Quantcast
Channel: Intellyx – The Digital Transformation Experts – Analysts
Viewing all 3136 articles
Browse latest View live

Silver Peak: Application-Driven SD-WAN

$
0
0

An Intellyx Brain Candy Update

When we last wrote our Brain Candy on Silver Peak in March 2017, the SD-WAN vendor’s core differentiator was its ability to make load balancing decisions on a packet-by-packet basis.

Today, Silver Peak is emphasizing the application-driven nature of its SD-WAN products.

It touts for key differentiators. First, it provides integrated WAN optimization (unlike competitor Riverbed Technology, whose WAN optimization product predates its SD-WAN).

Silver Peak also leverages consumer-grade Internet with its packet-by-packet capabilities and its workflow-based automation capabilities.

Its application-centricity, however, is its most important differentiator. For example, Silver Peak can route Office 365 traffic, traffic to legacy applications, and YouTube traffic differently depending upon policy.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, Riverbed Technology is an Intellyx customer. None of the other organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.


Ziften: Extending Microsoft Windows Defender Protection to Mac and Linux

$
0
0

An Intellyx Brain Candy Update

We last wrote a Brain Candy post on endpoint defense vendor Ziften in September 2017. Since that time, the company has inked a partnership with Microsoft, extending Microsoft Windows Defender Advanced Threat Protection (ATP) endpoint protection software to Macintosh and Linux endpoints.

Ziften can also protect Windows endpoints, but Microsoft has that covered. However, Microsoft would rather partner with a company like Ziften for non-Microsoft operating system capabilities rather than build such technology itself, a pattern Microsoft has followed for decades.

Ziften has tightly integrated its technology with Microsoft’s, enabling admins to detect, investigate, and respond to cyberattacks on macOS and Linux-based endpoints directly within the Microsoft Windows Defender ATP Management Console.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, Microsoft is a former Intellyx customer. None of the other organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.

Mainframes For A New Generation: Same Taste, New Can

$
0
0

The companies further state that continuous code quality management across platforms is of value to large enterprises – since their ability to bring new digital deliverables to market is often contingent on simultaneously updating code across both back-end mainframe systems of record and front-end mobile/web systems of engagement.

“Code coverage is such an integral part of continuous code quality that today’s DevOps practitioners almost take it for granted,” said Jason Bloomberg, president of agile digital transformation analyst firm Intellyx. “On the mainframe, however, code coverage has always been a difficult challenge. With today’s announcement, Compuware and SonarSource bring mainframe code coverage into the DevOps era, further mainstreaming the mainframe.”

Read the entire article at https://www.forbes.com/sites/adrianbridgwater/2018/01/05/mainframes-for-a-new-generation-same-taste-new-can/,

Cohesity: Focusing Secondary Storage Solutions on Backup Recoverability

$
0
0

An Intellyx Brain Candy Update

Everybody knows that backups are important, but the most important part of backing up your data is the ability to recover them.

The industry measures such recoverability with two metrics: Recovery Point Objective (RPO), which is the time between backups, thus representing the maximum interval of potential lost data; and Recovery Time Objective (RTO), how long it takes to recover from backup.

Cohesity helps its customers optimize these two metrics. When we last wrote a Brain Candy on Cohesity in September 2017, it focused on broad secondary storage challenges.

Today, secondary storage is still Cohesity’s focus, but backups – and their all-important recoverability – have become a sweet spot for the vendor.

RPOs are often measured in hours, while RTOs could be days or even longer. With Cohesity, in contrast, RPOs drop to less than five minutes, and RTOs are nearly instantaneous.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.

The Surprising Secret to Digital Transformation at Regional Financial Institutions

$
0
0

The retail banking industry is facing a digital transformation quandary that impacts all financial institutions, small and large.

The largest banks (e.g. Bank of America and JPMorgan Chase) have the resources to staff expansive software teams and have the budget and resources to build sophisticated applications across mobile, online, in-branch, and voice channels.

These behemoths grew through numerous acquisitions, leaving them with the burden of multiple disparate legacy systems that are difficult to integrate. In spite of their prodigious resources, such banks struggle to deliver a seamless customer experience that is the lynchpin of a successful digital transformation.

Midsize banks and credit unions also focus on building a modern digital presence, and many companies resort to purchasing off-the-shelf banking apps which are point solutions. However, they are finding that the mobile apps that their core banking providers offer lack the functionality and customization they require, thus limiting their digital initiatives.

