Charity begins at home (#DigitalTransformation)

The term Digital Transformation is very strongly associated with the latest in technological development. Concepts as Artificial Intelligence, Deep Learning, Automatic Learning, Big Data, Robots and others, are the ones that capture that topic of conversation and debate.

However, it seems to me that it is precisely this approach, strongly focused on them which, in many cases, hampers and delays the digital transformation in companies.

TDIBecause this change is so trending nowadays, it is above all, a cultural change that must affect the whole organization and from there, focus on the strategy to improve the customer experience, for which the full potential will be used available at the moment.
Another point to take into account, before starting the road of transformation: culture, customers and technology are constantly changing.

What does the organization need to be able to satisfy an increasingly changing and demanding customer?

We have witnessed, on more than one occasion, how strong and powerful organizations in the late twentieth century have collapsed during these first two decades of the twenty-first century. And it is very easy to fall into the trap of thinking that innovative solutions are being generated, when what is done is try to insert in models of this century, paradigms of the last century.

InfraFailIt is not possible to think, for example, that a web page to sell through it, can be implemented with the same practices as a physical store. Without a suitable digital strategy oriented to this new public (it is necessary to be clear that they are not the same that go physically to the premises), without an infrastructure and agile business architecture and a specific logistics for this new dynamics, the attempt goes right to failure .

A recurring example of this is the Blockbuster case.

That is why digital transformation is easier for emerging or very agile companies to change. In traditional ones it is more complicated by the heavy backpack of past convictions and «successes».

So the first thing to do is look inward and see if we are ready to start an External Digital Transformation, because if we want to have a better chance in this wild world of change, we must have a solid internal base on which to support all Changes to be made and the speed to be made.

The steps that I suggest for this work of Internal Digital Transformation, are the following:

  • Be aware that nowadays the users of the systems area want the same as our customers. In fact you have to treat them as such, and therefore put together an IT strategy aimed at meeting your needs and improving your user experience.
  • Look for allies in the organization, so that the traditional friction between users and systems is broken.
  • Next, prepare to move quickly and safely to the solutions that the organization needs: Infrastructure (cloud, hyper-convergence), Comprehensive information security architecture (information, not only access to the network), streamlining and automation of internal processes, among others.

The bottom line is to incorporate in us the idea is that customers have changed and require the business to meet their needs.

That users are the customers of IT and …

Charity starts at home

 

This blog has been verified by Rise: Rce83668a34c6255ab6cb5824380acce1

The «Dark Side» (Shadow IT) 

SombrasDarthAllow or not allow. That’s the discussion I usually hear every time I talk to my colleagues about Shadow IT.

I’m not so much in agreement that we should polarize in that way, if this type of problem exists, it’s because there is a need to which we must pay attention (unsatisfied demand).

The concept of Shadow IT is already quite old, and refers to all those technological tools that the administrative and operational areas use without the IT area knowledge or control. This definition is quite broad, and so are included in this Macros in Excel, programs «in permanent demo,» applications for consolidation or exploitation of data and mobile applications for consultation or collaboration. However, all this has a common root: they are a product of a gap between what people need and what IT can provide.

From some time ago, in all companies we are seeing the incorporate of technological tools what solve some common daily problems to user, and with which they feel comfortable.

Today any C-Level can access these applications, and basically cover the need to solve a specific problem that they have at that time. Should they be suppressed? I don’t think so. What must be done with them is to control them.
But they do not cover, nor pretend to, solutions to medium or long-term problems, since they are in themselves disposable.

cadalococonsutemaShould each department have its own technology? DO NOT. It’s correct that the large number of solutions ready to use has allowed the technological needs of each area to be particular to each one, and there are parts that are not shared with any other. But allowing each department to take care of its own needs, will necessarily that the business architecture becomes a chaos and impossible to maintain in the long term. Something like a technological Babel.

