SlideShare uma empresa Scribd logo
1 de 55
Riding and Capitalizing 
the Next Wave of 
Information Technology 
Goutama Bachtiar 
IT Advisor, Auditor, Consultant and Trainer 
@goudotmobi
My Professional Profile 
 16 years of experience with exposure in IT Governance, 
Risk, Security, Compliance, Assurance and Management. 
 Advisor at six companies. 
 ISACA International Subject Matter Expert, Certification 
Exam and QAE Developer. 
 Project Management Institute International Program 
Evaluator, Certification Exam and Study Materials 
Developer. 
 Reviewer Panel at three international journals. 
 Have audited and consulted 30+ companies. 
 Have written, edited and reviewed 300+ manuscripts, 
articles and pieces in ICT, business and management 
spaces. 
 Have attained 65 international certifications under his belt. 
2
To d a y ’s Se s s i o n 
 IT and Management: Exploring Opportunities 
and Overcoming Challenges 
 Addressing Management Concerns and 
Influencing Factors 
 Valuing Agility and Consumerization 
 Comprehending Strategic Planning and 
Competitive Models 
 Ever Wonder How Important IT to Your (IT) 
Careers? 
3
IT AND MANAGEMENT: 
EXPLORING THE OPPORTUNITIES 
AND 
OVERCOMING THE CHALLENGES 
4
Data Analytics 
Specialized software, capabilities, and components 
exploring huge volumes of data to provide greater 
insight and intelligence rapidly. 
It includes: 
Locating and collecting reliable data from multiple 
sources in various formats. 
Preparing data for analysis by organizing, 
standardizing, removing duplicates and data 
cleansing. 
Performing correct and verifying analyses, and in the 
end do the reporting. 
5
What’s Data Analytics for? 
To help organizations achieving business 
outcomes: 
• Grow their customer base 
• Retain the most profitable customers 
• Continuously improve operational efficiency 
• Transform and automate financial processes 
• Detect and deter fraud 
6
Real World Examples 
Overstock.com 
“We’re not trying to use social media as 
a sales piece as much as an information 
gathering piece”. 
“Finding out what our customers want; 
whether they like a product; and how 
could we sell it better”. 
7
Real World Examples (cont’d) 
Best Buy. 
Electronics retailer Best Buy learned 
how unpopular the restocking fees were 
through social media. 
They changed its product-return policies, 
eliminating fees that were hurting sales. 
8
Real World Examples (cont’d) 
Starbucks. 
Coffee retailer Starbucks prepared to monitor 
customers’ tweets on a new coffee flavor on the 
day it was introduced by capitalizing on Social 
Media Analytics. 
A huge majority of tweets were about the 
complaints on the coffee’s higher price rather than 
its’ intense taste. 
By the next day, they had dropped the price. 
9
Data Analytics Challenges 
 “Messy” data 
Data (e.g., tweets, posts, clickstreams, 
images, videos, audios) that hardly be 
organized in a way that a 
computer/application/software could easily 
process. 
 Data sources 
Smartphones, feature phones, social media 
(social networks, micro blogs, forum, mailing 
lists), wearable devices, other mobile devices 
and even more machines (TV, AC, 
Refrigerator, etc). 
10
Structured 
Data 
Unstructured 
Data 
Semi- 
Structured 
Data 
Big Data 
Introducing Big Data
How “BIG” are They? 
Source Type Big Data Usage Popular Sources 
12 
Social Data 
• Provides insight for companies on 
consumer behavior and buying patterns 
• Can be integrated with CRM (Customer 
Relationship Management) data for 
analysis of customer behavior 
Facebook, Twitter, Google+, 
and 
LinkedIn 
Machine Data 
• Can be real-time data from sensors that 
track parts and monitor machinery, also 
called the Internet of Things 
• Includes web logs that can track user 
behavior online 
Location data such as NFC 
and 
RFID chip readings 
Transactional 
Data 
• Helps large retailers and B2B (Business 
to Business) companies in customer 
segmentation 
• Helps to track data transactions related 
to product IDs, prices, payment 
information, manufacturer date, etc. 
Retail websites 
such as Amazon. 
Com, eBay and Domino’s 
pizza chain 
Credit: GreyCampus
Benefits of Big Data 
Big Data Analytics Benefits Proportion Of Businesses Reporting Benefits 
Better social Influencer marketing 61% 
More accurate business insights 45% 
Segmentation of customer base 41% 
Identifying sales and market opportunities 38% 
