WHY IT MATTERS: Digital Transformation
113.8K views | +139 today
Follow
WHY IT MATTERS: Digital Transformation
Going digital in your business? I select the best posts and highlight the reasons why it matters. Like it? Click "recommend" + register to get the digest in your inbox: http://fmcs.digital/newsletter-signup/
Curated by Farid Mheir
Your new post is loading...
Scooped by Farid Mheir
Scoop.it!

Back-to-the-future and too much time on your hands: create a Slack client for Commodore 64 via @gnat

Back-to-the-future and too much time on your hands: create a Slack client for Commodore 64 via @gnat | WHY IT MATTERS: Digital Transformation | Scoop.it

Slack is great. Manysmarterpeople than me also think that Slack is great. Slack is great because its simple and easier to deal with than emails. With all the time it saves me on emails, I   relax / go the beach / write more code / send messages via Slack instead.

But while Slack might be great, it does not have a great native client for the Commodore 64. In fact, they have no client for Commodore 64 at all!

 

Farid Mheir's insight:

I thought this was just useless and funny at the same time to repurpose old technology for new uses. Maybe there is something here when considering digital transformation and extending life of existing technologies...

 

WHY THIS IS IMPORTANT

That being said, there is so much work involved - write assembler code, build custom hardware - that you have to appreciate how much we have evolved in the past 30 years as this solution can now be developed much more rapidly and much more easily with current tools and technologies.

 

https://scotch.io/tutorials/building-a-slack-clone-in-meteor-js-getting-started 

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Moving large #datasets - Exabyte-Scale - to #AWS requires physical trucks & hard drives

Moving large #datasets - Exabyte-Scale - to #AWS requires physical trucks & hard drives | WHY IT MATTERS: Digital Transformation | Scoop.it

AWS Snowmobile is an exabyte-scale data transfer service used to move extremely large amounts of data to AWS. You can transfer up to 100PB per Snowmobile, a 45-foot long ruggedized shipping container, pulled by a semi-trailer truck. Snowmobile makes it easy to move massive volumes of data to the cloud, including video libraries, image repositories, or even a complete data center migration. Transferring data with Snowmobile is secure, fast and cost effective.

Farid Mheir's insight:

Moving large amounts of data to the cloud - petabytes and exabytes - would take years to do if transferred using networks and the Internet. Amazon provides its customers with dedicated and secure hard drives - they call snowballs - and truck - they call snowmobiles - to move the data from one data center to the next.

 

WHY THIS IS IMPORTANT

There are limits to our network infrastructures and physical solutions often are required to migrate data to the cloud or digitize products. For example scanning paper files or converting books to digital ones often require specialized equipments in order to perform the work rapidly and cost effectively. Google had patented a book scanning equipment in order to create its Google books project in the past. I assume this same kind of innovation will start to happen in other fields as well.

http://www.theverge.com/2012/11/13/3639016/google-books-scanner-vacuum-diy 

https://books.google.com/googlebooks/about/ 

 

More on this here: http://uk.businessinsider.com/amazon-snowmobile-truck-is-a-funny-for-real-product-2016-11 

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Software Helps Police Departments Transform to #digital & Keep Cops On The Street via @forbes

Software Helps Police Departments Transform to #digital & Keep Cops On The Street via @forbes | WHY IT MATTERS: Digital Transformation | Scoop.it

Scott Crouch and his college buddies built Mark43 to help police do their job more efficiently and effectively.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Every industry is being transformed by digital, even those that were not so long ago considered off limit. Great example, the police force, which have systems that date from another era, can now benefit from cheap communication, cloud services, big data and analytics services to deliver mobile police insight and tools using everyday mobile phones and tablets.

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

How #Construction industry is being disrupted by digital via @forbes

How #Construction industry is being disrupted by digital via @forbes | WHY IT MATTERS: Digital Transformation | Scoop.it
Tooey Courtemanche started construction-management software firm Procore Technologies before the recession hit, then rode it out while competitors went by the wayside. Today, he's in the sweet spot as Procore expects $55 million in revenues this year.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Every industry is being transformed by digital, even those that were not so long ago considered off limit. Great example, construction industry, as every small contractor now has a cell phone and good data plan to connect to the cloud. New solutions are popping to take over this opportunity to transform an industry: sharing plans and project evolution with clients, tracking budget in real-time with feeds from material suppliers and even real-time decision making on the construction site. Opportunities are endless...

