recentpopularlog in

jonerp : business   327

« earlier  
The Real Serverless Revolution
"The cloud’s pay-as-you-go model, with apologies to predecessors such as time sharing, heralded a revolution in pricing, consumption and infrastructure and redefined the industry in its image. It had such an advantage in accessibility over the model that preceded it that not offering a pay-as-you-go option was not, itself, an option.

The real question now about serverless then is not about the technology, but whether its pay-only-when-it’s-on economic model is about to do exactly the same thing that the cloud’s did before it."
business  models  cloud 
16 days ago by jonerp
10 Ways To Own Your Cybersecurity In 2020
"Vault away passwords to critical systems and data. In the privileged access world of Cybersecurity operations in any organization, password vaults have become commonplace. Password vaults are similar to password managers many people use for their personal devices, web applications, and sites they regularly visit. In the case of a password vault, privileged credentials are checked in and out by admins, with each password automatically rotating to ensure greater randomization."
business  featured  posts  technology  software  trends  &  concepts  amazon  echo  bring-your-own-device  centrify  zero  trust  privilege.  cybersecurity  dashlane  google  home  lastpass 
17 days ago by jonerp
10 Ways Asset Intelligence Improves Cybersecurity Resiliency And Persistence
"Track, trace and find lost or stolen devices on or off an organizations’ network in real-time, disabling the device if necessary. Every device, from laptops, tablets, and smartphones to desktops and specialized use devices are another threat surface that needs to be protected."
business  featured  posts  technology  software  trends  &  concepts  absolute  persistence  platform  resilience  software’s  2019  endpoint  security  report  asset  intelligence 
23 days ago by jonerp
Introducing the Future of Work Global Index
"We believe the convergence of significant macro-trends in the market have attributed to the strong growth of “Future of Work” companies including:

digital transformation and the rapid adoption of cloud technologies in the enterprise
low unemployment forcing companies to investment in technology solution to more effectively streamline critical HR processes
workforce globalization requiring new investments collaboration and productivity tools
rapid automation of jobs and the need to reskill the global workforce"
business  featured  posts  technology  software  future  of  work  hrtech  human  resources  saas  slack 
4 weeks ago by jonerp
Shadow IT Is The Cybersecurity Threat That Keeps Giving All Year Long
"Shadow personal IoT voice assistants, Amazon Kindles, smartphone, and tablet devices are proliferating across enterprise networks today, accelerated by last-minute shopping everyone is trying to get done before the end of December. 82% of organizations have introduced security policies governing the use of these devices but just 24% of employees are aware of them. Meanwhile, the majority of IT senior management, 88%, believe their policies are effective. These and many other fascinating insights are from a recent study completed by Infoblox titled, What is Lurking on Your Network, Exposing the threat of shadow devices (PDF, 7 pp., no opt-in)."
business  featured  posts  technology  software  trends  &  concepts  byod  chief  information  officer  christmas  amazon  shopping  sales  ciso  cybercrime 
7 weeks ago by jonerp
Why Cybersecurity Needs To Focus More On Customer Endpoints
"There are over thirty vendors competing in the endpoint security market right now. A few of the most interesting are Absolute Software, Microsoft, Palo Alto Networks, and others who are seeing a surge of activity from enterprises based on discussions with CIOs and CISOs. Absolute Software’s Persistence self-healing endpoint security technology is embedded in the firmware of more than 500 million devices and gives CIOs, CISOs and their team’s complete visibility and control over devices and data. Absolute is the leading visibility and control platform that provides enterprises with tamper-proof resilience and protection of all devices, data, and applications."
business  featured  posts  technology  software  trends  &  concepts  absolute  persistence  resilience  (tse:  abt)  asset  management  christy  wyatt  ceo  of  cloud-based  endpoint  protection  platforms  (epp) 
9 weeks ago by jonerp
Decade-end review: Enterprise Applications have NOT eaten the world
"In this greatly fragmented market we are seeing many opportunities in “edges” and “junctions” – Zoho is finding new customers in Nigeria, UAE and other markets that bigger vendors have ignored, Plex is moving into MES as plants are increasingly modernized, Rimini is doing fine with third party maintenance as companies stay with legacy, Workfront is finding traction in new buying centers that have increasingly been digitized – Marketing Operations, New Product Development, and various corporate shared services. RPA vendors like Automation Anywhere, tools like Prism Analytics from Workday and MuleSoft from Salesforce are increasingly bridging gaps across the enterprise fragmentation. The big caveat from this fragmentation – application portfolios are screaming to be rationalized."
business  featured  posts  technology  software 
9 weeks ago by jonerp
7 Signs It’s Time To Get Focused On Zero Trust
"69% of employees doubt the cybersecurity processes in place in their organizations today. When the majority of employees don’t trust the security processes in place in an organization, they invent their own, often bringing their favorite security solutions into an enterprise. Shadow IT proliferates, productivity often slows down, and enterprise is more at risk of a breach than ever before. When there’s no governance or structure to managing data, cybercriminals flourish."
business  featured  posts  technology  software  trends  &  concepts  breach  breaches  centrify  cybersecurity  hackers  louis  columbus'  blog  passwords 
11 weeks ago by jonerp
What’s New On The Zero Trust Security Landscape In 2019
"The latest Forrester Wave adds in and places high importance on Zero Trust eXtended (ZTX) ecosystem advocacy, allocating 25% of the weight associated with the Strategy section on the scorecard. Forrester sees Zero Trust as a journey, with vendors who provide the greatest assistance and breadth of benefits on a unified platform being the most valuable. The Wave makes it clear that Zero Trust doesn’t refer to a specific technology but rather the orchestration of several technologies to enable and strengthen their Zero Trust framework. Key insights from what’s new this year in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019 include the following.."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  forrester  wave™:  zero  trust  extended  ecosystem  platform  providers  louis  columbus'  blog  mobile  security  mobileiron  mobility  q4  2019 
11 weeks ago by jonerp
10 Charts That Will Change Your Perspective Of AI In Security
"AI’s greatest benefit is the increase in the speed of analyzing threats (69%) followed by an acceleration in the containment of infected endpoints/devices and hosts (64%). Because AI reduces the time to respond to cyber exploits organizations can potentially save an average of more than $2.5 million in operating costs. Source: The Value of Artificial Intelligence in Cybersecurity – Sponsored by IBM Security Independently conducted by Ponemon Institute LLC, July 2018."
