Posts Tagged With: Security

How do you “Fail Fast” in Interdependent EcoSystem?

 

Smart_Connected_City_500px

Connected agriculture, connected cities, smart homes, smart airports, and the list goes on when it comes to technology enabled people and process automation in a world of Internet of Things. Digital technology is becoming more and more of a key investment opportunity that can create a long-term competitive advantage in such interdependent ecosystems. Use of telematics, wifi mesh networks, robots in the outdoor rugged environments has facilitated several companies to reduce workplace accidents, increase productivity and drive predictable workflow. Collection of data at the core and at the edge has facilitation improved decision making at each step, thus empowering the floor managers, and department heads make real time decisions towards improving asset utilization, value chain portfolio, safety and compliance on heavy machinery, and several other business critical functions. Caterpillar (CAT) is a great example of digital innovation in this space.

complex

Similarly, connected agriculture is an evolving opportunity in digital innovation. Use of mobile technology to improve agricultural productivity among the agricultural stakeholders and value chain is a fast growing practice with several integrated service companies worldwide. Examples of airports, smart homes, cities all are indicative of a very complex and interdependent eco-system when it comes to digitization.

Unlike digitally enabled business models like Uber, AirBnB which are B2C, strategy for digitization in such industries is very complicated. Its one thing to have a dream like vision on the impact of such technology enabled process, decisions and disruption of the business models, and a completely different beast to beat down this vision into strategic chunks of projects. A starting point would be to define a clear bounded strategy that will give way to a set of design principles for organizational alignment and execution. Decision support services will be embedded into such structural change to enable the key tenents that are important for success. Focus on improving the customer experience, enablig faster time to market on products and services, and finally on automation and agility of operations. Internally, the organization needs to focus on building the key talent at leadership and functional level, developing a culture and operating model that supports digital success with the metrics and developing capabilities to bring data and analytics into everyday process and decision making.

Categories: analytics, digitization | Tags: , , , | Leave a comment

Security concerns in IOE

IoE is here, whether you see it or not, you are a part of it. As many of our most critical data streams and business processes will be enabled, security will play an even more important role than ever before. Security vulnerabilities in the Retail and Media industry have made several headlines over the last year in 2014. And as we speak, several mission-critical industrial control systems of automation, energy and manufacturing operations are going online. It is prescient to expect malicious hackers to find their way into unauthorized access to configuration settings and sensitive information.

In the healthcare industry, which already wrought with severe litigations and privacy infringements, computer systems can be vulnerable to cybersecurity breaches. As medical devices are increasingly interconnected, via the Internet, hospital networks, other medical device, and smartphones, there is an increased risk of cybersecurity breaches, which could affect how a medical device operates endangering life and recovery of their patients.

Working smarter with cloud security can utilize the unique capabilities to help IT professionals overcome the added complexity and resource constraints.

It has been predicted that the number of Internet-connected devices are going to reach 50 billion by 2020. IoE is essentially where peopleprocessesdata, and things converge. While it unlocks new possibilities for sharing and connectivity, those who benefit from IoE could also be open to attacks against it. The Shodan search engine, a massive index of currently Internet-connected smart devices, reveals just how big a threat this default password problem is.

Get smart, get secure and most of all, be aware of your smart devices, and your information and credentials.

Categories: Uncategorized | Tags: , , , | Leave a comment

Create a free website or blog at WordPress.com.