The Arrival of Algorithmic Business

CQkmrO4WcAA503P.png

Peter Sondergaard of Gartner explains the arrival of Algorithmic Business. 

What happens when 30 billion things connect with business and 3 billion people with smartphones? All these things and people generate vast amounts of rich data, and what companies do with that data – how they turn it into proprietary algorithms – will determine how well they maximize the opportunity presented by digital business.

“Algorithms are where the real value lies,” said Peter Sondergaard, senior vice president at Gartner and global head of research. “Algorithms define action.” Digital revenues have risen, IT organizations have gone bimodal, and the increased density of connections promises smart agents and algorithms that can do very complex things, including spawning their own, new algorithms and agents.

In today’s digital era, dynamic, digital algorithms are at the core of new customer interactions. Moving forward, companies will be valued not just on their big data, but on the algorithms that turn that data into actions and impact customers.
Next year, spending on the Internet of Things (IoT) will exceed $2.5 million dollars per minute. Gartner data shows that companies are taking advantage of the IoT opportunity. As analog revenues flatten, and decline for many industries, businesses are shifting to new sources of growth. For example, Williams-Sonoma, the 50 year-old US retail company, transformed itself to fend off digital upstarts by creating a multichannel digital strategy that marries its physical and digital stores. Now half of Williams-Sonoma’s revenues are digital.

Gartner surveys indicate that leading CEOs report their digital revenues will increase by more than 80 percent by 2020. With over half of large enterprises (125,000) launching digital business initiatives, the onus is on CIOs to take a bimodal approach by creating innovative units that run alongside traditional IT operations. To further accelerate the creation of a new digital technology platform, leading companies act as venture investors, buying a stake in small technology startups to guide their direction. They must couple this with a move beyond traditional thinking that stems from established business models. “Digital organizations start with the customer,” Mr. Sondergaard said. “They don’t ask what the customer wants, they watch what the customer does.”

The Post-App Era

Making sense of all the data about how customers behave, and what connected things tell an organization, will require algorithms to define business processes and create a differentiated customer experience. Algorithms will evaluate suppliers, define how our cars operate, and even determine the right-mix of drugs for a patient. In the purely digital world, agents will act independently based on our algorithms, in the cloud. In the 2020s, we’ll move away from using apps to rely on virtual assistants – basically, algorithms in the cloud – to guide us through our daily tasks. “People will trust software that thinks and acts for them,” Mr. Sondergaard said.

Take this to another level and the algorithms themselves will eventually become smart by learning from experience and producing results their creators never expected. Eventually, they will spawn other algorithms, creating agents out of agents or robots out of robots.
“Therefore, we have to get the algorithms right,” Mr. Sondergaard said.
In essence, algorithms spot the business moments, meaningful connections, and predict ill behaviors and threats. Mr. Sondergaard called on CIOs to be the strategic voice on the use of information, to build the right technology platform, and to become a trusted ally to their CEOs. “Calculate the value of your algorithms,” he said. “Be an algorithmic business.” 
ITWorldCanada: http://http://bit.ly/1VGS3tu

 

 

« Hackers Compromise Cisco Web
Cyber Warfare: Regional Is Becoming Global »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.

Abstract Security

Abstract Security

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.

CyberAntix

CyberAntix

CyberAntix offers Premium CyberSecurity for your business using an advanced Security Operations Centre technology and process platform reinforced by a steadfast and expert SOC team.