A real case:

Marketing, felt that the centralized backup solution was not the right one and that the change through IT would take a lot of time and bureaucracy. So they decided to buy their timecapsule to back up. All good, but it was not taken into account that these devices are also switches, when using it as an access point to the network, at night there was a loose cable connected to one of the ports, came cleaning staff and seeing this, and to maintain order, plugged the other end into another port of the same device which generated a loop and dropped an entire segment of the network. The next day, networks guys took all morning to track down and find the problem.

The marketing «solution» caused them to lose half a day’s work themselves.

In this case it was a partial loss of service, but also the Shadow IT is the gateway to:

  • Theft / Loss of information: In the case of apps that store information, it remains in the device in which it is installed, in case the owner of the device leaves the company will go with confidential information, or in case it loses its device, information could go to fall into hands that could make misuse of it.
  • Vector input for viruses / attacks: In the case of «free» apps that are downloaded, they frequently have programming defects that some hacker can use to access our network, or that the download is accompanied by some malware that does things not wanted, like encrypt all the information and ask for redemption … does it sound?

What do we do?

Recognize that it exists. This is the most important. If you think that with all the restrictive measures, software detection systems and control of technological inventory has control of everything, let me remove you from your innocence: If a user considers that he needs something to work, he will have it. With or without our permission, and the good professionals are the worst, since the more they want to do their work in an exceptional way, the more they will find a way to have at hand all possible help, especially technological.

Know the Users. Therefore we only have to redouble our efforts to meet our internal customers, to know what they need and why; Knowing where they are going and what they are asking or they want to give to the business. If we know them, we will know what the needs are, even in advance, and therefore we can cover them and lower the incidence of finding solutions outside IT. In addition they will tell us in advance if they see something in the cloud or elsewhere, which will give us the opportunity to review it to be able to incorporate it into the systems inventory (but really do so with that intention please!).

Educate the user. If we have already been able to understand them, it is necessary to address the avalanche of information that they now have access to, so that it is useful both for them and for us. We must show the advantages and risks of looking for isolated solutions in the network, make them see a little further, and understand at least a superficial level, that the task of IT is to make everyone work in an organized and collaborative way, So that, for example, isolated applications eventually become a problem rather than an aid.

Reduce red tape. Either way, the speed at which technology moves today threatens to leave us behind. The way in which tools are evaluated should be speeded up. We can not spend months to tell the user that he can use it. The most certain thing is that by then he already used it, and that now what he needs to use is another. What I apply, in an attempt to keep me in the rhythm, is the assignment of a member of my team to help him prepare a real pilot for the evaluation. The truth is that I start the review from that very moment, so that when «the pilot» is already ready, I know where it goes and how it should be worked. If this work is finished and useful, there is nothing to review: the application has demonstrated by itself that it is necessary, my team already knows how to handle it so that it interacts with others, we know its advantages and its risks. So the subsequent «evaluation» is just a process. However, if the demo does not reach the end for any reason, it is clear that the user of the tool has more problems than advantages, and it is he who discards it.


There is no doubt that the technological knowledge of the other areas and the new members of the C-Level Club has increased considerably in recent years due to the enormous access to information we have today, but they only see the surface, they are not personnel of YOU. And not only that, but they do not have the picture as it has IT, or at least as it should have.

In any case you have to take advantage of the new technological skills of our peers so that the search for tools and part of the execution of the implementation is shared with them. This will benefit both parties as the tools chosen will best fit your needs and IT will be able to devote more and better time to integration with the company’s global architecture.

alltogetherAs discussed in other articles, CIO tasks are evolving. Big Data, the bursting of artificial intelligence, now accessible to everyone through apps, and all new trends make the current challenge for IT heads to orchestrate everything so that they work in an organized way, DO NOT FORGET, safely in the business information as for the users themselves.

The adventure just started, companions! May the force be with us.

Crea un blog o un sitio web gratuitos con WordPress.com.

Subir ↑