At the core of such initiatives is a focus on customer value. “Banks want to deliver value to customers while giving them a digital experience that differentiates their brand,” explains Jeffery Kendall, SVP and GM for Global Banking and Financial Solutions at Kony, a leading provider of digital banking applications. “Customer expectations are being influenced and informed by companies all around them, such as Amazon, Starbucks and Disney, who are focused on digital leadership.”

Digital Transformation at TDECU

TDECU (Texas Dow Employees Credit Union) in Lake Jackson, Texas, is executing an ambitious digital transformation strategy. “For us to compete, we had to do something different,” explains Andrew Wayman, Vice President of Digital Strategy for TDECU. Wayman says that compared to digital efforts in the retail industry, banking is years behind.

The essential difference between the retail industry and banking is that in retail, digital presence is a competitive differentiator.

In contrast, banks often treat basic web and mobile app capabilities as necessary for meeting member and customer expectations, without being strategic to the organization.

In today’s digital era, that equation has fundamentally changed. Today, software-based capabilities drive competitive differentiation in banks as well as retail and most other industries.

This strategic requirement, creates both a challenge and opportunity for regional banks and credit unions. “The most important thing isn’t the individual features, but the ability to adapt to change quickly,” Wayman says.

Competitive differentiation, after all, isn’t a static target. It requires being agile to adapt to ongoing shifts in customer demands in an ever-changing economic and competitive landscape.

Choosing the Kony Platform

To address this complex set of technical and strategic challenges, TDECU turned to Kony with a particular emphasis on digital and online applications. “With a vertical product, focus on retail banking, and an innovative roadmap, we knew we could drive our digital transformation agenda by partnering with Kony,” Wayman explained.

Like TDECU, many financial institutions are prioritizing their digital initiatives. “Over the past 18 months, we’ve seen an increase in the number of inbound requests about accelerating digital banking from credit unions and midsize banks,” Kendall says. “They are finding their current path of relying on their core banking system providers and traditional players is slowing them down.”

For TDECU, outsourcing the entire effort was expensive and wouldn’t have provided the business agility essential to a competitive digital offering. “We had a choice to compete for tech talent, to completely outsource it, or partner with a leader in this space,” Wayman explains.

The credit union chose to partner with Kony, thus giving the credit union the ability to add new features in multiple channels more quickly than with other providers. “With Kony, we can add new features, while reducing the go-to-market time,” Wayman explains. “Quality assurance and end-user testing can be accomplished in days and weeks rather than months.”

The Intellyx Take

Kony offers TDECU more than a faster, cost-effective way to add features. It gives the credit union and regional banks the flexibility to build a competitive offering – which means adapting to ongoing change.

Kendall sees TDECU’s experience as part of a broader trend. “Banks want to remove customer friction,” he explains. “How fast can they keep up with changing customer expectations.”

The possibilities are endless. Wayman is looking forward to building differentiated offerings in the modern world of phone-based payments, invisible transactions (think of getting out of an Uber), and even the Internet of Things – say, connected cars that can automatically make a payment at a drive-thru window.

Digital transformation is changing the game – and with Kony’s help, TDECU intends to be a leader in the race.

Copyright © Intellyx LLC. Kony is an Intellyx client. At the time of writing, none of the other organizations mentioned in this article are Intellyx clients. Intellyx retains full editorial control over the content of this paper. Image credit: TDECU.

OpenPort: Blockchain-Powered Logistics for Asian Countries

$
0
0

An Intellyx Brain Candy Brief

Amidst all the noise, the most promising Blockchain-based business models involve multiparty transactions. Logistics businesses like shipping and trucking are prime examples of industries ripe for such blockchain-driven disruption.

OpenPort is tackling this rapidly populating space by focusing its efforts on trucking within a handful of south and east Asian countries. By avoiding international shipments and sticking to trucking, it hopes to establish a foothold among shippers, truckers, and brokers – thus overcoming the network effect tipping point problem that plagues all similar blockchain-based business models.

To foster a decentralized, token-based economy, OpenPort executives and various ecosystem participants founded the non-profit Open Enterprise Logistics (OEL) Foundation. OpenPort will serve as a paid service provider to OEL.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.

