accelerating change through digital...

Post on 09-Jul-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Accelerating Change Through Digital Transformation

William Emmanuel Yu, Ph.D.MDI / Novare

DEFINING THE KODAK MOMENT

A MOMENT WORTHY OFCAPTURING WITH A PHOTOGRAPH

A MOMENT WHEN YOU WAKE UP AND YOUR ENTIRE BUSINESS MODEL IS OBSOLETE

sel.fie /ˈselfē/ noun informal

Was taking a million shots with outstretched arms where you waited a week to find out that ½ were blurred and nearly the other half was of your forehead.

When a million shots averaged around 24.

Oh! Look at Intel. They are making processors for personal computers. Those are low end computing devices.

We do not need to worry. We make processors for servers. We can continue focus on the high end of the market.

The Innovator’s Dilemma Illustrated

Haha. Goodbye Digital! I have grown up, entered your space and eaten your market share!

Now, I make processors for servers too!

The Innovator’s Dilemma Illustrated

Oh! Look at ARM. They are making processors for phones. Those are low end computing devices.

We do not need to worry. We make processors for servers. We can continue focus on the high end of the market.

The Innovator’s Dilemma Illustrated

IS CHANGE NECESSARY?

© 2017 William Emmanuel Yu. All Rights Reserved.

Why do organizations do it?

71% Improved Outcome-based, Omni-channel Customer Experiences

36% Re-platform Core Processes & Use Real-Time Analytics to be Smarter, Faster, Agile

31% Workforce Prepared for Future with Data & Tools for a Transformed Business

31% Cut Operational Costs

33% Manage Data & Digital Assets for Insights & Creating New Business Models

51% Collaborative Business Ecosystem for Growth and Innovation

Reference: SAP Digital Transformation Research 2016. Digital Transformation: State of the Nations.

DX in terms ofSERVICE VELOCITY

© 2017 William Emmanuel Yu. All Rights Reserved.

YOU NEED TO BE BOTH

© 2017 William Emmanuel Yu. All Rights Reserved.

An Era of Contradictions - Bespoke yet Mass Produced

Feature Rich yet SimpleComprehensive yet FastMillennial yet Inclusive

Technology allows us to speed development. But, it also distracts us with many options.

Iterate, iterate, iterate.

DX in terms ofPARTNERS

© 2017 William Emmanuel Yu. All Rights Reserved.

Partners can sell with you

© 2017 William Emmanuel Yu. All Rights Reserved.

Partners can

support customers with you

© 2017 William Emmanuel Yu. All Rights Reserved.

Partners can

build with you

DX in terms ofOUTCOMES

© 2017 William Emmanuel Yu. All Rights Reserved.

Great things were not

built in a day

© 2017 William Emmanuel Yu. All Rights Reserved.

But … Great things are not the only things you can build

There is an ecosystem of support structures, processes and system that can be worked on

Instead of building tall, you can build wide

WHY NOW?

© 2017 William Emmanuel Yu. All Rights Reserved.

WHY IS THIS MADE POSSIBLE?

WE PRODUCE MORE. WE SHARE MORE.

Availability of anytime anywhere

communications

Availability of anytime anywhere computing

Culture of Overshare Advent of Social

Networking

Sharing Economy

IOTSensors everywhere

Open Data

© 2017 William Emmanuel Yu. All Rights Reserved.

WHY IS THIS MADE POSSIBLE?

Advent of Commodity Computing and the rise of Merchant Silicon

Rise of Distributed Computing (ie. Hadoop/NoSQL)

Era of open source software (ie. Linux, Hadoop) and technology (ie. Open Hardware, SDN).

Technology is bridging the gap

We can keep more. We can process more.

© 2017 William Emmanuel Yu. All Rights Reserved.

WHY IS THIS MADE POSSIBLE?

Technology is Geographically-Agnostic

No special hardware. No special access.

Information is made Free.

What is made available somewhere in the globe is shortly made available anywhere on the Internet.

Some fundamentals still need development like Internet access.

WHAT WE CAN DO TO HELP

© 2017 William Emmanuel Yu. All Rights Reserved.

GROWTH

RELIABLE

SCALABLE

SECURE

ELASTIC

Infrastructure Requisites for Growth

© 2017 William Emmanuel Yu. All Rights Reserved.

