February 05, 2021

February 05, 2021

Riding out the wave of disruption

Disruption is not necessarily the crisis it’s frequently considered to be for incumbents, the researchers stress. Two technologies can often coexist in the marketplace for a significant period. Thus, it’s important for incumbent companies not to overreact. They should target dual users and reexamine the factors that have led to the old technology sticking around for so long. Of course, the profit implications of cannibalization of the old technology and leapfrogging depend on which type of firm is trumpeting the new technology. New entrants will always stand to gain when they introduce a technology that takes off. But incumbents rolling out a successive technology will also gain if their competitors would have introduced it anyway or if the 2.0 version has a higher profit margin than the original. The authors write, “Leapfroggers are an opportunity loss for incumbents, but switchers are a real loss.” Regardless of the predictive model they use, marketers should strive to understand how the various consumer segments identified in this study will grow or shrink over time and use that information in their forecasts of early sales or market penetration of successive technologies.


AI and APIs: The A+ Answers to Keeping Data Secure and Private

Adding to the complexity is ensuring that AI and data are used ethically, Marques points out. Two key categories comprise secure AI, he says: responsible AI and confidential AI. Responsible AI focuses on regulations, privacy, trust, and ethics related to decision-making using AI and ML models. Confidential AI involves how companies share data with others to address a common business problem. For example, airlines might want to pool data to better understand maintenance, repair, and parts failure issues but avoid exposing proprietary data to the other companies. Without protections in place, others might see confidential data. The same types of issues are common among healthcare companies and financial services firms. Despite the desire to add more data to a pool, there are also deep concerns about how, where, and when the data is used. In fact, complying with regulations is merely a starting point for a more robust and digital-centric data management framework, Jahil explains. Security and privacy must extend into a data ecosystem and out to customers and their PII. For example, CCPA has expanded the concept of PII to include any information that may help identify the individual, like hair color or personal preferences.


What is a data center REIT?

The rationale for converting to REIT status will vary from company to company, but broadly it offers beneficial tax status and greater access to capital for growth. “The biggest benefit is that REITs don’t pay any corporate tax,” says Millionacre’s Frankel. “Think of a data center company that isn't a REIT. Its income can effectively be taxed twice; once at the corporate level when the company earns a profit, and again on the individual level when the company pays a dividend to investors.” The rules on whether an organization can apply for REIT classification vary from country to country, but broadly having a portfolio of properties from which real-estate activities such as rent is the majority of your revenue is derived, and having a number of investors to which you provide the majority of that revenue, is the minimum requirement. “REITs are able to raise capital more easily via share issuances and/or joint venture partnerships as investors have a better idea of the company’s financial situation once public, says Cushman & Wakefield’s Imboden. “The degree of difficulty [on becoming a REIT] depends largely on if the company was structured and managed with the intention of becoming a REIT, or if the decision was made after years of operating.”


12 security career-killers (and how to avoid them)

“The biggest problem I’ve seen is security people who think security is the be-all and end-all. They go in with that attitude, and they don’t see how they have to enable the business,” says James Carder, CSO of the security tech company LogRhythm. He says they instead need to collaborate with their business-unit colleagues to understand their objectives and then be an enabler, not a hinderance. Others agree. “Security is a profession that has plenty of standards and regulations and frameworks, but too many times we try to implement them in a blind way, from the perspective of the standards instead of trying to implement them in the context of the business,” adds Russ Kirby, CISO of software company ForgeRock. Similarly, Kirby has seen security pros become so focused on their own objectives that they alienate other departments that may otherwise want to work together to find a solution. He points to one scenario, where security staffers wanted to change an application’s minimum password length from 8 characters to upwards of 20. The IT application team pushed back, explaining that they could go to 12 characters but anything more would take significant time and money to change.


Six industries impacted by the combination of 5G and edge computing

"Weather and humidity can impact the performance of 5G,'' Roberts added; he also noted that, as 5G continues to proliferate, there will be many more cell towers. That's consistent with recently released research by PwC, which reported that "the performance of 5G networks remains uneven." Widespread usage is not here yet "because it's a big challenge to upgrade infrastructure," agreed Mark Sami, a director at West Monroe. Right now, for example, to get Verizon's Ultra Wideband network, "you need a line of sight to a tower so you have to be in close proximity," Sami said. ... "It's all about driving applications and how do you make these 5G and edge solutions [work] in a manner where you create more opportunities for the developer community to write applications to that infrastructure architecture,'' said Sid Nag, a vice-president at Gartner. Some 90% of industrial enterprises will use edge computing by 2020, according to Frost & Sullivan. "The applications are endless,'' observed Chris Steffen, a research director at Enterprise Management Associates. "Every vertical is going to be impacted in some way,'' he added, depending on specific use cases and relevance.


Why Disconnected Data Grinds Customer Journeys to a Halt

Business architecture matters because it defines and explains the relationships between customer business processes. And information and application architecture matter because they define the major types of information and the applications that process customer data. Clearly, this kind of systems thinking is essential to defining holistic customer journeys — or in the language of marketing, the friction points between customer facing systems and data that flows between them. Thinking this way raises questions like why customers need to interface with applications separately and why they have to enter data multiple times when interacting with these separate applications — two big sources of customer journey friction. Data limits the quality of the customer journey at three major points: a company’s sales, marketing and service processes. According to economist Theodore Levitt, any sales and marketing processes should focus on the following: “the role of marketing is creating and keeping the customer.” To create or obtain new customers, organizations must simplify the processes to become a customer, regardless of the customer channel chosen. In practice this means integrating customer facing systems, so customers enter information only once.

Read more here ...

要查看或添加评论,请登录

Kannan Subbiah的更多文章

  • March 31, 2025

    March 31, 2025

    World Backup Day: Time to take action on data protection “The best protection that businesses can give their backups is…

  • March 30, 2025

    March 30, 2025

    Gemini hackers can deliver more potent attacks with a helping hand from… Gemini For the first time, academic…

  • March 28, 2025

    March 28, 2025

    Do Stablecoins Pave the Way for CBDCs? An Architect’s Perspective The relationship between regulated stablecoins and…

  • March 27, 2025

    March 27, 2025

    Can AI Fix Digital Banking Service Woes? For banks in India, an AI-driven system for handling customer complaints can…

  • March 26, 2025

    March 26, 2025

    The secret to using generative AI effectively It’s a shift from the way we’re accustomed to thinking about these sorts…

  • March 25, 2025

    March 25, 2025

    Why FinOps Belongs in Your CI/CD Workflow By codifying FinOps governance policies, teams can put guardrails in place…

  • March 24, 2025

    March 24, 2025

    Identity Authentication: How Blockchain Puts Users In Control One key benefit of blockchain is that it's decentralized.…

  • March 23, 2025

    March 23, 2025

    Citizen Development: The Wrong Strategy for the Right Problem The latest generation of citizen development offenders…

  • March 21, 2025

    March 21, 2025

    Synthetic data and the risk of ‘model collapse’ There is a danger of an ‘ouroboros’ here, or a snake eating its own…

  • March 20, 2025

    March 20, 2025

    Agentic AI — What CFOs need to know Agentic AI takes efficiency to the next level as it builds on existing AI platforms…

社区洞察

其他会员也浏览了