Arcadia Data: Native Analytics and Business Intelligence for Data Lakes

$
0
0

An Intellyx Brain Candy Brief

As the data lake market matures, the differences between data lakes and data warehouses become clearer. Data lakes are architected for scalability, and thus store and process data quite differently from the earlier generation data warehouses.

Most analytics and business intelligence tools, however, date from the data warehouse days – and regardless of what their vendors say, they are a poor fit for data lakes.

Arcadia Data, in contrast, built its technology to run natively on data lakes – in particular, ones that run on Hadoop. The Hadoop File System (HDFS) is distributed and horizontally scalable, and Arcadia Data runs on each HDFS node.

This distributed architecture gives Arcadia Data markedly better performance than traditional analytics and BI tools, and also brings the processing to the data, thus addressing the data gravity issues that big data sets can struggle with.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.

VMware Workspace One: An Integrated Digital Workspace Platform

$
0
0

An Intellyx Brain Candy Brief

Today’s worker demands an integrated working environment in which they can use the devices of their choosing and seamlessly integrate their work and personal lives. They also expect to have an uncomplicated, consumer-like experience while doing so. In the modern enterprise, however, delivering this type of employee experience is difficult when balanced with the need to provide such an experience securely.

Past attempts at striking this balance, including approaches such as virtual desktop infrastructures (VDI), have fallen woefully short as the need to create a secure environment resulted in a kluge and complicated experience. VMware believes that it has struck the right balance between these seemingly opposing needs with its Workspace One offering. True to its name, the solution creates a digital employee workspace that combines single sign-on capabilities with an application catalog and end-point management. The result is a secure environment that provides an employee with either native or virtualized (as necessary) access to the applications they need to do their job on Windows, Mac or mobile devices.

It can be a little difficult to grasp, but the solution provides an elegant, yet secure mechanism that enables employees to access the applications they need intuitively. The ability to simultaneously support native mobile apps, browser-based interfaces and to virtualize legacy applications when necessary is what separates the company’s approach from traditional VDI efforts and creates a transformative experience for employees. The additional layer of consolidated endpoint management gives IT the tools it needs to unobtrusively ensure the security of the environment.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, VMware is an Intellyx customer. To be considered for a Brain Candy article, email us at pr@intellyx.com.


The Top Tools to Support DevSecOps – Part 5

$
0
0

By DevOps Digest

EMPATHY

Simply putting developers and security people into the same cube farm and telling them to work together won’t work, of course — and will likely be counterproductive. Collaboration is key — but even the best collaboration tool in the world won’t facilitate cooperation among people who feel they are in an adversarial relationship with each other. Just as with DevOps itself, therefore, the most important tool for DevSecOps is empathy — the ability to put yourself into the other person’s shoes and see the problem space from their point of view. Once the team has sufficient empathy for each other, collaboration tooling is important to be sure — but tools don’t make high-performance teams.
Jason Bloomberg
President, Intellyx

Read the entire article at http://www.devopsdigest.com/devsecops-security-tools-5

Top 20 Global Thought Leaders on Digital Transformation – June 2018

$
0
0

Top 20 Global Thought Leaders on Digital Transformation (June 2018)

Here’s the Thinkers360 leaderboard for the top 20 global thought leaders on digital transformation for June 2018. Congratulations to all our thought leaders and experts who participated!

Rank Twitter Handle Name TL Score
1 @gregverdino Greg Verdino Score: 100
2 @tkspeaks Thomas Koulopoulos Score: 80.19
3 @NicholasDEvans Nicholas Evans Score: 73.67
4 @charlesaraujo Charles Araujo Score: 57.46
5 @dhinchcliffe Dion Hinchclife Score: 57.46

Read the entire article at https://www.thinkers360.com/top-20-global-thought-leaders-on-digital-transformation-june-2018/.

 

To Make Digital Transformation Real, Shift from a Project to a Product Focus

$
0
0

Our fellow pundits love broad proclamations like ‘software is eating the world’ or ‘every company is becoming a software company.’

For those tech-savvy enterprises that have been leveraging mission-critical software to deliver customer value for decades, such a transformation is relatively easy to understand – and furthermore, they may already be well on their way to their own digital nirvana.

In the more general case, however, the products that an enterprise sells to its customers are quite separate from the role that software plays within the organization.

For such companies in particular, IT has long been a cost center, playing an essential but secondary support role to the product teams in the lines of business, who have always been responsible for customer value.

Read the entire article at https://blog.launchdarkly.com/to-make-digital-transformation-real-shift-from-a-project-to-a-product-focus/.

