SlideShare une entreprise Scribd logo
1  sur  74
Using Technology
                 To Gain a
           Competitive Advantage


Scott Klososky
Using Technology
                 To Gain a
           Competitive Advantage


Scott Klososky
SCOTT KLOSOSKY

    Velocity Leadership
Three Leverage Points leaders must apply in
order to grow organizations with velocity...
SCOTT KLOSOSKY

    Velocity Leadership
Three Leverage Points leaders must apply in
order to grow organizations with velocity...


    Learn to better “see” future trends
SCOTT KLOSOSKY

    Velocity Leadership
Three Leverage Points leaders must apply in
order to grow organizations with velocity...


    Learn to better “see” future trends

  Build sophisticated digital plumbing
SCOTT KLOSOSKY

    Velocity Leadership
Three Leverage Points leaders must apply in
order to grow organizations with velocity...


    Learn to better “see” future trends

  Build sophisticated digital plumbing

        Insure uptime, security and
                   speed
1
1
1
1
1
1
1
1
1
2
2
2
SCOTT KLOSOSKY
       Your Personal
        eCommunity
                     It is NOT
                     NetFu
                       n
                     NetVis
                       it
                     NetPla
                       y
                     It is
eCommunity NetWor
              k
3
3



So, what heck is Social
       Media?
3



So, what heck is Social
       Media?
4
4
SCOTT KLOSOSKY

Cloud Computing
4
SCOTT KLOSOSKY

Cloud Computing
  Mainframes with tethered terminals.   1950
         IT department control
4
SCOTT KLOSOSKY

Cloud Computing
   Mainframes with tethered terminals.   1950
          IT department control

Personal computers completely untethered. 1980
       Partial IT department control
4
SCOTT KLOSOSKY

Cloud Computing
   Mainframes with tethered terminals.   1950
          IT department control

Personal computers completely untethered. 1980
       Partial IT department control


      Cloud computing applications       2008
              untethered.
   IT department has even less control
5
5
SCOTT KLOSOSKY

   Digital Plumbing Layers
5
5
 SCOTT KLOSOSKY

usiness Intelligence Layer
5
 SCOTT KLOSOSKY

usiness Intelligence Layer




    Custom reports and individualized   Valuable
              dashboards
5
 SCOTT KLOSOSKY

usiness Intelligence Layer




  Rules platform with automated actions    Game
     that trigger on prescribed events    Changing



    Custom reports and individualized     Valuable
              dashboards
5
 SCOTT KLOSOSKY

usiness Intelligence Layer

   Artificial intelligence (non sentient)   Imperative



  Rules platform with automated actions     Game
     that trigger on prescribed events     Changing



    Custom reports and individualized      Valuable
              dashboards
5

 Red
              Core
     u
Data ndant           s
                stem
             Sy
Cen
   ter

                             Auto                             s/
                                                          ient ers
                                    mat                Cl
                                       ed W                   m
                                                         usto
                                            orkfl       c
                                                 ow


                                                      SaaS
                               rs
                          endo                               Appl
                                                                    icati
                         V                                                  ons




                                                               •Real time
                                                               Acct
                                                               •Event
                                                               tracking
                                                               •Rules engine
             Mas
                h Up
                     Data
                          Feed
                               s
5
    SCOTT KLOSOSKY
              Your Personal
 Red
              Core

               eCommunity
     u
Data ndant           s
                stem
             Sy
Cen
   ter

                             Auto                             s/
                                                          ient ers
                                    mat                Cl
                                       ed W                   m
                                                         usto
                                            orkfl       c
                                                 ow


                                                      SaaS
                               rs
                          endo                               Appl
                                                                    icati
                         V                                                  ons




                                                               •Real time
                                                               Acct
                                                               •Event
                                                               tracking
                                                               •Rules engine
             Mas
                h Up
                     Data
                          Feed
                               s
5
    SCOTT KLOSOSKY
              Your Personal
 Red
              Core

               eCommunity
     u
Data ndant           s
                stem
             Sy
Cen
   ter

                             Auto                             s/
                                                          ient ers
                                    mat                Cl
                                       ed W                   m
                                                         usto
                                            orkfl       c
                                                 ow


