Jump Over the Hidden Barriers to Digital Transformation
A key reason for the failures: a lack of clear, measurable business goals.
Right now, no matter the business, eyes everywhere are on IT. To push through
the transformation, you need to benefit not just yourself but your
organization. You need to be able to speak the language of business, and
here’s how you can do it. If you’re going to ask the company to support your
program, talk about it in a way the C-suite can understand. Think about the
use case they’ll be most interested to hear about. Shortening customer wait
times? They’ll care. Aiding supply chains? They’ll listen. Remember, they’ll
want numbers, too. The C-suite will do a cost-benefit analysis, but you should
preempt this by conducting one beforehand. This shows your commitment to
making the company more successful and inspires trust in the project through
data. Avoid using too much technical jargon; doing so will get glassy-eyed
looks and perhaps inspire them to give some other department a budget increase
or greenlight a different project. Never make the C-suite do your work for
you: Make them understand the value of your plans. Doing so may develop your
soft skills.
6 Insights for Dynamic Leadership
Too often we get caught up in the inequity of having a problem. It’s unfair
that we should suffer this or “that should have never happened in the first
place!” What we need to focus on is how to safely address the problem, how to
move forward, around, over or under it to get where we need to go. ...
Focusing on “being decisive” misses the lesson. Start thinking about the
information — what you have, what you need and whether you can wait for more.
The goal is be able to reflect upon decisions and know that you would make the
same one again tomorrow — even if they were wrong. ... If it’s not someone’s
job, it’s no one’s job. And so, we’re taught to identify a specific person to
carry out a task in order to get the task done. When it can be anyone’s
job to cook dinner, you’ll be hangry by 7:00. But when you split the cooking
every other day, you will go hungry a lot less often. As meetings end, tasks
should be given to people and as specifically as possible with closed-loop
communication built into the responsibility. ... Control yourself — it’s
pretty much the only thing you can control. It’s the doctor whose face says
“Everything’s cool — I got this.” It’s the pilot’s smooth, buttery drawl that
announces the severe turbulence over the PA. It’s the expert in the room
defusing an insane customer or devolving employee.
Management lessons of The True Believer
The True Believer is no less relevant today than when it was first published,
despite its pessimistic view of human nature and skepticism toward mass
movements. Several elements are of particular interest to business leaders.
For example, Hoffer recognizes that “the chief passion” of the frustrated is
to belong, and urges employers to cultivate “a vivid feeling of solidarity” in
employees through collective pay schemes and other means, as teamwork boosts
productivity: “Any policy that disturbs and tears apart the team is bound to
cause severe trouble.” Another important source of belonging is the family.
Dangerous mass movements, in Hoffer’s view, tend to undermine and be jealous
of the family, which is yet another reason firms ought to be friendlier toward
that beleaguered institution. Humans find passionate causes seductive, Hoffer
knows, but he seems not to subscribe to any cultlike conception of a business.
“The practical organization offers opportunities for self-advancement, and its
appeal is mainly to self-interest,” he writes, adding that: “Where
self-advancement cannot, or is not allowed to, serve as a driving force, other
sources of enthusiasm have to be found if momentous changes, such as the
awakening and renovation of a stagnant society or radical reforms in the
character and pattern of life of a community, are to be realized and
perpetuated.”
Microsoft Office the most targeted platform to carry out attacks
Researchers said that ... hacking browsers has become more expensive, as
browser security has improved. “Browser developers put much effort into
different kinds of security protections and mitigations,” Liskin said.
“Attackers were looking for a new target, and MS Office has become a star.”
Liskin added that there are plenty of reasons why cybercriminals choose to
attack the popular suite. “Microsoft Office has a huge number of different
file formats," he said. "It is deeply integrated into the Windows operating
system." He also argued that when Microsoft created Office, it made several
decisions that, in hindsight, aren’t optimal security-wise and are currently
difficult to change. Making such alterations would have a significant impact
on all the versions of the products, Liskin said. A new report from SonicWall
released in July 2020 shows this trend is growing. Office files have overtaken
PDF documents as a delivery mechanism for malware. Office documents make up
22.4% of all malicious file types, compared to 10.7% for PDFs. A bit of good
news in the SonicWall report: The number of detected malicious Office files
declined slightly at the end of the first half of 2020.
Intel's 7nm products delayed; first 7nm client CPU expected in late 2022 or 2023
Intel is pushing back its 7nm product roadmap after identifying a defect mode
in its 7nm process that resulted in yield degradation, Swan said. The yield of
Intel's 7nm process is now trending approximately 12 months behind the
company's internal target. "We've root caused the issue, and believe there are
no fundamental roadblocks," Swan said. "But we've also invested in contingency
plans to hedge against further schedule uncertainty. We've mitigated the
impact of the process delay on our product schedule by leveraging improvements
in design methodology, such as die disaggregation and advanced packaging." The
news of the delay caused Intel shares to sink in after-hours trading. The
delay comes in the context of Intel's challenges to transition to 10nm
products, with its product roadmap repeatedly delayed. "We've seen this
movie before," Swan acknowledged Thursday. "We have learned from the
challenges in our 10nm transition, and we have a milestone-driven approach to
ensure our product competitiveness is not impacted by our process technology
roadmap."
