simple to read and adopt.
PMO Advisory is a PMI (Project Management Institute) global education provider i.e. PMI® R.E.P. It provides training in various streams. These include Project Management in Portfolio (PfMP®), Program (PgMP®), Project (PMP® and CAPM®), Risk (PMI-RMP®), Agile (PMI-ACP®, SCRUM®), Project Management Office (PMO) and Organizational Change Management (OCM). The new on-site training and coaching program aims to enhance an enterprise’s capabilities through a unique combination. This unique combination training includes best practice frameworks of Portfolio, Program, and Project Management. This way, PMO Advisory will be able to empower these organizations to overcome those challenges.
PMO Advisory names it as Triple Play Professional Training. In fact, this unique combination of Portfolio, Program, and Project Management is a wonderful fusion of management frameworks. There was no single platform so far offering this unique combination. This, in fact, will overcome many gaps in project management training. The fusion of management frameworks from three different streams couples with a custom training program. Furthermore, this will transform and accelerate organizations in an optimal and efficient manner.
Prof. Te Wu, Founder and CEO of PMO Advisory says, “We are able to bring executives and governance to Project Management and Projects into alignment with organizational strategies.” Te Wu continues, “we can align and bridge the gaps between an organization’s Strategy, Projects, and Operations, alleviate dysfunctional team dynamics like poor communication, team in-fighting, and misdirection – all onsite through a blending of high-powered training and coaching with consulting insights.”
Te Wu adds further, “We can help organizations confronting these issues: too many projects and programs, poorly aligned projects with strategy, project inefficiencies and cost overrun, inadequate methodology, mismatched organization culture versus project culture, taking on disproportionate amount of risk, and poor discipline with project, program, and portfolio management. Through a combination of training, facilitated workshop, coaching, and providing common and best practices from consulting, we are in a unique position make significant improvements quickly.”
You can get further details of this unique training from PMO Advisory here.
It will be interesting to understand the functioning of Intellicta Platform. This is a new platform from TechDemocracy. Before that you may like to read the previous post on Intellicta release. Ken Pfeil who is a former CISO and currently Chief Architect, TechDemocracy says, “Even in large organizations, I found it particularly challenging to obtain a holistic view of the risk posture, because I was limited to piecemeal assessments coming from the tools I was using to protect the enterprise. That approach not only lacks objectivity, it fails to show the gaps that exist in protection. We’ve created a platform that breaks down those limitations and puts companies on a path to intelligent risk assurance.”
Therefore, it becomes important to learn how Intellicta Platform works. As we know, it is an open platform. In fact, it is easily customizable to align with an enterprise’s specific business requirements. It integrates whatever leading enterprise-class IT security technologies in use. The integration, in fact, is quite simple And thereafter, it immediately starts assessing the realistic effectiveness of these technologies. As a matter of fact, the emphasis is also on finding out the gaps and the quantification of risks. As and when an enterprise adds new security and risk tools in the organization to cater to their needs, they need to add it in Intellicta Platform. The platform will immediately assess and confirm if the new tools are capable delivering the outcomes to mitigate the cyber risks. In fact, it gives a comprehensive dashboard to see an overall cyber risk posture.
Intellicta Platform Is a Universal Framework
Intellicta Platform is a universal framework that takes care of your complete regulatory needs and security standards. These include NIST, ISO, HIPAA, IRA, SOX, and so on. In turn, it creares a comprehensive risk assurance progam. In addition, it keeps mapping and monitoring industry best practices. As a result, it finds out the gaps, if any, in regard to cyber risk and compliance.
Intellicta Platform, being an open architecture, is easy to integrate and support. The Risk Assurance Center that resides in the platform continuously monitors an enterprise’s unique technology ecosystem. The center keeps aggregating this data from the hardware and security tools. It then coorelates and analyzes this data to measure across regulatory requirements. It also keeps measuring enterprise’s own security and governance rules.
In the context of Intellicta Platfrom, Martin Kuppinger, founder and principal analyst, KuppingerCole says, “The cybersecurity risks organizations face are forcing them to invest significantly in cybersecurity technology, but what is missing is a platform to evaluate their overall preparedness and governed situational awareness.” KuppingerCole is an international and independent analyst organization headquartered in Europe. Marting further adds, “TechDemocracy is creating a highly ambitious and innovative software category. Its underlying conceptual framework will be a welcome addition to the marketplace, especially for larger enterprises with the need to correlate existing compliance and risk information into a flexible, unified and powerful risk assurance model.”
TechDemocracy launches Intellicta that is the first ever platform offering businesses a new paradigm in the assessment of Compliance, Security, Risk, and Governance Tools. In fact, it is first ever tool that provides this four-dimensional assessment in a complete manner. TechDemocracy LLC is a global frontrunner in providing cyber risk assurance solutions. Intellicta platform will help enterprises’ board of directions and C-suite teams fill the knowledge gaps across the four important functions. These four pillars are compliance, security, risk, and governance. The platform complies with all standards to create a framework of a globally universal level. In fact, it builds a risk assurance center that analyzes comprehensively the gray areas of existing cyber risk. Not only this, it also provides respective compliance solutions thereby offering a complete dashboard of enterprise risk spectrum.
Enterprises, in the current scenario, are facing a number of hiccups implementing a complete risk assurance program. This is because of the limitations of such platforms available in the market. In addition, another significant reason is the complexities in their cyber security and compliance assessment solutions. In fact, none of the tools available so far comply to a universal set of industry standards. This, in turn, causes limitations to create uniformity and objectivity in regard to situational awareness. It also becomes unable to consider all current and future business needs. Intellicta, as a matter of fact, will cover all such gaps thereby providing a holistic solution.
Srikiran Patibandla, CEO, TechDemocracy says, “Our DNA is rooted in cyber advisory and managed services, and particularly in identity and access management. Building on that core, we made an investment to fill a gap that we see worldwide—the need for a management platform that enables senior executives to evaluate, measure and governs the overall risk and compliance situation of the enterprise.”
Intellicta Platform Cyber Security Solution
Intellicta provides a real-time situational awareness information in a single dashboard. This dashboard covers all possible cyber risks across the business. In fact, it also quantifies risk score and financial exposure. Hence, it is capable enough to provide not only the risks but also their value in terms of money, time, and reputation to the business.
Gautam Dev, global managing principal, TechDemocracy says, “CISOs have been working hand in hand with other business functions to implement cybersecurity solutions, but for those accountable to boards of directors for governance — CROs, CIOs, CEOs and CFOs — what has been missing until now is a way to evaluate their performances collectively against the business objectives and to create one common picture of their risk situation.” He further adds, “Intellicta enables senior decision makers to assess and clearly communicate where the enterprise stands versus industry best practices and standards, pinpoint inefficiencies, prioritize risk investments and continually track progress.”
If I think of 5 great IoT initiatives of 2016, the top ones that come to my mind are below. There would, definitely, be more to mention. The IoT initiatives, logically, fall into two categories, in my opinion. Firstly, there are end consumer or home segment IoT drives. The second category belongs to Industrial IoT initiatives. Both are equally important in our life. In fact, both intend to make smart cities. And as we all know, smart cities comprise of smart homes, smart industries, smart offices, smart hospitals, smart roads, smart infrastructure, and so on. All this leads to smart governance and hence smart cities. A collection of smart cities builds a smart nation.
5 Great IoT initiatives
Let us list below the 5 great IoT initiatives of 2016:
- Google Home: With its release in November 2016, probably Google has come out with one of the most wonderful innovations. If you remember Amazon Echo, Google Home is simliar to this. But in a way it is much beyond what Amazon Echo does. This tool will empower you to easily use your IoT smart home devices.