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

President Obama on #AI, #NationalSecurity & fighting threats using medecine rather than walls via @WIRED

WIRED guest editor President Barack Obama, WIRED editor in chief Scott Dadich and MIT Media Lab director Joi to discuss the challenges of cyber security

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Amazing short 12min video because of the level of understanding that the President of the USA has of the threats that come from AI and other digital means. He has been briefed of course but his discourse and examples shows that these are very important topics on top of mind for him and his administration. Moreover, it raises some concerns on our ability to fight against those threats and the impact they can have on countries and businesses alike. Must listen video IMHO.

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

7 things to do to improve your account #security

7 things to do to improve your account #security | WHY IT MATTERS: Digital Transformation | Scoop.it

How to protect your account security
1.    Stop using one word passwords
2.    Make long and strong passwords
3.    Use unique passwords for every account
4.    Don’t casually share your passwords
5.    Use a password manager to create, remember and enter your passwords
6.    Lock your mobile with a PIN or password.
7.    Enable Two-Factor Authentication

Farid Mheir's insight:

Simple, easy things to do to be more secure. Do it. Today.

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

A #hacker event demonstrates how easy it is to obtain sensitive information using #socialEngineering

A #hacker event demonstrates how easy it is to obtain sensitive information using #socialEngineering | WHY IT MATTERS: Digital Transformation | Scoop.it

The Social Engineering Capture the Flag (SECTF) is an annual event held within the SocialEngineer Village at the DEF CON Hacking Conference in Las Vegas. The competition was formed to demonstrate how serious social engineering threats are to companies and how even novice individuals could use these skills to obtain important information. The contest is divided into two parts, the information-gathering phase that takes place prior to DEF CON, followed by the live call phase that occurs at the DEF CON conference.

Farid Mheir's insight:

This year's DEFCON24 report is full of information about social engineering, the event and methods to protect your organization. This is IMHO a must read for every executive to see how easy it is to breach security of their organization which can potentially result in theft, both physical and digital.

http://www.social-engineer.org/wp-content/uploads/2016/11/Social-Engineer-Capture-The-Flag-DEFCON24-SECTF-2016.pdf 

 

WHY THIS IS IMPORTANT

Often we think that our digital lives or digital transformations must be protected with strong passwords, encryption and other digital security methods. However, time and again the "social engineers" have demonstrated that the weakest link in the chain often are the individuals, employees and partners that voluntarily divulge sensitive information. And this, no technology can prevent and companies must invest in training their employees to detect the social engineering methods and respond with appropriate actions when such techniques are being tested on them.

more...
Xixi QU's curator insight, November 27, 2016 4:06 AM
This year's DEFCON24 report is full of information about social engineering, the event and methods to protect your organization. This is IMHO a must read for every executive to see how easy it is to breach security of their organization which can potentially result in theft, both physical and digital.http://www.social-engineer.org/wp-content/uploads/2016/11/Social-Engineer-Capture-The-Flag-DEFCON24-SECTF-2016.pdf WHY THIS IS IMPORTANTOften we think that our digital lives or digital transformations must be protected with strong passwords, encryption and other digital security methods. However, time and again the "social engineers" have demonstrated that the weakest link in the chain often are the individuals, employees and partners that voluntarily divulge sensitive information. And this, no technology can prevent and companies must invest in training their employees to detect the social engineering methods and respond with appropriate actions when such techniques are being tested on them.
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

Kill the Password: A String of Characters Won't Protect You

Kill the Password: A String of Characters Won't Protect You | WHY IT MATTERS: Digital Transformation | Scoop.it
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters that can reveal everything about you.

 

DON’T

  • Reuse passwords. If you do, a hacker who gets just one of your accounts will own them all.
  • Use a dictionary word as your password. If you must, then string several together into a pass phrase.
  • Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now have those built in.
  • Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password.

