Category

Business Technology Trends

Opinion on the technology, business, and social trends that are impacting enterprises worldwide.

Sep 012017
 
[Call for Papers] Big Data Trends: Predictive Analytics, Machine Learning, and Cloud

With data being collected by organizations at a staggering rate, the demand for analytics to leverage the insight from this data is growing just as fast. Big data can viewed as a gateway to new opportunities, as a means of managing risks, or as a tool to improve business sustainability. Oftentimes, big data is associated with two keywords: analytics and technologies. These keywords represent an evolving suite of trends – from descriptive, predictive and prescriptive analytics to the application of Machine Learning, and Cloud technologies. Continuously monitoring these trends in analytical approaches and technological breakthroughs in the context of Big Data and applying them to produce business value is the key to survival in this Read more

Aug 222017
 
Wondering What are the Best Innovation Practices?

Many companies boast about having a culture of innovation, but, as Cutter Consortium Fellow Steve Andriole writes, they in fact don’t. Instead of breaking free of their cultural constraints to truly innovate, they continue innovate in the past; that is, toward business models, processes, and technologies that are anchored solidly in the 20th century. To break through and become truly innovative Andriole advises organizations study what the best innovators have done and try to repeat their successes by following the formulas that have worked for the most successful innovators. So what do the best companies do? How do they make the list of most innovative companies? In The Heart of Innovation: Best Practices from the Read more

Jul 032017
 
Lessons for Innovators and Digital Disruptors

It could be argued that digital technologies present more profound and disruptive opportunities and threats to established business models than anything that’s come before. In Digital Disruption of Business Models: The Mass Mitec Story, David Wortley charts the digital transformation of Mass Mitec, a UK-based small-to-medium enterprise, via a disruptive digital technology in the 1990s and uses the story to illustrate the potential and dangers of digital disruption. Even though Mass Mitec had a very good understanding of the evolution of the technologies upon which its business models were based, and the organization had built a business development plan that reflected that evolution, it seriously failed to properly secure or exploit the business and contractual arrangements Read more

Jun 282017
 
[Call for Papers] Insurtech: Reinventing the Insurance Industry

Similar to Fintech revolutionizing the financial services industry, Insurtech is taking the insurance sector by storm with its innovative and possibly disruptive technology solutions. The benefits to incumbent insurers include better engagement with and reestablishing trust with customers, the ability to innovate quicker with improved products, services and distribution, increased operational efficiency and profits, the ability to generate meaningful risk insight, and the opening of new market opportunities for millennials seeking easier means of purchasing insurance. However, the transition to an Insurtech business model comes with its challenges as many insurance companies are mired in old legacy systems and cultural barriers that could serve as roadblocks to adoption. As well, Insurtech startups are replete with Read more

May 022017
 
RPAs: A Cautionary Tale

Last week I wrote about the “triple win” that can come from robotic processing applications (RPAs). But Cutter Fellow Robert N. Charette points out a cautionary tale. In a recent Business Technology & Digital Transformation Strategies Advisor, Charette tells the saga of the Michigan Unemployment Insurance Agency’s Michigan Integrated Data Automated System (MiDAS) system, which was found to have falsely accused at least 22,000 — and possibly more than 50,000 — of the state’s residents of unemployment fraud between October 2013 and August 2015. How did that happen? Writes Charette: It turns out that Michigan decided to fight unemployment fraud using a software-driven approach, rather than the previous ‘manual and paper intensive work process.’ In fact, Michigan UIA Read more

Apr 252017
 
Benefits of Robotic Process Automation (RPA)

Robotic process automation (RPA) and cognitive automation (CA) tools are getting a lot of attention. But, as reported by Mary Lacity and Leslie Willcocks in their new report, Smart Service Automation: Benefits, Cases, and Lessons, potential adopters of these new types of service automation tools remain skeptical about the claims surrounding their promised business value. These potential adopters are still not sure why an organization would move to service automation, what they’d achieve if they were to do it, and what are the best practices. To answer these questions, Lacity and Willcocks conducted two surveys of 143 outsourcing professionals and interviewed 48 people, including service automation adopters, providers, and advisors. From the interviews, they identified 20 adoption journeys. The 20 Read more

Apr 172017
 
Data-centric Protection and Security: What are the Trends?

Data-centric protection and security focuses on the organization’s sensitive data (as opposed to its overall computer networks and applications). This is accomplished by locating, identifying, and cataloging sensitive data as well as by applying encryption, data masking, and policy-based data access controls (and end-user monitoring) to protect data residing across multiple enterprise environments. To what extent are organizations adopting, or planning to adopt, data-centric protection and security practices? In a recent Cutter Consortium survey, Senior Consultant Curt Hall asked 50 organizations about their data protection practices to shed some light on this important question. As shown in the figure below, more than a third (37%) of surveyed organizations currently have data-centric protection and security practices in place.   Read more