Automated decisions for real-time process 37% 
Detection of fraud 33% 
Quantification of risks 30% 
Better planning and forecasting 29% 
Identifying cost drivers 29% 
Credit: GreyCampus
Cloud Computing 
• Method of providing shared computing resources 
that include applications, storage, computing, 
networking, development, and deployment 
platforms, as well as business processes. 
• Offers easy availability of computing resources to 
an application 
• Allows us paying for these services accordingly, 
depending on what and how much we use. 
14
Illustrating Cloud Computing 
Working of the Cloud 
Computing Model 
15 
Credit: GreyCampus
Internet of Things (IoT) 
“Things having identities and virtual 
personalities operating in smart spaces using 
intelligent interfaces to connect and 
communicate within social, environmental, 
and user contexts”. ~ IoT in 2020 
“A proposed development of the internet in 
which everyday objects have network 
connectivity, allowing them to send and 
receive data.” ~ Oxford Dictionary, 2013 
16
17 
IoT: Smart Mirror 
Credit: Vala Afshar
18 
IoT: Blood Pressure Monitor
19 
IoT: Smart Garbage Cans
20 
IoT: Blood Pressure Monitor
IoT: Smart Home 
21
IoT: Smart Car 
22
IoT: E-Healthcare 23
Summing IoT Up 
From ANY TIME, ANY PLACE connectivity 
for ANYONE, we have CONNECTIVITY 
for ANYTHING. 
24
ADDRESSING 
MANAGEMENT CONCERNS AND 
INFLUENCING FACTORS 
25
Business, Information and IT 
 Business performance relies on quality of 
information and IT Capabilities. 
 An organization’s accomplishment depends 
on what IT can do for them. 
 Business and technology teams need to 
align, collaborate and synergize on smart, 
cost-effective, and collaborative data 
management. 
 Implementation is the most influential key 
success factor. 
26
Management Concerns and Influential ITs 
27
Business Productivity and Cost 
Reduction 
 Increasing level of output, while 
maintaining the same level of inputs. 
 Maintaining level of output, while 
reducing the level of inputs. 
 Combination of the above two. 
28
IT and Business Alignment 
 Starting from Organization Strategic Plan 
towards IT Strategic Plan. 
 IT division/department have to understand 
organizational objectives, goals, visions, 
missions, strategies, risks, and 
opportunities. 
 While the business must understand IT’s 
capability and capacity. 
29
Business Agility and Time to Market 
 Aggregatively, the markets have yet to 
fully recovered from global recession. 
 An agile enterprise, with the ability to 
adapt and respond rapidly, are the magic 
words. 
 Furthermore, Agile becomes pretty 
common Project Management 
methodology. 
30
Business Process Reengineering (BPR) 
 BP is a series of tasks performed by 
people/systems designed to produce a 
specific output/outcome. 
 Examples: customer ordering process, 
credit approval and shipping a product. 
 1) Eliminating unnecessary non–value 
added processes, 2) simplify and 3) 
automate remaining processes to reduce 
cycle time, labor, and costs. 
31
IT Reliability and Efficiency 
 Accuracy, availability, security, and 
accessibility of data and information 
systems is a must. 
 Why? So the executives and 
managements will put their trusts and 
reliance within the systems. 
32
Business Intelligence (BI) 
 Aimed to run the business more efficiently, 
identify trends and relationships in 
organizational data, create/capitalize the 
advantage of business opportunities. 
 Required integration, computation, and 
analysis of massive data repositories. 
33
Cloud Computing 
 As known as cloud infrastructure or cloud 
services. 
 Various computing and network 
arrangements. 
 Enable anyone or any organization to 
deploy tools that can scale on demand to 
serve as many users as necessary. 
34
Cloud Delivery Models 
Cloud Model Description 
IaaS 
• Infrastructure as a Service (IaaS) Infrastructure refers to 
hardware, storage, and network. This type of cloud can be used 
as public and private both. 
• Examples: virtual machines, load balancers, and network 
attached storage. 
PaaS 
• Provides a platform to write and run user’s applications. 
• Platform refers to the operating system, which is a collection of 
middleware services and software development and deployment 
tools. 
• Examples: Windows Azure and Google App Engine (GAE). 
SaaS 
• Provides software that can be accessed from anywhere. 
• They are offered on monthly or yearly contracts. 
