May 15, 2024

May 15, 2024

Why Capability-Based IT Investments Planning Doesn’t Work for Enterprises Today

Capability-based Planning has been around for long in the world of Enterprise Architecture (EA), and often finds a mention in leading EA frameworks. At its core is the concept of “business capability” (or simply “capability”) which represents the “what” that the business does. This is different from the “how” of the business, which is represented by constructs such as business processes, value streams, and value chains. ... Capability-based IT planning approaches are typically linear and spread over years. They do not consider the real and dynamic nature of the enterprises of today, wherein new themes such as Product Management, Agile enterprise, and AI-led business disruption require continuous introspection and adaptation to evolving industry practices and customer preferences. ... The product roadmap provides prioritised inputs for the landscape to respond to. The good thing here is that such roadmaps typically have clarity up to a few quarters ahead (up to 1- 2 years generally), with the initial quarters being more concrete and stable as opposed to the later quarters. When combined with EA-driven landscape impact analysis, the resulting IT initiatives are much more aligned to the dynamics of the business.


Evolving Roles: Developers and AI in Coding

The increasing use of AI in software development is causing a paradigm shift in the jobs of developers. Developers are evolving from being merely code writers to orchestrators of technology, strategists, and leaders of innovation. This calls for adjusting to new roles that prioritize higher-level decision-making, problem characterization, and system design. One of the changes involves that the developers need to be skilled in incorporating and tailoring AI tools into their workflow. This entails knowing the possibilities and limitations of these instruments in addition to being able to use them. Developers can devote their time to more complicated and valuable operations by becoming proficient with these technologies and freeing up time from repetitive jobs. As AI assumes greater responsibility for the technical coding process, soft skills like project management, communication, and creative problem-solving become more crucial. Developers need to be multidisciplinary collaborators, proficient communicators with non-technical team members, and project managers of both people and technology.


Why is embedded insurance so popular right now?

“Consumers get good value with embedded insurance for two main reasons. The first is trust. Customers want to buy insurance products from their trusted brands, not financial services and insurance organisations. Through embedded solutions, customers can stick to shopping with and purchasing from the brands they love and trust. There is also no need to head to a physical outlet to buy insurance – customers get protection at the exact point of sale and the service or product will be covered instantly. There is a lot of value in this ease and simplicity. Embedded solutions do a lot of the hard work and it means safeguarding what you care about is no more complicated than ticking a box on purchase. The second reason is data. Embedded insurance utilises customer data to provide bespoke costs and policies. Thanks to technology such as open banking APIs (which facilitate the data transfer between entities), tech players can assess the preferences of users, their needs and financial behaviour. Embedded insurance platforms can therefore make informed decisions and provide diverse and tailored offerings to consumers based on their risk profiles.?


Understanding the Modern Data Stack

The architecture of a modern data stack is meticulously designed to ensure utmost flexibility and seamless integration, thereby revolutionizing the workflow for businesses. The hallmark of such an advanced system lies in its ability to adapt to the evolving demands of data processing and analysis. This flexibility is not just limited to handling diverse data types but also extends to its capability to integrate with a myriad of tools and platforms. Integration plays a pivotal role in enhancing this ecosystem, acting as the glue that binds all components of the data stack together. It ensures that data flows smoothly from one process to another without bottlenecks, enabling real-time analytics and insights. This interconnectedness allows for a holistic view of operations, making it easier for businesses to make informed decisions quickly. ... Ensuring Data Quality and security while maintaining cross-platform compatibility forms a cornerstone of the modern data stack. This holistic approach integrates various components, from databases and analytics tools to data integration and visualization platforms, ensuring seamless interoperability across different environments.?


Private cloud makes its comeback, thanks to AI

Private cloud providers may be among the key beneficiaries of today’s generative AI gold rush as, once seemingly passé in favor of public cloud, CIOs are giving private clouds — either on-premises or hosted by a partner — a second look. At the center of this shift is increasing acknowledgement that to support AI workloads and to contain costs, enterprises long-term will land on a hybrid mix of public and private cloud. ... Todd Scott, senior vice president for Kyndryl US, acknowledges that AI and cost are among the key factors driving enterprises toward private clouds. “Most enterprises are currently exploring AI on the public cloud, but we expect clients will ultimately bring the app to their data and run AI where the data is, in private environments and at the edge,” he says. “Another factor that’s driving a move back to private cloud is predictability of cost,” Scott says. “Agile enterprises, by definition, make frequent changes to their applications, so they sometimes see big fluctuations in the cost of having their data on public clouds. Private clouds provide more predictability because the infrastructure is dedicated.”


CISOs Reconsider Their Roles in Response to GenAI Integration

The rise of AI and generative AI tools is a double-edged sword. “On one hand, it’s increasing their organizations’ threat exposure because cybercriminals can now use generative AI tools to rapidly scale their attacks,” said Mike Britton, CISO of Abnormal Security. “On the other hand, CISOs also have a valuable opportunity to leverage AI in strengthening their defenses.” GenAI can help enhance security content creation, security testing and analytics, incident response, and forensics. AI and machine learning can play a role in that, Britton pointed out, by ingesting signals from across the email and SaaS environment and deeply understanding normal behavior across this ecosystem. “AI models can then be used to detect anomalous activity and understand when a message or an event may be malicious,” Britton said. “This can help security teams detect more attacks at a faster speed, ensuring that threat actors never successfully reach their targets.” Jose Seara, CEO and founder of DeNexus, pointed out that modern cybersecurity solutions are already AI-enabled and take advantage of AI’s data processing power to make sense of a large volume of cybersecurity signals.?

Read more here ...

要查看或添加评论,请登录

Kannan Subbiah的更多文章

  • November 25, 2024

    November 25, 2024

    GitHub Copilot: Everything you need to know GitHub Copilot can make inline code suggestions in several ways. Give it a…

  • November 24, 2024

    November 24, 2024

    AI agents are unlike any technology ever “Reasoning” and “acting” (often implemented using the ReACT — Reasoning and…

  • November 23, 2024

    November 23, 2024

    AI Regulation Readiness: A Guide for Businesses The first thing to note about AI compliance today is that few laws and…

  • November 22, 2024

    November 22, 2024

    AI agents are coming to work — here’s what businesses need to know Defining exactly what an agent is can be tricky…

  • November 21, 2024

    November 21, 2024

    Building Resilient Cloud Architectures for Post-Disaster IT Recovery A resilient cloud architecture is designed to…

  • November 20, 2024

    November 20, 2024

    5 Steps To Cross the Operational Chasm in Incident Management A siloed approach to incident management slows down…

  • November 19, 2024

    November 19, 2024

    AI-driven software testing gains more champions but worries persist "There is a clear need to align quality engineering…

  • November 18, 2024

    November 18, 2024

    3 leadership lessons we can learn from ethical hackers By nature, hackers possess a knack for looking beyond the…

  • November 17, 2024

    November 17, 2024

    Why Are User Acceptance Tests Such a Hassle? In the reality of many projects, UAT often becomes irreplaceable and needs…

  • November 16, 2024

    November 16, 2024

    New framework aims to keep AI safe in US critical infrastructure According to a release issued by DHS, “this…

社区洞察

其他会员也浏览了