- Xively ProductLauncher: Xively ProductLauncher evolves in September 2016 by LogMeIn. In fact, it is an IoT interactive design tool. It creates a new horizom of IoT projects modelling. As a matter of fact, it is a tool that is going to help many upcoming ioT projects and launches. There is a huge cost saving for industries while using Xively ProductLauncher.
- Android Things: This is a new IoT operating system from Google. Though it is a makeover of Brillo, but it has a lot of innovative capabilities.
- Amazon Dash: Amazon Dash came into existence in May 2016. This is a smart button that is completely and easily programmable. It will help developer communities to easily control connected devices.
- Cisco Industrial Network Director: As the name suggests it is an IIoT product. In fact, it provides a full visibility of any industrial network howsoever large it may be.
Hope these 5 great IoT initiatives of 2016 help in transforming the world in a meaningful manner. I feel they will in one way or the other. Would like to know reader’s views on the same in comments section.
A project manager is nothing but a facilitator to his teams. Agree? If a project manager doesn’t care for his teams, the same will apply vice versa. The teams also wouldn’t care about the project and project manager. Let us look at 5 Project Management Lessons from Luxe Amenities that you get aboard Emirates. Remember that what you give, you get in return. Interestingly, if you treat each project as an overseas flight, you need to treat your teams as passengers aboard. You, as a project manager, has to ensure that passengers aboard don’t carry a jet lag, lack of space, and improper teammates. All this may cause traveler a great amount of discomfort. And the straight impact will fall on project thereby causing disruptions and risks. Let your teams not worry about any of such issues while working on a project. Make your project as enjoyable as possible.
One of the important 5 project management lessons is to Personalize every teammate’s project journey. You let them know your demands and guidelines and then don’t restrict them to drive the project in their own way. The deliverables have to come in time. Which way, let it be their call.
5 Project Management Lessons from Emirates
5 project management lessons that you can adopt from Emirates are:
- Privacy: Retain every team member’s privacy. In fact, don’t barge into their privacy zones. Interestingly, the more you let them fly free, the more heights you attain in your project collaboratively.
- Sleep: Give them some rest time while calling them for long work hours. Definitely, no project works 9 to 5. There are moments and instances that call for extended hours. Provide them a comfort and space where they can have a nap to work afresh.
- Warmth: Keep your project alive with warmth. Don’t let it go cold and unresponsive. Let each person’s energy work in the same direction to achieve your results faster.
- Entertainment: If you are creating moments of anxiety and unrest for them, you are also responsible for creating moments of entertainment.
- Stress: Keep them stress-free throughout. In fact, bring some lighter moments in between. Share with each other about your families, friends, and life.
I am sure, these 5 project management lessons will help you in your project journeys. In fact, do share your experience. Even if you agree or not. As a matter of fact, I would love to listen from project managers from various parts of the world.
Deloitte Malta plans to go all digital. Hence it is taking Digital Strategy and Transformation as its top priority. In fact, this begins with the launch of Deloitte Digital. This is a one of the brand of repute that belongs to the organization wide network. This network also has member firms as its integral part. The aim is to focus on business transformation and technology implementation thus building world-class capabilities of a digital agency.
Malcolm Booker, Deloitte Malta CEO, says, “Digital is enabling business transformation at an unprecedented rate. It is impacting business models and redefining the way companies interact and engage with clients, while also becoming an intrinsic and essential part of their service offering. There is no doubt that those companies that do not leverage digital to their advantage will ultimately lose out to competitors who do.”
He further adds, “We envisage major opportunities for Deloitte Digital in Malta and beyond, as clients look to us for guidance on how to counter the disruptive forces that are challenging their business. This belief led us to acquire the Alert Group, in order to be able to hit the ground running when it comes to offering a top-notch digital service offering.”
Furthermore, he elaborates, “We are now fully committed to building upon the considerable experience of the existing digital team in providing the necessary investment and resources for a fully-fledged digital agency worthy of the Deloitte Digital brand.”
Deloitte Malta Goes Digital
Claudine Cassar, the founder of Alert Group and Deloitte Malta Digital and Technology Leader says, “With the digital revolution, industries are facing many new challenges and opportunities. The launch of Deloitte Digital will combine our digital and creative skills with the industry expertise we have built up over the years. The Digital team will be offering a comprehensive range of services for organisations who want to make effective use of the internet and advanced technologies in order to grow their business.”
She further adds, “The Deloitte brand is well known in the region and has an excellent reputation. This, combined with our digital expertise has helped us make inroads in the Gulf, where there is massive business potential. It certainly is not easy to receive a digital accreditation from Deloitte and it was really a very proud moment for us when we did. A whole new world of opportunities has opened for us.”
Walmart is the biggest retailer and employer in the world. It has more than 20,000 stores in around 30 countries. With the fast changing trends in technology and businesses, and to cope up with its business requirements, it is transforming hugely. The company is in the process of creating the biggest private cloud in the world. It aims to process more than 2.5 petabytes of data every hour. Surprising? Yes, of course. What a huge setup it is going to be. It seems ‘biggest’ is synonym with Walmart in all aspects of business and technology. Now, when a business plans to churn out so much of information, there has to be a team deciding what is the intake of data to churn out so huge information every hour.
Definitely, real-time analytics, intelligent dashboards, and timely alerts will be on the top of agenda. Walmart is creating its Data Café. It is going to be a state-of-the-art analytics hub within its Bentonville, Arkansas headquarters. There are more than 200 streams of internal and external data. It includes 40 petabytes of latest transactional data. In fact, modelling, structuring, and visualization will be taking place in a rapid manner. As a matter of fact, all teams are welcome to throw any problem that they are facing in business. Any such problem goes to the analytics experts in Walmart’s Data Café. The expert team works on the solution in a faster manner that is visible on the centre’s touch screen they call as “smart boards”.
Walmart Data Cafe
Senior Statistical Analyst Naveen Peddamail, Walmart says, “If you can’t get insights until you’ve analyzed your sales for a week or a month, then you’ve lost sales within that time.” He further adds, “If you can cut down that time from two or three weeks to 20 or 30 minutes, then that saves a lot of money for Walmart and stopped us losing sales. That’s the real value of what we have built with the data café.”
It is really going to be quite exciting, challenging, and collaborating atmosphere at data Café in Walmart helping business take a new leap.
CenturyLink Inc. is collaborating with Cloudera Inc. for a new Big Data-as-a-Service (BDaaS). While CenturyLink is a global communications expert, it seems to be a perfect combination with Cloudera. Cloudera, as we know, has a stronghold on Apache Hadoop analytics systems. As happens in other BDaaS initiatives, the two aim to empower enterprises with Big Data Analytics to have an edge in the global markets. It will create competitive business advantages without big investments. Because with BDaaS businesses will not require recruiting data scientists and developers on their rolls. The expertise will come along with this service as a complete package.
In a way, BDaaS saves a big investment on infrastructures like servers, storage, backup devices, and data center. In addition, it also takes off your burden of hiring high-value positions like Data Scientists and developers. Furthermore, the whole thing comes as a complete service. It thus saves a lot in your capital investment and operational cost. Rather, the talent that comes along with BDaaS brings an expertise of consulting, training, and education to the organization availing it. In fact, it also saves a lot of time for initial setup and deployment. It is now a question of just configuration and post-deployment support.
In this context of the release of BDaaS, Cloudera CEO Tom Reilly says, “Cloudera and CenturyLink’s innovations with Big Data analytics can drive true business transformation at a time when many companies are finding it hard to harness the power of increasing volumes of data. He adds further, “Companies that break down their information silos are finding themselves better positioned to capture new market share and deliver superior customer service.”
