Articles under the topic Technology
The information and communication technologies and paradigms supporting an enterprise to become digitally led are emerging. But there are challenges too, which needs to be understood, addressed and solved before the new technologies can be adopted. Here, I have listed six challenges that are resulting into a hurdle for enterprises to become digitally driven and use IT as a real business enabler and a differentiator.
Social media is slowly and steadily becoming a critical part of the strategy, and a new channel for Indian banks who are engaging customers on social platforms, to carry out numerous activities. Over the next five years, banks are expected to focus more on synergies that can be generated by social media and other key channels, rather than calculating RoI in the social landscape.
Ahead of India's General Elections 2014, major political parties in the country are going all out to woo the electorate on various social media platforms and use Big Data to influence voters. Reports suggest that there could be a vote swing of 3 to 4 percent in as many as 24 states, which constitute a large chunk of Internet users. Will these platforms influence voters ahead of the polls?
New and emerging technologies challenge the traditional process of teaching and learning, and the way education is managed. Teaching with technology is fairly different from teaching in a typical classroom. It requires a different pedagogical approach. The strategy should be to transform school education from a largely teacher-centered approach to a more interactive and learner-centered approach.
CIOs can play an important role especially in the evolution of startups wanting to provide solutions to enterprises. Their understanding of the business context coupled with their technology expertise gives them the ability to craft architectures that positively impact business outcomes. They should adopt a few fledglings depending on their interest and inclination.
Software licenses are bought in varied forms, box packs, paper licenses, and enterprise agreements, downloads, handed over on a disk or thumb drive. Until the industry learns and decides to work with CIOs on managing licenses, the onus shall remain with the IT teams to stay compliant with process driven provisioning and frequent internal assessments that rationalize use.
Organizations are still a bit confused about mobility. Companies and IT groups still see a dichotomy between seamless mobility for their employees and rigid and robust security for the enterprise. A well developed strategy for enterprise mobility should be able to reduce the gap between security, mobility and productivity without undue challenges.
The Worldwide Threat Assessment Report released for 2014 indicates that cyber-related threats are still the top concern for securing the nation and private industry. In response to these and similar developments, countries are creating cyber defense institutions within their national security establishments, and several of these will likely be responsible for offensive cyber operations as well.
A robust strategy for BYOD and mobility requires a re-thinking of the entire enterprise strategy. While re-thinking doesn't equate to re-working, it does mean a complete end-to-end revisit of the enterprise strategy to ensure BYOD and mobile devices are well represented in everything from security to backup to accessibility. Introduce mobility as a key cornerstone to your business technology strategy.
In my previous blog, I discussed how a social engineering assessment is a very valuable tool in understanding the security exposure of most organizations. It is imperative that the InfoSec professionals know how to architect, organize and carry out a successful assessment. This article serves as a starting point for planning basic activities and proactive measures to protect the safety of all involved and ensure best results!