5 ways to build a smarter enterprise

ByLois V. Aguirre

May 15, 2022 #3rd Wave Of Technology, #Active Mind Technology Steve Suda, #Adia Technology Limited, #Anxiety Caused By Technology, #Aum Technology Job Openings, #Best Books On Licensing Technology, #Best Us Companies Drivetrain Technology, #Boulder Creek Ca Technology Companies, #Bounce Box Technology, #Bridgerland Applied Technology College Cafeteria, #Cisco Technology News, #Comcast Comcast Technology Internship Program, #Complete Automated Technology, #Defence Technology News, #Definition Information Technology System, #Digital Technology, #Digital Technology Pdf, #Director, #Dxc Technology Malaysia Sdn Bhd, #Emerging Technology In Healthcare 2019, #Energy Efficient Home Technology, #Environmental Technology 2019, #Esl Information Technology Vocabulary, #Farming Technology Replacing People, #I.T. Information Technology, #Information Technology Residency Programs, #Issue With Holographic Counterfeiting Technology, #La Crosse Technology 9625 Manual, #La Crosse Technology C89201 Manual, #Lane Dedection Technology, #Long Quotes About Technology, #Micron Technology San Francisco, #Modern Steel Mill Technology, #Nc Lateral Entry Technology, #New Technology Replaces Wifi, #Russian Technology City, #Shenzhen Nearbyexpress Technology Development, #Stackoverflow Resume With Technology Interests, #State Agency For Technology, #Teacher Comfort With Technology Survey, #Technology Companies In Southwest Florida, #Technology Credit Union Address, #Technology In Mercedes Glc, #Technology Material Grant For College, #Technology Meibomian Lid, #Technology Production And Cost, #Treehouse Education Technology, #Western Technology Center Sayre Ok, #What Is Jet Intellagence Technology, #Why Women In Technology, #Will Technology Take Away Libraries

[ad_1]

We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 – 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!


The original SMART system was designed in the 1990s to help computer users avoid unexpected hard drive crashes. In the subsequent decades, this idea of “Self-Monitoring, Analysis, and Reporting Technology” has flourished and expanded far beyond the 1s and 0s on magnetic platters. The concept — and lowercase version of the name — is now applied to everything from coffeemakers to buildings to sustainability efforts.

Smart devices have assimilated easily into consumers’ lives, but enterprises often labor to integrate this approach into organizational processes and practices. Technologies such as artificial intelligence (AI), internet of things (IoT), and machine learning, make smart devices and systems even more powerful and effective. The complexity hampers organizational efforts to become the smart enterprises needed to compete and succeed long-term. However, best practices have been developed to help tame the complexity. 

1. Establish guiding principles

Enterprises risk wandering aimlessly if they don’t create a map to guide them in the right direction. This step is particularly critical to smart technologies since they rely heavily on interconnectedness. One wrong turn can throw you completely off course.

An organization’s guiding principles must include:

Construction —Incorporate sustainability in every step of the process; prioritize efficiency in all areas; secure the users’ needs; adapt to changing preferences; and engage with the user and community in a meaningful way.

Technology — Secure and protect all entry points through advanced cybersecurity; learn from data to anticipate the needs of users and facilities, and ensure accessibility and interoperability throughout the organization.

Experience — Create inclusive persona experiences for all affected stakeholders, from employees to customers to executives to communities; personalize user experiences; remove user friction and barriers; and develop an environment conducive to productivity.

2. Take a systems design approach

A new model is needed to solve complex problems like sustainability, which considers the multiple systems where a problem exists. Systems design allows you to solve actual problems rather than temporarily relieve symptoms. Enterprises can deconstruct problems into their constituent elements. Large, seemingly unmanageable problems are converted into a series of more manageable ones. Frameworks then help sort through the tangle of interactions that influence how the entire system operates.

In this case, organizations look holistically at the systems, processes, and personas that need to be addressed — rather than focusing on individual systems or use cases. Applied systems design takes into account interfaces, architecture, and data points based on problem type and context.

Ultimately, this approach will result in practical solutions that will be accepted by the users and society as a whole.

3. Prioritize privacy

The principles of privacy by design allow organizations to move beyond existing policies and regulations. In this approach, privacy is a core consideration during the design and architecture stages for all business processes, applications, products, and technologies. This is particularly critical in increasingly interconnected systems.

Privacy by design embraces a variety of concepts, including:

  • Privacy — Make this the default mode.
  • Functionality and data privacy — Value both equally.
  • End-to-end security — Incorporate across the information life cycle.
  • Transparency and visibility —Provide to all stakeholders.

4. Define and enforce clear security guidelines

Much like privacy, security must be considered at all stages to ensure there is user trust. Security by design offers a way to develop clear guidelines. 

Identity services are needed to authenticate users in a centralized or federated model. These foundational services must cover key stakeholders — employees, customers, partners — and offer anytime, anywhere flexibility.

Zero trust architecture is needed to fill gaps in traditional perimeter-based security, which was not designed with today’s hybrid cloud and edge systems in mind. This approach allows an enterprise to apply security controls and checks across all architectural layers and interactions.

Multi-cloud and data security require different tools and strategies. Enterprises can benefit from autonomous techniques that will maximize security as code, policy as code, and monitoring as code.

5. Adopt a micro-change strategy 

Enterprises often struggle with change because the barriers are too high — or at least they appear that way. However, more Agile approaches make greater progress than if you tried to climb a mountain in a single leap. A series of small, irreversible changes can generate compound effects and deliver exponential results.

Long-term goals are divided into achievable waypoints, with employees incentivized by nudges rather than shoves. Each success builds on the other. Barriers to change management start to fall.

This philosophy is critical for smart technology and sustainability efforts. The rapidly evolving nature of the technology, such as AI, IoT, and cloud, lend themselves to smaller and more frequent advances. In addition, sustainability goals tend to be long-term, with many intermediate steps in-between.

This strategy can also counteract common change management problems, in which employee angst and resistance undercut potentially effective plans.

Corey Glickman is Infosys’ head of Global Sustainability and Design Consulting Services.

DataDecisionMakers

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.

If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.

You might even consider contributing an article of your own!

Read More From DataDecisionMakers

[ad_2]

Source link