BDaaS Big Data-as-a-Service Is a Big Revolution
Similarly, CenturyLink says, “CenturyLink BDaaS is enhanced by adding data and advanced analytics consulting services supported by a deep bench of Cloudera-certified data scientists and Cloudera Hadoop solution administrators, developers and architects.” It goes further saying, “The solution, bolstered by CenturyLink’s global high-speed network connectivity, provides storage, processing, and management components deployed on CenturyLink Cloud Bare Metal servers. The bare metal private cloud environments, which allow customers to achieve faster time-to-market, improved data protection, and rapid public cloud scalability at a lower cost, have been certified by Cloudera as an architecture that meets its rigorous criteria for ensuring optimal performance and efficiency.”
In addition, James Curtis, Research Analyst, CenturyLink says, “With numerous vendors offering components for Big Data solutions today, a key to achieving success for customers is services and support. Providers that offer data and analytics consulting, deployment support and customized infrastructure and application solutions, should be able to deliver enhanced strategic value for customers.”
In the nutshell, BDaaS is going to revolutionize the business in an entirely new spectrum thus shifting the focus on fast adaptability and usage.
Big Data Analytics In The Retail Industry can help any online retail business to a great extent. Online retail stores must understand customer behavior in various parameters. The same understanding is equally important for the prospects that are not yet their customers. Though walk-in is important but more important is conversion. A high walk-in or check-in with low sales means the business is able to attract visitors from outside but once they enter the site, they don’t find it lucrative enough for purchase. The reasons could be many. One needs to understand it deeply so as to take appropriate measures.
The best moments of sales for retailers are holidays. These holiday periods compensate the down periods during the year when there are no sales. In fact, holidays help a lot in boosting the sales and profits. That is why holidays are quite crucial for retail business. It helps them in capitalizing on the season to its fullest. And even if during these periods if they fail to capitalize, it creates a lot of other failing factors. Interestingly, on the other hand, if there is a boom in sales during this period, it covers up their risks and losses. That is the reason for retailers to find all kind of pointers to boost their sales. Big Data Analytics in the retail industry become quite handy in that aspect. Right?
Big Data Analytics in the Retail Industry
In fact, Big Data Analytics in the retail industry not only helps them in increasing their sales but also to find out a large number of interesting and realistic points. It caters to their different purposes, in fact. As a matter of fact, these analytics solutions can also give great insights on success and failure. For this, you need to have the right set of tools, strategies, and manpower to draw full benefits of Big Data Analytics in the retail industry. Only then you can have a cakewalk on the success path.
Transformation is a tough task. In fact, it never happens overnight. It takes a lot of learning, understanding, willingness, desire, determination, and discipline to transform in life. Creating a Transformational Project Manager is a tougher job, as a matter of fact. Rather, it does not happen on its own. You need a spark to transform. And that spark might come from anything. It could be a person, instance, or an inner voice. Or, a combination of all the three. You can’t create a transformational project manager further in your team or peers if you are not the one yourself. That is like bringing a change by 360 degrees. Usually, you will not find project managers even having an urge to become a transformational project manager. There might be sharp, smart, and accurate project managers, though. But even they don’t fall in this category. It is a different class altogether.
Well, If you feel to be in the category of transformational project managers, let us play a quiz as below. If you answer yes, add 1 point to your score. Similarly, if you answer no to a question, then subtract two points from your score. Your overall score might be negative. Don’t worry about that. Be realistic and accept the reality on the face of it. Only thing is that in that case, you will have to work really hard to get into this category. So, here we go:
Transformational Project Manager Check List
- Are you a change seeker?
- Do you keep a close watch on your policies and procedures?
- Do you raise a voice for making a change in your policies and procedures?
- Do you maintain revisions to these policies and procedures?
- Are you a changemaker?
- Did you observe any major change in your working style in last quarter?
- Did this change ease your and your teammate’s comfort level?
- Are you able to bring change in your teammates working style?
Be honest in your replies. Because only then you will be able to assess if you are a real transformational project manager.
Greece’s Theotokos Foundation Turns to Metalogix and Orthology for Microsoft Office 365 Operations ManagementBackup and Recovery, Data protection, Disaster Recovery, Metalogix, microsoft office 365, Office 365, SharePoint, Virtualization
Non-profit to Next Leverage Metalogix for SharePoint Cloud.
The Theotokos Foundation has deployed Metalogix’s Essentials for Office 365, in order to regain control and streamline the ongoing management of its client services and internal operations content. In doing so, the non-profit can better focus on its core business goal of serving more than 300 learning and developmentally disabled clients and their families in Greece.
Recently, the Theotokos Foundation identified the need to clean up and regain control of its vast store of data spread across various applications. Its goal was to enhance productivity and collaboration. The first step was to find and migrate all of its data – from emails to online calendars, to all other client and internal operations data into Microsoft Office 365. It turned to its trusted advisor Orthology for the best solution from both a features and functionality standpoint, as well as pricing. Orthology recommended Metalogix right away. And, after a thorough review and testing (free trial), the Theotokos Foundation agreed it exceeded expectations, and offered far better capabilities, was less complicated to use and delivered a much higher ROI than any of its competitors.
It first leveraged Metalogix Essentials to find and then accurately migrate its content into Office 365. Once this was complete, its next goals were to streamline management of the environment, as well as ensure data protection and disaster recovery (DR) capabilities. Again, it turned to Metalogix Essentials. With the solution, Theotokos automated the provisioning and management of its Office 365 users and licenses (currently 200 licenses). It now also uses Essentials to simplify day-to-day administrative tasks. And, Essentials gives them complete backup and granular restore capabilities for Office 365 data – protecting against everything from an accidental deletion to a serious disaster event.
Greece’s Theotokos Foundation Turns to Metalogix and Orthology
“Metalogix Essentials provided just what we needed to protect our vital information, in an easy to deploy and manage package,” said George Koumarianos, IT Manager, Theotokos Foundation. “Moreover, right away we could see that it was much more flexible than any other solution we evaluated. With Metalogix Essentials in place, the Theotokos Foundation now enjoys complete peace of mind that our data is highly available, reliably protected and ready for fast and simplified recovery if needed.”
Now, having completed its Microsoft Office 365 initiative it is planning for its upcoming SharePoint cloud project. And with Metalogix having exceeded expectations, Theotokos plans to turn to them again. “Once our users have been trained on SharePoint, we will also use Metalogix to optimize and protect our SharePoint data in the cloud,” said Koumarianos. “Metalogix has more than proven itself across our Office 365 environment, and we will without hesitation deploy it to support our SharePoint environment as well.”
A Theotokos Foundation case study can be read here, should you wish to learn more.
In today’s world of internet and digitalization, any startup is a sort of tech startup. As the startups are mushrooming on a regular basis, it is essential to understand the most critical stumbling blocks of startups. Why I call almost every startup as a tech startup, you will come to know a little later. The reason for this is mobility and internet. The startup might relate to hospitality, travel, medical, or food venture. But as most of them are online apps, they fall in tech category too. You can differentiate the stumbling blocks of startups in two categories. As a matter of fact, the first category is that of Generic or global causes. While the second one is a set of reasons varying case to case. We would be talking about the former category of key stumbling blocks of startups that fits all.
I remember a startup launching a contest on its portal. There were four prizes for the top 4 winners. Contrarily, the contest results were entirely different. Two of the five winners were getting the third prize. And rest were getting some gift vouchers. This was almost a violation of the rules and guidelines. Coming back to the key stumbling blocks of startups, I think, the most prominent are a lack of vision. In fact, startups forget to keep walking on the right track and start deviating quite easily. They lack concrete project charter and plans. The adherence to plans and timelines is missing. Rather, there are so much of changes that happen too frequently.