• For SaaS to work, the infrastructure (IaaS) and the platform 
(PaaS) must be in place. 
35 
Credit: GreyCampus
Enterprise Resource Planning (ERP) 
 IT 
Systems/Software/Services/Applications 
supporting essential business processes 
and operations. 
 Commercial or open-source packages 
implemented as modules. 
 Examples of modules are: Sales and 
Distribution, Material Management, 
Human Capital Management, Finance and 
Controllership. 
36
Software as a Service (SaaS) 
 Pay-per-use arrangement. 
 As an option, instead of buying and 
installing enterprise apps, users access it 
from a SaaS vendor over a network via a 
browser. 
 Anytime, anywhere as long as the internet 
is there. 
37
Collaboration and Workflow Tools 
 Power people to work together and 
collaborate in (more) organized ways. 
 Allow us to manage our tasks more 
efficiently and effectively. 
 Examples: Google Docs, Microsoft 
Share Point, Office 365, and Skype. 
38
VALUING IT AGILITY AND 
CONSUMERIZATION 
39
 Agile is more than just quick response 
 Responsive 
IT capacity can be easily scaled up or 
down as needed. 
 Flexible 
Ability to quickly integrate new business 
functions. 
Easily (re)configure software or apps. 
40 
What Agile is All About
 The migration of consumer technology into 
enterprise environments. 
 Driven by mobile devices, data plan, apps, 
platforms, social media, and telecommuting. 
 Above drivers become part of our personal 
and professional life. 
 Flexi work time and flexi working environment 
are adopted rapidly. 
 Bring Your Own Device (BYOD). 
41 
IT Consumerization
COMPREHENDING 
STRATEGIC PLANNING 
AND COMPETITIVE MODELS 
42
Defines plan on how a business will achieve its 
mission, goals, and objectives. 
 Long-term direction of our business 
 Overall plan for deploying our resources 
 List down any trade-offs 
 Identify any resources to share 
 Our position compared to competitors 
 How to achieve competitive advantage over 
rivals in order to maximize profitability 
43 
Let’s Start with a Strategy
 Scanning and reviewing of political, social, 
economic, and technical factors of an 
organization. 
 SWOT 
Evaluation of strengths and weaknesses 
(internal) and opportunities and threats 
(external). 
44 
Then Strategic Analysis
Take this as an Example 
• Strengths: market leader; highly-achiever 
workforce; sophisticated business software 
• Weaknesses: assurance, risk and 
compliance; 
• Opportunities: Positive economic outlook; 
a developing market; ability to create a new 
market, product or service 
• Threats: Price wars by competitors; Low 
barrier to entry 
45
Porter’s Competitive Forces Model 
46
Here Comes the Strategic Planning 
“A series of strategic activities an 
organization selects and arranges its 
businesses or services to achieve goals 
and objectives even when unexpected 
events disrupt its businesses, products, or 
services.” 
47
EVER WONDER HOW IMPORTANT IT 
TO YOUR (IT) CAREERS? 
48
What IT Have Been Doing These 
Days? 
 IT creates (new) markets, (new) 
businesses, (new) products, and (new) 
careers. 
 New technologies such as 4G networks, 
wearable devices, Machine-to-Machine 
communication, embedded sensors, IPv6. 
49
Top Growing Occupations 2010-2020 
50
Chief Technology Officer (CTO) 
 Evaluate the latest and most innovative 
technologies. 
 Determine how they could be implemented 
for competitive advantage. 
 Develop technical standards, deploy 
technology, and supervise resources who 
deal with the daily IT operational activities 
51
Chief Information Officer (CIO) 
 While CTOs are more concerned with 
technology itself, whereas CIOs are much 
more concerned with biz applications and 
how to manage them. 
 Manage businesses IT systems and 
functions, creates and delivers IT 
strategies. 
 Focus more onto the IS and employees 
within their organizations. 
52
Other CxOs 
 Chief Information Security Officer (CISO) 
Identifying, developing, implementing and 
maintaining Information Security policies, 
processes and procedures across the 
organizations. 
 Chief Data Privacy Officer (CDPO) 
Responsible for Data Privacy both 
customers and employees within their 
organizations. 
53
References 
Information Technology for Management: 
Advancing Sustainable, Profitable Business 
Growth 9th Edition, authored by Turban, 
Volonino and Wood, published by John Wiley 
and Sons, Inc., 2013. 
54
Thank You! 
55