business  featured  posts  technology  software  trends  &  concepts  ai  cybersecurity  artificial  intelligence  cyberattacks  fraud  detection  louis  columbus'  blog 
12 weeks ago by jonerp
5 Proven Ways Manufacturers Can Get Started With Analytics
" I believe they’re in a tough situation with customers wanting short-notice production time while supply chains often needing to be redesigned to reduce or eliminate tariffs. They’re turning to analytics to gain the insights they need to take on these challenges and more. The graphic below is from Gartner’s latest survey of heavy manufacturing CIOs, it indicates the technology areas where heavy manufacturing CIOs’ organizations will be spending the largest amount of new or additional funding in 2019 as well as the technology areas where their organizations will be reducing funding by the highest amount in 2019 compared with 2018"
business  featured  posts  technology  software  trends  &  concepts  2019  analytics  spending  manufacturing  cio  agenda  heavy  insights  intelligence  crm  gartner  louis  columbus’  blog  cycle  time 
november 2019 by jonerp
Facebook admits to circumventing GDPR
"Facebook claims that it is no longer bound by GDPR because of the way it changed its terms and conditions. It is relying on Article 6(1)(b) of the GDPR which states: “processing is necessary for the performance of a contract to which the data subject is party or in order to take steps at the request of the data subject prior to entering into a contract.”
business  latest  news  security  advertising  eu  facebook  gdpr  libra  noyb  privacy 
november 2019 by jonerp
A Different Perspective on Differentiation
"Vendors spend all their time focusing on their own differentiation, when, maybe, they should be focused on their ability to help their customers differentiate. Now this is interesting, because I really don’t have a business if I sell to just 1 company. And if I sell to many, differentiating based on my product is not realistic."
go-to-market  differentiation  line  of  business  tech  buying 
november 2019 by jonerp
Securing Multi-Cloud Manufacturing Systems In A Zero Trust World
"To stop the cybercriminals’ gold rush, merged manufacturing businesses need to take the first step of adopting an approach to secure each acquired company’s identity repositories, whether on-premises or in the cloud. For example, instead of having to reproduce or continue to manage the defined rights and roles for users in each AD, manufacturing conglomerates can better secure their combined businesses using a Multi-Directory Brokering approach."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  resource  planning  erp  louis  columbus'  blog  manufacturing  private  equity  firms 
november 2019 by jonerp
Improving Endpoint Security Needs To Be A Top Goal In 2020
"Cyberattacks are growing more complex and difficult to prevent now and will accelerate in the future, making endpoint security a top goal in 2020. Cybercriminals are using structured and unstructured machine learning algorithms to hack organizations’ endpoints with increasing frequency. Endpoint attacks and their levels of complexity will accelerate as cybercriminals gain greater mastery of these techniques."
business  featured  posts  technology  software  trends  &  concepts  absolute  absolute’s  2019  endpoint  security  report  cyberattacks  cybersecurity 
november 2019 by jonerp
What’s New In Gartner’s Hype Cycle For CRM, 2019
"Four new technologies are on the Hype Cycle for CRM, reflecting enterprises’ need for greater integration of diverse systems and the demand for more predictive and prescriptive analytics-based insights. The four technologies include the following."
business  featured  posts  technology  software  trends  &  concepts  2019  gartner  hype  cycle  for  crm  sales  louis  columbus’  blog  partner  relationship  management  configure  price  quote  cpq  customer 
october 2019 by jonerp
How To Make Complex CPQ Selling Simple With Visual Configurators
"Visual configurators are capable of so much more than they are delivering today. It’s time to graduate beyond the shock-and-awe stage, which has been very successful in driving leads, generating MQLs, and closing deals. It’s time to get down to the hard work of making all those impressive models buildable at scale and profitable. And that comes by doubling down efforts at shortening cycle times from product concept to completed product. That’s the true north of this market and the secret to succeeding. Getting engineering, manufacturing, and sales collaborating using product models as a single source of truth is the best place to start."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  elogic  engineer-to-order  louis  columbus'  blog  price  and  quote  product  configuration 
october 2019 by jonerp
How To Improve Your CPQ Pricing Strategies
"The typical manufacturer who has over $100M in sales generates 40% or more of their sales through indirect channels. The channel partners they recruit and sell through are also reselling 12 other competitive products on average. Which factors most influence a distributor or channel partner’s decision to steer a sale to one manufacturer versus another? The following are the steps manufacturers can take now to improve price management and drive more channel sales."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  engineer-to-order  louis  columbus'  blog  price  and  quote  pricing  management  product  configuration 
october 2019 by jonerp
What’s New In Gartner’s Hype Cycle For AI, 2019
"
Between 2018 and 2019, organizations that have deployed artificial intelligence (AI) grew from 4% to 14%, according to Gartner’s 2019 CIO Agenda survey.
Conversational AI remains at the top of corporate agendas spurred by the worldwide success of Amazon Alexa, Google Assistant, and others.
Enterprises are making progress with AI as it grows more widespread, and they’re also making more mistakes that contribute to their accelerating learning curve."
business  featured  posts  technology  software  trends  &  concepts  ai  cloud  computing  gartner  hype  cycle  for  artificial  intelligence  2019  louis  columbus'  blog 
october 2019 by jonerp
What really is Product Marketing?
