You are on page 1of 26

Digital

Transformation:
Are We Ready?

Naveen Sharma
Manager Architecture, Risk and Compliance
Short History
Microprocessor invented by Intel - 1971
First Apple Computer - 1976
Mobile Phones (first in 1973) commercially available - 1979
Internet and WWW - 1980s 90s
Laptops -1990s
Personal digital assistant (PDAs) - 1990s
Facebook, Twitter, Instagram, Pinterest - 2006
Smartphones - 2007
iPads - 2010
Smartwatch - 2014 +
Naveen Sharma 2015 2
Some history about information
200 years ago, it took six months for a letter
from Australia to reach family in England.
50 years ago, air mail revolutionised
international postage by cutting delivery times
to mere days.
Every day we create 2.5 quintillion bytes of
data. To give that some context, in the US a quintillion is represented by a
one followed by 18 zeros. In the UK, its a one followed by 30 zeros.
Source: Professor Michael Blumenstein, HOS, School of ICT, Griffith University: Theres nowhere to hide in the age of big data

Naveen Sharma 2015 3


History of information
4,000BC:
The clay tablets of Mesopotamia, dating back as far as 3,500 B.C.,
were used to record the earliest writings of mankind. These were
then left to dry for several hours. (Source: Global Information Industry Center; UC
San Diego).

2015: After 9.5 years and 3.5 billion miles for New Horizon
spacecraft to Pluto; it takes 4.5 hrs for a signal each way.

Not much has changed in several thousand years! (to view the
information)

Naveen Sharma 2015 4


Data Bits and Bytes 101
One binary digit = 1 Bit
8 Bits = 1 Byte
1,024 Bytes = 1 Kilobyte
1,024 Kilobytes = 1 Megabyte
1,024 Megabytes = 1 Gigabyte
1,024 Gigabytes = 1 Terabyte
1,024 Terabytes = 1 Petabyte
1,024 Petabytes = 1 Exabyte
1,024 Exabytes = 1 Zettabyte
1,024 Zettabytes = 1 Yottabyte (a 1 followed by 24
zeros - bytes)
1024 Yottabytes = 1 BrontoByte (a 1 followed by 27
zeros - bytes).
Naveen Sharma 2015 5
Data Tsunami example 1 of 2
Annual global IP traffic will surpass the zettabyte (1024 exabytes)
threshold in 2016, and the two zettabyte threshold in 2019

Content delivery networks will carry over half of Internet traffic by


2019

Over half of all IP traffic will originate with non-PC devices by 2019.
(TVs, tablets, smartphones, and Machine to machine (M2M) module)

The number of devices connected to IP networks will be three times


as high as the global population in 2019 (also 3 devices per capita)
Source: Cisco Visual Networking Index: Forecast and
Naveen Sharma 2015 Methodology, 2014 2019 6
Data Tsunami example 2 of 2
Video Highlights: It would take an individual over 5
million years to watch the amount of video that will
cross global IP networks each month in 2019.

Consumer VoD traffic will double by 2019 (& will be 80% of


all consumer Internet traffic)

Globally, mobile data traffic will increase 10 fold


between 2014 and 2019
Source: Cisco Visual Networking Index: Forecast and
Naveen Sharma 2015 Methodology, 2014 2019 7
Lead-up to the Digital Era
B2B Business to Business
B2C Business to Consumer
B2B2C Business to Business to Consumer
e everything dot.com boom
i everything internet boom
Cloud everything-as-a-Service
Digital everything (e.g. CDO)

Naveen Sharma 2015 8


Digital Related Jobs - examples
Digital Marketing Manager
Fashion & Retail Graduate Consultant - Digital Marketing &
eCommerce
European Head of Digital Marketing
Digital Acquisition Manager
Digital Trade Adviser
Director of Digital Analytics (BH/LB)
Digital Content Manager
Social Media Manager and Outreach Manager
Search Engine Marketer (SEM)
Direct Digital Marketing Executive
Social Media Manager and Outreach Manager

Source: https://jobs.econsultancy.com/jobs/

Naveen Sharma 2015 9


Data Challenges
Post 2000:
Structured data sources Consolidation with SANs
But in the background: unstructured data proliferation on laptops,
desktops and mobile devices

Post 2010:

Unstructured data proliferation via cloud and smart devices; but also
University started collecting more data for reporting, BI and analytics
Compliance and data retention
Research

Naveen Sharma 2015 10


Data Challenges
Now+:
Big Data e.g. Paypal 2014: 170M users & 4B transaction
Unstructured Fragmented in ether space
Compliance Policies and Regulatory
Lifecycle management / archive (governance)
Data classification

Security CIA

Cybersecurity concerns

Naveen Sharma 2015 11


Breakdown of the Type of Cyber
Security Incidents

Naveen Sharma 2015 12


Source: Cert Australia Survey 2013
Cyber Security Incident example

http://tinyurl.com/npnh79p

Naveen Sharma 2015 13


Information is changing so are the Risks!