                                                      SaaS
                               rs
                          endo                               Appl
                                                                    icati
                         V                                                  ons




                                                               •Real time
                                                               Acct
                                                               •Event
                                                               tracking
                                                               •Rules engine
             Mas
                h Up
                     Data
                          Feed
                               s
5
5



Once you understand
digital plumbing, you
can then construct
Mash ups...
5



Once you understand
digital plumbing, you
can then construct
Mash ups...
5



Once you understand
digital plumbing, you
can then construct
Mash ups...
5



Once you understand
digital plumbing, you
can then construct
Mash ups...
5



Once you understand
digital plumbing, you
can then construct
Mash ups...
SCOTT KLOSOSKY
    The Current State of
         Security
SCOTT KLOSOSKY
    The Current State of
         Security
SCOTT KLOSOSKY
    The Current State of
         Security
                 We Strike Data
                 Galore... by Avi Baumstein
                 Are peer to peer networks
                 really filled with sensitive
                 corporate data just waiting
                 to be lucked and abused?

                 Information Week, March 17,
                 2008
SCOTT KLOSOSKY
    The Current State of
         Security
                 We Strike Data
                 Galore... by Avi Baumstein
                 Are peer to peer networks
                 really filled with sensitive
                 corporate data just waiting
                 to be lucked and abused?

                 Information Week, March 17,
                 2008
SCOTT KLOSOSKY
    The Current State of
         Security
                 We Strike Data
                 Galore... by Avi Baumstein
                 Are peer to peer networks
                 really filled with sensitive
                 corporate data just waiting
                 to be lucked and abused?

                 Information Week, March 17,
                 2008
SCOTT KLOSOSKY
    The Current State of
         Security
                 We Strike Data
                 Galore... by Avi Baumstein
                 Are peer to peer networks
                 really filled with sensitive
                 corporate data just waiting
                 to be lucked and abused?

                 Information Week, March 17,
                 2008
SCOTT KLOSOSKY
         The Cost of Poor
             Security
     1. Damage to customer

     relationships

     2. Damage to overall credibility

     3. Legal ramifications can be
   Note - According to analyst firm IDC, about 70% of all
   successful attacks on computer networks were
     costly
   carried out by employees and insiders.
SCOTT KLOSOSKY
         The Cost of Poor
             Security
     1. Damage to customer

     relationships

     2. Damage to overall credibility

     3. Legal ramifications can be
   Note - According to analyst firm IDC, about 70% of all
   successful attacks on computer networks were
     costly
   carried out by employees and insiders.
SCOTT KLOSOSKY
         The Cost of Poor
             Security
     1. Damage to customer

     relationships

     2. Damage to overall credibility

     3. Legal ramifications can be
   Note - According to analyst firm IDC, about 70% of all
   successful attacks on computer networks were
     costly
   carried out by employees and insiders.
SCOTT KLOSOSKY
         The Cost of Poor
             Security
     1. Damage to customer

     relationships

     2. Damage to overall credibility

     3. Legal ramifications can be
   Note - According to analyst firm IDC, about 70% of all
   successful attacks on computer networks were
     costly
   carried out by employees and insiders.
✓ Only 6 percent of companies suering from a catastrophic
data loss survive, while 43 percent never reopen and 51
percent close within two years. Research by the University of Texas

✓ The survival rate for companies without a disaster
recovery plan is less than 10%! According to a recent Touche Ross
study

✓ Only 35 percent of Small/Medium Businesses have a
comprehensive disaster recovery plan in place. Research by
Gartner

✓ Companies lose an average of $84,000 for every hour of
downtime. Research by International Data Corp

✓ Man-made disasters aect 10% of small businesses,
whereas natural disasters have impacted more than 30% of
all small businesses in the USA. According to a recent NFIB National
Small Business Poll

✓ 40% of senior IT executives reported having a business
continuity plan, but hadn’t tested it within the past 12
months. According to Telephony Online
Business
               Continuity
✓ Only 6 percent of companies suering from a catastrophic
data loss survive, while 43 percent never reopen and 51
percent close within two years. Research by the University of Texas

✓ The survival rate for companies without a disaster
recovery plan is less than 10%! According to a recent Touche Ross
study

✓ Only 35 percent of Small/Medium Businesses have a
comprehensive disaster recovery plan in place. Research by
Gartner