"Finally, being in denial about the onset of idea bankruptcy on the part of Product Management. This happens 2-3 quarters before its clear to everyone but at some point, the company can start to look to product marketing to come up with new “stories” off the same code. This is a result of a tired product organization that has may have temporarily lost its ability to outflank the competition. Insist that your product team tells you why you will win. If your product marketer is dominating that conversation in a leadership or a board meeting about this topic, you’re in trouble."
business  startup  lessons  cmo  go  to  market  marketing  product  management  saas  and  cloud  selling  go-to-market 
october 2019 by jonerp
The Primordial Soup of On-Demand Mobility
"Even as these underlying technologies remain the same, we expect business models to continue evolving, and the companies leading today may not be the ones that endure. Part of this uncertainty arises because today’s on-demand mobility businesses have flourished under favorable market conditions that may not last"
next-generation  mobility  autonomous  vehicles  business  model  maas  services  mobility-as-a-service  on-demand 
september 2019 by jonerp
Three Reasons Why Killing Passwords Improves Your Cloud Security
"The Twitter CEO’s account getting hacked is the latest in a series of incidents that reflect how easy it is for hackers to gain access to cloud-based enterprise networks using mobile devices. Verizon’s Mobile Security Index 2019 revealed that the majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device. Mobile devices are one of the most porous threat surfaces a business has. They’re also the fastest-growing threat surface, as every employee now relies on their smartphones as their ID. IDG’s recent survey completed in collaboration with MobileIron, titled Say Goodbye to Passwords found that 89% of security leaders believe that mobile devices will soon serve as your digital ID to access enterprise services and data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  hackers  jack  dorsey  louis  columbus'  blog  mobileiron  twitter  hack  zero  trust  networks 
september 2019 by jonerp
State Of AI And Machine Learning In 2019
"Data mining, advanced algorithms, and predictive analytics are among the highest-priority projects for enterprises adopting AI and machine learning in 2019. Reporting, dashboards, data integration, and advanced visualization are the leading technologies and initiatives strategic to Business Intelligence (BI) today. Cognitive BI (artificial-intelligence-based BI) ranks comparatively lower at 27th among priorities. The following graphic prioritizes the 27 technologies and initiatives strategic to business intelligence."
business  featured  posts  technology  software  trends  &  concepts  ai  artificial  intelligence  louis  columbus'  blog  machine  learning  ml  state  of  2019  and  in 
september 2019 by jonerp
5 Key Insights From Absolute’s 2019 Endpoint Security Trends Report
"Endpoint security controls and their associated agents degrade and lose effectiveness over time. Over 42% of endpoints experience encryption failures, leaving entire networks at risk from a breach. They’re most commonly disabled by users, malfunction or have error conditions or have never been installed correctly in the first place. Absolute found that endpoints often failed due to the fragile nature of their encryption agents’ configurations. 2% of encryption agents fail every week, and over half of all encryption failures occurred within two weeks, fueling a constant 8% rate of decay every 30 days. 100% of all devices experiencing encryption failures within one year.'
business  featured  posts  technology  software  trends  &  concepts  absolute  security  cybersecurity  endpoint  louis  columbus'  blog 
september 2019 by jonerp
Why Manufacturing Supply Chains Need Zero Trust
"Supply chains are renowned for how unsecured and porous they are multiple layers deep. That’s because manufacturers often only password-protect administrator access privileges for trusted versus untrusted domains at the operating system level of Windows NT Server, haven’t implemented multi-factor authentication (MFA), and apply a trust but verify mindset only for their top suppliers. Many manufacturers don’t define, and much less enforce, supplier security past the first tier of their supply chains, leaving the most vulnerable attack vectors unprotected."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
september 2019 by jonerp
Mobile Identity Is The New Security Perimeter
"89% of security leaders believe that mobile devices will serve as your digital ID to access enterprise services and data in the near future according to a recent survey by IDG completed in conjunction with MobileIron, titled Say Goodbye to Passwords. You can download a copy of the study here. Mobile devices are increasingly becoming the IDs enterprises rely on to create and scale a mobile-centric zero trust security network throughout their organizations."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  mobileiron  smartphones  zero  trust  network  security 
september 2019 by jonerp
As 47% of enterprises seek to reduce their reliance on outsourcing… we’re going straight to digital
"It’s taken more than 12 years – ever since the first-ever blog post written right here – but the outsourcing marketing is on the cusp of its most seismic change since the offshore revolution… the majority of enterprises are seeking to pull away from their stale outsourcing relationships and replace people with intelligent cognitive workers which learn context – or simply bots that perform transactional tasks. And the reality of outsourcing is that it’s far easier for an enterprise to eliminate workers that are contracted via a service partner than have to go through all the painful change and resistance when trying to eliminate their own staff directly with software investments. What’s more, enterprises rarely want to bring outsourced work back inhouse until it has been fully automated and the outsourcing offers little future value."
business  featured  posts 
august 2019 by jonerp
The Truth About Privileged Access Security On AWS And Other Public Clouds
"In short, native IAM capabilities offered by AWS, Microsoft Azure, Google Cloud, and more provides enough functionality to help an organization get up and running to control access in their respective homogeneous cloud environments. Often they lack the scale to fully address the more challenging, complex areas of IAM and PAM in hybrid or multi-cloud environments."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  aws  cybersecurity  security  centrify  louis  columbus'  blog 
august 2019 by jonerp
What Needs To Be On Your CPQ Channel Roadmap In 2019
"Manufacturers can realize greater revenue potential through their channels by combining machine learning insights to find those aftermarket customers most ready to buy while accelerating sales closing cycles with CPQ. Manufacturers want to make sure they are getting their fair share of the aftermarket. Using a machine learning-based application, they can help their resellers increase average deal sizes by knowing which products and services to offer when. They’ll also know when to present upsell and cross-sell offers into an account at a specific point in time when they will be most likely to lead to additional sales, all based on machine learning-based insights. Combining machine learning-based insights to guide resellers to the most valuable and highest probability customer accounts ready to buy with an intuitive CPQ system increases sales efficiency leading to higher revenues."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  elogic  engineer-to-order  louis  columbus'  blog  price  and  quote  product  configuration 
august 2019 by jonerp
Goals and metrics
"An HR department is measured by the number of candidates that are hired, but not on the quality of the candidates. I don’t need to explain how that goes wrong, but suffice it to say that it has a big impact on customer satisfaction as well as productivity."
business  alignment  architecture  metrics 
august 2019 by jonerp
Your Mobile Phone Is Your Identity. How Do You Protect It?