DO

  • Enable two-factor authentication when offered. When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it’s better than nothing.
  • Give bogus answers to security questions. Think of them as a secondary password. Just keep your answers memorable. My first car? Why, it was a “Camper Van Beethoven Freaking Rules.”
  • Scrub your online presence. One of the easiest ways to hack into an account is through your email and billing address information. Sites like Spokeo and WhitePages.com offer opt-out mechanisms to get your information removed from their databases.
  • Use a unique, secure email address for password recoveries. If a hacker knows where your password reset goes, that’s a line of attack. So create a special account you never use for communications. And make sure to choose a username that isn’t tied to your name—like m****n@wired.com—so it can’t be easily guessed.
Farid Mheir's insight:
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters that can reveal everything about you.

 

DON’T

  • Reuse passwords. If you do, a hacker who gets just one of your accounts will own them all.
  • Use a dictionary word as your password. If you must, then string several together into a pass phrase.
  • Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now have those built in.
  • Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password.

DO

  • Enable two-factor authentication when offered.When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it’s better than nothing.
  • Give bogus answers to security questions. Think of them as a secondary password. Just keep your answers memorable. My first car? Why, it was a “Camper Van Beethoven Freaking Rules.”
  • Scrub your online presence. One of the easiest ways to hack into an account is through your email and billing address information. Sites like Spokeo and WhitePages.com offer opt-out mechanisms to get your information removed from their databases.
  • Use a unique, secure email address for password recoveries. If a hacker knows where your password reset goes, that’s a line of attack. So create a special account you never use for communications. And make sure to choose a username that isn’t tied to your name—like m****n@wired.com—so it can’t be easily guessed.
Farid Mheir's insight:

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

more...
Online Marketing Man's curator insight, March 20, 2016 1:11 PM

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

jasmine moriah gabrielle hummel's curator insight, March 21, 2016 11:44 AM

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

jasmine moriah gabrielle hummel's curator insight, April 6, 2016 7:40 PM
DON’T •Reuse passwords. . •Use a dictionary word as your password. •Use standard number substitutions. •Use a short password DO •Enable two-factor authentication when offered. •Give bogus answers to security questions. •Scrub your online presence. •Use a unique, secure email address for password recoveries
Scooped by Farid Mheir
Scoop.it!

Google warns journalists and professors: Your account is under attack

Google warns journalists and professors: Your account is under attack | WHY IT MATTERS: Digital Transformation | Scoop.it
A flurry of social media reports suggests a major hacking campaign has been uncovered.
Farid Mheir's insight:

Google is warning individuals that their Google accounts are being hacked - even if they turned on 2-factor authentication.

 

WHY THIS IS IMPORTANT

This news stories highlights some very important security and privacy elements:

1- Google is actively protecting security and privacy of high profile individuals which is reassuring because only they have the size and scope to fight state-funded hacking

2- I always believed 2-factor authentication was a good way to protect your digital self: looks like I was wrong. More on this later...

3- Google has been doing this since 2012, so the whole thing is not new but recent DDoS attacks using Internet of Things devices (cameras, etc.) demonstrates that hackers now have new, very effective hacking tools and they are using it.

more...
bumminluna's comment, November 25, 2016 9:53 PM
Thats astonishing...
Scooped by Farid Mheir
Scoop.it!

Great. Now Even Your #Headphones Can #Spy on You: turning speakers into microphones via @gnat

Great. Now Even Your #Headphones Can #Spy on You: turning speakers into microphones via @gnat | WHY IT MATTERS: Digital Transformation | Scoop.it
Israeli researchers show that even if you're paranoid enough to remove your computer's microphone, malware can convert your headphones into spy bugs.
Farid Mheir's insight:

A vulnerability in always on devices that listen to our every words can be turned into a spy tool.

