The Arrival of Algorithmic Business

CQkmrO4WcAA503P.png

Peter Sondergaard of Gartner explains the arrival of Algorithmic Business. 

What happens when 30 billion things connect with business and 3 billion people with smartphones? All these things and people generate vast amounts of rich data, and what companies do with that data – how they turn it into proprietary algorithms – will determine how well they maximize the opportunity presented by digital business.

“Algorithms are where the real value lies,” said Peter Sondergaard, senior vice president at Gartner and global head of research. “Algorithms define action.” Digital revenues have risen, IT organizations have gone bimodal, and the increased density of connections promises smart agents and algorithms that can do very complex things, including spawning their own, new algorithms and agents.

In today’s digital era, dynamic, digital algorithms are at the core of new customer interactions. Moving forward, companies will be valued not just on their big data, but on the algorithms that turn that data into actions and impact customers.
Next year, spending on the Internet of Things (IoT) will exceed $2.5 million dollars per minute. Gartner data shows that companies are taking advantage of the IoT opportunity. As analog revenues flatten, and decline for many industries, businesses are shifting to new sources of growth. For example, Williams-Sonoma, the 50 year-old US retail company, transformed itself to fend off digital upstarts by creating a multichannel digital strategy that marries its physical and digital stores. Now half of Williams-Sonoma’s revenues are digital.

Gartner surveys indicate that leading CEOs report their digital revenues will increase by more than 80 percent by 2020. With over half of large enterprises (125,000) launching digital business initiatives, the onus is on CIOs to take a bimodal approach by creating innovative units that run alongside traditional IT operations. To further accelerate the creation of a new digital technology platform, leading companies act as venture investors, buying a stake in small technology startups to guide their direction. They must couple this with a move beyond traditional thinking that stems from established business models. “Digital organizations start with the customer,” Mr. Sondergaard said. “They don’t ask what the customer wants, they watch what the customer does.”

The Post-App Era

Making sense of all the data about how customers behave, and what connected things tell an organization, will require algorithms to define business processes and create a differentiated customer experience. Algorithms will evaluate suppliers, define how our cars operate, and even determine the right-mix of drugs for a patient. In the purely digital world, agents will act independently based on our algorithms, in the cloud. In the 2020s, we’ll move away from using apps to rely on virtual assistants – basically, algorithms in the cloud – to guide us through our daily tasks. “People will trust software that thinks and acts for them,” Mr. Sondergaard said.

Take this to another level and the algorithms themselves will eventually become smart by learning from experience and producing results their creators never expected. Eventually, they will spawn other algorithms, creating agents out of agents or robots out of robots.
“Therefore, we have to get the algorithms right,” Mr. Sondergaard said.
In essence, algorithms spot the business moments, meaningful connections, and predict ill behaviors and threats. Mr. Sondergaard called on CIOs to be the strategic voice on the use of information, to build the right technology platform, and to become a trusted ally to their CEOs. “Calculate the value of your algorithms,” he said. “Be an algorithmic business.” 
ITWorldCanada: http://http://bit.ly/1VGS3tu

 

 

« Hackers Compromise Cisco Web
Cyber Warfare: Regional Is Becoming Global »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

France Cybersecurity

France Cybersecurity

France Cybersecurity represents the French cybersecurity industry to raise international awareness of French cybersecurity capabilities and solutions.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

Blueskytec (BST)

Blueskytec (BST)

BST provide accredited, patent-pending commercial cyber security hardware and software to protect your cyber physical systems from attack.

Octane OC

Octane OC

OCTANe is building the SoCal of tomorrow. We drive innovation and growth by connecting people, resources and capital. Our Incubator focus is FinTech, Data Analytics and Cybersecurity.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

CENSUS

CENSUS

CENSUS is a Cybersecurity services provider offering services to multiple industries worldwide such as Security Testing, Code Auditing, Secure SDLC, Vulnerability Research and Consulting Services.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.