"Accidental, inadvertent breaches from human error and system glitches are still the root cause for nearly half (49%) of the data breaches. And phishing attacks on mobile devices that are lost, stolen or comprised in workplaces are a leading cause of breaches due to human error."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  privilege  security 
august 2019 by jonerp
How To Deal With Ransomware In A Zero Trust World
"Ransomware attackers are becoming more sophisticated using spear-phishing emails that target specific individuals and seeding legitimate websites with malicious code – it’s helpful to know the anatomy of an attack. Some recent attacks have even started exploiting smartphone vulnerabilities to penetrate corporate networks, according to Dr. George."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
august 2019 by jonerp
Is Sage obfuscating on cloud revenue?
"There is a lack of detail in Sage results that often frustrates. On the whole the numbers look solid. Yet there are several unanswered questions about its actual performance and strategy. Aaron Harris, appointed in 2019 will deliver his cloud strategy at the end of year. It will be interesting to see how that shifts Sage towards fulfilling its vision. At the moment it is not easy to see whether it is actually heading in the right direction. Again, there was no mention of Sage People, which historically has been one of the fastest growing cloud products for Sage."
business  erp  latest  news  cloud  ebp.  accounting  enterprise  management  results  saas  sage  50  intacct  steve  hare 
july 2019 by jonerp
Roadmap To Zero Trust For Small Businesses
"Small businesses and startups run so fast there’s often a perception that achieving greater security will slow them down. In a Zero Trust world, they don’t need to spend a lot of sacrifice speed for security. Following a Zero Trust roadmap can protect their systems, valuable intellectual property, and valuable time by minimizing the risk of falling victim to costly breaches.

Here’s what small businesses and startups need to include on their Zero Trust roadmaps"
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
july 2019 by jonerp
Why AI Is The Future Of Cybersecurity
"Fraud detection, malware detection, intrusion detection, scoring risk in a network, and user/machine behavioral analysis are the five highest AI use cases for improving cybersecurity. Capgemini analyzed 20 use cases across information technology (IT), operational technology (OT) and the Internet of Things (IoT) and ranked them according to their implementation complexity and resultant benefits (in terms of time reduction). Based on their analysis, we recommend a shortlist of five high-potential use cases that have low complexity and high benefits. 54% of enterprises have already implemented five high impact cases. The following graphic compares the recommended use cases by the level of benefit and relative complexity."
business  featured  posts  technology  software  trends  &  concepts  absolute  ai  centrify  cybersecurity  kount  louis  columbus'  blog  mobileiron 
july 2019 by jonerp
Passwords Are The Weakest Defense In A Zero Trust World
"These and many other fascinating insights make it clear that passwords are now the weakest defense anyone can rely on in a Zero Trust world. Two recent research studies quantify just how weak and incomplete an IT security strategy based on passwords is, especially when the need to access mobile apps is proliferating. Combined, these two MobileIron reports pack a one-two punch at passwords, and how they’re not strong enough alone to protect mobile devices, the fastest proliferating threat surface in a Zero Trust world."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  security 
july 2019 by jonerp
The Benefits of Business Process Framing
"In selecting and implementing a new enterprise system, business leaders have learned the importance of evaluating business processes. However, they often think that this means they should begin with detailed process mapping of their existing processes. We propose a better way: Begin with an exercise we call business process framing. In this post we provide a definition of process framing, explain the differences between process framing and process mapping, and outline the benefits of beginning with process framing before moving on, selectively, to process mapping."
business  process  improvement  crm  selection  erp  hcm  software  consulting 
july 2019 by jonerp
Salesforce Now Has Over 19% Of The CRM Market
"72.9% of CRM spending was on software as a service (SaaS) in 2018, which is expected to grow to 75% of total CRM software spending in 2019.
Worldwide enterprise application software revenue totaled more than $193.6B in 2018, a 12.5% increase from 2017 revenue of $172.1B. CRM made up nearly 25% of the entire enterprise software revenue market."
business  featured  posts  technology  software  trends  &  concepts  adobe  marketing  crm  customer  relationship  management  hubspot  louis  columbus'  blog  oracle  salesforce 
july 2019 by jonerp
Time for a Declaration of Independence from Software Vendors?
"The traditional advice companies is that it is best to standardize on a commercial software vendor for the core of the applications portfolio. Nevertheless, we are now seeing some clients push back against this advice and developing more of their own software in-house. In this post, we trace the history of the commercial software industry and why the buyers in some cases are rebelling. We conclude by offering new guidelines on when to choose custom development over packaged solutions."
business  strategy  it  due  diligence  erp  ibm  isv  spending  microsoft  oracle  sap 
june 2019 by jonerp
Machine Learning Is Helping To Stop Security Breaches With Threat Analytics
"Immediate visibility with a flexible, holistic view of access activity across an enterprise-wide IT network and extended partner ecosystem. Look for threat analytics applications that provide dashboards and interactive widgets to better understand the context of IT risk and access patterns across your IT infrastructure. Threat analytics applications that give you the flexibility of tailoring security policies to every user’s behavior and automatically flagging risky actions or access attempts, so that you’ll gain immediate visibility into account risk, eliminating the overhead of sifting through millions of log files and massive amounts of historical data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  privileged  access  management  verizon  zero  trust  privilege  security  ztp 
june 2019 by jonerp
Smart Machines Are The Future Of Manufacturing
"Capturing IIoT’s full value potential will require more sophisticated integrated approaches than current automation protocols provide. IIoT manufacturing systems are quickly becoming digital manufacturing platforms that integrate ERP, MES, PLM and CRM systems to provide a single unified view of product configurations and support the design-to-manufacturing process."