 

WHY THIS IS IMPORTANT

We are surrounded by "always on" devices - from Apple Siri and Airpods to Google NOW to Amazon echo. They listen to your every word looking for keywords such as "siri" or "OK google". Using those features one should assume the device is listening all the time and potentially recording to the cloud our conversations, which has a number of people quite scared including this Guardian article named "Goodbye privacy".

https://www.theguardian.com/technology/2015/nov/21/amazon-echo-alexa-home-robot-privacy-cloud 

 

Here we are faced with an exploit that enables speakers - which everyone thinks of as an output device - to become listening devices. Any engineer knows that speakers and microphones work based on the same electromagnetic principle. However this exploit is special because it transforms the output port on the computer into an input port, allowing speakers to become microphones. And then record everything, compress it and send it to the cloud where it can be used for spying or other purpose.

 

The end of privacy is closer than it has ever been...

more...
bumminluna's comment, November 25, 2016 9:53 PM
Its fabulous
Scooped by Farid Mheir
Scoop.it!

Wal-Mart Tackles #FoodSafety With Trial of Blockchain and bring food traceability to new levels

Wal-Mart Tackles #FoodSafety With Trial of Blockchain and bring food traceability to new levels | WHY IT MATTERS: Digital Transformation | Scoop.it

The sliced apples or cut broccoli -- the merchant won’t say what’s involved exactly -- are being used to test blockchain, a new database technology. If successful, the trial could change how Wal-Mart Stores Inc., which serves some 260 million customers a week, monitors food and takes action when something goes wrong. That could spur big leaps in food safety, cut costs and save lives.

Farid Mheir's insight:

WalMart is testing a new food traceability solution co-developed by IBM using blockchain technology.

 

WHY THIS IS IMPORTANT

Blockchain, the technology behind the bitcoin currency is being actively enhanced to be used for other application than Finance or payment. In this particular case, food retailers may find that using this technology will improve traceability of food products and facilitates recalls when they are needed. The fact that WalMart embraces it so early probably means the current systems are not very efficient and that there are opportunities to reduce costs and improves brand image and reduce liabilities. Digital transformation does mean more than just being present on social networks and improving marketing.

 

Read more about it :

  1. Understand blockchain in 2 min: http://fmcs.digital/blog/understand-the-blockchain-in-2-minutes/
  2. How blockchain can change the world: http://fmcs.digital/blog/how-blockchains-could-change-the-world-not-just-banking/ 
  3. Editing the blockchain: http://fmcs.digital/blog/editing-the-uneditable-blockchain-accenture/ 
  4. Chain block blog: http://fmcs.digital/blog/chain-blog-a-blog-dedicated-to-blockchain-technology-and-innovation/ 
  5. Bitfinex lost 120K bitcoins: http://fmcs.digital/blog/hong-kong-bitcoin-exchange-bitfinex-loses-nearly-120000-bitcoins-in-hack/ 
more...
Scooped by Farid Mheir
Scoop.it!

From Carrefour to Nordstrom: 25 #Retailers Nailing it with their #Proximity Marketing Campaigns #beacons

From Carrefour to Nordstrom: 25 #Retailers Nailing it with their #Proximity Marketing Campaigns #beacons | WHY IT MATTERS: Digital Transformation | Scoop.it

Unacast’s latest Q4 Proxbook report confirms that beacon deployments are on track and the numbers align with ABI Research’s forecast of 400 million beacons to be deployed by 20201. Last year, we saw big brands undertaking large scale beacon deployments. And, this year started with Rite Aid’s announcement of initiating the largest beacon-deployment in a retail setting till date. Discover the top 25 proximity marketing campaigns in retail and what they are doing right.

Farid Mheir's insight:

A review on real-life beacon deployments in retail store tends to demonstrate a resurgence of proximity geographic location tracking.

 

WHY THIS IS IMPORTANT

Digital transformation strategies require that customers are tracked in the real world as much as they are in the web-world. This often means that the mobile devices we carry enable a seamless digital communication - tools to push promotions and notifications while we walk the street or store aisles. To do so, retailers must know where you are and geofencing is not enough anymore. Beacons come to the rescue and mobile OSes - both Apple and Google - now build into their APIs very good location services which allow mobile app developers ways to connect with users in a very personal way. Using GPS location is not sufficient, especially indoors, so beacons are a must and reports such as this one show that our physical world has become a forest of digital beacons to track our every moves. We all thought this technology was dead after the initial failure of the 2013 Apple announcement. However, all retailers should now include geolocation and proximity tracking in their digital strategies and mid-term roadmaps, as it has apparently moved from the lab to the real world.

