This list celebrates changemakers creating meaningful impact through leadership, innovation, fresh perspectives, transformative mindsets, and lessons that resonate far beyond the workplace.
Sensei introduced a brand and logo refresh this week to usher in a new era of service based on its new Customer Insight Analysis (CIA) platform. The goal in redesigning our logo was to provide a visual aid that better represented the business’s unique differentiator in a crowded marketplace. The response has been overwhelmingly positive yet it...
For the second year running, the FIDO Alliance hosted a consumer authentication showcase at CES, the gigantic Consumer Electronics Show in Las Vegas, this year featuring four FIDO Alliance members.
One approach is to categorise different classes of IdP, matched to different transaction types. "Levels of Assurance" (LOAs) have been loosely standardised by many governments and in some federated identity frameworks, like the Kantara Initiative. The US Authentication Guideline NIST SP 800-63 is one of the preeminent de facto standards, adopted by the National Strategy for Trusted Identities in Cyberspace (NSTIC). But over the years, adoption of SP 800-63 in business has been disappointing, and now NIST has announced a review.
There’s no doubt that that Internet has changed the business of retailing. Thanks to consumers’ proclivity for pre-purchase research and the availability of online commerce, retail growth is no longer dependent on brick and mortar expansion. In fact, expanding physical stores can negatively affect a retailer’s bottom line because online sales are eradicating revenues previously used to...
Next week I will be deep in the heart of the Javits Center for the 2015 Retail Big Show, running between meetings and navigating the ever growing maze of companies. Every year I go into these meetings wondering what the … Continue reading →
Part 1; Why your IT Operation can’t run your Digital Business Operations, and in turn, why your Digital Operations can’t run your IT OperationsJust for a moment lets stop thinking about all the pages, and pages, of well thought through comment on recognizing the market opportunities, the pressures to compete in new ways, the transformation challenges for the enterprise, even the new operating skills, and just focus on the Business Functional Requirements for Operational Technology that all of this requires.
Over 160,000 attendees from around the globe gathered in Las Vegas January 6th to 9th for the annual consumer tech pilgrimage. A few big themes have emerged that have cross over potential to other market segments:
The Future of Collaboration Lies at the Intersection of Social Interaction and Data-Driven Insights
hbspt.cta.load(341263, '8253a182-3799-494c-a58d-446878f982d7');
This report explores key trends in how employees collaborate with their colleagues and customers.
After using the format for the HCM 2014 highlights, I will re-use the same for the cloud and next generation Applications in this post: So basically I revisited my blog posts of 2014 and determined which event in each month had the most impact, was the most important event one. One thing that became clear is that some months – January, February, July, August and December are slower months – so less to choose from – and March, April, May, September, October and November are more on the busy side. And of course it is to a certain point biased as I can only cover so much in a year.
This is an updated version of arguments made in Lockstep's submission to the 2009 Cyber Crime Inquiry by the Australian federal government.
In stark contrast to other fields, cyber safety policy is almost exclusively preoccupied with user education. It's really an obsession. Governments and industry groups churn out volumes of well-meaning and technically reasonable security advice, but for the average user, this material is overwhelming. There is a subtle implication that security is for experts, and that the Internet isn't safe unless you go to extremes. Moreover, even if consumers do their very best online, their personal details can still be taken over in massive criminal raids on databases that hardly anyone even know exist.
Increasingly, commentators are calling into question the state of information security. It's about time. We infosec professionals need to take action before our customers force us to.
Standard security is just not intellectually secure.
We can't adequately protect credit card numbers, yet we're joy-riding like a 12-year old on a stolen motorcycle into an Internet of Things.
We're going to have to fix complexity and quality before security stands a chance.
As we head towards 2015 here are some wishes I have for our supply chains far and wide: Better actionable data, harmonization of execution systems, and smarter evolution of SMAC within all aspects of supply chain....
Constellation Research analysts are wrapping up a very busy 2014 with a series of "State of the State" reports. For my part I've looked at the state of privacy, which I feel is entering its adolescent stage. Here's a summary:1. Consumers have not given up privacy - they've been tricked out of it.The impression is easily formed that people just don't care about privacy anymore, but in fact people are increasingly frustrated with privacy invasions. They're tired of social networks mining users' personal lives; they are dismayed that video game developers can raid a phone's contact lists with impunity; they are shocked by the deviousness of Target analyzing women's shopping histories to detect pregnant customers; and they are revolted by the way magnates help themselves to operational data like Uber's passenger movements for fun or allegedly for harassment - just because they can.2. Private sector surveillance is overshadowed by government intrusion, but is arguably just as bad...
State of the State: Digital Safety and Privacy
hbspt.cta.load(341263, 'dd706d0d-2e66-4735-b1fd-b3e8577e7377');
This report identifies the political, economic, societal, technological, environmental, and legislative trends affecting digital safety and privacy in 2015.
Constellation surveyed over 200 CxOs to identify the top 10 boardroom priorities for 2015.
hbspt.cta.load(341263, '076e48f3-b78d-4506-844c-1a7a19f0ad31');
Clients should use this document as a source for executive and board planning assumptions.
State of the State: Post Sale Commerce
hbspt.cta.load(341263, 'ad44648a-dae3-4ac0-a5be-c4e3431190a7');
This report identifies trends affecting post sale commerce in 2015.
Alan Lepofsky, Constellation Research VP & Principal Analyst, reveals the top 10 items to be aware of when purchasing collaboration software. 10 minutes
Market move – Oracle buys Datalogix - the next gen Apps viewThis morning we learnt that Oracle has acquired Datalogix, the provider of consumer data that fuels marketing campaigns.
While difficult to do and very important, offline spending and digital marketing need to get connected. CMO's need this data to make the right calls on their marketing mix and shape their priorities. Datalogix connects offline consumer spending to digital marketing to help marketers increase the effectiveness and measurability of their advertising. It does this by aggregating...
You better watch out You better not cry You better not pout I’m telling you why Santa Claus is coming to town Santa Claus is coming to town Santa Claus is coming to town Yup, the big guy dressed in … Continue reading →
State of the State: Digital Business and Digital Leadership
hbspt.cta.load(341263, '2b6b4254-221a-4c3e-9f2e-af0e22df43ff');
This report identifies the political, economic, societal, technological, environmental, and legislative trends affecting digital business and digital leadership.
The differentiator between Netflix, Uber, Amazon, Google and the pharmaceuticals industry is a small thing called context. Knowing the context of a person, interaction, or message can improve how influence is exchanged. Brands can use context to engage instead of simply marketing. Context is not simple or easy, but powerful.