Mais conteúdo relacionado

Mais procurados

What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information GovernanceAtle Skjekkeland
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
White Paper: The Business Case for IT Governance in the Age of Digital Transf...
White Paper: The Business Case for IT Governance in the Age of Digital Transf...White Paper: The Business Case for IT Governance in the Age of Digital Transf...
White Paper: The Business Case for IT Governance in the Age of Digital Transf...SDI Presence LLC
 
CDO Vision: The Value of Data
CDO Vision: The Value of DataCDO Vision: The Value of Data
CDO Vision: The Value of DataDATAVERSITY
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Fintech workshop Part I - Law Society of Hong Kong - Xccelerate
Fintech workshop Part I - Law Society of Hong Kong - XccelerateFintech workshop Part I - Law Society of Hong Kong - Xccelerate
Fintech workshop Part I - Law Society of Hong Kong - XccelerateHenrique Centieiro
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?Eryk Budi Pratama
 
Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentationIgor Swann
 
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningDigital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningCognizant
 
IBM Solutions Connect 2013 - Getting started with Big Data
IBM Solutions Connect 2013 - Getting started with Big DataIBM Solutions Connect 2013 - Getting started with Big Data
IBM Solutions Connect 2013 - Getting started with Big DataIBM Software India
 
8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too lateJohn Mancini
 
Gartner IT Enterprise Key Metrics Data 2011
Gartner IT Enterprise Key Metrics Data 2011Gartner IT Enterprise Key Metrics Data 2011
Gartner IT Enterprise Key Metrics Data 2011cathylums
 
Teleran Briefing July 2014
Teleran Briefing July 2014Teleran Briefing July 2014
Teleran Briefing July 2014Howard Meadow
 
Planning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessPlanning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessRich Medina
 
Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?PECB
 
Data Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICOData Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICOCaserta
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionCapgemini
 

Mais procurados (20)

What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
White Paper: The Business Case for IT Governance in the Age of Digital Transf...
White Paper: The Business Case for IT Governance in the Age of Digital Transf...White Paper: The Business Case for IT Governance in the Age of Digital Transf...
White Paper: The Business Case for IT Governance in the Age of Digital Transf...
 
CDO Vision: The Value of Data
CDO Vision: The Value of DataCDO Vision: The Value of Data
CDO Vision: The Value of Data
 
In sync10 grc_suite
In sync10 grc_suiteIn sync10 grc_suite
In sync10 grc_suite
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Fintech workshop Part I - Law Society of Hong Kong - Xccelerate
Fintech workshop Part I - Law Society of Hong Kong - XccelerateFintech workshop Part I - Law Society of Hong Kong - Xccelerate
Fintech workshop Part I - Law Society of Hong Kong - Xccelerate
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?
 
Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentation
 
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningDigital Enterprise Architecture: Four Elements Critical to Solution Envisioning
Digital Enterprise Architecture: Four Elements Critical to Solution Envisioning
 
IBM Solutions Connect 2013 - Getting started with Big Data
IBM Solutions Connect 2013 - Getting started with Big DataIBM Solutions Connect 2013 - Getting started with Big Data
IBM Solutions Connect 2013 - Getting started with Big Data
 
8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late
 
Gartner IT Enterprise Key Metrics Data 2011
Gartner IT Enterprise Key Metrics Data 2011Gartner IT Enterprise Key Metrics Data 2011
Gartner IT Enterprise Key Metrics Data 2011
 
Teleran Briefing July 2014
Teleran Briefing July 2014Teleran Briefing July 2014
Teleran Briefing July 2014
 
Planning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessPlanning Information Governance and Litigation Readiness
Planning Information Governance and Litigation Readiness
 
Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?Digital Transformation 101 — How Will It Affect Your Business?
Digital Transformation 101 — How Will It Affect Your Business?
 
Data Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICOData Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICO
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
 

Semelhante a Riding and Capitalizing the Next Wave of Information Technology

Business Intelligence, Data Analytics, and AI
Business Intelligence, Data Analytics, and AIBusiness Intelligence, Data Analytics, and AI
Business Intelligence, Data Analytics, and AIJohnny Jepp
 
What are the Top Technology Trends For Your Business?
What are the Top Technology Trends For Your Business?What are the Top Technology Trends For Your Business?
What are the Top Technology Trends For Your Business?Albiorix Technology
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise AnalyticsDATAVERSITY
 
Building the Cognitive Era : Big Data Strategies
Building the Cognitive Era : Big Data StrategiesBuilding the Cognitive Era : Big Data Strategies
Building the Cognitive Era : Big Data StrategiesKevin Sigliano
 
8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdflearntransformation0
 
IBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day KeynoteIBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day KeynoteIBM Software India
 
Certus Accelerate - Building the business case for why you need to invest in ...
Certus Accelerate - Building the business case for why you need to invest in ...Certus Accelerate - Building the business case for why you need to invest in ...
Certus Accelerate - Building the business case for why you need to invest in ...Certus Solutions
 
Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101Mukul Krishna
 
Emerging trend in information system and operation.ppt
Emerging trend in information system and operation.pptEmerging trend in information system and operation.ppt
Emerging trend in information system and operation.pptmQuangThanhT
 
Data Analytics And Business Decision.pdf
Data Analytics And Business Decision.pdfData Analytics And Business Decision.pdf
Data Analytics And Business Decision.pdfCiente
 
Data Analytics And Business Decision.pdf
Data Analytics And Business Decision.pdfData Analytics And Business Decision.pdf
Data Analytics And Business Decision.pdfCiente
 
How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015Ihor Malchenyuk
 
Oea big-data-guide-1522052
Oea big-data-guide-1522052Oea big-data-guide-1522052
Oea big-data-guide-1522052kavi172
 
Oea big-data-guide-1522052
Oea big-data-guide-1522052Oea big-data-guide-1522052
Oea big-data-guide-1522052Gilbert Rozario
 