business  featured  posts  technology  software  trends  &  concepts  design-to-manufacture  iiot  industrial  internet  of  things  louis  columbus'  blog  manufacturing  intelligence 
june 2019 by jonerp
What Matters Most In Business Intelligence, 2019
"Improving revenues using BI is now the most popular objective in 2019, despite BI initially being positioned as a solution for compliance and risk management. Executive Management, Marketing/Sales, and Operations are driving the focus on improving revenues this year. Nearly 50% of enterprises now expect BI to deliver better decision making, making the areas of reporting, and dashboards must-have features. Interestingly, enterprises aren’t looking to BI as much for improving operational efficiencies and cost reductions or competitive advantages."
business  featured  posts  technology  software  trends  &  concepts  analytics  bi  intelligence  dashboards  data  integration  dresner  advisory  associates  louis  columbus’  blog  manufacturing 
june 2019 by jonerp
The State Of 3D Printing, 2019
"Proof of concepts and prototyping dominate 3D printing applications in 2019. Manufacturers are increasing their reliance on 3D printing as part of their broader manufacturing strategies, with production use up to 51% of all respondents from 38.7% in 2018. The following compares 2019’s purpose of 3D prints versus the last five years of survey data."
business  featured  posts  technology  software  trends  &  concepts  3d  modeling  printing  forecast  in  manufacturing  prototyping  design-to-manufacture  louis  columbus'  blog 
june 2019 by jonerp
How The Top 21% Of PAM-Mature Enterprises Are Thwarting Privileged Credential Breaches
"Energy, Technology & Finance are the most mature industries adopting Privileged Access Management (PAM), outscoring peer industries by a wide margin. Government, Education, and Manufacturing are the industries most lagging in their adoption of Zero Trust Privilege (ZTP), making them the most vulnerable to breaches caused by privileged credential abuse. Education and Manufacturing are the most vulnerable industries of all, where it’s common for multiple manufacturing sites to use shared accounts for controlling privileged access. The study found shared accounts for controlling privileged access is commonplace, with 52% of all organizations reporting this occurring often. Presented below are the relative levels of Zero Trust Privilege Maturity by demographics, with the largest organizations having the most mature approaches to ZTP, which is expected given the size and scale of their IT and cybersecurity departments."
business  featured  posts  technology  software  trends  &  concepts  centrify  2019  zero  trust  privilege  maturity  model  report  louis  columbus'  blog  pam  privileged  access  credential  abuse  credentials  management 
june 2019 by jonerp
Seven Things You Need To Know About IIoT In Manufacturing
"IIoT platforms are beginning to replace MES and related applications, including production maintenance, quality, and inventory management, which are a mix of Information Technology (IT) and Operations Technology (OT) technologies. IoT Analytics is seeing IIoT platforms begin to replace existing industrial software systems that had been created to bridge the IT and OT gaps in manufacturing environments. Their research teams are finding that IIoT Platforms are an adjacent technology to these typical industrial software solutions but are now starting to replace some of them in smart connected factory settings. The following graphic explains how IoT Analytics sees the IIoT influence across the broader industrial landscape."
business  featured  posts  technology  software  trends  &  concepts  ai  artificial  intelligence  iiot  industrial  internet  of  things  iot  analytics  louis  columbus'  blog  machine  learning 
june 2019 by jonerp
How to Improve Privileged User’s Security Experiences With Machine Learning
"Every business is facing the paradox of hardening security without sacrificing users’ login and system access experiences. Zero Trust Privilege is emerging as a proven framework for thwarting privileged credential abuse by verifying who is requesting access, the context of the request, and the risk of the access environment across every threat surface an organization has."
business  featured  posts  technology  software  trends  &  concepts  centrify  louis  columbus'  blog  machine  learning  zero  trust  privilege  security  ztp  zts 
june 2019 by jonerp
Industry 4.0’s Potential Needs To Be Proven On The Shop Floor
"In the many conversations I’ve had with mid-tier manufacturers located in North America this year, I’ve learned the following:

Their top investment priorities are upgrading existing machinery, replacing fully depreciated machines with next-generation smart, connected production equipment, and adopting real-time monitoring including Manufacturing Execution Systems (MES).
Manufacturers growing 10% or more this year over 2018 excel at integrating technologies that improve scheduling to enable more short-notice production runs, reduce order cycle times, and improve supplier quality."
business  featured  posts  technology  software  trends  &  concepts  artificial  intelligence  erp  industry  4.0  machine  learning  manufacturing  execution  system  mes 
may 2019 by jonerp
Sig taught me about Barely Repeatable Processes and how work flows
"There are plenty of ad-hoc processes in any company. They might cover the unplanned issues that happen every day, or they are the company specific things that aren’t covered by the standard package. They might have no system to help at all, or are often supported by data in an Excel spreadsheet being e-mailed around a group of people. These are what Sig calls Barely Repeatable Processes (BRP). They have some rules, but they often need to adapt and change as new circumstances arise. They need information, but it’s often unstructured notes and facts captured on paper or buried in e-mails sitting in someone’s inbox on their PC, tablet or smartphone."
ideas  barely  repeatable  processes  business  flows  future  of  work  sigurd  rinde  thingamy 
may 2019 by jonerp
How To Improve Supply Chains With Machine Learning: 10 Proven Ways
"Machine learning-based algorithms are the foundation of the next generation of logistics technologies, with the most significant gains being made with advanced resource scheduling systems. Machine learning and AI-based techniques are the foundation of a broad spectrum of next-generation logistics and supply chain technologies now under development. The most significant gains are being made where machine learning can contribute to solving complex constraint, cost and delivery problems companies face today."
business  featured  posts  technology  software  trends  &  concepts  analytics  artificial  intelligence  centrify  erp  infor  inspectorio  louis  columbus'  blog 
may 2019 by jonerp
Event Report: FinancialForce.com Doubles Down On Customer-Centric ERP #FFCommLive19
"Accounting and finance continue march towards feature parity with legacy ERP vendors. Key enhancements in the past year included allocations on a proportional basis, collections Workspace V1, configurable e-mail reminders, financial reporting and analytics. New capabilities will include e-Payment integration, more workspaces, prepaid expense, bank recon enhancements, Auto-FX rate and rate type, improved reporting powered by Einstein, and as of date aging powered by Einstein."