Stumbling Blocks of Startups
The next couple of biggest stumbling blocks of startups is mismanagement of finances and funds. A mismatch or gap between the inflow and outflow without knowing the facts is dangerous. It may lead you to a wrong direction. In fact, it can cause wrong financial decisions that could be quite harmful.
Looking at the current trends in the technology segment, 5 Top Technology Skills in demand for the next year would be as follows. The current trends show Project Management has been a top agenda during the year. A lot of aspiring learners opt to qualify such certifications. The certification like the one from PMI (Project Management Institute) helps them in getting relevant job. But on the other hand, there have been a number of upcoming trends that ensure those will be in high demand during the next year. These upcoming trends include Big Data Analytics, Cloud Migration (or in fact, cloud technologies), Digital Marketing, and Cyber Security. All these indicate to be 5 top technology skills in demand for the next year.
I feel, managing your projects will depend a lot on how you manage your people. Hiring right skill people is definitely a great skill. But managing them and getting the best out of them demands an altogether different set of skills. This is where the role of a successful project manager comes into demand. Similarly, if we look at current scenario, no business is untouched by big data. Every business is engaging with social media to enhance its outreach. Big Data Analytics, thus, is going to be a big ticket item in the list of 5 top technology skills in demand for the next year.
Businesses are migrating to cloud rapidly as it promises a lot of benefits. These benefits not only are in monetary terms but also in terms of manageability and security. You need less infra, space, and manpower when you migrate your data center to cloud.
5 top technology skills in demand
With the increase in business on internet (e-business), the demand of digital marketeers is at its peak. And, in fact, it will be one of the 5 top technology skills in demand for the next year. Finally, as the number of business transactions are increasing on portals and e-commerce sites, the security is becoming a major concern. It is also about the important information available online that needs a strong shield of security against the vulnerabilities and threats.
With the new year coming it is essential for analyzing the current year. Then we will talk about 5 new year resolutions essential for project management. It is equally important to understand what is gone well, what could have gone better, and what didn’t go well. For the things that you have done well during the year, you must ensure that the same will happen the next year. Sustenance is pretty essential in life for all good things we achieve in the profession. Secondly, for the things that could go better, build a learning spectrum to ensure that the same does not repeat next year. In fact, if you perform the same task again, it has to be in the first category. And finally, ensure that more and more results lie in the third category to keep your morale high during the year.
One of the top 5 new year resolutions is to identify your style of working. You must not have all the top qualities. But you would have a number of strongholds. Identify those. And keep them intact. On the other hand, identify your low streams and create a plan to convert them to high stream.
The second big ticket item among 5 new year resolutions is Optimize your team capabilities. For this. it is important to identify the potential and shortfalls of every team member. Then strategize to balance them out in a way that one person’s strength covers another team member’s weakness. Meanwhile, ensure to convert weaknesses to strengths through training, coaching, mentoring etc.
5 New Year Resolutions
The third of the 5 new year resolutions is quite tricky. You, as a project manager, must own your organization, team, work, customer, and so on. Own in terms of deliverance rather than expectations.
In the same way, own your customer. Be a part of his successes and failures. Share his pain to help him coming out of all failures.
And finally, when we talk about 5 new year resolutions, the magic word is CHANGE. Be the change, change with the change, and motivate others to change.
Customer Service is all about your relationship with the customer. It is what you tell the customer about your service or product and what you deliver. Rather it also depends on your post delivery commitments. It is always better to deliver more than what you commit to your customer than committing more and delivering less. Overall, your customer service depends on the successful acquisition of new customers in a consistent manner. Also, retaining old customers is equally critical. Your acquisition rate can be higher in the beginning of a business. But when you achieve maturity in business it is always the sustenance of existing customers that matters most. In fact, that gives you a higher potential to spend more in acquiring new customers. But this should always happen without any compromise with the service to the existing customers.
As a matter of fact, new customer acquisition at the cost of old customers is always harmful to the business. Losing your old customer at the same or higher pace than acquiring new ones is poisonous to your business. This is the prime mistake many businesses make without realizing its killing impact. And by the time they realize it, it is already too late. And ultïmately, they lose the race of survival in the market. Here are few beautiful quotes in relation to customer service:
- “Ask your customers to be part of the solution, and don’t view them as part of the problem. ” – Alan Weiss, Author “Million Dollar Consulting”
- “To keep a customer demands as much skill as to win one.” – American Proverb
- “Strive not to be a success, but rather to be of value.” – Albert Einstein
- “Customers may forget what you said but they’ll never forget how you made them feel.” – Unknown
- “Customer service is the new marketing.” – Derek Sivers, Founder CD Baby
If we observe carefully, Big Data is all about 5 Vs. The five pillars of Big Data are Volume, Velocity, Variety, Veracity, and Value. In fact, it is very important to understand each pillar very clearly. Otherwise, it would be like a black hole. As Dan Ariely says rightly, “Big Data is like teenage sex: everyone talks about it, nobody really knows how to do it, everyone thinks everyone else is doing it, so everyone claims they are doing it.” I don’t think in today’s era of the digital age, any business can survive without it.
When it comes to any business data versus the big data volume, it is almost incomparable. In fact, it does not matter even if the organization is too large. The volume of the business data against the latter is insignificant. And, as a matter of fact, this comparison stays valid for all the 5 Vs we are talking about. Craig Mundie is absolutely right when he says, “Data are becoming the new raw material of business.” Another fact is from Pat Gelsinger “Data is the new science. Big Data holds the answers.” Pat Gelsinger is the Chief Executive Officer of VMware, Inc. and former Chief Operating Officer of EMC Corporation.
In this regard let us look at a very relevant quote. “With too little data, you won’t be able to make any conclusions that you trust. With loads of data you will find relationships that aren’t real… Big data isn’t about bits, it’s about talent.” – Douglas Merrill
“The world is one big data problem.” – Andrew McAfee, the associate director of the Center for Digital Business at the MIT Sloan School of Management (also known as MIT Sloan or Sloan.)
“We chose it because we deal with huge amounts of data. Besides, it sounds really cool.” – Larry Page, co-founder of Google.
I wonder if all team members in a project work like Bluetooth devices. And, in fact, it happens. Before we learn how to get Bluetooth working between devices, let us exemplify it. When developers and testers work on a product, it is simply a pairing between the two. Similarly, when a business analyst prepares CRD (Customer Requirement Document) there is a pairing between the analyst and customer. If you are able to understand this, it becomes easier to understand how to get Bluetooth working between devices. It is just a phenomenon of pairing and then working together in the desired manner.
I have a Bluetooth device Teewee connected with my Plasma television device. I can easily pair Teewee with my smartphone or tablet and play any video that projects on my large TV screen. Similarly, I have Bluetooth speakers that I can easily pair with my laptop, tablet, or smartphone to play music through it. The life has become quite simpler with the help of technology. Devices talk to each other in a much simpler and easier manner. Learning how to get Bluetooth working between devices is not a rocket science.
How To Get Bluetooth Working Between Devices
It is quite simple if both the devices in question are Bluetooth enabled and it is ‘on’. Any active Bluetooth enabled device searches for the other devices active within the permissible vicinities. There are active bt devices and similarly, there are passive bt devices. Active devices are smartphones, tablets, laptops etc. And passive devices are like Bluetooth speakers, Bluetooth printers etc. Any to bt devices need to ‘pair’ to sync with each other in order to talk to each other and perform desired operations. You can easily pair passive devices to an active device with the help of the active device. Once they are paired you can perform desired operations. I hope it is now quite clear how to get Bluetooth working between devices.
