accelerating change through digital...
TRANSCRIPT
Accelerating Change Through Digital Transformation
William Emmanuel Yu, Ph.D.MDI / Novare
DEFINING THE KODAK MOMENT
A MOMENT WORTHY OFCAPTURING WITH A PHOTOGRAPH
A MOMENT WHEN YOU WAKE UP AND YOUR ENTIRE BUSINESS MODEL IS OBSOLETE
sel.fie /ˈselfē/ noun informal
Was taking a million shots with outstretched arms where you waited a week to find out that ½ were blurred and nearly the other half was of your forehead.
When a million shots averaged around 24.
Oh! Look at Intel. They are making processors for personal computers. Those are low end computing devices.
We do not need to worry. We make processors for servers. We can continue focus on the high end of the market.
The Innovator’s Dilemma Illustrated
Haha. Goodbye Digital! I have grown up, entered your space and eaten your market share!
Now, I make processors for servers too!
The Innovator’s Dilemma Illustrated
Oh! Look at ARM. They are making processors for phones. Those are low end computing devices.
We do not need to worry. We make processors for servers. We can continue focus on the high end of the market.
The Innovator’s Dilemma Illustrated
IS CHANGE NECESSARY?
© 2017 William Emmanuel Yu. All Rights Reserved.
Why do organizations do it?
71% Improved Outcome-based, Omni-channel Customer Experiences
36% Re-platform Core Processes & Use Real-Time Analytics to be Smarter, Faster, Agile
31% Workforce Prepared for Future with Data & Tools for a Transformed Business
31% Cut Operational Costs
33% Manage Data & Digital Assets for Insights & Creating New Business Models
51% Collaborative Business Ecosystem for Growth and Innovation
Reference: SAP Digital Transformation Research 2016. Digital Transformation: State of the Nations.
DX in terms ofSERVICE VELOCITY
© 2017 William Emmanuel Yu. All Rights Reserved.
YOU NEED TO BE BOTH
© 2017 William Emmanuel Yu. All Rights Reserved.
An Era of Contradictions - Bespoke yet Mass Produced
Feature Rich yet SimpleComprehensive yet FastMillennial yet Inclusive
Technology allows us to speed development. But, it also distracts us with many options.
Iterate, iterate, iterate.
DX in terms ofPARTNERS
© 2017 William Emmanuel Yu. All Rights Reserved.
Partners can sell with you
© 2017 William Emmanuel Yu. All Rights Reserved.
Partners can
support customers with you
© 2017 William Emmanuel Yu. All Rights Reserved.
Partners can
build with you
DX in terms ofOUTCOMES
© 2017 William Emmanuel Yu. All Rights Reserved.
Great things were not
built in a day
© 2017 William Emmanuel Yu. All Rights Reserved.
But … Great things are not the only things you can build
There is an ecosystem of support structures, processes and system that can be worked on
Instead of building tall, you can build wide
WHY NOW?
© 2017 William Emmanuel Yu. All Rights Reserved.
WHY IS THIS MADE POSSIBLE?
WE PRODUCE MORE. WE SHARE MORE.
Availability of anytime anywhere
communications
Availability of anytime anywhere computing
Culture of Overshare Advent of Social
Networking
Sharing Economy
IOTSensors everywhere
Open Data
© 2017 William Emmanuel Yu. All Rights Reserved.
WHY IS THIS MADE POSSIBLE?
Advent of Commodity Computing and the rise of Merchant Silicon
Rise of Distributed Computing (ie. Hadoop/NoSQL)
Era of open source software (ie. Linux, Hadoop) and technology (ie. Open Hardware, SDN).
Technology is bridging the gap
We can keep more. We can process more.
© 2017 William Emmanuel Yu. All Rights Reserved.
WHY IS THIS MADE POSSIBLE?
Technology is Geographically-Agnostic
No special hardware. No special access.
Information is made Free.
What is made available somewhere in the globe is shortly made available anywhere on the Internet.
Some fundamentals still need development like Internet access.
WHAT WE CAN DO TO HELP
© 2017 William Emmanuel Yu. All Rights Reserved.
GROWTH
RELIABLE
SCALABLE
SECURE
ELASTIC
Infrastructure Requisites for Growth
© 2017 William Emmanuel Yu. All Rights Reserved.
