The Arrival of Algorithmic Business

CQkmrO4WcAA503P.png

Peter Sondergaard of Gartner explains the arrival of Algorithmic Business. 

What happens when 30 billion things connect with business and 3 billion people with smartphones? All these things and people generate vast amounts of rich data, and what companies do with that data – how they turn it into proprietary algorithms – will determine how well they maximize the opportunity presented by digital business.

“Algorithms are where the real value lies,” said Peter Sondergaard, senior vice president at Gartner and global head of research. “Algorithms define action.” Digital revenues have risen, IT organizations have gone bimodal, and the increased density of connections promises smart agents and algorithms that can do very complex things, including spawning their own, new algorithms and agents.

In today’s digital era, dynamic, digital algorithms are at the core of new customer interactions. Moving forward, companies will be valued not just on their big data, but on the algorithms that turn that data into actions and impact customers.
Next year, spending on the Internet of Things (IoT) will exceed $2.5 million dollars per minute. Gartner data shows that companies are taking advantage of the IoT opportunity. As analog revenues flatten, and decline for many industries, businesses are shifting to new sources of growth. For example, Williams-Sonoma, the 50 year-old US retail company, transformed itself to fend off digital upstarts by creating a multichannel digital strategy that marries its physical and digital stores. Now half of Williams-Sonoma’s revenues are digital.

Gartner surveys indicate that leading CEOs report their digital revenues will increase by more than 80 percent by 2020. With over half of large enterprises (125,000) launching digital business initiatives, the onus is on CIOs to take a bimodal approach by creating innovative units that run alongside traditional IT operations. To further accelerate the creation of a new digital technology platform, leading companies act as venture investors, buying a stake in small technology startups to guide their direction. They must couple this with a move beyond traditional thinking that stems from established business models. “Digital organizations start with the customer,” Mr. Sondergaard said. “They don’t ask what the customer wants, they watch what the customer does.”

The Post-App Era

Making sense of all the data about how customers behave, and what connected things tell an organization, will require algorithms to define business processes and create a differentiated customer experience. Algorithms will evaluate suppliers, define how our cars operate, and even determine the right-mix of drugs for a patient. In the purely digital world, agents will act independently based on our algorithms, in the cloud. In the 2020s, we’ll move away from using apps to rely on virtual assistants – basically, algorithms in the cloud – to guide us through our daily tasks. “People will trust software that thinks and acts for them,” Mr. Sondergaard said.

Take this to another level and the algorithms themselves will eventually become smart by learning from experience and producing results their creators never expected. Eventually, they will spawn other algorithms, creating agents out of agents or robots out of robots.
“Therefore, we have to get the algorithms right,” Mr. Sondergaard said.
In essence, algorithms spot the business moments, meaningful connections, and predict ill behaviors and threats. Mr. Sondergaard called on CIOs to be the strategic voice on the use of information, to build the right technology platform, and to become a trusted ally to their CEOs. “Calculate the value of your algorithms,” he said. “Be an algorithmic business.” 
ITWorldCanada: http://http://bit.ly/1VGS3tu

 

 

« Hackers Compromise Cisco Web
Cyber Warfare: Regional Is Becoming Global »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Verlingue

Verlingue

Verlingue (formerly ICB Group) is a leading corporate insurance broker providing Insurance, Risk Management and related advice to businesses and private clients.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Six Degrees Group

Six Degrees Group

Six Degrees is a specialist managed IT services organisation offering a range of solutions including Managed Security Services.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

Intrinsyc Technologies

Intrinsyc Technologies

Intrinsyc provides product development services and Edge Computing modules that are helping to take the Internet of Things products to the next level.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

Pentest360

Pentest360

Pentest360 is a 24x7x365 Penetration testing service offered through a feature-rich, centralised platform on the cloud that delivers instant visibility during security assessments.

Australian Cyber Collaboration Centre (A3C)

Australian Cyber Collaboration Centre (A3C)

A3C assists business to understand and navigate the cyber ecosystem to address their specific cyber needs. It is a central connection point for businesses looking to improve their cyber resilience.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

Securonix

Securonix

Securonix delivers a next generation security analytics and operations management platform for the modern era of big data and advanced cyber threats.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

TerraEagle

TerraEagle

Terraeagle is a boutique cyber security services company providing tailor-made solutions. Our core competency is in SOCaaS, MDRaaS & and Incident Response Retainer Services.