✓ Companies lose an average of $84,000 for every hour of
downtime. Research by International Data Corp

✓ Man-made disasters aect 10% of small businesses,
whereas natural disasters have impacted more than 30% of
all small businesses in the USA. According to a recent NFIB National
Small Business Poll

✓ 40% of senior IT executives reported having a business
continuity plan, but hadn’t tested it within the past 12
months. According to Telephony Online
Business
               Continuity
✓ Only 6 percent of companies suering from a catastrophic
data loss survive, while 43 percent never reopen and 51
percent close within two years. Research by the University of Texas

✓ The survival rate for companies without a disaster
recovery plan is less than 10%! According to a recent Touche Ross
study

✓ Only 35 percent of Small/Medium Businesses have a
comprehensive disaster recovery plan in place. Research by
Gartner

✓ Companies lose an average of $84,000 for every hour of
downtime. Research by International Data Corp

✓ Man-made disasters aect 10% of small businesses,
whereas natural disasters have impacted more than 30% of
all small businesses in the USA. According to a recent NFIB National
Small Business Poll

✓ 40% of senior IT executives reported having a business
continuity plan, but hadn’t tested it within the past 12
months. According to Telephony Online
SCOTT KLOSOSKY

Business Continuity Realities
SCOTT KLOSOSKY

Business Continuity Realities
    It is not a matter of “if” - it is a
    matter of “when” you will be
    impacted by an event
SCOTT KLOSOSKY

Business Continuity Realities
    It is not a matter of “if” - it is a
    matter of “when” you will be
    impacted by an event
    It is no longer feasible to allow data or
    software applications to be at any kind
    of risk because your customers have
    many choices
SCOTT KLOSOSKY

Business Continuity Realities
    It is not a matter of “if” - it is a
    matter of “when” you will be
    impacted by an event
    It is no longer feasible to allow data or
    software applications to be at any kind
    of risk because your customers have
    many choices
    At the moment you find out you were
    not properly prepared, it is too late -
    and no excuse will be good enough
SCOTT KLOSOSKY

       Five Steps to BC
SCOTT KLOSOSKY

       Five Steps to BC
    1 - Understand what data and systems
    are critical to business continuity
SCOTT KLOSOSKY

         Five Steps to BC
    1 - Understand what data and systems
    are critical to business continuity
     2 - Identify and fix single points of failure
     in your network, business processes, and
SCOTT KLOSOSKY

         Five Steps to BC
    1 - Understand what data and systems
    are critical to business continuity
     2 - Identify and fix single points of failure
     in your network, business processes, and

     3 - Create a workforce continuity
     plan
SCOTT KLOSOSKY

         Five Steps to BC
    1 - Understand what data and systems
    are critical to business continuity
     2 - Identify and fix single points of failure
     in your network, business processes, and

     3 - Create a workforce continuity
     plan
     4 - Create a disaster recovery plan
SCOTT KLOSOSKY

         Five Steps to BC
    1 - Understand what data and systems
    are critical to business continuity
     2 - Identify and fix single points of failure
     in your network, business processes, and

     3 - Create a workforce continuity
     plan
     4 - Create a disaster recovery plan

     5 - Regularly train your sta on disaster
     response
“A rock pile ceases to be a rock pile
the moment a single person
contemplates it, bearing within them
the image of a cathedral.”
SCOTT KLOSOSKY

               Resources
Subscribe to www.technologystory.com
 Give me a business card with Newsletter on it




               This PowerPoint
                   Give me a business card
                   with PowerPoint written
                   on it

Contenu connexe

Similaire à Using Technology To Gain A Competitive Advantage - By Scott Klososky

Pre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise ApplicationsPre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise Applicationswhite paper
 
AWS Summit Canberra Keynote 2016
AWS Summit Canberra Keynote 2016AWS Summit Canberra Keynote 2016
AWS Summit Canberra Keynote 2016Amazon Web Services
 
Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?Splunk
 
Glassbeam: Ad-hoc Analytics on Internet of Complex Things with Apache Cassand...
Glassbeam: Ad-hoc Analytics on Internet of Complex Things with Apache Cassand...Glassbeam: Ad-hoc Analytics on Internet of Complex Things with Apache Cassand...
Glassbeam: Ad-hoc Analytics on Internet of Complex Things with Apache Cassand...DataStax Academy
 