The new DNA of leadership is ideally an entirely a new journey for new age managers. They have a new set of culture and values. In fact, they provide a new definition of character and competence. As a matter of fact, trust is not thrust in their case. It is a point of earning rather than imposing. Rather, the new DNA of leadership talks about responsibility and capability. There is a direct connection between the two. Without the capability, you can’t own responsibility. And, in fact, without responsibility, all your capabilities are nothing but waste. In today’s world of competence, fair and flexible wins the race. The presence of both elements in a right mix is very important. Mere flexibility is not a point of elegance. Similarly, merely being fair in all your professional deals without any flexibility will lead you ṭo a dead end.
Feedback at every level and every juncture is a key element of the new DNA of leadership. Elon Musk is among the greatest world leaders. One of his quote fits well here. He says, “I think it’s very important to have a feedback loop, where you’re constantly thinking about what you’ve done and how you could be doing it better. I think that’s the single best piece of advice: constantly think about how you could be doing things better and questioning yourself.” Definitely, feedback has its own value. But at the same time, it is important to differentiate a fair feedback from a fake one.
New DNA of Leadership
“Until one is committed, there is hesitancy, the chance to draw back– Concerning all acts of initiative (and creation), there is one elementary truth that ignorance of which kills countless ideas and splendid plans: that the moment one definitely commits oneself, then Providence moves too. All sorts of things occur to help one that would never otherwise have occurred. A whole stream of events issues from the decision, raising in one’s favor all manner of unforeseen incidents and meetings and material assistance, which no man could have dreamed would have come his way. Whatever you can do, or dream you can do, begin it. Boldness has genius, power, and magic in it. Begin it now.” says Johann Wolfgang von Goethe. And this goes so true in the case of the new DNA of leadership.
Social aspirations are changing quite fast across all job roles. And, in fact, it is happening across thë globe. There are a lot of changes happening in recent times. As we see, there is a clearly visible paradigm shift in job roles. Lifetime employment is now no more a prominent aspiration among thè younger generation. In fact, not many of the brilliant engineers aspire for a high-salary job. Ïnstead they plan to start with a high-risk zone of their own venture. And a lot of them are successful in their journey. As a matter of fact, starting your career as a Founder cum CEO is quite fascinating for them. In addition, everybody is vulnerable. Rather, job security is secondary when the business is losing permanence. In fact, social aspirations are acquiring a new meaning. Rather, we are living in a world of changing paradigms.
Social Aspirations Are Changing Fast
“A new scientific truth does not triumph by convincing its opponents and making them see the light, but rather because its opponents eventually die, and a new generation grows up that is familiar with it.”
― Max Planck, Scientific Autobiography, and Other Papers. This is what happens to social aspirations. Similar reflections we see in this quote – “The present convergence of crises––in money, energy, education, health, water, soil, climate, politics, the environment, and more––is a birth crisis, expelling us from the old world into a new.” ― Charles Eisenstein, Sacred Economics: Money, Gift, and Society in the Age of Transition.
But that is not all. In fact, social aspirations were there in thë past in the professional world. And they will stay in future too. “We’ve forgotten much. How to struggle, how to rise to dizzy heights and sink to unparalleled depths. We no longer aspire to anything. Even the finer shades of despair are lost to us. We’ve ceased to be runners. We plod from structure to conveyance to employment and back again. We live within the boundaries that science has determined for us. The measuring stick is short and sweet. The full gamut of life is a brief, shadowy continuum that runs from gray to more gray. The rainbow is bleached. We hardly know how to doubt anymore. (“The Thing”)” ― Richard Matheson, Collected Stories, Vol. 1
The world is changing fast. It is important to understand the changing paradigms of job roles. A few decades back there was a fast emerging new concept. There was a new paradigm in job identification. Like the white collar, blue collar, and pink collar jobs. There was a clear-cut distinction between them. But gradually the sanctity of these collars is vanishing. In current times, a blue-collar worker has all kind of chances to upgrade to a white collar supervisor. This can happen if he carries the will and strength to reach to that level. Contrarily, a white collar executive has no reasons in this changing scenario to maintain a gap between him and workers. If there is a shortfall of a worker on a critical assembly point, the executive has to drop his white collar and wear the blue collar for the day to fill that gap.
Michio Kaku, in the context of changing paradigms of job roles, says – “The job market of the future will consist of those jobs that robots cannot perform. Our blue-collar work is pattern recognition, making sense of what you see. Gardeners will still have jobs because every garden is different. The same goes for construction workers. The losers are white-collar workers, low-level accountants, brokers, and agents.”
Similarly, Tom Peters explains the changing paradigms of job roles, “The workplace revolution that transformed the lives of blue-collar workers in the 1970s and 1980s is finally reaching the offices and cubicles of the white-collar workers.” The same way Sherrod Brown says, “We’re losing all kinds of white-collar jobs, all kinds of jobs in addition to manufacturing jobs, which we’re losing by the droves in my state.”
Changing Paradigms of Job Roles
As a matter of fact, in today’s scenario, all across the globe, changing paradigms of job roles reflect certain common aspects. In fact, we need to understand it well. Either the collarless jobs are increasing or the demand is high for professionals weâring multi-collars.
Mastering State Transition Testing Technique is like learning to drive a car. You need to be patient while learning and practicing. But once you become proficient, everything becomes quite easy. It is a dynamic testing technique, unlike other techniques we use. This technique is quite beneficial in two conditions:
- When you define the system in a finite number of states, and
- The rules of the system control the transition between these states
Hence, the technique is useful where you consider every transforming feature of a system as a state. In such cases, the rules of thë software will govern these transformations. There are three key components in State Transition Testing. These are Original State, Action, and Final State. So whenever there is a transformation from an original state to final state, there is an action or event. And definitely, there is an input that triggers this action or event which results in an output.
State Transition Testing
Think of a scenario where you mark your attendance in your organization with the help of a swipe card. And, in fact, the same card provides you accessibility. If you swipe your card at entry, it marks your ‘in’ and automatically opens the door for you to enter. Similarly, at the exit when you swipe the same card it marks you ‘out’ and opens thë door automatically for you to move out of the building. Now let us understand State Transition Testing with the help of following steps:
- You are at the entry gate.
- Swiping your card marks your attendance and opens the door for you to enter the office.
- You enter and the gate closes after the stipulated time.
- You slide your card outside to your friend Sam to use the same card again for his entry.
- Sam swipes your card at the same entry point.
- This time there is no action and the gate does not open.
You swipe your card first time. It marks your attendance and lets you enter. Next time, you try the same action through Sam but this time it doesn’t open the door. So this time the transition, that is causing the change in state is the earlier entry.
Image source: testing excellence
There is a deep connection among test cases, test scenarios, and SRS. The story begins with SRS i.e. Software Requirement Specifications document. Preparation of SRS begins with a deep analysis of business. This includes exhaustive discussions with business process owners. It also includes different business process walkthroughs. As a matter of fact, any shortfall in SRS leads to a bigger disaster than any glitches happening later. Once SRS sign off takes place, the relevant team starts building test scenarios. And, then, test cases emerge out of these various test scenarios. When the testing team is ready with test scenarios they identify overall scope of the testing. On the basis of this, the QA team prepares a detailed test plan. Then the plan goes to execution. The team responsible for its execution prepares test cases.
Actually, there are two parallel activities that are taking place at this juncture. While the QA team is busy with documenting test cases, the development team begins the SDLC (Software Development Life Cycle) with the coding phase. In a waterfall model, these two activities might be sequential. But otherwise, in agile methodology, by the team each code chunk is ready for testing, the QA team is ready with the test cases by then. This mechanism shrinks the overall tïme of execution of the project.
