The Arrival of Algorithmic Business

CQkmrO4WcAA503P.png

Peter Sondergaard of Gartner explains the arrival of Algorithmic Business. 

What happens when 30 billion things connect with business and 3 billion people with smartphones? All these things and people generate vast amounts of rich data, and what companies do with that data – how they turn it into proprietary algorithms – will determine how well they maximize the opportunity presented by digital business.

“Algorithms are where the real value lies,” said Peter Sondergaard, senior vice president at Gartner and global head of research. “Algorithms define action.” Digital revenues have risen, IT organizations have gone bimodal, and the increased density of connections promises smart agents and algorithms that can do very complex things, including spawning their own, new algorithms and agents.

In today’s digital era, dynamic, digital algorithms are at the core of new customer interactions. Moving forward, companies will be valued not just on their big data, but on the algorithms that turn that data into actions and impact customers.
Next year, spending on the Internet of Things (IoT) will exceed $2.5 million dollars per minute. Gartner data shows that companies are taking advantage of the IoT opportunity. As analog revenues flatten, and decline for many industries, businesses are shifting to new sources of growth. For example, Williams-Sonoma, the 50 year-old US retail company, transformed itself to fend off digital upstarts by creating a multichannel digital strategy that marries its physical and digital stores. Now half of Williams-Sonoma’s revenues are digital.

Gartner surveys indicate that leading CEOs report their digital revenues will increase by more than 80 percent by 2020. With over half of large enterprises (125,000) launching digital business initiatives, the onus is on CIOs to take a bimodal approach by creating innovative units that run alongside traditional IT operations. To further accelerate the creation of a new digital technology platform, leading companies act as venture investors, buying a stake in small technology startups to guide their direction. They must couple this with a move beyond traditional thinking that stems from established business models. “Digital organizations start with the customer,” Mr. Sondergaard said. “They don’t ask what the customer wants, they watch what the customer does.”

The Post-App Era

Making sense of all the data about how customers behave, and what connected things tell an organization, will require algorithms to define business processes and create a differentiated customer experience. Algorithms will evaluate suppliers, define how our cars operate, and even determine the right-mix of drugs for a patient. In the purely digital world, agents will act independently based on our algorithms, in the cloud. In the 2020s, we’ll move away from using apps to rely on virtual assistants – basically, algorithms in the cloud – to guide us through our daily tasks. “People will trust software that thinks and acts for them,” Mr. Sondergaard said.

Take this to another level and the algorithms themselves will eventually become smart by learning from experience and producing results their creators never expected. Eventually, they will spawn other algorithms, creating agents out of agents or robots out of robots.
“Therefore, we have to get the algorithms right,” Mr. Sondergaard said.
In essence, algorithms spot the business moments, meaningful connections, and predict ill behaviors and threats. Mr. Sondergaard called on CIOs to be the strategic voice on the use of information, to build the right technology platform, and to become a trusted ally to their CEOs. “Calculate the value of your algorithms,” he said. “Be an algorithmic business.” 
ITWorldCanada: http://http://bit.ly/1VGS3tu

 

 

« Hackers Compromise Cisco Web
Cyber Warfare: Regional Is Becoming Global »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Cansure

Cansure

Cansure is a leading insurance provider in Canada offering a broad range of property & casualty insurance solutions including Cyber & Data Breach insurance.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

Venrock

Venrock

Venrock helps entrepreneurs build some of the world's most disruptive, successful companies. We invest in technology: Security, Cloud Services, Big Data, Healthcare IT, AdTech.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

SIGLA Group

SIGLA Group

SIGLA Group specialize in the design and development of IT and OT solutions, from analysis to design, from implementation to commissioning, as well as consultancy, training and assistance.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.