Before Now
Spoke via landline phone Mobile /video devices
Wrote letters Instant - Social media
Business done in person or Online
forms
Filing cabinets; Folders on Cloud
shelf; folders on computers
Mostly 1:1 Many: Many

Naveen Sharma 2015 14


Information is changing so are the Risks!
Before Now

Access to systems via desktop/laptop


Mobile devices (smartphones, iPads, tablets)
Lectures in class, paper notes Lectures: Online; Recorded and archived
Library physical books Library: eBooks and Electronic journals
Structured environment Workflow, email, internet, video collaboration,
social media Facebook/Twitter/Linkedin/Pinterest,
cloud computing
Signage physical notices or boards Signage: Digital and content updated remotely

Naveen Sharma 2015 15


Impact of Digital Transformation
First, how can one define digital transformation?

Second, we will discuss in terms of:


The Good
The Bad
The Ugly

Naveen Sharma 2015 16


Impact of Digital Transformation
The Good:
Collaboration
Communication
Platform/Mobility
Personalisation
Information (Digital rights management -> Information Rights Management (embedding into documents)).
Analytics
3D Printing
Internet of Things e.g. Machine to machine (M2M) Big Data - volume, variety, and velocity
(e.g. from sensors, devices, third parties, web applications, and social media and alerts/early warning/maintenance notification).

Naveen Sharma 2015 17


Impact of Digital Transformation
The Good:
Ease of access to services;
Cloud, Big data (e.g. research, BI and marketing);
Video Collaboration/virtual rooms;
Flexibility: Just-in-Time learning and online
courses;
Location identifiers can provide just in time data
or assistance;
FAQs /Self-service (Tier 0) and Tier -1 service
(+crowd sourcing).
Naveen Sharma 2015 18
Impact of Digital Transformation
The Bad:
Anti-social;
Information overload;
Loss of good analytical skills faster
than providing alternatives;
Privacy and security implications (e.g.
geo-location tracking, web page visits)

Naveen Sharma 2015 19


Impact of Digital Transformation
The Ugly:
e-Waste (both devices and batteries even wireless
mouse, keyboards all have batteries). Global E-waste Monitor
2014 and compiled by the United Nations University, last year an estimated 41.8
million metric tons of e-waste was discarded throughout the world. (Source: Dr Sunil
Herat, Academic Staf,Griffith School of Engineering ,Griffith University)

In this day and age many in the world still have


inequitable access to basic communications and
internet next slide
Naveen Sharma 2015 20
Global Internet Availability
World population: 7.3B

Penetration Rate %
100
90
80
70
60
50
40
30
20
10
0

Source: Dec 2014 - http://www.internetworldstats.com/stats.htm


Naveen Sharma 2015 21
Disruption Trend 2015+ : e.g.
More Video Streaming :Short form (e.g. YouTube); Video calling; Long form(e.g. Hulu);
Live Internet TV; Internet-video-to-TV (e.g. Netflix); Internet PVR; Ambient video and
Mobile video.

File Sharing: P2P and web-based file-sharing systems

Gaming

Web, email, and data including Social media

Internet of Things (IoT) allow micro-decisions to be made but can also at work (or
home) make University systems vulnerable. Analogy to MFPs.

An IT workforce plan which continues the shift of emphasis from an IT build and
maintain model to one which develops the Universitys overall capability to integrate
and exploit IT.

Naveen Sharma 2015 22


Disruption Trend 2015+ : e.g. security
Non-Microsoft devices cyber criminals will be focussing on these to
exploit.
Encryption of data may become standard/default.
Increased focus on mobile exploits by hackers (especially NFC and ApplePay
payment systems).
Bundling frameworks and services (genuine service with malware)
Card Not Present Fraud (running at twice Cards Present)
Biometrics will be targeted (purposely inaccurate otherwise legitimate users will fail).
Even fingerprints can be cloned!

Naveen Sharma 2015 23


Politician's fingerprint 'cloned from photos' by hacker

Source: Zoe Kleinman Technology reporter, BBC News, 29


Naveen Sharma 2015 Dec 2014 24
Digital Quotient DQ - simple metric for the digital maturity of a company
<33 =Below average; 33 43 = above average; 43 52 = Emerging leaders; >52 = established leaders

1.Culture: Risk appetite; test & learn; Agility/Speed;


Collaboration and External orientation.
2.Strategy: Linked to business strategy; bold and long
term orientation; centred around customer needs.
3.Capabilities: Connectivity; Automation; Content; Data
& Analytics; Customer Experience and Technology.
4.Organisation & Talent: Structure; Process and
People
Source: McKinsey Quarterly June 2015 by Catlin, Scanlan and Willmott
Naveen Sharma 2015 25
Conclusion
Evolution Of Information
Challenges With Data
Impact Of Digital Transformation
Disruption Trend 2015+
DQ

Thank You!
Naveen Sharma 2015 26

You might also like