How data analytics will drive the future of banking
How data analytics will drive the future of bankingHow data analytics will drive the future of banking
How data analytics will drive the future of bankingSamuel Olaegbe
 
Day 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_pressDay 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_pressIntelAPAC
 
How Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive InnovationHow Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive InnovationCognizant
 
Big Data in Retail. Infographic
Big Data in Retail. InfographicBig Data in Retail. Infographic
Big Data in Retail. InfographicInData Labs
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
 

Semelhante a Riding and Capitalizing the Next Wave of Information Technology (20)

Business Intelligence, Data Analytics, and AI
Business Intelligence, Data Analytics, and AIBusiness Intelligence, Data Analytics, and AI
Business Intelligence, Data Analytics, and AI
 
What are the Top Technology Trends For Your Business?
What are the Top Technology Trends For Your Business?What are the Top Technology Trends For Your Business?
What are the Top Technology Trends For Your Business?
 
Transforming Big Data into business value
Transforming Big Data into business valueTransforming Big Data into business value
Transforming Big Data into business value
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Building the Cognitive Era : Big Data Strategies
Building the Cognitive Era : Big Data StrategiesBuilding the Cognitive Era : Big Data Strategies
Building the Cognitive Era : Big Data Strategies
 
8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf8 Tools For Digital Transformation For Every Leader.pdf
8 Tools For Digital Transformation For Every Leader.pdf
 
IBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day KeynoteIBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day Keynote
 
Certus Accelerate - Building the business case for why you need to invest in ...
Certus Accelerate - Building the business case for why you need to invest in ...Certus Accelerate - Building the business case for why you need to invest in ...
Certus Accelerate - Building the business case for why you need to invest in ...
 
Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101Internet of things, Big Data and Analytics 101
Internet of things, Big Data and Analytics 101
 
Emerging trend in information system and operation.ppt
Emerging trend in information system and operation.pptEmerging trend in information system and operation.ppt
Emerging trend in information system and operation.ppt
 
Data Analytics And Business Decision.pdf
Data Analytics And Business Decision.pdfData Analytics And Business Decision.pdf
Data Analytics And Business Decision.pdf
 
Data Analytics And Business Decision.pdf
Data Analytics And Business Decision.pdfData Analytics And Business Decision.pdf
Data Analytics And Business Decision.pdf
 
How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015
 
Oea big-data-guide-1522052
Oea big-data-guide-1522052Oea big-data-guide-1522052
Oea big-data-guide-1522052
 
Oea big-data-guide-1522052
Oea big-data-guide-1522052Oea big-data-guide-1522052
Oea big-data-guide-1522052
 
How data analytics will drive the future of banking
How data analytics will drive the future of bankingHow data analytics will drive the future of banking
How data analytics will drive the future of banking
 
Day 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_pressDay 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_press
 
How Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive InnovationHow Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive Innovation
 
Big Data in Retail. Infographic
Big Data in Retail. InfographicBig Data in Retail. Infographic
Big Data in Retail. Infographic
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 

Mais de Goutama Bachtiar

Crypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and BlockchainCrypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and BlockchainGoutama Bachtiar
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Goutama Bachtiar
 
Blockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking IndustryBlockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking IndustryGoutama Bachtiar
 
Leveraging Agile Project Management with Scrum
Leveraging Agile Project Management with ScrumLeveraging Agile Project Management with Scrum
Leveraging Agile Project Management with ScrumGoutama Bachtiar
 
Library of Information Technology Icons
Library of Information Technology IconsLibrary of Information Technology Icons
Library of Information Technology IconsGoutama Bachtiar
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereGoutama Bachtiar
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudGoutama Bachtiar
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationGoutama Bachtiar
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet BankingGoutama Bachtiar
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryGoutama Bachtiar
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Goutama Bachtiar
 
Implementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft VisioImplementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft VisioGoutama Bachtiar
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesGoutama Bachtiar
 
Crafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to InvestorsCrafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to InvestorsGoutama Bachtiar
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormGoutama Bachtiar
 
Developing and Managing Educational Institution Policies
Developing and Managing Educational Institution PoliciesDeveloping and Managing Educational Institution Policies
Developing and Managing Educational Institution PoliciesGoutama Bachtiar
 

Mais de Goutama Bachtiar (20)

Crypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and BlockchainCrypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and Blockchain
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018
 
Blockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking IndustryBlockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking Industry
 
Delving into Fintech
Delving into FintechDelving into Fintech
Delving into Fintech
 
Leveraging Agile Project Management with Scrum
Leveraging Agile Project Management with ScrumLeveraging Agile Project Management with Scrum
Leveraging Agile Project Management with Scrum
 
Library of Information Technology Icons
Library of Information Technology IconsLibrary of Information Technology Icons
Library of Information Technology Icons
 
