Category

Digital Transformation

Feb 162017
 
Is your organization a disrupter? Has it been disrupted?

There’s no denying the disruption resulting from new business models enabled by digital technologies. From Uber turning the taxi industry on its head, to Facebook/Venmo blindsiding the banking industry by becoming a player in funds transfer, both organizations and entire industries are having to rethink value — how they create it and how they capture it. If you’ve been involved in transforming your company’s business model, or creating an entirely new business model, we invite you to share your story. If you’ve had to regroup to face new competition — made possible by digital technologies — we invite you to share your story, too. Cutter Consortium will publish a special “From the Field” report later Read more

Nov 182016
 

The sesquiannual gathering of Cutter Consortium clients and consultants just took place in Cambridge, Mass., on November 15-16. The main theme was “digital transformation,” including the new business models centered on “digital data streams” and the implications of this transformation for the CIO’s organization. Cutter Fellow Prof. Karim Lakhani presented a Harvard Business School case study on “GE and the Industrial Internet.” It tells of GE’s decision to create a new entity devoted to applying IoT technology to industrial environments (manufacturing, transportation, electricity generation, etc.). There was a lot of discussion of how some other companies missed the transformation to digital services, in part by underestimating in the early 1990s the explosion in the number Read more

Oct 262016
 
IoT-based DDOS Attacks

Last week’s DDoS attack against Dyn Inc. had an impact on many organizations beyond the reported hits to PayPal, Twitter, Amazon, Spotify, and others. Even Cutter’s website search function was out of commission for a short while! Experts have warned that at some point, smart versions of devices such as refrigerators, televisions and thermostats could be manipulated to alter their basic functions, but did anyone foresee that these devices would be used to launch a third-party attack? This isn’t the first time it’s happened, and it’s not likely to be the last. In the July 2016 Cutter article Securing the IoT: It Takes the Global Village, author David Tayouri discusses the threats Internet of Things Read more