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015Prabal Acharyya
 
Osmius: Monitoring Made Easy
Osmius: Monitoring Made EasyOsmius: Monitoring Made Easy
Osmius: Monitoring Made Easyosmius
 
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew TuckerCloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew TuckerLew Tucker
 
Continuous Intelligence: Staying Ahead with Streaming Analytics
Continuous Intelligence: Staying Ahead with Streaming AnalyticsContinuous Intelligence: Staying Ahead with Streaming Analytics
Continuous Intelligence: Staying Ahead with Streaming AnalyticsInside Analysis
 
Database Development Mistakes
Database Development MistakesDatabase Development Mistakes
Database Development MistakesMichael Findling
 
Sensors Everywhere: Unlocking the Promise of IoT | AWS Public Sector Summit 2016
Sensors Everywhere: Unlocking the Promise of IoT | AWS Public Sector Summit 2016Sensors Everywhere: Unlocking the Promise of IoT | AWS Public Sector Summit 2016
Sensors Everywhere: Unlocking the Promise of IoT | AWS Public Sector Summit 2016Amazon Web Services
 
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...Splunk
 
KSQL: The Streaming SQL Engine for Apache Kafka
KSQL: The Streaming SQL Engine for Apache KafkaKSQL: The Streaming SQL Engine for Apache Kafka
KSQL: The Streaming SQL Engine for Apache KafkaChris Mueller
 
Cloud Computing through FCAPS Managed Services in a Virtualized Data Center
Cloud Computing through FCAPS Managed Services in a Virtualized Data CenterCloud Computing through FCAPS Managed Services in a Virtualized Data Center
Cloud Computing through FCAPS Managed Services in a Virtualized Data Centervsarathy
 
Cloud Foundry Open Tour India 2012 , Keynote
Cloud Foundry Open Tour India 2012 , KeynoteCloud Foundry Open Tour India 2012 , Keynote
Cloud Foundry Open Tour India 2012 , Keynoterajdeep
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1CloudExpoEurope
 
20160706 Automotive SYS: "Evolving Needs for Software Systems - Demonstrated"
20160706 Automotive SYS: "Evolving Needs for Software Systems - Demonstrated"20160706 Automotive SYS: "Evolving Needs for Software Systems - Demonstrated"
20160706 Automotive SYS: "Evolving Needs for Software Systems - Demonstrated"Alexander Much
 

Similaire à Using Technology To Gain A Competitive Advantage - By Scott Klososky (20)

Zodiac
ZodiacZodiac
Zodiac
 
Pre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise ApplicationsPre-Integrated SSO for Software-as-a-Service & Enterprise Applications
Pre-Integrated SSO for Software-as-a-Service & Enterprise Applications
 
AWS Summit Canberra Keynote 2016
AWS Summit Canberra Keynote 2016AWS Summit Canberra Keynote 2016
AWS Summit Canberra Keynote 2016
 
Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?
 
Glassbeam: Ad-hoc Analytics on Internet of Complex Things with Apache Cassand...
Glassbeam: Ad-hoc Analytics on Internet of Complex Things with Apache Cassand...Glassbeam: Ad-hoc Analytics on Internet of Complex Things with Apache Cassand...
Glassbeam: Ad-hoc Analytics on Internet of Complex Things with Apache Cassand...
 
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015
Data Science for IOT - Prabal Acharyya, OSIsoft Internet of Things World SF 2015
 
Osmius: Monitoring Made Easy
Osmius: Monitoring Made EasyOsmius: Monitoring Made Easy
Osmius: Monitoring Made Easy
 
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew TuckerCloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
 
Continuous Intelligence: Staying Ahead with Streaming Analytics
Continuous Intelligence: Staying Ahead with Streaming AnalyticsContinuous Intelligence: Staying Ahead with Streaming Analytics
Continuous Intelligence: Staying Ahead with Streaming Analytics
 
Database Development Mistakes
Database Development MistakesDatabase Development Mistakes
Database Development Mistakes
 
Sensors Everywhere: Unlocking the Promise of IoT | AWS Public Sector Summit 2016
Sensors Everywhere: Unlocking the Promise of IoT | AWS Public Sector Summit 2016Sensors Everywhere: Unlocking the Promise of IoT | AWS Public Sector Summit 2016
Sensors Everywhere: Unlocking the Promise of IoT | AWS Public Sector Summit 2016
 
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...
Splunk conf2014 - Getting Deeper Insights into your Virtualization and Storag...
 