@rwang0  2013  2019  accounting  ai  apps  strategy  artificial  intelligence  business  transformation  cdo  ceo  chief  data  officer  digital 
may 2019 by jonerp
How To Secure Mobile Devices In A Zero Trust World
"Hacker’s favorite way to gain access to any business is by using privileged access credentials, which are increasingly being harvested from cellphones using malware. Hacking organizations would rather walk in the front door of any organizations’ systems rather than expend the time and effort to hack in. It’s by far the most popular approach with hackers, with 74% of IT decision makers whose organizations have been breached in the past say it involved privileged access credential abuse according to a recent Centrify survey, Privileged Access Management in the Modern Threatscape."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  forrester  zero  trust  framework  identity  access  management  louis  columbus'  blog  machine  learning  mobileiron 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part 2
"Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  gartner  top  10  security  projects  for  2018  louis  columbus'  blog  privileged  access  abuse  management 
may 2019 by jonerp
Big Idea: Extreme Capitalism And The Dawn Of Digital Duopolies
"How could this happen despite the rhetoric and dire warnings? At precisely the wrong time, when they should have stepped up to invest to defend against this threat, most leaders pulled back to harvest. Even worse, most organization’s shareholders bet against them by stripping away their ability to invest and innovate for the long run with stock buy backs, share dividends, and a plethora of mergers and acquisitions."
@rwang0  2019  alliances  apps  strategy  artificial  intelligence  big  ideas  business  transformation  ceo  chief  customer  officer  data  digital  executive 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part I
"The following are five strategies CIOs need to concentrate on to stop privileged credential abuse. Starting with an inventory of privileged accounts and progressing through finding the gaps in IT infrastructure that create opportunities for privileged credential abuse, CIOs and their teams need to take preemptive action now to avert potential breaches in the future."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  gartner  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  credential  abuse 
april 2019 by jonerp
The State Of Cloud Business Intelligence, 2019
"An all-time high 48% of organizations say cloud BI is either “critical” or “very important” to their operations in 2019. Organizations have more confidence in cloud BI than ever before, according to the study’s results. 2019 is seeing a sharp upturn in cloud BI’s importance, driven by the trust and credibility organizations have for accessing, analyzing and storing sensitive company data on cloud platforms running BI applications."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  analytics  aws  intelligence  cloud  bi  analysis  forecast  for  2019  computing  louis  columbus 
april 2019 by jonerp
5 Things Every Executive Needs To Know About Identity And Access Management
"Executives have a strong sense of urgency to improve Identity and Access Management (IAM) today to assure the right individuals access the right resources at the right times and for the right reasons. IAM components like Access Management, Single Sign-On, Customer Identity and Access Management (CIAM), Advanced Authentication, Identity Governance and Administration (IGA), IoT-Driven IAM, and Privileged Access Management address the need to ensure appropriate access to resources across an organization’s entire attack surface and to meet compliance requirements."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  identity  and  access  management  louis  columbus'  blog  mfa  multi-factor  authentication  pam 
april 2019 by jonerp
The Best Cloud Computing Companies And CEOs To Work For In 2019 Based On Glassdoor
"Indexing the most interesting and fastest growing cloud computing companies by their Glassdoor scores and reputations is a great way to begin defining a long-term career growth strategy. One factor not quantified is how well of a fit an applicant is to company culture. Take every opportunity for in-person interviews, read Glassdoor ratings often and observe as much as possible about daily life in companies of interest to see if they are a good fit for your skills and strengths."
business  featured  posts  technology  software  trends  &  concepts  cloud  computing  jobs  cloudian  computer  reseller  news’  100  coolest  vendors  of  2019  fivetran  glassdoor  kony 
march 2019 by jonerp
5 Ways To Demystify Zero Trust Security
"To Chase Cunningham’s point, more customer use cases need to be created, and thankfully that’s on his research agenda. Starting the conversation with each vendor visited by asking for their definition of Zero Trust either led to a debate of whether Zero Trust was needed in the industry or how their existing architecture could morph to fit the framework. Booth staffs at the following companies deserve to be commended for how much they know about their customers’ success with Zero Trust: Akamai, Centrify, Cisco, Microsoft, MobileIron, Palo Alto Networks, Symantec, and Trend Micro."
business  featured  posts  technology  software  trends  &  concepts  akamai  capgemini  centrify  cisco  ledios  cyber  louis  columbus'  blog  microsoft 
march 2019 by jonerp
The CRM Mobius Strip
"As part of the research we did a survey each year asking the user organizations what they thought about these B2B marketing products and what challenges they ran into when they implemented the solution. Every year for 5 years we got the same response: Their major problem was getting Sales and Marketing to talk to each other."
business 
march 2019 by jonerp
Vodafone’s 2019 IoT Barometer Reflects Robust Growth In The Enterprise
"
85% of enterprises who develop deep expertise with IoT succeed at driving revenue faster than competitors.
81% of enterprises say Artificial Intelligence streamlines interpreting and taking action on data insights gained from IoT systems and sensors.
68% of enterprises are using IoT to track the security of physical assets, making this use case the most common across enterprises today.