PMBOK 6th vs 5th Edition
PMBOK 6th vs 5th EditionPMBOK 6th vs 5th Edition
PMBOK 6th vs 5th Edition
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet Banking
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
 
Implementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft VisioImplementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft Visio
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the Opportunities
 
Crafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to InvestorsCrafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to Investors
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment Form
 
Developing and Managing Educational Institution Policies
Developing and Managing Educational Institution PoliciesDeveloping and Managing Educational Institution Policies
Developing and Managing Educational Institution Policies
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Riding and Capitalizing the Next Wave of Information Technology

  • 1. Riding and Capitalizing the Next Wave of Information Technology Goutama Bachtiar IT Advisor, Auditor, Consultant and Trainer @goudotmobi
  • 2. My Professional Profile  16 years of experience with exposure in IT Governance, Risk, Security, Compliance, Assurance and Management.  Advisor at six companies.  ISACA International Subject Matter Expert, Certification Exam and QAE Developer.  Project Management Institute International Program Evaluator, Certification Exam and Study Materials Developer.  Reviewer Panel at three international journals.  Have audited and consulted 30+ companies.  Have written, edited and reviewed 300+ manuscripts, articles and pieces in ICT, business and management spaces.  Have attained 65 international certifications under his belt. 2
  • 3. To d a y ’s Se s s i o n  IT and Management: Exploring Opportunities and Overcoming Challenges  Addressing Management Concerns and Influencing Factors  Valuing Agility and Consumerization  Comprehending Strategic Planning and Competitive Models  Ever Wonder How Important IT to Your (IT) Careers? 3
  • 4. IT AND MANAGEMENT: EXPLORING THE OPPORTUNITIES AND OVERCOMING THE CHALLENGES 4
  • 5. Data Analytics Specialized software, capabilities, and components exploring huge volumes of data to provide greater insight and intelligence rapidly. It includes: Locating and collecting reliable data from multiple sources in various formats. Preparing data for analysis by organizing, standardizing, removing duplicates and data cleansing. Performing correct and verifying analyses, and in the end do the reporting. 5
  • 6. What’s Data Analytics for? To help organizations achieving business outcomes: • Grow their customer base • Retain the most profitable customers • Continuously improve operational efficiency • Transform and automate financial processes • Detect and deter fraud 6
  • 7. Real World Examples Overstock.com “We’re not trying to use social media as a sales piece as much as an information gathering piece”. “Finding out what our customers want; whether they like a product; and how could we sell it better”. 7
  • 8. Real World Examples (cont’d) Best Buy. Electronics retailer Best Buy learned how unpopular the restocking fees were through social media. They changed its product-return policies, eliminating fees that were hurting sales. 8
  • 9. Real World Examples (cont’d) Starbucks. Coffee retailer Starbucks prepared to monitor customers’ tweets on a new coffee flavor on the day it was introduced by capitalizing on Social Media Analytics. A huge majority of tweets were about the complaints on the coffee’s higher price rather than its’ intense taste. By the next day, they had dropped the price. 9
  • 10. Data Analytics Challenges  “Messy” data Data (e.g., tweets, posts, clickstreams, images, videos, audios) that hardly be organized in a way that a computer/application/software could easily process.  Data sources Smartphones, feature phones, social media (social networks, micro blogs, forum, mailing lists), wearable devices, other mobile devices and even more machines (TV, AC, Refrigerator, etc). 10
  • 11. Structured Data Unstructured Data Semi- Structured Data Big Data Introducing Big Data
  • 12. How “BIG” are They? Source Type Big Data Usage Popular Sources 12 Social Data • Provides insight for companies on consumer behavior and buying patterns • Can be integrated with CRM (Customer Relationship Management) data for analysis of customer behavior Facebook, Twitter, Google+, and LinkedIn Machine Data • Can be real-time data from sensors that track parts and monitor machinery, also called the Internet of Things • Includes web logs that can track user behavior online Location data such as NFC and RFID chip readings Transactional Data • Helps large retailers and B2B (Business to Business) companies in customer segmentation • Helps to track data transactions related to product IDs, prices, payment information, manufacturer date, etc. Retail websites such as Amazon. Com, eBay and Domino’s pizza chain Credit: GreyCampus
  • 13. Benefits of Big Data Big Data Analytics Benefits Proportion Of Businesses Reporting Benefits Better social Influencer marketing 61% More accurate business insights 45% Segmentation of customer base 41% Identifying sales and market opportunities 38% Automated decisions for real-time process 37% Detection of fraud 33% Quantification of risks 30% Better planning and forecasting 29% Identifying cost drivers 29% Credit: GreyCampus
  • 14. Cloud Computing • Method of providing shared computing resources that include applications, storage, computing, networking, development, and deployment platforms, as well as business processes. • Offers easy availability of computing resources to an application • Allows us paying for these services accordingly, depending on what and how much we use. 14
  • 15. Illustrating Cloud Computing Working of the Cloud Computing Model 15 Credit: GreyCampus
  • 16. Internet of Things (IoT) “Things having identities and virtual personalities operating in smart spaces using intelligent interfaces to connect and communicate within social, environmental, and user contexts”. ~ IoT in 2020 “A proposed development of the internet in which everyday objects have network connectivity, allowing them to send and receive data.” ~ Oxford Dictionary, 2013 16
  • 17. 17 IoT: Smart Mirror Credit: Vala Afshar
  • 18. 18 IoT: Blood Pressure Monitor
  • 19. 19 IoT: Smart Garbage Cans
  • 20. 20 IoT: Blood Pressure Monitor
  • 24. Summing IoT Up From ANY TIME, ANY PLACE connectivity for ANYONE, we have CONNECTIVITY for ANYTHING. 24
  • 25. ADDRESSING MANAGEMENT CONCERNS AND INFLUENCING FACTORS 25
  • 26. Business, Information and IT  Business performance relies on quality of information and IT Capabilities.  An organization’s accomplishment depends on what IT can do for them.  Business and technology teams need to align, collaborate and synergize on smart, cost-effective, and collaborative data management.  Implementation is the most influential key success factor. 26