KSQL: The Streaming SQL Engine for Apache Kafka
KSQL: The Streaming SQL Engine for Apache KafkaKSQL: The Streaming SQL Engine for Apache Kafka
KSQL: The Streaming SQL Engine for Apache Kafka
 
Collaborative Security Audits
Collaborative Security AuditsCollaborative Security Audits
Collaborative Security Audits
 
Cloud Computing through FCAPS Managed Services in a Virtualized Data Center
Cloud Computing through FCAPS Managed Services in a Virtualized Data CenterCloud Computing through FCAPS Managed Services in a Virtualized Data Center
Cloud Computing through FCAPS Managed Services in a Virtualized Data Center
 
Cloud Foundry Open Tour India 2012 , Keynote
Cloud Foundry Open Tour India 2012 , KeynoteCloud Foundry Open Tour India 2012 , Keynote
Cloud Foundry Open Tour India 2012 , Keynote
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
 
Mobile game changer 2011
Mobile game changer 2011Mobile game changer 2011
Mobile game changer 2011
 
20160706 Automotive SYS: "Evolving Needs for Software Systems - Demonstrated"
20160706 Automotive SYS: "Evolving Needs for Software Systems - Demonstrated"20160706 Automotive SYS: "Evolving Needs for Software Systems - Demonstrated"
20160706 Automotive SYS: "Evolving Needs for Software Systems - Demonstrated"
 

Dernier

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Dernier (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Using Technology To Gain A Competitive Advantage - By Scott Klososky

