How (cyber) secure are you?
Ron Immink
I empower innovative, purpose driven companies by crafting compelling visions for the future. Make them more compelling for all stakeholders. Strategist, positive futurist, coach, advisor, mentor, author and speaker.
These prompts are a way to develop responses to trends and train your change muscle, making you more resilient and agile for the future. If you need help with developing these prompts, you can book a free appointment here. If you want me to speak at your event, contact me at [email protected]
Digital transformation mindcandy 24 February 2025
Today’s topics are IoT, customer data, TM Forum’s Level 5 Automation, data, medallion architecture, CDAOs, and cyber security.
How (cyber) secure are you?
Redefining smart living: IoT in the hi-tech world
IoT is quietly and profoundly transforming the way we live and work. From consumer devices to large-scale industrial systems, we are witnessing a growing adoption across the?global landscape.
Are Customer Data Platforms the Missing Link to Omnichannel Marketing Success?
Marketers rely on CDPs to collect, unify, organize and analyze customer data, but the onus is still on them to manage fragmented data.
Orchestrating the future of fully autonomous networks with GenAI
TM Forum’s Level 5 Automation: a fully autonomous network, meaning the network operates completely independently with closed-loop automation across all services, domains, and lifecycle stages, requiring minimal to no human intervention.
Data is very valuable, just don't ask us to measure it, leaders say
After fifteeen years decade of big hype, less than 25% of orgs measure value of data, analytics
Medallion Architecture: A Layered Data Optimization Model
Medallion architecture is an effective framework for financial sector data management with a layered approach to optimize data flow and ultimate consumption.
Gartner Survey Finds One-Third of CDAOs Cite Measuring Data, Analytics and AI Impact as Top Challenge
There is a massive value vibe around data, where many organizations talk about the value of data, desire to be data-driven, etc., but there are few who can substantiate it.
Lock All The Doors: The Cybersecurity Risks Of Overlooked Devices In Computer Networks