  • 27. Management Concerns and Influential ITs 27
  • 28. Business Productivity and Cost Reduction  Increasing level of output, while maintaining the same level of inputs.  Maintaining level of output, while reducing the level of inputs.  Combination of the above two. 28
  • 29. IT and Business Alignment  Starting from Organization Strategic Plan towards IT Strategic Plan.  IT division/department have to understand organizational objectives, goals, visions, missions, strategies, risks, and opportunities.  While the business must understand IT’s capability and capacity. 29
  • 30. Business Agility and Time to Market  Aggregatively, the markets have yet to fully recovered from global recession.  An agile enterprise, with the ability to adapt and respond rapidly, are the magic words.  Furthermore, Agile becomes pretty common Project Management methodology. 30
  • 31. Business Process Reengineering (BPR)  BP is a series of tasks performed by people/systems designed to produce a specific output/outcome.  Examples: customer ordering process, credit approval and shipping a product.  1) Eliminating unnecessary non–value added processes, 2) simplify and 3) automate remaining processes to reduce cycle time, labor, and costs. 31
  • 32. IT Reliability and Efficiency  Accuracy, availability, security, and accessibility of data and information systems is a must.  Why? So the executives and managements will put their trusts and reliance within the systems. 32
  • 33. Business Intelligence (BI)  Aimed to run the business more efficiently, identify trends and relationships in organizational data, create/capitalize the advantage of business opportunities.  Required integration, computation, and analysis of massive data repositories. 33
  • 34. Cloud Computing  As known as cloud infrastructure or cloud services.  Various computing and network arrangements.  Enable anyone or any organization to deploy tools that can scale on demand to serve as many users as necessary. 34
  • 35. Cloud Delivery Models Cloud Model Description IaaS • Infrastructure as a Service (IaaS) Infrastructure refers to hardware, storage, and network. This type of cloud can be used as public and private both. • Examples: virtual machines, load balancers, and network attached storage. PaaS • Provides a platform to write and run user’s applications. • Platform refers to the operating system, which is a collection of middleware services and software development and deployment tools. • Examples: Windows Azure and Google App Engine (GAE). SaaS • Provides software that can be accessed from anywhere. • They are offered on monthly or yearly contracts. • For SaaS to work, the infrastructure (IaaS) and the platform (PaaS) must be in place. 35 Credit: GreyCampus
  • 36. Enterprise Resource Planning (ERP)  IT Systems/Software/Services/Applications supporting essential business processes and operations.  Commercial or open-source packages implemented as modules.  Examples of modules are: Sales and Distribution, Material Management, Human Capital Management, Finance and Controllership. 36
  • 37. Software as a Service (SaaS)  Pay-per-use arrangement.  As an option, instead of buying and installing enterprise apps, users access it from a SaaS vendor over a network via a browser.  Anytime, anywhere as long as the internet is there. 37
  • 38. Collaboration and Workflow Tools  Power people to work together and collaborate in (more) organized ways.  Allow us to manage our tasks more efficiently and effectively.  Examples: Google Docs, Microsoft Share Point, Office 365, and Skype. 38
  • 39. VALUING IT AGILITY AND CONSUMERIZATION 39
  • 40.  Agile is more than just quick response  Responsive IT capacity can be easily scaled up or down as needed.  Flexible Ability to quickly integrate new business functions. Easily (re)configure software or apps. 40 What Agile is All About
  • 41.  The migration of consumer technology into enterprise environments.  Driven by mobile devices, data plan, apps, platforms, social media, and telecommuting.  Above drivers become part of our personal and professional life.  Flexi work time and flexi working environment are adopted rapidly.  Bring Your Own Device (BYOD). 41 IT Consumerization
  • 42. COMPREHENDING STRATEGIC PLANNING AND COMPETITIVE MODELS 42
  • 43. Defines plan on how a business will achieve its mission, goals, and objectives.  Long-term direction of our business  Overall plan for deploying our resources  List down any trade-offs  Identify any resources to share  Our position compared to competitors  How to achieve competitive advantage over rivals in order to maximize profitability 43 Let’s Start with a Strategy
  • 44.  Scanning and reviewing of political, social, economic, and technical factors of an organization.  SWOT Evaluation of strengths and weaknesses (internal) and opportunities and threats (external). 44 Then Strategic Analysis
  • 45. Take this as an Example • Strengths: market leader; highly-achiever workforce; sophisticated business software • Weaknesses: assurance, risk and compliance; • Opportunities: Positive economic outlook; a developing market; ability to create a new market, product or service • Threats: Price wars by competitors; Low barrier to entry 45
  • 47. Here Comes the Strategic Planning “A series of strategic activities an organization selects and arranges its businesses or services to achieve goals and objectives even when unexpected events disrupt its businesses, products, or services.” 47
  • 48. EVER WONDER HOW IMPORTANT IT TO YOUR (IT) CAREERS? 48
  • 49. What IT Have Been Doing These Days?  IT creates (new) markets, (new) businesses, (new) products, and (new) careers.  New technologies such as 4G networks, wearable devices, Machine-to-Machine communication, embedded sensors, IPv6. 49
  • 50. Top Growing Occupations 2010-2020 50
  • 51. Chief Technology Officer (CTO)  Evaluate the latest and most innovative technologies.  Determine how they could be implemented for competitive advantage.  Develop technical standards, deploy technology, and supervise resources who deal with the daily IT operational activities 51
  • 52. Chief Information Officer (CIO)  While CTOs are more concerned with technology itself, whereas CIOs are much more concerned with biz applications and how to manage them.  Manage businesses IT systems and functions, creates and delivers IT strategies.  Focus more onto the IS and employees within their organizations. 52
  • 53. Other CxOs  Chief Information Security Officer (CISO) Identifying, developing, implementing and maintaining Information Security policies, processes and procedures across the organizations.  Chief Data Privacy Officer (CDPO) Responsible for Data Privacy both customers and employees within their organizations. 53
  • 54. References Information Technology for Management: Advancing Sustainable, Profitable Business Growth 9th Edition, authored by Turban, Volonino and Wood, published by John Wiley and Sons, Inc., 2013. 54

