The Arrival of Algorithmic Business

CQkmrO4WcAA503P.png

Peter Sondergaard of Gartner explains the arrival of Algorithmic Business. 

What happens when 30 billion things connect with business and 3 billion people with smartphones? All these things and people generate vast amounts of rich data, and what companies do with that data – how they turn it into proprietary algorithms – will determine how well they maximize the opportunity presented by digital business.

“Algorithms are where the real value lies,” said Peter Sondergaard, senior vice president at Gartner and global head of research. “Algorithms define action.” Digital revenues have risen, IT organizations have gone bimodal, and the increased density of connections promises smart agents and algorithms that can do very complex things, including spawning their own, new algorithms and agents.

In today’s digital era, dynamic, digital algorithms are at the core of new customer interactions. Moving forward, companies will be valued not just on their big data, but on the algorithms that turn that data into actions and impact customers.
Next year, spending on the Internet of Things (IoT) will exceed $2.5 million dollars per minute. Gartner data shows that companies are taking advantage of the IoT opportunity. As analog revenues flatten, and decline for many industries, businesses are shifting to new sources of growth. For example, Williams-Sonoma, the 50 year-old US retail company, transformed itself to fend off digital upstarts by creating a multichannel digital strategy that marries its physical and digital stores. Now half of Williams-Sonoma’s revenues are digital.

Gartner surveys indicate that leading CEOs report their digital revenues will increase by more than 80 percent by 2020. With over half of large enterprises (125,000) launching digital business initiatives, the onus is on CIOs to take a bimodal approach by creating innovative units that run alongside traditional IT operations. To further accelerate the creation of a new digital technology platform, leading companies act as venture investors, buying a stake in small technology startups to guide their direction. They must couple this with a move beyond traditional thinking that stems from established business models. “Digital organizations start with the customer,” Mr. Sondergaard said. “They don’t ask what the customer wants, they watch what the customer does.”

The Post-App Era

Making sense of all the data about how customers behave, and what connected things tell an organization, will require algorithms to define business processes and create a differentiated customer experience. Algorithms will evaluate suppliers, define how our cars operate, and even determine the right-mix of drugs for a patient. In the purely digital world, agents will act independently based on our algorithms, in the cloud. In the 2020s, we’ll move away from using apps to rely on virtual assistants – basically, algorithms in the cloud – to guide us through our daily tasks. “People will trust software that thinks and acts for them,” Mr. Sondergaard said.

Take this to another level and the algorithms themselves will eventually become smart by learning from experience and producing results their creators never expected. Eventually, they will spawn other algorithms, creating agents out of agents or robots out of robots.
“Therefore, we have to get the algorithms right,” Mr. Sondergaard said.
In essence, algorithms spot the business moments, meaningful connections, and predict ill behaviors and threats. Mr. Sondergaard called on CIOs to be the strategic voice on the use of information, to build the right technology platform, and to become a trusted ally to their CEOs. “Calculate the value of your algorithms,” he said. “Be an algorithmic business.” 
ITWorldCanada: http://http://bit.ly/1VGS3tu

 

 

« Hackers Compromise Cisco Web
Cyber Warfare: Regional Is Becoming Global »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

Venable

Venable

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

Pentagon Group

Pentagon Group

Pentagon Group is a provider of security services in high-risk environments, remote areas and emerging markets in support of land-based, aviation, maritime and cyber operations.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.