LaunchDarkly is an Intellyx client. At the time of writing, none of the other organizations mentioned in this article are Intellyx clients. Intellyx retains full editorial control over the content of this paper. Image credit: alainalele.

Is the employee experience the digital transformation linchpin?

$
0
0

Leadership experts have long held that unhappy employees equal unhappy customers. Therefore, the opposite must be true, right? Business leaders, however, must go beyond that simple intuition and determine if an investment in the employee experience will deliver measurable customer experience outcomes.

There’s a new buzzword in town, and it’s taking the industry airwaves by storm. Our industry’s new object of affection: the employee experience.

Of course, the idea that organizations should pay attention to and improve the employee experience in the form of the workplace, the tools, and the processes they use to perform their tasks is not new. But the idea has found a fresh and reinvigorated buzz as vendors and pundits connect it to both the need to improve the customer experience and the broader push around digital transformation.

The thinking goes that the customer experience is now essential to driving competitive value, but that an organization’s employees must have a conducive work environment to deliver such a positive experience to the customer. Ergo, an investment in the employee experience yields value in the form of a winning customer experience.

On the one hand, this is intuitive. Leadership experts have long held that unhappy employees result in unhappy customers, leading to the assumption that the converse must also be true. The resource-strapped business or IT executive, however, must go beyond that simple intuition and determine if an investment in the employee experience will deliver measurable customer experience outcomes, and, if so, where and how to make those investments.

Read the full article on CIO.com: https://www.cio.com/article/3278556/digital-transformation/is-the-employee-experience-the-digital-transformation-linchpin.html

Winning the Race in Quantum Computing

$
0
0

The asymmetric encryption system currently used to protect credit card information and bank accounts relies on two keys. One key is the “private key” and consists of two large prime numbers known only to one’s bank or to services such as PayPal. The other key, called the “public key,” sits in cyberspace and is the product of multiplying together those two “private” prime numbers to create a semi-prime number.

The only way a hacker could access encrypted credit card or bank information would be by factoring the large “public key” (often six hundred digits or more) back to the correct two numbers of the “private key” — a Herculean computation task that would take too long for a classical computer to solve.

A future quantum computer, however, will be able to do such a computation almost instantly. Even blockchain will not be able to withstand the first quantum attack if it relies on two-key encryption architecture — the architecture protecting nearly all digital information today.

This includes our leading financial institutions, including Wall Street; our power grid and water systems; the nation’s food supply and energy resources; as well as the entire federal government. As Jason Bloomberg of Intellyx concluded in a Forbes article, “Welcome to the cyber-battlefield of the 21st century” — a battlefield that will be dominated by quantum technology.

Read the entire article at https://medium.com/@americanaffairs/winning-the-race-in-quantum-computing-9ec22609398c.

Sensedia: Bringing Full-Lifecycle API Management from Brazil to the World

$
0
0

An Intellyx Brain Candy Brief

After establishing itself as a SOA governance repository vendor in the 2000s, Sensedia implemented an API management platform that has come to dominate the market in its home country of Brazil.

Globally, the API management market has largely consolidated, with CA Technologies’ 2013 acquisition of Layer 7 Technologies, followed by Googles’ acquisition of Apigee and Rogue Wave’s acquisition of Akana, both in 2016. Offerings from Software AG and IBM round out the market.

Bringing its standalone API management product to Europe and eventually North America may be a challenge given the dominance of such larger players – but Sensedia has an ace up its sleeve.

It’s completely rewriting its aging SOA governance repository as a modern, container-savvy API governance tool, thus potentially filling an important niche in the burgeoning Kubernetes marketplace.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, CA Technologies, IBM, and Software AG are Intellyx customers. None of the other organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.

Kuika: Design-First Low-Code/No-Code Platform

$
0
0

An Intellyx Brain Candy Brief

Kuika is joining the crowded low-code/no-code marketplace with a professional developer and citizen developer-friendly configurable tool. Application creators in either role can easily configure data-centric or workflow-centric apps for mobile or web deployment.

Kuika takes a declarative, model-driven approach, generating an intermediate description language it then compiles into running code.

For mobile deployment, Kuika leverages the Angular front-end web application platform, the Ionic hybrid mobile app SDK, and Apache Cordova native component plugins in order to create state-of-the-art hybrid mobile apps.