Transport & Logistics and Manufacturing & Industrials saw the most significant increase in adoption between 2018 and 2019."
business  featured  posts  technology  software  trends  &  concepts  5g  artificial  intelligence  iiot  industrial  internet  of  things  iot  enterprise  adoption 
march 2019 by jonerp
74% Of Data Breaches Start With Privileged Credential Abuse
"Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In quantifying this gap consider the typical U.S.-based enterprise will lose on average $7.91M from a breach, nearly double the global average of $3.68M according to IBM’s 2018 Data Breach Study."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  ibm  2018  data  breach  study  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  report  credential  abuse  security 
march 2019 by jonerp
NetSuite report at NRF
"This data clearly shows that personalization is a hard thing to get right. But maybe we’re trying too hard. A few years ago, an article in Harvard Business Review, “Stop Trying to Delight Your Customers,” by Matthew Dixon, Karen Freeman, and Nicolas Toman, said, “…[customer] loyalty has a lot more to do with how well companies deliver on their basic, even plain-vanilla promises than on how dazzling the service experience might be.” Quite right. Attempting to dazzle with service people or bots can backfire."
business  cloud  computing 
february 2019 by jonerp
Top 25 IoT Startups To Watch In 2019
"The most successful IoT startups selling into enterprises excel at orchestrating analytics, Artificial Intelligence (AI), and real-time monitoring to deliver exceptional customer experiences. As a group, these top 25 IoT startups are showing early potential at enabling profitable new business models, revitalizing industries that have experienced single single-digit growth recently. Each of these startups is taking a unique approach to solving some of the enterprises’ most challenging problems, and in so doing creating valuable new patents that further fuel IoT adoption and growth."
business  featured  posts  technology  software  trends  &  concepts  internet  of  things  startups  louis  columbus'  blog  top  25  iot  2019 
february 2019 by jonerp
Digital Transformation’s Missing Link Is Zero Trust
"Gaps exist between the results digital transformation initiatives are delivering today, and the customer-driven value they’re capable of. According to Gartner, 75% of digital transformation projects are not aligned internally today, leading to delayed new product launches, mediocre experiences, and greater security risks than ever before."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  palo  alto  networks  privileged  access  management  (pam)  world  economic  forum 
february 2019 by jonerp
Top 10 Ways Internet Of Things And Blockchain Strengthen Supply Chains
"One CIO told me recently his company deliberately spins up several POCs at once, adding “they’re our proving grounds, we’re pushing blockchain and IoT’s limits to see if they can solve our most challenging supply chain problems and we’re learning a tremendous amount.”
business  featured  posts  technology  software  trends  &  concepts  blockchain  forecasts  use  cases  ethical  supply  chains  ibm  food  trust  iiot  industrial  internet  of  things 
february 2019 by jonerp
How Machine Learning Improves Manufacturing Inspections, Product Quality & Supply Chain Visibility
"Manufacturers’ most valuable data is generated on shop floors daily, bringing with it the challenge of analyzing it to find prescriptive insights fast – and an ideal problem for machine learning to solve.

Manufacturing is the most data-prolific industry there is, generating on average 1.9 petabytes of data every year according to the McKinsey Global Insititute. Supply chains, sourcing, factory operations, and the phases of compliance and quality management generate the majority of data."
business  featured  posts  technology  software  trends  &  concepts  inspectorio  louis  columbus'  blog  machine  learning  manufacturing  mckinsey  global  institute’  product  inspections  quality 
february 2019 by jonerp
Event Report: #WEF19 #Davos2019 Globalization 4.0 Under Fire As Global Leaders Fail The Populace
"While noble in intent, the forum drives deep discussion among its members. The research into political, societal, economic, and technology issues have raised public awareness. Despite the number of world leaders, business executives, non-profit pioneers, and other change agents, few major initiatives move from concept to commercialization and impact the general populace. Hence, many skeptics continue to criticize the WEF efforts."
@rwang0  2019  alliances  apps  strategy  artificial  intelligence  business  transformation  ceo  chief  customer  officer  data  digital  executive  financial 
january 2019 by jonerp
When is it Time to Say Goodbye to Accenture, Deloitte, IBM or KPMG?
"Here are a few signs to look for:

You are in deployment mode and your cost per day for ERP consultants is greater than 15% of the rate you would pay for a solid independent
The SI’s team lacks experience and you are spending more time developing their talent than your own
You need fresh ideas to solve new problems and the SI team you hired is not qualified
Your SI is attempting to spread its influence well beyond your program without your direction"
system  integrators  accenture  business  transformation  contract  negotiations  deloitte  ibm  it  cost  reduction  project  implementation  kpmg  governance  integrator 
january 2019 by jonerp
Which Analytics And BI Technologies Will Be The Highest Priority In 2019?
"82% of enterprises are prioritizing analytics and BI applications and platforms as part of their budgets for new technologies and cloud-based services. 78% of enterprises are prioritizing advanced analytics, and 76% data preparation. 54% say AI, machine learning and Natural Language Processing (NLP) are also a high investment priority. The following graphic ranks enterprises’ investment priorities for acquiring or subscribing to new technologies and cloud-based services by analytics and BI initiatives or strategies. Please click on the graphic to expand for easier reading."
business  featured  posts  technology  software  trends  &  concepts  analytics  bi  and  in  the  age  of  ai  big  data  intelligence  cloud  computing  lake  louis  columbus'  blog 
january 2019 by jonerp
Defense contractor: IT must embrace ‘radical transparency and culture change’
" One of the things that I didn’t like when I joined, and it’s common in corporate culture but I wanted to change within L3 is, somebody would ask a perfectly reasonable question, and another person will say, “Well, we don’t know the answer. We’ll get back to you.”

Well, now the conversation is dead. But, what you want is an active, “Well, let’s see what the data says,” because it exists, right? That’s the thing that drove me crazy. Somebody has got the data. How come it all isn’t in a giant warehouse so that we can peal things back to the infinite level that we want to? Sort of like an onion. You peel back the layers and peel back the layers to get down to the answer to say, “The reason why this isn’t working or is working so well, is because of this.”"
business  featured  posts 
january 2019 by jonerp
How To Protect Healthcare Records In A Zero Trust World
"Using access credentials stolen from co-workers or stolen laptops, unethical healthcare insiders are among the most prolific at stealing and selling patient data of any insider threat across any industry. Accenture’s study, “Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workforce Survey on Cybersecurity,” found that the most common ways healthcare employees financially gain from stealing medical records is to commit tax return and credit card fraud."