Self-Driving Money Is Coming To Consumer Fintech
The first step to autonomous finance is breaking down the barriers between
these products. Open banking solutions like Plaid, which link fintechs and
banks together, have made it easier to transfer money and data between
platforms. Today, that looks like a hub-and-spoke model: I can move money
from Venmo to my checking account to Vanguard. In the future, it will be
point-to-point: I should be able to take $400 at-rest in Venmo and invest it
directly into my Roth IRA, or split it 50/50 between my student loan
payments and my credit card bill. Self-driving money limited to one app is
like a self-driving car that only works on one road. The second step is
where the ‘autonomous’ part comes in. Connected fintech services will use a
combination of common-language rules set by the user and machine learning to
manage money in the background. This goes a step beyond setting a retirement
goal on a roboadvisor: I should be able to say “whenever I have spare money
laying around, other than what I need for day-to-day expenses, reinvest it
into whatever earns the highest return.” After that, I should never have to
think about what’s happening with my money, other than when I receive
updates from the service on how it is being put to work.
Low-Code Technology Boosts The Growth Of Specialist Bank
During its low-code journey, HTB invested heavily in testing capabilities,
providing value with an improved turnaround time for any defects.
Previously, developers would publish a change, finishing in the evening,
then the test team would arrive the next morning and start the test pack,
which could run for 3-4 hours, ensuring everything worked correctly and
highlighting any regressions. The developers wouldn’t get feedback until
lunchtime, therefore losing half a day of development time. Now, the
developers publish an update and leave for the evening. Liberty Create takes
30 minutes to package the release and push it to the test environment,
waking up the testing platform automatically once complete and running the
series of tests. By 9 am, the test team starts the day with the results and
the developers work on any fixes needed immediately. As a result, an extra
half a day per developer is gained from every push. This acted as the first
step for HTB on its journey to seamless integrated testing and DevOps.
Today, HTB’s confidence in front-end building capabilities now influences
how the bank approaches new potential suppliers with a clear strategy that
needs to work with low-code.
Security Leaders Adapt to Manage Cyber Everywhere
We have placed a significant focus on our early talent development program,
bringing in people who understand the business and can be trained to perform
risk assessments and develop the necessary technical skills. Mentoring young
professionals is one of my passions, and it is essential to develop the
cybersecurity skills we need now and in the future. It’s important to make
the time, however busy our schedules are, to help shape people into more
than they thought they could be. In terms of collaboration across the
profession, we are participating in the recently formed Health Information
Sharing and Analysis Center (H-ISAC) in Japan, which is a community of life
sciences organizations that have come together to share timely, relevant,
actionable information on cybersecurity. Although we are competitors in
business, we share a common goal to prevent, detect, and respond to
cybersecurity concerns. We face many of the same challenges with respect to
resources and professional staffing, so it helps all of us if we can work
collaboratively.
Cloud Computing – Trends that Enterprises Should Watch Out For
The prevalence of mobile phones has majorly affected the business world.
Anyplace, anytime access that these cloud-based apps provide turns to be
perfect for remote working employees. Employees can essentially sign into
any application with web-enabled devices like tablets or mobile phones to
carry out their tasks in the cloud infrastructure. Information breaches,
theft, and data omission are the major threats even for conventional IT
infrastructures. But, as more organizations move to the cloud platforms,
it’s crucial to guarantee that cloud service provider can ensure a secure
framework for the wellbeing of their consumer’s information. Cloud security
isn’t the only trend in cloud computing, but it’s important to be
emphasized enough on by each organization. Consequently, an enormous
demand for cloud security suppliers is emerging that guarantees that
the data practices abide by GDPR and other compliances. With
open-source cloud computing, firms can see various advantages. They can
quickly scale their cloud foundation, including exceptions that are a lot
more direct than the closed source platform, with fewer security
concerns.
Banning TikTok Won't Solve Our Privacy Problems
While all these drivers are legitimate concerns — we should express concern
when a nation-state owns an application that is harvesting huge amounts of
sensitive data — our focus on these factors conveniently bypasses the true
problem. Applications are becoming increasingly more intrusive and we are
surrendering our data ever more willingly without understanding the
potential ramifications that will ripple far into the future. Once our data
has been leaked, it is out there and we can't ask nicely to please have it
back. That means if data we once thought was innocuous suddenly changes into
something dangerous, perhaps because of a new piece of technology or a
change to how we use data, then you are already at a disadvantage. Banning
apps based solely on their country of origin (no matter how hostile) is not
going to solve this problem; it is merely a Band-Aid that won't fully
address all privacy and security concerns. We need to address the
underlying problem, take a hard look at what data our applications are
collecting, and focus on improving privacy controls. We could throw a dart
at a list of apps in most app stores and almost be guaranteed to hit one
with some form of privacy issue.
Quote for the day:
No comments:
Post a Comment