Test Cases, Test scenarios, And SRS Relationship
While in the waterfall scenario, test phase comes after development phase, in agile, development takes place in iterations. Similarly is for testing. Each iteration clears development and testing in this fashion. Hence, as is clear, in the former case, the overall time increases because the testing begins when coding finishes. The development team hands over the complete code to the QA team. The QA team then starts studying and preparing test cases.
In the nutshell, test cases are all about ‘How’ of the business. If you are ensuring to drive a business with the help of a business application, test cases ensure to validate each ‘how’ related to every process of the business.
Every application that you develop has some fundamental requirements. These requirements arise from business and user. Let us look at it closely to understand clearly what is a test case in software testing. It is essentially very important for the software testing community to understand it clearly so as to ensure the successful launch of any software that their development team creates. Actually, any software development is a collaborative effort. It includes mainly three key stakeholders for the right kind of development. The number of stakeholders increases further when it comes to deployment of the application.
The first set of key stakeholders is the business analyst and customer. If these two don’t marry well, it creates a lot of trouble later. A business analyst should never hesitate in double assuring the customer requirement before documentïng it. In fact, he will have to pass through all possible business scenarios to ensure capturing of right requirements. Now, when it comes to development, whether you follow waterfall approach or scrum methodology, understanding of what is a test case is very crucial. So the second set of key stakeholders is the customer and developers. And the third set of key stakeholders is a tri-party association. It comprises of the tester, developer, and customer. So as we see, the customer is an omnipresent entity throughout this crucial journey of requirement gathering, development, and testing.
What Is A Test Case
As a matter of fact, customer plays the biggest role in all the phases of any development. The higher is the level of engagement with the customer, thë less are the troubles. Now, about what is a test case in software development and testing. A test case, basically, is a set of conditions that a tester will determine to ensure that the system under test satisfies as per the actual requirements so as to works correctly. This process of developing test cases helps in finding problems in the requirements or design of an application.
This post is in continuation of my previous post regarding Big Data predictions and concerns for 2017 and beyond. In the previous post, we talk about a huge increase in big data and spending. Let us talk further about big data predictions and concerns for coming years.
The latest study by IDC says, “Through 2020, spending on cloud-based BDA technology will grow 4.5x faster than spending for on-premises solutions.”
Analysts believe much of that new spending will go towards cloud-based big data analytics (BDA) solutions. In fact, IDC forecasts, “Through 2020, spending on cloud-based BDA technology will grow 4.5x faster than spending for on-premises solutions.” What it means is that open source big data solutions will be in a high demand when companies go for cloud-based solutions. And it is quite visible. We can see technologies like Hadoop, Spark, Storm and others dominating big data analytics. As a matter of fâct, all of the leading cloud computing vendors, like Amazon Web Services, Microsoft Azure, IBM and Google Cloud, are offering big data analytics products. And in the same manner, many smaller firms are offering cloud-based analytics products as well.
Forrester report pertaining ṭo 2017 says, “Investment in artificial intelligence (AI) will triple as firms look to tap into complex systems, advanced analytics, and machïne learning tëchnology.”
Another pointer in IDC report says, “By 2020, 50% of all business analytics will incorporate prescriptive analytics built on cognitive computing functionality.”
A study by Markets & Markets states, “The streaming analytics market is estimated to grow from USD 3.08 Billion in 2016 to USD 13.70 Billion by 2021, at a Compound Annual Growth Rate (CAGR) of 34.8%.”
Big Data Predictions and Concerns
If we talk about salaries of big data professionals, a report from Robert Half Technology says regarding average salaries for 2017 as, “Big Data Engineers $123,000-$158,000. Data Scientists $99,500-$132,000. BI Analysts $97,000-$132,500.”
As a matter of fact, there are quite a few more indicators and pointers about big data predictions and concerns. In fact, all these points hint towards growth in big data technologies, big data volumes, manpower requirements, skill demands, and greater opportunities to meet customer’s expectations.
Before we talk about Big Data Predictions, let us admit that big data security is a major concern. In addition, training, skillset, tools, and applications is another wide spectrum of major concerns. But as we all know, this all create a bigger spectrum of opportunities. Technologies like artificial intelligence, prescriptive analytics, and real-time streaming are there to play a lead role in big data solutions. Alright, so now let us talk about the big data predictions and concerns for 2017 and further.
A recent EMC Digital Universe Study says, “The digital universe is doubling every two years and will multiply 10-fold between 2013 and 2020.” The benefit of this prediction is that any enterprise or business analytics accuracy and width will increase tremendously. The risk is to cater to this tsunami of data with appropriate manpower, skills, and infrastructure. As per a study by Dell EMC, the global storage systems comprises of 4.4 trillion gigabytes of data at the end of 2013. This is bound to reach aroúnd 17.6 trillion gigabytes of data by the end of 2017.
Big Data Predictions and Concerns
The credit of such a humungous data goes to other important IT trends. These trends include Internet of Things (IoT), social media and data from mobile devices. Therefore, just wait for more and more data to accumulate worldwide. It will be interesting to see this prediction bouncing back with more hoardings of data than predicted.
IDC says, “Worldwide revenue for big data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019.” As the data increases the big data analytics capabilities will also increase. This will raise confidence in big data technologieṣ and hence the spendings will increase. Definitely, in order to store and analyze big data, enterprises will increase their spending. If we draw a dirëct relationship between the growth of data and spending, it is goïng to be 50% higher in next five years. Almost double of spending will go in big data software out of the total spending estimates. The big data spending will rise fastest in sectors like utilities, resource industries, healthcare, and banking. But above all, as a matter of fact, manufacturing will remain the biggest big data spender.
We will be discussing the same in the next post…
Big data has come in a big way and is gaining momentum in the same way. In a very short period, it has become a familiar phenomenon all across the globe. So much so that it is no longer a new technology. In fact, it is introducing newer terms and technologies as a rider. Most businesses are talking about Big data analytics. Because they realize that the business analytics will go haywire if they don’t consider all appropriate data. This data might be lying anywhere but is relevant to the business. It could be on the cloud, in the data center, on social media, or elsewhere. Hence it needs a complete mining their data to gain realistic insights. It is essential if they want to remain competitive in the constantly evolving marketplace. In fact, many organizations have already seen the benefit of big data solutions. Therefore, now they want more.
Refinement of big data capabilities lies on the top of priorities for 2017 for most of the big organizations. In fact, many startups already are familiar with its power and hence right into it since the beginning. Primary trends also show that big data analytics is crucial for such enterprises. In fact, they are analyzing for ways to gather more data, more quickly. Because for most of them, the initial investment in big data technology has been paying well. That is why the expansion of their big data projects is on their cards. The aim is simple. Firstly, to get much better insights in business. Secondly, to achieve even greater financial results.
Big Data Analytics
At the same time, the big data talent demand is increasing exponentially thereby creating a talent crunch. Because of this, the companies are hiring less qualified or incompetent people because there is no another option. This, in turn, is impacting their business goals that they are not able to achieve. On the other hand, the salaries ar extremely high for the right candidates. It is really difficult to get big data analytics professionals. As a matter of fact, technology can play a major role here with the development of big data analytics tools.
Advanced Analytics can’t happen without Big Data integration. In fact, big data integration is the key to achieving advanced analytics. Big data has a tremendous scope. As a matter of fact, organizations that use analytics gain huge competitive benefits in terms of reduced costs, enhanced production efficiencies, reduced risks, and so on. Employing advanced analytics throughout your enterprise increases these benefits manifold.
Having right tools is much more important for any enterprise before deploying advanced analytics. If you are new to big data you must understand it’s nitty gritty well. The concept and volume of processing change completely. You need a support of innovative tëchnology and build advanced decision-making capabilities.