  • 1. Using Technology To Gain a Competitive Advantage Scott Klososky
  • 2. Using Technology To Gain a Competitive Advantage Scott Klososky
  • 3.
  • 4. SCOTT KLOSOSKY Velocity Leadership Three Leverage Points leaders must apply in order to grow organizations with velocity...
  • 5. SCOTT KLOSOSKY Velocity Leadership Three Leverage Points leaders must apply in order to grow organizations with velocity... Learn to better “see” future trends
  • 6. SCOTT KLOSOSKY Velocity Leadership Three Leverage Points leaders must apply in order to grow organizations with velocity... Learn to better “see” future trends Build sophisticated digital plumbing
  • 7. SCOTT KLOSOSKY Velocity Leadership Three Leverage Points leaders must apply in order to grow organizations with velocity... Learn to better “see” future trends Build sophisticated digital plumbing Insure uptime, security and speed
  • 8. 1
  • 9. 1
  • 10. 1
  • 11. 1
  • 12. 1
  • 13. 1
  • 14. 1
  • 15. 1
  • 16. 1
  • 17. 2
  • 18. 2
  • 19. 2 SCOTT KLOSOSKY Your Personal eCommunity It is NOT NetFu n NetVis it NetPla y It is eCommunity NetWor k
  • 20. 3
  • 21. 3 So, what heck is Social Media?
  • 22. 3 So, what heck is Social Media?
  • 23. 4
  • 25. 4 SCOTT KLOSOSKY Cloud Computing Mainframes with tethered terminals. 1950 IT department control
  • 26. 4 SCOTT KLOSOSKY Cloud Computing Mainframes with tethered terminals. 1950 IT department control Personal computers completely untethered. 1980 Partial IT department control
  • 27. 4 SCOTT KLOSOSKY Cloud Computing Mainframes with tethered terminals. 1950 IT department control Personal computers completely untethered. 1980 Partial IT department control Cloud computing applications 2008 untethered. IT department has even less control
  • 28. 5
  • 29. 5 SCOTT KLOSOSKY Digital Plumbing Layers
  • 30. 5
  • 31. 5 SCOTT KLOSOSKY usiness Intelligence Layer
  • 32. 5 SCOTT KLOSOSKY usiness Intelligence Layer Custom reports and individualized Valuable dashboards
  • 33. 5 SCOTT KLOSOSKY usiness Intelligence Layer Rules platform with automated actions Game that trigger on prescribed events Changing Custom reports and individualized Valuable dashboards
  • 34. 5 SCOTT KLOSOSKY usiness Intelligence Layer Artificial intelligence (non sentient) Imperative Rules platform with automated actions Game that trigger on prescribed events Changing Custom reports and individualized Valuable dashboards
  • 35. 5 Red Core u Data ndant s stem Sy Cen ter Auto s/ ient ers mat Cl ed W m usto orkfl c ow SaaS rs endo Appl icati V ons •Real time Acct •Event tracking •Rules engine Mas h Up Data Feed s
  • 36. 5 SCOTT KLOSOSKY Your Personal Red Core eCommunity u Data ndant s stem Sy Cen ter Auto s/ ient ers mat Cl ed W m usto orkfl c ow SaaS rs endo Appl icati V ons •Real time Acct •Event tracking •Rules engine Mas h Up Data Feed s
  • 37. 5 SCOTT KLOSOSKY Your Personal Red Core eCommunity u Data ndant s stem Sy Cen ter Auto s/ ient ers mat Cl ed W m usto orkfl c ow SaaS rs endo Appl icati V ons •Real time Acct •Event tracking •Rules engine Mas h Up Data Feed s
  • 38. 5
  • 39. 5 Once you understand digital plumbing, you can then construct Mash ups...
  • 40. 5 Once you understand digital plumbing, you can then construct Mash ups...
  • 41. 5 Once you understand digital plumbing, you can then construct Mash ups...
  • 42. 5 Once you understand digital plumbing, you can then construct Mash ups...
  • 43. 5 Once you understand digital plumbing, you can then construct Mash ups...
  • 44.
  • 45. SCOTT KLOSOSKY The Current State of Security
  • 46. SCOTT KLOSOSKY The Current State of Security
  • 47. SCOTT KLOSOSKY The Current State of Security We Strike Data Galore... by Avi Baumstein Are peer to peer networks really filled with sensitive corporate data just waiting to be lucked and abused? Information Week, March 17, 2008
  • 48. SCOTT KLOSOSKY The Current State of Security We Strike Data Galore... by Avi Baumstein Are peer to peer networks really filled with sensitive corporate data just waiting to be lucked and abused? Information Week, March 17, 2008
  • 49. SCOTT KLOSOSKY The Current State of Security We Strike Data Galore... by Avi Baumstein Are peer to peer networks really filled with sensitive corporate data just waiting to be lucked and abused? Information Week, March 17, 2008
  • 50. SCOTT KLOSOSKY The Current State of Security We Strike Data Galore... by Avi Baumstein Are peer to peer networks really filled with sensitive corporate data just waiting to be lucked and abused? Information Week, March 17, 2008
  • 51.
  • 52. SCOTT KLOSOSKY The Cost of Poor Security 1. Damage to customer relationships 2. Damage to overall credibility 3. Legal ramifications can be Note - According to analyst firm IDC, about 70% of all successful attacks on computer networks were costly carried out by employees and insiders.
  • 53. SCOTT KLOSOSKY The Cost of Poor Security 1. Damage to customer relationships 2. Damage to overall credibility 3. Legal ramifications can be Note - According to analyst firm IDC, about 70% of all successful attacks on computer networks were costly carried out by employees and insiders.
  • 54. SCOTT KLOSOSKY The Cost of Poor Security 1. Damage to customer relationships 2. Damage to overall credibility 3. Legal ramifications can be Note - According to analyst firm IDC, about 70% of all successful attacks on computer networks were costly carried out by employees and insiders.