Kuika’s most important differentiator is its design-first approach. Application creators can input visual design files directly into the platform for configuration as interactive applications.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.


Can DevOps Really Shift Everything ‘To The Left’?

$
0
0

Just as in the fictitious Lake Wobegon, where all the children are above average, in the DevOps software lifecycle, we shift every step in the lifecycle all the way ‘to the left.’

The ‘shifting to the left’ metaphor dates to the 1990s, as software development organizations realized that the industry-standard waterfall methodology led to poor quality software and expensive fixes.

Welcome to Lake Wobegon, where all the women are strong, all the men are good-looking, and all the children are above average. -- Garrison Keillor

Welcome to Lake Wobegon, where all the women are strong, all the men are good-looking, and all the children are above average. — Garrison Keillor

The problem: the testing step was far ‘to the right,’ that is, late in the lifecycle. By moving it earlier, i.e., ‘to the left,’ software quality improved and any necessary bug fixes were far less expensive to address.

Shifting testing to the left is now an established software best practice. “It has been well known that defects are more difficult and expensive to fix the later they are found in the lifecycle,” explains Donald Firesmith, Principal Engineer at the Software Engineering Institute. “One of the most important and widely discussed trends within the software testing community is shift left testing, which simply means beginning testing as early as practical in the lifecycle.”

Shifting Operations to the Left

Today’s modern practice of DevOps adds operations to the mix, as teams now shift deployment in particular ‘to the left,’ what we call ‘continuous deployment’ or CD. “Shifting left requires two key DevOps practices: continuous testing and continuous deployment,” says Dr. Darrell R. Schrag, Watson and Cloud Platform Architect at IBM. “Continuous deployment automates the provisioning and deployment of new builds, enabling continuous testing to happen quickly and efficiently.”

In fact, one way to look at this ‘shift everything to the left’ mentality is ‘continuous everything.’ “Continuous everything is really around how do you do continuous testing and continuous delivery,” explains David Williams, Senior Vice President, Portfolio Strategy at CA Technologies. “When you’re delivering on a test infrastructure, it’s continuous throughout, whether it’s from development, thorough to release, into production, back into plan, and that is a continuous environment.”

Read the entire article at https://www.forbes.com/sites/jasonbloomberg/2018/06/08/can-devops-really-shift-everything-to-the-left/.

Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, CA Technologies and IBM are Intellyx customers. None of the other organizations mentioned in this article are Intellyx customers. CA Technologies covered Jason Bloomberg’s expenses at the CA Built to Change Summit, a standard industry practice. Image credit: ladysnap50.

The Enterprise Leader’s Guide to Blockchain

$
0
0

Are you a blockchain true-believer or skeptic? Do you believe that it will be the next great disruptive technology — changing almost everything about, well, everything — or do you see it as just a bunch of hyped-up, scam-infested gobbledygook?

Blockchain has now entered the public consciousness. You will find journalists and pundits writing about it in major (and not so major) business and news publications everywhere. Everyone from business people to students is discussing it in bars and coffee houses in every corner of the world.

Those engaged in animated conversations about it range from crazy fanatics (this mostly applies to adherents of Bitcoin and the various alternate cryptocurrencies) to outspoken skeptics (you can mostly put our own Jason Bloomberg in this camp).

But most of us fall into the larger category spread over the broad middle between these two ends of the spectrum. For us, we’re just trying to cut through all of the static to understand what all the hubbub is about and, more importantly, the impact it may — or may not — have on our businesses and in our lives.

While Jason has covered blockchain extensively, both for Intellyx as well as in several Forbes articles, he has done so primarily in the context of the cryptocurrency craziness or the emerging blockchain startup sector.

If you’re a business or IT executive, however, I believe there’s a need to step back and look at this emerging and potentially disruptive technology both more holistically and strategically, with the goal of answering a single, essential question when it comes to blockchain in the enterprise context: so what?

What is ‘Blockchain’ Anyway? It’s Not as Clear as You Might Think.

The first challenge to understanding blockchain and its potential impact is that there isn’t even an agreed upon definition of what is or isn’t a blockchain. Adrianne Jeffries, in fact, recently devoted an entire article in The Verge, entitled Blockchain is Meaningless, to this problem.

She writes, “The idea of a blockchain, the cryptographically enhanced digital ledger that underpins Bitcoin and most cryptocurrencies, is now being used to describe everything from a system for inter-bank transactions to a new supply chain database for Walmart. The term has become so widespread that it’s quickly losing meaning.”