Big Data Posture Analysis
Big Data Implementation
Big Data App Dev
Analytics Consulting
Network Security Assessment
Inventory and Categorization
Managed Private Cloud
Design and Development
API Svc Mgt Framework
API Gateways
API and Microservices
Implementation and Configuration
Network Security Assessment
Supply and Delivery
Security Management
MANAGED SERVICESTechnical Support, Managed Services, Staff Augmentation, Platform MS
CUSTOMER EXPERIENCEDigital
TransformationEnterprise Mobility B2B, B2C Apps IP PRODUCTS
(ECMS, FFM, MCA)
CLOUD ANALYTICS API MICROSERVICES SECURITY
© 2017 William Emmanuel Yu. All Rights Reserved.
Service Management
PortfolioManagement
OperationsManagement
Cloud Management
LayerService Catalog
Self-Service Portal
Orchestration
Virtual Infrastructure
Layer
Hypervisor
Pools of Resources
Virtualization Control
PhysicalLayer Compute
Storage
Network
BusinessContinuity
Fault Tolerance and
Disaster Recovery
Backup and
Recovery
Replication
Security
Governance
Risk
Compliance
© 2017 William Emmanuel Yu. All Rights Reserved.
System 3
System 2
System 1
APIFramework
Internet/Desktop
CHANNELS
CRM Frontliners/CSR
Big Data Repository
End User
FINTECH CORE SERVICES
Partners
Smartphones/ Mobile
Kiosks
ERPOwner
© 2017 William Emmanuel Yu. All Rights Reserved.
Data Framework
Data Sources
Customer Data Credit Data Industry Feeds Service Experience Social Media Other Sources
Cost Reduction Revenue Increase
Operational Efficiency Risk / Security Single Customer View New Business
Data Archiving
Optimized Service Routes
Improved Infrastructure
Event Management Extension
Fraud Detection
Sentiment Analysis
Proactive Care
Targeted Marketing
Churn Analysis
New Product/Services
Data Monetization
© 2017 William Emmanuel Yu. All Rights Reserved.
Escalating Threats Increasing Complexity Resource Constraints
Spear Phishing
Persistence
Backdoors
Designer Malware
Sorry, no applicants found
ITSecurityJobs.com
Three core trends affecting clients’ ability to secure environments
Increasingly sophisticated attack methods
Disappearing perimeters
Accelerating security breaches
Constantly changing infrastructure
Too many products from multiple vendors; costly
to configure and manage
Inadequate antivirus products
Struggling security teams
Too much data, not enough manpower and skills to manage it all
© 2017 William Emmanuel Yu. All Rights Reserved.
To enable screen reader support, press shortcut Ctrl+Alt+Z. To learn about keyboard shortcuts, press shortcut Ctrl+slash.
DATA DISCOVERY AND
CLASSIFICATION
DATA GOVERNANCE:
AUDIT, RISK AND COMPLIANCE
DATA CENTER ACCESS
CONTROL
DATA DISPOSAL/ ERASURE
DATA ARCHIVING
PRIVILEGE, PASSWORD AND
RIGHTS ASSIGNMENT/ MANAGEMENT
MULTI-FACTOR AUTHENTICATION
DATABASE/ APPLICATION
ACCESS CONTROL AND AUDIT
DATA LEAKAGE, PREVENTION AND
ENCRYPTION
ENDPOINT/ MOBILE SECURITY AND MANAGEMENT
INFORMATION RIGHTS
MANAGEMENT
PARTING WORDS
© 2017 William Emmanuel Yu. All Rights Reserved.
BEWARE ANALYSIS PARALYSISBuild Ecosystems NOT Point solutions
Simple Solutions to Complex Problems
Work with Partners NOT Vendors.
USE YOUR DATAUse as much information-based decision
making as possible
12
3
© 2017 William Emmanuel Yu. All Rights Reserved.
These are the moments ...
… Don’t let them pass you by.
© 2017 William Emmanuel Yu. All Rights Reserved.
Thank [email protected]
© 2017 William Emmanuel Yu. All Rights Reserved.
Citations and References● Nokia 5110, IBM PC, Lazada, Amazon, Zalora, Google GMail, Pyramids of Giza are copyrighted by their respective owners. ● Kodak Moment Photo. Sally Edelstein and Envisioning The American Dream, 2016.
https://envisioningtheamericandream.com/2016/02/22/the-fading-middle-class/● Decline of Film. MIT Technology Review. http://www.technologyreview.com.br/printer_friendly_article.aspx?id=39219●