 

More on location services in the OSes, see the following links:

 

https://developer.apple.com/library/content/documentation/UserExperience/Conceptual/LocationAwarenessPG/Introduction/Introduction.html#//apple_ref/doc/uid/TP40009497-CH1-SW1

 

https://developer.android.com/guide/topics/location/index.html 

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Akamai on the Record KrebsOnSecurity #DDoS Attack via @BrianKrebs @Akamai

Akamai on the Record KrebsOnSecurity #DDoS Attack via @BrianKrebs @Akamai | WHY IT MATTERS: Digital Transformation | Scoop.it

Internet infrastructure giant Akamai last week released a special State of the Internet report. Normally, the quarterly accounting of noteworthy changes in distributed denial-of-service (DDoS) attacks doesn’t delve into attacks on specific customers. But this latest Akamai report makes an exception in describing in great detail the record-sized attack against KrebsOnSecurity.com in September, the largest such assault it has ever mitigated.

Farid Mheir's insight:

Describes recent DDoS attacks and provides links to Akamai State of the Internet report, a very useful reference.

 

WHY THIS IS IMPORTANT

Going digital often means relying on the Internet for critical business operations. This article is a stark reminder of the need to put security on the top of priority list.

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

We Need a Better Way to #Visualize People’s #Skills via @hbr

We Need a Better Way to #Visualize People’s #Skills via @hbr | WHY IT MATTERS: Digital Transformation | Scoop.it
The “competency grid” is a promising new tool.

By 2020, the US economy is expected to create 55 million job openings: 24 million of these will be entirely new positions. And 48 percent of the new jobs, according to Georgetown’s Center on Education and the Workforce, will emphasize a mix of hard and soft intellectual skills, like active listening, leadership, communication, analytics, and administration competencies.

Farid Mheir's insight:

A review of the most in-demand skills and the way to visualize them to more clearly identify and rate potential new hires.

 

WHY THIS IS IMPORTANT

The article shows the gitHub contribution profile in the chart clearly shows that Alex is a more constant contributor than Dana and that he may have better skills for a computer programming job. what if if was possible to "visualize" the skills of your employees and prospects based on data and metric such as this one? We would then be in a better position to hire and promote the right individuals based on their true skillset and unbiased data.

more...
Bourgade's curator insight, November 22, 2016 2:57 AM

A review of the most in-demand skills and the way to visualize them to more clearly identify and rate potential new hires.

 

WHY THIS IS IMPORTANT

The article shows the gitHub contribution profile in the chart clearly shows that Alex is a more constant contributor than Dana and that he may have better skills for a computer programming job. what if if was possible to "visualize" the skills of your employees and prospects based on data and metric such as this one? We would then be in a better position to hire and promote the right individuals based on their true skillset and unbiased data.

Scooped by Farid Mheir
Scoop.it!

2016 pre- #Thanksgiving #retail survey shows #omnichannel #webrooming #showrooming always must-haves v @Deloitte

2016 pre- #Thanksgiving #retail survey shows #omnichannel #webrooming #showrooming always must-haves v @Deloitte | WHY IT MATTERS: Digital Transformation | Scoop.it

Explore consumer attitudes and trends about Black Friday retail this year in our latest report. Our pre-Thanksgiving survey polled more than 1,200 consumers across the United States to get a pulse check on their shopping strategy for the long Thanksgiving weekend that includes Black Friday and Cyber Monday. This year 76 percent of holiday shoppers plan to shop over the long weekend, spending an average of $400—that is $31 more than last year.

Farid Mheir's insight:

Deloitte survey on Thanksgiving weekend forecast.