business  featured  posts  technology  software  trends  &  concepts  centrify  healthcare  breaches  protenus  breach  barometer  idaptive  louis  columbus  privileged  access  credentials  zero  trust  privilege 
december 2018 by jonerp
Monday’s Musings: What’s Up With Big Tech Stocks? The Insider View For 2019
"Algo’s have been reset so the markets are operating on different rules and that model will be reset again soon. Why Big Tech? They play in a winner takes all market. Apple and Google provide 99% of all the consumer software in the US. Facebook, Google, and Amazon drive almost 63% of all advertising dollars
Tech is still strong with 20 to 40% growth. Investors will find it hard to find other asset allocation classes this good and this dominant."
business  featured  posts  technology  software  $appl  $goog  $nflx  $tsla  018  2018  2019  adbe 
december 2018 by jonerp
SAP’s evolving partner economy
"It was nice to spend some time listening to Diane Fanelli, SVP describe how SAP is showcasing in its App Center a growing number of ISV offerings using tools in its Cloud Platform and Leonardo offerings. In previous attempts, SAP has tried to do similar around NetWeaver and HANA. The customer access is much more digital this time around, the Cloud Platform leverages lot more open source and the barriers to partner participation appear much lower. It is fledgling at this point in terms of revenues for the ISVs and SAP (Fanelli says focus is adoption prior to monetization). I hope they continue with her statement “the future is small, simple applications that snap into existing landscapes. You go shopping [for them] on your phone.” Which also means the onus for vertical and other books of record will stay with SAP. Too many vendors abdicate heavy lifting to their platform partners."
business  featured  posts 
december 2018 by jonerp
CPQ Needs To Scale And Support Smarter, More Connected Products
"Industrial Internet of Things (IIoT) platforms has the potential of providing a single, unified data model across an entire manufacturing operation, giving manufacturers a single unified view of product configurations across their lifecycles. Producing smart, connected products at scale also requires a system capable of presenting a unified view of configurations in the linguistics each department can understand. Engineering, production, marketing, sales, and service all need a unique view of product configurations to keep producing new products. Leaders in this field include Configit and their Configuration Lifecycle Management approach to CPQ and product configuration."
business  featured  posts  technology  software  trends  &  concepts  cad  configit  configuration  lifecycle  management  configure  price  quote  cpq  crm  integration 
december 2018 by jonerp
Using Machine Learning To Find Employees Who Can Scale With Your Business
"Betting on solid data and personalization at scale, on the other hand, delivers real results. Real data slices through the probabilities and is the best equalizer there is at eradicating conscious and unconscious biases from hiring decisions."
business  featured  posts  technology  software  trends  &  concepts  ai  applicant  tracking  systems  artificial  intelligence  ats  eightfold  hr  machine  learning  human  resource  management 
december 2018 by jonerp
Where Cloud Computing Jobs Will Be In 2019
"The Hiring Scale is 78 for jobs that require cloud computing skill sets, with the average job post staying open 46 days. The higher the Hiring Scale score, the more difficult it is for employers to find the right applicants for open positions. Nationally an average job posting for an IT professional with cloud computing expertise is open 46 days. Please click on the graphic to expand for easier reading."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  aws  cloud  computing  employment  jobs  deloitte 
december 2018 by jonerp
86% Of Enterprises Increasing IoT Spending In 2019
"86% of enterprises expect to increase their spending on IoT in 2019 and beyond. Enterprises increased their investments in IoT by 4% in 2018 over 2017, spending an average of $4.6M this year. Nearly half of enterprises globally (49%) interviewed are aggressively pursuing IoT investments with the goal of digitally transforming their business models this decade. 38% of enterprises have company-wide IoT deployments today, and 55% have an IoT vision and are currently executing their IoT plans."
business  featured  posts  technology  software  trends  &  concepts  centrify  cisco  f5  idaptive  industrial  internet  of  things  intelligent  enterprise  index 
december 2018 by jonerp
The Costly, Damaging, and Futile Myth of Business & IT Alignment Replacing nonsensical ‘business and IT alignment’ with a newer, better environment
"Now is the ideal time to partition business and IT in such a fashion. The emerging viability of what has been somewhat arbitrarily grouped into ‘digital transformation’ assets (Big Data, Machine Learning, Internet-of-Things and Analytics) can only be successfully adopted by an organization with an efficient and credible foundation of integrated business applications. With business stakeholders firmly at the wheel, such efficiency and credibility are more easily achieved than through an alignment effort that has been a dismal failure since the days of manual typewriters, hi-fis, black & white television, and rotary telephones."
business  requirements  it  alignment  cio  role  digital  transformation  disruption  enterprise  applications  functional  design  internet-of-things  iot  of 
november 2018 by jonerp
Predicting The Future Of Digital Marketplaces
"Competitive differentiation, buyer retention, buyer acquisition, and social media engagement and the four most common customer-facing challenges marketplaces face today. 39% of marketing execs say that differentiating from competitors is the greatest challenge, followed by buyer retention (32%), buyer acquisition (29%) and effective social media campaigns (29%) Further validation that today’s digital marketplaces are enabling greater digital transformation through personalization is found in just 22% of respondents said customer experience is a challenge."
business  featured  posts  technology  software  trends  &  concepts  altimeter  group  byline=louis  columbus  digital  marketplaces  ecommerce  forrester  google  cloud  platform  kahuna 
november 2018 by jonerp
Which CRM Applications Matter Most In 2018
"Marketing analytics continues to be hot for marketing leaders, who now see it as a key business requirement and a source of competitive differentiation. In my opinion and based on discussions with CMOs, interest in marketing analytics is soaring as they are all looking to quantify their team’s contribution to lead generation, pipeline growth, and revenue. I see analytics- and data-driven clarity as the new normal. I believe that knowing how to quantify marketing contributions and performance requires CMOs and their teams to stay on top of the latest marketing, mobile marketing, and predictive customer analytics apps and technologies constantly. The metrics marketers choose today define who they will be tomorrow and in the future."
business  featured  posts  technology  software  trends  &  concepts  ai  byline=louis  columbus  cloud  computing  cpq  crm  customer  relationship  management  enterprise 
november 2018 by jonerp
« earlier      
per page:    204080120160

Copy this bookmark:





to read