The biggest challenge, of course, is that savvy marketers are seizing on the buzziness of the term to market older technologies as blockchain to an eager and unsuspecting market. For enterprise strategists and buyers, it will be critical to look past the buzz to get to the heart of when and where blockchain may be useful in driving some form of competitive business value for the organization.

While I won’t attempt to choose the ‘right’ blockchain definition here, it may be helpful to ditch the blockchain term altogether and instead use the more generic and accurate, distributed ledger technology (DLT), as a way to center your thinking.

The essence of blockchain, after all, is that organizations can write data immutably and transparently to a shared and distributed ledger (although more on these characteristics in a bit), thereby enabling parties to create a decentralized, yet trusted exchange. (For the sake of continuity, I’m going to stick with blockchain in this article.)

However you decide to define blockchain or DLT, there is a broader mental shift that will be even more helpful.

You should separate the conceptualization of blockchain technology and the characteristics it imbues, from how startups may use blockchain to disrupt industries or create all-new business models. (Although if you want help evaluating these types of blockchain start-ups, check out Jason’s article, Seven Criteria for Evaluating a Blockchain Business.)

In the enterprise context, these startups and their hopeful ambitions are interesting, but only mildly instructive. Instead, you should be looking at the characteristics that are at the conceptual core of blockchain and examine how your organization might use them as a disruptive tool or how a competitor (or startup) may wield them as a disruptive weapon against you.

In this context, however, it is less about picking winners or losers, and more about seeing the big picture of possibilities, their underlying strengths and vulnerabilities, and the impact they may have on the nature of how enterprises function and go-to-market.

As the last wave of potentially disruptive technologies emerged, it was a failure of enterprise imagination that enabled, at least in part, the current wave of so-called digital disruption. This is your chance to avoid making the same mistake twice.

The Immutability and Permanence Fallacy

Before we go any further, however, I need to address a fallacy when it comes to blockchain: its immutability and permanence.

One of the reasons that Bitcoin fired up all of the crazy fanatics is that it promised an end to centralized control of currencies (and, in theory, everything). Two of the primary reasons that this decentralization could work is because of blockchain’s purported immutability and permanence — two of the very things that society needs to engender enough confidence and trust in a decentralized model.

The problem is that blockchain may not be quite as immutable or as permanent as its adherents claim.

Angela Walch, associate professor at St. Mary’s University School of Law and research fellow at the Centre for Blockchain Technologies at University College London, discussed the issue of immutability in a recent report published in the Review of Banking & Financial Law.

In this report, she states, “The first conceptual problem is that it is misleading to continue to state that ‘immutability is a characteristic of blockchain technology’ when the records created by both Bitcoin and Ethereum have each been changed at various times, and when they remain subject to 51 percent attacks.” (More on 51 percent attacks in a moment.)

She goes on to explain that there is nothing magical about the technology, and that real-world examples in public blockchains prove “at a minimum that it is problematic to describe blockchain technology as a whole as immutable, when at least some (and perhaps all?) blockchain records may be changed if the people operating the blockchain so choose.”

The net-net? While blockchain’s purported immutability is a powerful feature, business and IT leaders must approach it with eyes wide-open. Data in a blockchain is not somehow written onto a blockchain stone in the sky. It is just an architectural approach and algorithm based on consensus between ledgers that node operators can, under certain circumstances, overwrite or manipulate.

The Problem with Consensus

It is, in fact, blockchain’s consensus model that is both its greatest strength and weakness.

In a recent article in MIT’s Technology Review entitled, In blockchain we trust, authors Michael J. Casey and Paul Vigna, authors of The Truth Machine: The Blockchain and the Future of Everything, explain, “No single entity controls the ledger. Any of the computers on the network can make a change to the ledger, but only by following rules dictated by a ‘consensus protocol,’ a mathematical algorithm that requires a majority of the other computers on the network to agree with the change.”

It is these consensus protocols that provide blockchain’s purported immutability. But it also makes a network subject to the so-called 51% attack, in which a bad actor takes control of 51% of the nodes, ensuring automatic consensus for whatever change he or she may like.

Finally, the permanence attribute of DLT’s is also a bit of a misnomer. The permanence of the record is akin to the permanence of records written to a CD — they may be uneditable, but they are only as permanent as your ability to continually store and access them. With these burgeoning blockchain networks, their permanence is anything but guaranteed.