Big Data Posture Analysis

Big Data Implementation

Big Data App Dev

Analytics Consulting

Network Security Assessment

Inventory and Categorization

Managed Private Cloud

Design and Development

API Svc Mgt Framework

API Gateways

API and Microservices

Implementation and Configuration

Network Security Assessment

Supply and Delivery

Security Management

MANAGED SERVICESTechnical Support, Managed Services, Staff Augmentation, Platform MS

CUSTOMER EXPERIENCEDigital

TransformationEnterprise Mobility B2B, B2C Apps IP PRODUCTS

(ECMS, FFM, MCA)

CLOUD ANALYTICS API MICROSERVICES SECURITY

© 2017 William Emmanuel Yu. All Rights Reserved.

Service Management

PortfolioManagement

OperationsManagement

Cloud Management

LayerService Catalog

Self-Service Portal

Orchestration

Virtual Infrastructure

Layer

Hypervisor

Pools of Resources

Virtualization Control

PhysicalLayer Compute

Storage

Network

BusinessContinuity

Fault Tolerance and

Disaster Recovery

Backup and

Recovery

Replication

Security

Governance

Risk

Compliance

© 2017 William Emmanuel Yu. All Rights Reserved.

System 3

System 2

System 1

APIFramework

Internet/Desktop

CHANNELS

CRM Frontliners/CSR

Big Data Repository

End User

FINTECH CORE SERVICES

Partners

Smartphones/ Mobile

Kiosks

ERPOwner

© 2017 William Emmanuel Yu. All Rights Reserved.

Data Framework

Data Sources

Customer Data Credit Data Industry Feeds Service Experience Social Media Other Sources

Cost Reduction Revenue Increase

Operational Efficiency Risk / Security Single Customer View New Business

Data Archiving

Optimized Service Routes

Improved Infrastructure

Event Management Extension

Fraud Detection

Sentiment Analysis

Proactive Care

Targeted Marketing

Churn Analysis

New Product/Services

Data Monetization

© 2017 William Emmanuel Yu. All Rights Reserved.

Escalating Threats Increasing Complexity Resource Constraints

Spear Phishing

Persistence

Backdoors

Designer Malware

Sorry, no applicants found

ITSecurityJobs.com

Three core trends affecting clients’ ability to secure environments

Increasingly sophisticated attack methods

Disappearing perimeters

Accelerating security breaches

Constantly changing infrastructure

Too many products from multiple vendors; costly

to configure and manage

Inadequate antivirus products

Struggling security teams

Too much data, not enough manpower and skills to manage it all

© 2017 William Emmanuel Yu. All Rights Reserved.

To enable screen reader support, press shortcut Ctrl+Alt+Z. To learn about keyboard shortcuts, press shortcut Ctrl+slash.

DATA DISCOVERY AND

CLASSIFICATION

DATA GOVERNANCE:

AUDIT, RISK AND COMPLIANCE

DATA CENTER ACCESS

CONTROL

DATA DISPOSAL/ ERASURE

DATA ARCHIVING

PRIVILEGE, PASSWORD AND

RIGHTS ASSIGNMENT/ MANAGEMENT

MULTI-FACTOR AUTHENTICATION

DATABASE/ APPLICATION

ACCESS CONTROL AND AUDIT

DATA LEAKAGE, PREVENTION AND

ENCRYPTION

ENDPOINT/ MOBILE SECURITY AND MANAGEMENT

INFORMATION RIGHTS

MANAGEMENT

PARTING WORDS

© 2017 William Emmanuel Yu. All Rights Reserved.

BEWARE ANALYSIS PARALYSISBuild Ecosystems NOT Point solutions

Simple Solutions to Complex Problems

Work with Partners NOT Vendors.

USE YOUR DATAUse as much information-based decision

making as possible

12

3

© 2017 William Emmanuel Yu. All Rights Reserved.

These are the moments ...

… Don’t let them pass you by.

© 2017 William Emmanuel Yu. All Rights Reserved.

Thank you!william.yu@novare.com.hk

© 2017 William Emmanuel Yu. All Rights Reserved.

Citations and References● Nokia 5110, IBM PC, Lazada, Amazon, Zalora, Google GMail, Pyramids of Giza are copyrighted by their respective owners. ● Kodak Moment Photo. Sally Edelstein and Envisioning The American Dream, 2016.

https://envisioningtheamericandream.com/2016/02/22/the-fading-middle-class/● Decline of Film. MIT Technology Review. http://www.technologyreview.com.br/printer_friendly_article.aspx?id=39219●

top related