June 13, 2015

Is customer experience management the new CRM?
Dailes says there are some things companies can do to improve customer experience. “The first thing is to listen to your customers. Understand who your clients are. Understand their needs. You can do this through surveys or by watching users. "Another thing that is really important is to have a policy of constant improvement. Rather than look for major changes, look for slow and constant improvement over time, based on feedback. You are always going to have people who shout quite loudly about what they want, but that’s not always the most useful feedback. Look for feedback that represents the majority of users," she says.

Improving One Process Affected 18 Processes Before it Improved Business
So, every time you are going to look at process improvement, we need to focus on these changes in an incremental manner rather than a big bang approach. Instead of starting with process changes in 12 departments, start with changes in 3 departments and then seven departments and then 12 departments. Every time you are going to initiate process improvement, you must understand the impact on all the departments. Identify which of these are low impact, medium impact, and high impact departments. Secondly, identify the processes in each department. ... So, what are the processes we are talking about? Here we go..”Customer acquisition” and “Customer Relationship” and “Requirement Management”. “Requirement Management” in turn is the link to “Marketing” department as they conduct surveys with existing customers as well as prospects.

Steve Wozniak Says The Internet of Things Is in ‘Bubble Phase’
In the tech world, there’s no concrete definition for a “bubble.” However, one way to gauge bubble-like growth is through irrational industry hype. It’s easy to find bullish forecasts on the IoT market. Cisco believes the number of connected devices worldwide will double from 25 billion in 2015 to 50 billion in 2020. IDC claims the global IoT market will grow from $1.9 trillion in 2013 to $7.1 trillion by 2020. That’s why tech giants such as Google and Apple are pushing into smart homes, connected cars, wearable devices, and mobile payments. Spotting that trend, start-ups are flooding the market with IoT and wearable devices for even the silliest niches. A fart-analyzing wearable, a sex-tracking wearable, and a smart bra that detects binge eating all indicate developers are getting carried away with connecting things to the Internet.

Build your own supercomputer out of Raspberry Pi boards
The RPiCluster provides another option for continuing development of projects that require MPI [Message Passing Interface] or Java in a cluster environment. Second, RPis provide a unique feature in that they have external low-level hardware interfaces for embedded systems use, such as I2C, SPI, UART, and GPIO. This is very useful to electrical engineers requiring testing of embedded hardware on a large scale. Third, having user only access to a cluster is fine if the cluster has all the necessary tools installed. If not however, you must then work with the cluster administrator to get things working. Thus, by building my own cluster I could outfit it with anything I might need directly. Finally, RPis are cheap! The RPi platform has to be one of the cheapest ways to create a cluster of 32 nodes.

Naomi Lefkovitz explains what NIST's privacy risk framework means for agencies
with the Cybersecurity Framework for Improving Critical Infrastructure we were directed to include a methodology for privacy and civil liberties by the executive order. And that methodology was derived from the consensus-based document. And, essentially, at a high level it says, well, 'Consider the privacy implications when you're doing your cybersecurity measures.' That's a very high-level paraphrase, but that's sort of the concept. What we're doing with the risk management framework, which is aimed at federal systems but nonetheless, the concept is, 'OK, how do you consider those privacy implications? How do you go about identifying privacy risk?' Because we're never seen that process laid out.

Keep it simple and risk-based to secure collaboration
Having identified risks, the process of analysing and then treating those risks should be carried out. The key to this process is proportionality.  If the risk treatment becomes too expensive, in terms of time, resources or money, is it worth doing based on the risk? Equally, if the treatment makes doing the job, such as collaborating with a fellow employee, unwieldy and difficult, then the treatment has also failed. It may make the process safer in security terms, but has also made it more difficult and less efficient in achieving operational, business objectives. Security should enable, not inhibit and should always take into consideration the user experience. While risk treatment of a system or process will always be different, there are common themes which form the foundation of a well-managed, and ultimately secure, approach.

Content blocking via geolocation takes world wide out of the web
This is a subject of renewed interest for the European Commission, which formally announced the Digital Single Market initiative last month; the initiative is intended to identify and address issues related to the digital and physical delivery of goods and services across the 28 EU member countries. According to The Guardian, presently only 15% of online shoppers in the EU buy products from another country, while only 7% of small and medium sized businesses sell products across national borders. ... Interestingly, in an effort to limit the need for users to rely on a VPN to access content,Netflix monitors file sharing traffic to identify what films and TV programs are locally popular, and the company acquires the rights for those programs in order to provide a legal (and sanctioned) means to view that content in that country.

Cisco New Intercloud Services Focus on Next Generation Internet of Things Market
Organizations are demanding new ways to manage the exponential growth of data and the ability to obtain real-time analysis. To meet this need, Cisco collaborates with leading Big Data solutions such as MapR, Hortonworks, Cloudera and Apache Hadoop community. Working with these partners, Cisco safely extends Hadoop solutions on-premise to the cloud and provide a true hybrid deployment. It is also providing end customers to maintain the same policies, control and security in their Big Data implementations, as well as greater flexibility and an unlimited virtual scalability.

8 New Big Data Projects To Watch
The big data community has a secret weapon when it comes to innovation: open source. The granddaddy of big data, Apache Hadoop, was born in open source, and its growth will come from continued innovation in done by the community in the open. Here are eight open source projects generating buzz now in the community. ... Zeppelin essentially provides a Web front-end for Spark. The mighty Zep brings a notebook-based approach to giving users data discovery, exploration, and visualization of Spark apps in an interactive manner. The software, which is modeled on the IPython notebook, supports Spark and other frameworks, such as Flink, Tajo, and Ignite.

Cloud tech can make a Supreme Court decision against Obamacare irrelevant
Healthcare.gov is illegal, argue lawyers for Obamacare’s opponents. Their argument against the Affordable Care Act splits hairs about the law’s construction. The underlying legislation designates federal subsidies to be paid through tax credits to the buyers of health insurance purchased on state-operated exchanges. The ACA is silent about the eligibility for subsidies of purchases on the federally operated exchange healthcare.gov. The plaintiffs argue that the subsidies can’t be given to buyers using the federal exchange healthcare.gov, and only can be given to the buyers using the state exchanges such as Cover Oregon.

Quote for the day:

"You must expect great things of yourself before you can do them." -- Michael Jordan

No comments:

Post a Comment