 

WHY THIS IS IMPORTANT

Always interesting to look at the forecast then compare with actual numbers. In the past, the pattern was clear: people move their holiday shopping online. What is also interesting is in the chart above about webrooming and showrooming: physical stores continue to play a big role and that is why omni-channel technologies are more important than never.

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

#DeepLearning for complete beginners: Recognising handwritten digits by Cambridge Coding Academy

#DeepLearning for complete beginners: Recognising handwritten digits by Cambridge Coding Academy | WHY IT MATTERS: Digital Transformation | Scoop.it

Welcome to the first in a series of blog posts that is designed to get you quickly up to speed with deep learning; from first principles, all the way to discussions of some of the intricate details, with the purposes of achieving respectable performance on two established machine learning benchmarks: MNIST (classification of handwritten digits) and CIFAR-10 (classification of small images across 10 distinct classes—airplane, automobile, bird, cat, deer, dog, frog, horse, ship & truck).

Farid Mheir's insight:

Very technical series of articles on deep learning coding techniques. Useful to read even if you have only limited DL coding experience because it pulls the covers from over a very new way of coding - especially for old nerds like me!

 

part 1: http://online.cambridgecoding.com/notebooks/cca_admin/deep-learning-for-complete-beginners-recognising-handwritten-digits 

part 2: http://online.cambridgecoding.com/notebooks/cca_admin/convolutional-neural-networks-with-keras 

part 3: http://online.cambridgecoding.com/notebooks/cca_admin/neural-networks-tuning-techniques 

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Security and efficiency in a world beyond passwords

Security and efficiency in a world beyond passwords | WHY IT MATTERS: Digital Transformation | Scoop.it
A world beyond passwords is possible--technology is on the verge of rendering passwords obsolete, bolstering security as well as making users and customers happier.
Farid Mheir's insight:

A very good review of the limitations of passwords and the multiple new methods we will have to enhance our digital security.

 

WHY THIS IS IMPORTANT

To go digital, being secure is very high on the list of priorities. Maslow had put security as the second layer in the pyramid of needs - and I believe this is also true in the new pyramid of digital needs!

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Users #Computer #Skills is Worse Than You Think: only 33% of population has high or medium via @shufflepath

Users #Computer #Skills is Worse Than You Think: only 33% of population has high or medium via @shufflepath | WHY IT MATTERS: Digital Transformation | Scoop.it
Across 33 rich countries, only 5% of the population has high computer-related abilities, and only a third of people can complete medium-complexity tasks.
Farid Mheir's insight:

A study of 250K people over 2011-2015 timeframe across 33 countries in OECD shows that most users can barely operate their computer of mobile phone.

 

WHY THIS IS IMPORTANT

Digital transformation strategies and roadmap often fail to allocate sufficient effort/budget/time/resources to accompany employees and users with the proper change management. This study shows why: most people don't know how to perform simple computer tasks. Put them in front of a new software or technology and they will fail, or even worse, they will discredit the solution so as not to show their inability. Accompany them and recognize that they need help and they will succeed in their transition. And you will succeed in your digital transformation.

more...
gatherhazards's comment, November 16, 2016 9:41 PM
good
Scooped by Farid Mheir
Scoop.it!

Digital #Disruption in #Telecos is still to come- discussion may apply to many other industries @DirkRohweder

Digital #Disruption in #Telecos is still to come- discussion may apply to many other industries @DirkRohweder | WHY IT MATTERS: Digital Transformation | Scoop.it

I recently had the pleasure to meet Pilgrim Beart now the CEO of devicepilot at a TM Forum workshop about the Internet of Everything (IoE) business models and monetization. He shared his story about alert.me an early connected home start up founded in 2006 that was sold in 2015 to British Gas for 100 million €.

He said that they were in intensive discussion with three industries: utilities, retail (DIY chains) and Telcos, as he felt for all three of them there was a huge potential to build a platform on top of their core business. Despite trialing and piloting with all three industries only the efforts with Telcos never led to any real-life implementations.

Farid Mheir's insight:

A very interesting article on the changes that could happen in the telecom industry with the evolution towards Internet of Things and 5G technologies.

