The digital revolution is here, do you know where your data is? IT executive Jo Hoppe provided insight into today’s IT landscape including the move to the cloud, the importance of a digital data strategy and the crucial questions to ask each and every time you post to social media.
“Big iron” versus the Cloud Many companies today are moving their data centers away from on-site hardware and instead are utilizing off-site cloud computing centers. The business case for cloud computing is pervasive and compelling. The efficiencies include:
- Elastic resource, where intermittent high capacity usage is paid only as needed
- No capital expenditure, but instead an operating expense as incurred
- Leveraging the massive purchasing power of cloud suppliers such as Amazon Web Services, Google or Microsoft
Security But is cloud computing as secure as a self-hosted system? In many cases the answer will be yes, the cloud is as secure if not more so. This is because cloud suppliers can leverage security resources just as they leverage purchasing power.
Data - the Crown Jewels Whereas “big data” means exabytes of information, most companies have far less – maybe a few hundred customers or a few thousand transactions. Nevertheless, all companies should have a digital capital strategy which allows for insights into who are the buyers and what are they buying, whether that be from structured or unstructured (think image or text formats) data.
Define Yourself or Be Defined Companies must have a social media strategy as part of a holistic marketing plan. Social media has moved into mainstream adoption and if you do not actively define your company, others (including competitors) will impose their definition on you. Thus it will be their definition of your capabilities that people discover first.
Privacy One of the biggest threats to privacy is when individuals post to social media without thinking through the “connect the dots” implications. It is critical to understand the entirety of your on-line communications to ensure personal as well as business security.
IT has come a long way since stand-alone computers worked only with certain devices across tethered pathways. Today’s world of seamless global connectivity and unified communications offers more opportunities to connect, and more obligations to use those connections in a thoughtful manner.
Please join us for our next program, "Telling A Story With The Numbers" on March 17th!
Click here to learn more.