But before anything else you must assess your current level of integration among key business applications. This includes legacy applications that are actively operational and driving business values. There have to be least troubles in terms of infrastructure. If rest everything is smooth, you can take a decision of scaling up. With so many criṭical things happening around, it might confuse you where to start. Big data comprises of huge volumes of structured and unstructured data derived from various sources. In fact, never try untested tools when dealing with big data across business units, data centers, and other sources.
Advanced Analytics needs Big Data Integration
As a matter of fact, there is a difference between advanced analytics and business intelligence tools. There are multiple applications including ERP running in a small organization. If all these applications are integrated well, the organization can easily build a crisp dashboard providing realtime view of business. This can help them getting timely insights for decision-making. Firstly, be clear about your objectives. Secondly, your goal must be to gain better outcomes in a measurable manner. Theefore, it is critical to identify your data sources. Asess you data pipe sizes, infrastructure, and other technology areas.
In the nutshell, the success of your advanced analytics project will purely depend on your ability to capture data and your integration infrastructure.
This is, in fact, a great initiative by Google in Artificial Intelligence (AI) and Machine Learning areas. DeepMind is going to be the next challenge in a big way. Google’s secretive AI aims to develop human-like reasoning. That is why DeepMind partners with Blizzard to build a high-level AI research platform. It will be a hard testing of AI agents using the real-time strategy game. As a matter of fact, machines will be developing strategies and react to other players. The approach intends to gain benefits of learning AI application in the real life scenarios.
It will be a level up in AI research. Earlier achievements include mastering Atari arcade classics and beating human world champs at board games. But this time, the machines will be having a chance to act in a more life-like gaming universe. The announcement came earlier this month at BlizzCon 2016 in Anaheim, California. It was about Google DeepMind teaming up with video game giant Blizzard Entertainment. With this, they aim to turn one of the hit titles into a learning environment for AI. StarCraft 2 is a widely popular real-time strategy game. The new partnership will see it open up into a sandbox for the purpose of teaching and testing machines.
DeepMind Partners with Blizzard
The strategic alliance aims to create a scientific mission to push the boúndaries of AI. DeepMind team will be developing programs that use AI tools to learn and solve any sort of complex problem. And, in fact, that too without needing to be told how. As a matter of fact, games ar the best means to do this. Because the environment allows to build and test smarter. In fact, you apply more flexible AI algorithms rapidly and effectively. At the same time, it provides instant feedback on how a player is doing through scores. The same way DeepMind aims to achieve.
Latest release on Indian government’s official press site talks about Impact of technology. Bandaru Dattatreya, the Union Minister of State (Independent Charge), Ministry of Labour and Employment says it all depends on user’s mindset. If you are using technology with a positive mindset, it will definitely yield positive results. What it means is that thë tëchnology itself is neither good nor bad. It is all about the mindset with which you use it that decides its’ impact. Accountability and transparency are the key factors for good governance. Technology can always help in ensuring it. With the rapid changes in technology, one must keep changing with the changing time. There is in fact, no life without technology. To bring revolution in life, you need to use technology. Definitely, any revolution comes along with some challenges. Even then it is the technology that helps in tackling those challenges.
Impact of Technology Depends on User’s Mindset
Now look at the practical side of this to understand the impact of technology in our work life. For project management or testing automation, we use some or the other tool or methodology. The same tool or methodology brings different results in different scenarios or organizations. Even you will find two different teams using the same testing tool in the organization will yield different results. For the first team, it could be highly successful yield. While for thè second team it could lead to a failure. So we see the same tool bringing positive as well as negative impact. In fact, there could be various reasons for this. Reasons could include lack of knowledge about the tool. It could also be the lack of good governance in the second case. There could be a lack of accountability and transparency.
As Dattatreya says further, the need of younger generation in India is different. Their thinking is different and hence it must be addressed in a different way. This generation uses technology with a great comfort and ease. In fact, it is a good sign for India. It shows that India is going to be the most competitive country in the field of technology.
The Event was on ‘Technology and the Future of Work’. It was organized by the Ministry of Labour and Employment. The motive of the program was to discuss in detail how technology affects and supports human life especially in the context of job creation and destruction; its impact on direction and quality of human life.
Data Protection Officers are high in demand. In fact, the demand is at its peak. And rather, it is about to increase exponentially worldwide. It is because of increasing threats and vulnerabilities. Data protection is the top most priority for any organization. On the other hand, cyber attacks are at its verge. If you are in the UK or working for a British firm anywhere in the world then EU GDPR Practitioner qualification can help you become DPO. In fact, a suitable training in cyber security can help you achieve the ISO 17024-accredited EU GDPR Practitioner (EU GDPR P) qualification. This way, you can fulfill the role of data protection officer (DPO) under the EU General Data Protection Regulation.
A recent study by IAPP determines that the GDPR’s global reach will necessitate at least 75,000 data protection officers (DPOs) worldwide. The report also states that the United States will require the largest number of DPOs (9,000), followed by China (7,568) and Switzerland (3,682).
A certification in EU General Data Protection Regulation (GDPR) Practitioner is useful in comprehensive understanding on the subject. It also helps to acquire the practical skills to fulfill the role of DPO under the GDPR. Similar kind of courses is in high demand in every country.
IT Governance supports professional development in this regard. After completing the course, students will sit a 90-minute multiple-choice exam accredited by IBITGQ. If you qualify, you become certified ISO 17024-accredited EU GDPR Practitioner qualification. This certificate signifies that now you have the knowledge and skills to help organizations achieve compliance with the GDPR and take on the responsibilities of a DPO.
Data Protection Officers Gain Demand
It is important to know what all they cover in this certification. The Certified EU General Data Protection Regulation (GDPR) Practitioner training course covers the GDPR principles, the role of DPO, setting up a privacy compliance framework, data protection impact assessments, data mapping, the role of data processors and controllers, data breach reporting requirements, achieving compliance and similar topics.
GDPR Compliance Becomes Important for all UK-based organizations. It is a mandate now for all organizations to comply with GDPR in order to stay within the law. IT Governance is among the pioneers in providing cyber security and data protection services. The firm guides all UK-based organizations to comply with the EU General Data Protection Regulation (GDPR). The initiation of this whole exercise comes from Karen Bradley MP, Secretary of State for Culture, Media and Sport. She regulates that the EU General Data Protection Regulation (GDPR) will apply in the UK.
In addition, Elizabeth Denham, Information Commissioner welcomes this announcement by saying, “One of the key drivers for data protection change is the importance and continuing evolution of the digital economy in the UK and around the world. That is why both the ICO and UK government have pushed for reform of the EU law for several years.”
Alan Calder, the founder and chief executive of IT Governance, says “With the government confirming the GDPR will apply to the UK, organizations need to prioritize GDPR compliance to avoid the possible fines of up to €20 million or 4% of global annual turnover and the threat of a lawsuit from aggrieved data subjects.” He further adds, “Boards should be concerned about these risks, put GDPR compliance at the top of their agendas and push for adequate technical, administrative and operational security measures in line with the GDPR requirements”.
GDPR Compliance Becomes Important
As a matter of fact, the GDPR is about to become law within next 18 months. That is why the organizations around the world that directly or indirectly collect and process data on European residents will have to comply with the Regulation.
IT Governance’s Certified EU General Data Protection Regulation (GDPR) Foundation and Practitioner training courses can help delegates get a basic understanding of the Regulation and/or fulfil the role of data protection officer (DPO). Because it can help organizations get a basic understanding of the Regulation and/or fulfill the role of data protection officer (DPO). That is why GDPR compliance becomes a top priority.