 

WHY THIS IS IMPORTANT

The paper highlights many important questions and decisions that players in the telecommunication industry must answer. I argue that similar questions must also be had in other industries, such as in Retail for example. 

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Inside the digital boardroom: are digital skills and competences must-have or nice-to-have?

Inside the digital boardroom: are digital skills and competences must-have or nice-to-have? | WHY IT MATTERS: Digital Transformation | Scoop.it

The dawning of the digital era is the latest in a long series of innovation-led disruptions, and, as with past disruptions, it is the board’s responsibility to decide which skills and competencies to add in response, and how best to do so.

Farid Mheir's insight:

Heidrick & Struggles provides some insight on how to best determine if digital skills are required in the boardroom. In particular they raise the important of digital advisory boards.

 

WHY THIS IS IMPORTANT

Digital and technology transformation should be part of every board member checklist as the digital transformation requires support at the highest level.

more...
No comment yet.
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

A world where everything is hackable via @Strata @acroll

A world where everything is hackable via @Strata @acroll | WHY IT MATTERS: Digital Transformation | Scoop.it

Let’s say you fancy a fast car. Flavio Garcia, a University of Birmingham computer scientist, discovered the algorithm that verifies the ignition key for luxury cars like Porsches, Audis, Bentleys, and Lamborghinis. He was slapped with an injunction to ban him from disclosing his findings at the Usenix Security Symposium in order to prevent sophisticated criminal gangs from having the analytics tools for widespread car theft.

You might need Garcia’s algorithm to steal a car, but soon, with an entirely different algorithm, you may be able to crash one into a tree or disable its brakes from a distance. Or maybe it’s a fast boat you’re after. Mess with its GPS, and you can steer it where you want without the crew noticing.

Farid Mheir's insight:

This post is full of very relevant and useful links. Building on what is in this piece, I suggest the following to get a feel for the evil side of these hacks. 

 

Listen to the 60 minutes report on the stuxnet and the flame viruses, which were recently used to attack nuclear facilities in Iran. Also read an interesting report during a recent security conference of simulated attacks on an oil rig or another post on potential security concerns with airplanes.

 

WHY THIS IS IMPORTANT

Digital transformations ultimately will mean everything will be digital - corporations, things, and most of what people see and do. And when you get to 100% digital and 100% connected, some of what Alistair is describing will become common place.

more...
Farid Mheir's curator insight, August 30, 2013 10:01 AM

This post is full of very relevant and useful links. Building on what is in this piece, I suggest the following to get a feel for the evil side of these hacks. 


Listen to the 60 minutes report on the stuxnet and the flame viruses, which were recently used to attack nuclear facilities in Iran. Also read an interesting report during a recent security conference of simulated attacks on an oil rig or another post on potential security concerns with airplanes.


Digital transformations ultimately will mean everything will be digital - corporations, things, and most of what people see and do. And when you get to 100% digital and 100% connected, some of what Alistair is describing will become common place.



Felix Cheang's curator insight, November 13, 2016 7:36 PM

As long as there is a chip inside, anything is hackable....

Scooped by Farid Mheir
Scoop.it!

Facebook DID influence the #Elections via @Mike_K_Spencer

Facebook DID influence the #Elections via @Mike_K_Spencer | WHY IT MATTERS: Digital Transformation | Scoop.it

It's hard to imagine, just twelve years ago, that the media would have been reduced to Facebook, degenerated into what we have today.

Farid Mheir's insight:

An interesting overview of the impact that social media, Facebook in particular may have had in the elections. Not sure if that is the case but for sure the world of media has evolved tremendously.

more...
SofiJukeMari's curator insight, November 13, 2016 1:52 PM
Share your insight
Scooped by Farid Mheir
Scoop.it!

Google Project #Tango demonstrates how to buy WayFair furniture in #AugmentedReality #eCommerce #GoogleIO

Project Tango unleashes a new way for you to explore the world. With a few sensors and some computer vision software, your phone gets even smarter, and can start to see the world the way you do. Follow guided arrows to know which exit to take when you get off the subway, see how a sofa looks in your living room before you buy it, or watch zombies battle on your dining table. In this session, we explore the vision of Project Tango and how it will come to life with the launch of our first consumer phone, announced earlier this year.