None of this discussion diminishes the underlying promise of blockchain. Its distributed nature and (mostly) immutable and permanent characteristics offer tremendous opportunities for organizations to reimagine entire business models and supply chains. But enterprise leaders should evaluate these applications of the technology with a cautious eye and not allow grandiose promises to seduce them into forgetting the truths about how technology works.

The Intellyx Take

The foundational transformation that will occur with blockchain is the transformation of trust. Or, more specifically, the nature of how trust is created and sustained.

It is the conveyance of trust that intermediaries have provided in the economy. Absent intermediaries, it is the verification of transactions, absent trust, that has consumed vast amounts of enterprise resources. This paradigm is what blockchain may change.

As an enterprise leader, therefore, you must look at the application of blockchain technology through this lens, and with its characteristics of immutability, permanence, security, and decentralization in mind.

With that perspective, it will be easy to skip over most of the muck about blockchain in the press and get down to the nitty-gritty of examining where the risks and opportunities will lie in the future. Moreover, you will be prepared to seize the opportunities and protect against the risks — if and when this foundational technology finally changes everything.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. Image credit: Tobias Begemann.

Stay Ahead of Public Cloud Service Changes

$
0
0

Webinar by Densify on June 14: Machine Learning Helps You Take Advantage of The Latest from AWS, Azure, & Other Cloud Providers

Cloud computing has become one of the fastest growing areas of IT and of business—period. Cloud is supposed to help companies transform their IT infrastructure with more flexibility, higher efficiency and less CAPEX/OPEX dollars. But in reality, this is not always the case.

With the rapid growth of the industry comes rapid developments from all the major cloud providers that seem to be increasing at an exponential rate. And it begs the question, how is it possible to stay informed of all the current offerings, let alone know which one, out of millions of combinations, is best suited for your dynamic workload needs?

First on the panel is Andrew Hillier, CTO of Densify and a true veteran with over 20 years of experience focused on the creation and implementation of mission-critical software for the World’s largest financial institutions and utilities. Along with Jason Bloomberg, top industry analyst, who is a key Forbes contributor as well as a globally recognized expert on disruptive trends in enterprise technology and digital transformation.

For more information and to register, please go to https://www.densify.com/articles/keep-ahead-aws-azure-google-ibm-cloud-changes.

Densify is an Intellyx customer.

 

Cint: An Insights Exchange Platform to Answer the ‘Why’

$
0
0

An Intellyx Brain Candy Brief

We are entering the age of the customer. It is a time in which the driver of business value has shifted away from optimization and towards the customer experience. Creating, supporting, and managing the customer experience is now paramount as enterprises seek to deliver mass customization and serve the so-called “market-of-one.” To respond to this shift, organizations are turning to customer data and analytics to better understand and meet the needs of their customers.

According to Cint, however, data analytics only tells part of the story and fails to get at the ‘why.’ This gap, it says, is why market research is more important than ever — and why the company created what it calls its ‘insights exchange platform.’

The platform acts as a digital marketplace connecting researchers, agencies, and brands with over 50 million registered participants via its network of panel and community owners. The company’s registered participants are then available to its customers to participate in studies, answer survey questions or complete profile information. Moreover, the company helps its clients connect the dots between its analytics systems, research data, and customer behavior through various stages of the customer journey.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.

Cryptocurrency: a risky investment?

$
0
0

With that in mind though, other digital currency forms like Dogecoin and Namecoin who people consider “joke money,” may actually be profitable in the near future. The creator of Dogecoin made the coin so that it gives a wider demographic than just Bitcoin. Dogecoin is always running updates and improving its blockchain system, completely independently of Bitcoin, to implement new features according to the architect behind the coin Ross Nicoll.

As far as getting scammed goes, usually people who have a lot of coins are abusing the use of it. A survey taken in 2015 by MarketsInsider shows Bitcoin users tend to be overwhelmingly white and male, but of varying incomes. The survey suggested that people with the most bitcoins are more likely to be using it for illegal purposes. According to Jason Bloomberg, and IT industry analyst, there are four primary areas of criminal activity lend themselves to cryptocurrency: tax evasion, money laundering, contraband transactions and extortion.

Read the entire article at https://uncagednews.com/6408/feature/cryptocurrency-a-risky-investment/.

Viewing all 3136 articles
Browse latest View live




Latest Images