The concept of a separate set of testers is vanishing. And so is the testing phase after production phase. Scientifically practice testing protects memory against stress. As a matter of fact, testers must be away from stress when it comes to testing. In fact, learning by taking practice tests has a great power. It is a strategy known as retrieval practice. Hence, it can protect memory against the negative effects of stress. This is a lovely video in that context.
“Typically, people under stress are less effective at retrieving information from memory. We now show for the first time that the right learning strategy, in this case, retrieval practice or taking practice tests, results in such strong memory representations that even under high levels of stress, subjects are still able to access their memories,” says senior study author Ayanna Thomas, Ph.D. She is an associate professor. As a director of the graduate program in psychology at Tufts, she has a high focus on this study.
“Our results suggest that it is not necessarily a matter of how much or how long someone studies, but how they study,” says Amy Smith. Amy is a graduate student in psychology at Tufts. She is also the corresponding author on the study.
Practice Testing Can Create Perfect Testers
“Even though previous research has shown that retrieval practice is one of the best learning strategies available, we were still surprised at how effective it was for individuals under stress. It was as if stress had no effect on their memory,” Smith says. “Learning by taking tests and being forced to retrieve information over and over has a strong effect on long-term memory retention, and appears to continue to have great benefits in high-stakes, stressful situations.”
“Our one study is certainly not the final say on how retrieval practice influences memory under stress, but I can see this being applicable to any individual who has to retrieve complex information under high stakes,” says Thomas. “Especially for educators, where big exams can put a great deal of pressure on students, I really encourage employing more frequent more low-stakes testing in the context of their instruction.”
This is concluding post from my discussion with Bill Tolson, Vice President of Marketing, Archive360. In the first post, we discussed the salient features of his company Archive360 and its various offerings. In the second post, we discussed Archive2Azure, their recently introduced new solution. Here, in this concluding Q&A, Bill highlights the ideal use cases for Archive2Azure.
Here we go:
Q: What are the ideal use cases for Archive2Azure?
Most companies have huge amounts of unstructured data floating around their enterprise that is, in reality, not managed at all. This content is usually only visible to the owner/custodian. In fact, up to 80% of enterprise data can be considered unstructured/low touch data. However, this content consumes storage resources and can be a major problem for compliance and eDiscovery situations. Archive2Azure is perfect for that corporate grey data that is not obviously valueless (and should be defensibly deleted) but rather that unstructured data that could still be needed. For example, many companies archive departed employee data for the period of time equal to the statute of limitations for wrongful termination lawsuits. Another use is to securely store legal department eDiscovery data sets that can grow into the tens of TB, in case that data is needed in a later appeal. There is no limit to the reason for utilizing Archive2Azure. The bottom line is that Archive2Azure can archive and manage a company’s grey data at a much lower cost than can be done on premise,
Q: What is your existing global presence paradigm (in what countries do you offer your solutions) and how you plan to expand it further in 2017-18?
Archive360 offers our solutions and support around the world. Earlier this year we began a new channel partner program to increase our channel partner base. We currently work with best of breed partners and continue to look to add to that partner base.
Q: Where could readers go to learn more?
Readers can go to the Archive360 website for more information or send an email directly to: firstname.lastname@example.org
We are in conversation with Bill Tolson, Vice President of Marketing, Archive360. In the previous and opening post, he talks about his company Archive360 and its solutions. As we learned, The Archive360 product line consists of 3 solutions; Archive2Anywhere, Archive2Azure, and FastCollect. Archive2Anywhere is the only solution in the market specifically designed to deliver fast, trouble-free, predictable legacy email archive migrations, with verifiable data fidelity and defensible chain of custody reporting. Archive2Azure is a managed compliance storage solution based on Microsoft Azure. And FastCollect for PSTs is the only automated PST discovery and migration solution that ensures ALL message stubs, metadata, and message content are located, rehydrated, migrated, deleted, and audited in a manner ensuring full legal and regulatory compliance. In this post Bill talks about Archive2Azure, their recently introduced new solution.
We proceed with our discussion with Bill Tolson below.
Q: You recently introduced a new solution, Archive2Azure, could you explain what was going on with your customers and/or in the market, that prompted its introduction? And, could you explain how Archive2Azure addresses these trends/market needs?
Bill: We noticed that many of our legacy email archive customers, after successfully migrating their legacy archives to Office 365, were still not shutting down the archive due to the need to keep the Journal available for regulatory reasons. Archive2Azure was original designed to move and manage those legacy Journal files to Azure intact so that the expensive legacy email archive could be shut down saving cost. Soon after clients began asking if they could move other content up to Azure. They wanted to do this so that they could move the majority of their low-touch or grey unstructured data up to the cloud to save on infrastructure costs.
Archive2Azure provides a much needed management layer to Azure so that customers can utilize the full Azure stack to better store and manage their unstructured data. Archive2Azure is the only Azure application to enable very low cost storage, retention/disposition, custom on-demand indexing and search, legal case management including search, access controls, review, hit high lighting, tagging and export.
We will be closing our discussion with Bill from Archive360 in the next post.
We are in discussion with Bill Tolson, Vice President of Marketing, Archive360. He will be talking about Archive360 and its solutions. In fact, Archive360 has recently introduced a new solution, Archive2Azure. Bill would explain what was going on with their customers and/or in the market, that prompted its introduction. Also, he would explain how Archive2Azure addresses these trends/market needs. In addition, he would discuss about the ideal use cases for Archive2Azure. And finally, we would come to know about Archive360’s existing global presence paradigm (in what countries do they offer their solutions) and how do they plan to expand it further in 2017-18.
Q: Name and title?
A: Bill Tolson, Vice President of Marketing, Archive360
Q: Could you introduce Archive360 and its solutions?
Archive360 has been and is the market leader in legacy email archive migration software, successfully migrating more than 12 petabytes of data for more than 500 organizations worldwide since 2012. The Archive360 product line consists of 3 solutions; Archive2Anywhere, Archive2Azure, and FastCollect.
The company’s first product, Archive2Anywhere, was introduced in 2012 and is the only solution in the market specifically designed to deliver fast, trouble-free, predictable legacy email archive migrations, with verifiable data fidelity and defensible chain of custody reporting. A big differentiator for Archive2Anywhere is our ability to rehydrate (or recombine) email stubs in the Exchange mailbox with the archived message/attachment in the legacy before the content is migrated. Many other migration vendors simply delete the stubs. This is legally dangerous due to the fact that email stubs can take on additional metadata that could be responsive to the eDiscovery. Archive360 has never been replaced at a client due to its extremely consistent and proven technology. Archive2Anywhere is able to migrate 11 of the most popular legacy email archives.
Archive2Azure is a managed compliance storage solution based on Microsoft Azure. It is delivered as part of the Archive2Anywhere platform and is the industry’s first solution allowing for complete elimination of legacy email archives and long term management of other low touch or ‘grey’ data including inactive employee work files and PSTs, file system content, system generated data, and data sets generated form eDiscovery. Archive2Azure delivers long-term, secure retention and management of low touch unstructured data, including journal email for regulatory compliance.
FastCollect for PSTs is the only automated PST discovery and migration solution that ensures ALL message stubs, metadata, and message content are located, rehydrated, migrated, deleted, and audited in a manner ensuring full legal and regulatory compliance. FastCollect for PSTs enables you to scan your enterprise, including individual desktops, for all or select PSTs and migrate them to the new repository, automatically.
Archive360 is a global organization and delivers its solutions through a network of specialist partners. Archive360 is a Microsoft Cloud Solution Provider and the Archive2Azure solution is Microsoft Azure Certified.
We will continue the discussion with Bill Tolson in the next post…