Farid Mheir's insight:

A video from Google demonstrates how to drop virtual furniture in your home environment, make sure it fits in the room then buy it directly from the augmented reality scene. The eCommerce segment starts at 17m16s

 

WHY THIS IS IMPORTANT

Augmented reality has the potential to revolutionize businesses much before Virtual Reality because it can so seamlessly add to your existing world. The video shows examples of an AR measuring tape that can also be used in an commerce setting. Other uses for AR in the business context, to review floor plans and planograms in retail settings, or help with repairs have been proposed in the past. Some Google glasses videos demonstrated some interesting use cases. It now looks like our mobile phone will in fact be carrying the necessary hardware to make AR a reality much sooner than anyone may have anticipated...

 

See also:

field repair, parcel delivery and other usage for google glasses: http://fmcs.digital/blog/google-glass-will-be-more-successful-among/ 

IKEA AR via its 2013 catalog: http://fmcs.digital/blog/augmented-reality-catalog-places-ikea-furniture-in/

translation AR: http://fmcs.digital/blog/looking-for-google-glass-killer-apps-via-mit/ 

google glass in operating rooms: http://fmcs.digital/blog/google-glass-finds-its-way-to-the-operating-room/ 

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Store Of The Future: 133 Startups Transforming Brick-And-Mortar Retail In One Infographic

The Store Of The Future: 133 Startups Transforming Brick-And-Mortar Retail In One Infographic | WHY IT MATTERS: Digital Transformation | Scoop.it
Startups are outfitting retailers with augmented reality, beacons, wearables, and more to bridge the gap between digital and physical shopping.
Farid Mheir's insight:

An inventory of technologies that can be deployed in retail stores.

 

WHY THIS IS IMPORTANT

Retail stores are being transformed by digital technology. Apple stores have shown that retail space today is more than a warehouse where customers fulfill orders. Today's store must also demonstrate products, educate customers and provide customer service. Store must also fulfill orders, although that should preferably be done online. In that context, stores leverage technologies to communicate with their customers, inform them, as well as provide an omni-channel experience.

Choosing the right technology to deploy is a challenge, but my experience has shown that the overall retail store business model must be reviewed to ensure the right content, support and service is made available. 

more...
Deborah Ben's curator insight, November 11, 2016 7:49 PM

An inventory of technologies that can be deployed in retail stores.

 

WHY THIS IS IMPORTANT

Retail stores are being transformed by digital technology. Apple stores have shown that retail space today is more than a warehouse where customers fulfill orders. Today's store must also demonstrate products, educate customers and provide customer service. Store must also fulfill orders, although that should preferably be done online. In that context, stores leverage technologies to communicate with their customers, inform them, as well as provide an omni-channel experience.

Choosing the right technology to deploy is a challenge, but my experience has shown that the overall retail store business model must be reviewed to ensure the right content, support and service is made available. 

Scooped by Farid Mheir
Scoop.it!

An #eBookon Best Practices for E-Signature Deployment around the work via @Kofax

An #eBookon Best Practices for E-Signature Deployment around the work via @Kofax | WHY IT MATTERS: Digital Transformation | Scoop.it

Although there are important differences in specific laws governing contracts, it’s generally universally accepted that for a contract to be binding and enforceable, that contract must capture the binding intent of the parties, no matter what law is applied.

Farid Mheir's insight:

An ebook that presents e-signature options, risks and rundown on where they are accepted worldwide. A great reference when planning digital transformation to include digital signature and its legal implications.

 

WHY THIS IS IMPORTANT

Digital transformation often means going paperless, or at the very least reduction in time it takes to digitize in order to reduce process duration and overall speed things up. This ebook provides valuable insights and guidance to help prepare for this, especially in large organizations that have global coverage and clients/partners.

more...
No comment yet.
Curated by Farid Mheir
Digital technology consultant. Register to my free email newsletter: http://fmcs.digital/newsletter-signup/