  • 55. SCOTT KLOSOSKY The Cost of Poor Security 1. Damage to customer relationships 2. Damage to overall credibility 3. Legal ramifications can be Note - According to analyst firm IDC, about 70% of all successful attacks on computer networks were costly carried out by employees and insiders.
  • 56. ✓ Only 6 percent of companies suering from a catastrophic data loss survive, while 43 percent never reopen and 51 percent close within two years. Research by the University of Texas ✓ The survival rate for companies without a disaster recovery plan is less than 10%! According to a recent Touche Ross study ✓ Only 35 percent of Small/Medium Businesses have a comprehensive disaster recovery plan in place. Research by Gartner ✓ Companies lose an average of $84,000 for every hour of downtime. Research by International Data Corp ✓ Man-made disasters aect 10% of small businesses, whereas natural disasters have impacted more than 30% of all small businesses in the USA. According to a recent NFIB National Small Business Poll ✓ 40% of senior IT executives reported having a business continuity plan, but hadn’t tested it within the past 12 months. According to Telephony Online
  • 57. Business Continuity ✓ Only 6 percent of companies suering from a catastrophic data loss survive, while 43 percent never reopen and 51 percent close within two years. Research by the University of Texas ✓ The survival rate for companies without a disaster recovery plan is less than 10%! According to a recent Touche Ross study ✓ Only 35 percent of Small/Medium Businesses have a comprehensive disaster recovery plan in place. Research by Gartner ✓ Companies lose an average of $84,000 for every hour of downtime. Research by International Data Corp ✓ Man-made disasters aect 10% of small businesses, whereas natural disasters have impacted more than 30% of all small businesses in the USA. According to a recent NFIB National Small Business Poll ✓ 40% of senior IT executives reported having a business continuity plan, but hadn’t tested it within the past 12 months. According to Telephony Online
  • 58. Business Continuity ✓ Only 6 percent of companies suering from a catastrophic data loss survive, while 43 percent never reopen and 51 percent close within two years. Research by the University of Texas ✓ The survival rate for companies without a disaster recovery plan is less than 10%! According to a recent Touche Ross study ✓ Only 35 percent of Small/Medium Businesses have a comprehensive disaster recovery plan in place. Research by Gartner ✓ Companies lose an average of $84,000 for every hour of downtime. Research by International Data Corp ✓ Man-made disasters aect 10% of small businesses, whereas natural disasters have impacted more than 30% of all small businesses in the USA. According to a recent NFIB National Small Business Poll ✓ 40% of senior IT executives reported having a business continuity plan, but hadn’t tested it within the past 12 months. According to Telephony Online
  • 59.
  • 61. SCOTT KLOSOSKY Business Continuity Realities It is not a matter of “if” - it is a matter of “when” you will be impacted by an event
  • 62. SCOTT KLOSOSKY Business Continuity Realities It is not a matter of “if” - it is a matter of “when” you will be impacted by an event It is no longer feasible to allow data or software applications to be at any kind of risk because your customers have many choices
  • 63. SCOTT KLOSOSKY Business Continuity Realities It is not a matter of “if” - it is a matter of “when” you will be impacted by an event It is no longer feasible to allow data or software applications to be at any kind of risk because your customers have many choices At the moment you find out you were not properly prepared, it is too late - and no excuse will be good enough
  • 64.
  • 65. SCOTT KLOSOSKY Five Steps to BC
  • 66. SCOTT KLOSOSKY Five Steps to BC 1 - Understand what data and systems are critical to business continuity
  • 67. SCOTT KLOSOSKY Five Steps to BC 1 - Understand what data and systems are critical to business continuity 2 - Identify and fix single points of failure in your network, business processes, and
  • 68. SCOTT KLOSOSKY Five Steps to BC 1 - Understand what data and systems are critical to business continuity 2 - Identify and fix single points of failure in your network, business processes, and 3 - Create a workforce continuity plan
  • 69. SCOTT KLOSOSKY Five Steps to BC 1 - Understand what data and systems are critical to business continuity 2 - Identify and fix single points of failure in your network, business processes, and 3 - Create a workforce continuity plan 4 - Create a disaster recovery plan
  • 70. SCOTT KLOSOSKY Five Steps to BC 1 - Understand what data and systems are critical to business continuity 2 - Identify and fix single points of failure in your network, business processes, and 3 - Create a workforce continuity plan 4 - Create a disaster recovery plan 5 - Regularly train your sta on disaster response
  • 71.
  • 72. “A rock pile ceases to be a rock pile the moment a single person contemplates it, bearing within them the image of a cathedral.”
  • 73.
  • 74. SCOTT KLOSOSKY Resources Subscribe to www.technologystory.com Give me a business card with Newsletter on it This PowerPoint Give me a business card with PowerPoint written on it

Notes de l'éditeur