Notas do Editor

  1. Slide Timings: 3 – 4 minutes Suggested Instructor Notes: Use this slide to discuss the structure, sources, and types of Big Data. Mention the three types of data. Slide Instructions: Load the on-screen elements one by one. Click the presentation to move to the next slide.
  2. Slide Timings: 2 – 3 minutes Suggested Instructor Notes: Use this slide to explain the application of Big Data in different areas of business. Ask the participants to explain each of the benefits listed on the slide. Slide Instructions: Load the text. Load the image. Click the presentation to move to the next slide.
  3. Slide Timings: 3 – 4 minutes Suggested Instructor Notes: Use this slide to define the relation between cloud and big data. Tell participants that earlier businesses had to buy computing resources and carry the overhead or send work out to external organizations. Now, they can simply move the task to a public cloud. Tell participants that they have been hearing about cloud computing for the past few years and some of you may be using it also. The cloud is a cluster or grid that rents computing resources to users. Discuss the flexibility offers by cloud computing to business organizations Slide Instructions: Load each block one by one. Click the presentation to move on the next slide.
  4. Slide Timings: 2 – 3 minutes Suggested Instructor Notes: Use this slide to check participant’s understanding of distributed computing. Ask the participants to solve the given problem. You can ask the participants to volunteer for the solution to the question given here. Encourage the participants to explain their solution. Appreciate a correct response so that the participants are encouraged to participate in class discussions. Lead them to the correct solution. Slide Instructions: Load the question. Click the presentation to move on the next slide.
  5. Slide Timings: 3 – 4 minutes Suggested Instructor Notes: Use this slide to explain the different types of cloud delivery models. Describe each type of cloud model with its uses. Give scenario for using each type of cloud computing model. Give real life examples of using each type of cloud model. Also ask participants to suggest that where these types of model can be used. Encourage participants to take part in class discussion. Tell participants that they will have to explain why cloud computing is suitable for Big Data analytics in the final certification examination. EXAM CHECK: In the certification examination, you will be able to explain why cloud computing is suitable for Big Data analytics?   Slide Instructions: Load the lead-in line then table. Click the presentation to move on the next slide.