„Hoe vind je het zelf gaan, Buurman?” Houtskoolschetsen, talent aanboren, managers doorzagen, prototypes realiseren, in de steigers zetten, zekerheden borgen, waarden v

„Hoe vind je het zelf gaan, Buurman?”

Martijn Veldkamp

“Strategic Technology Leader | Customer’s Virtual CTO | Salesforce Expert | Helping Businesses Drive Digital Transformation”

February 27, 2017

Houtskoolschetsen, talent aanboren, managers doorzagen, prototypes realiseren, in de steigers zetten, zekerheden borgen, waarden verankeren, platslaan, voorstellen afhameren, piketpaaltjes slaan en contouren schetsen: in de trein kijkend naar de bouwput vlak bij station Sloterdijk betrap ik mijzelf op taalgebruik met collega’s en klanten alsof alsof we met zijn allen op een bouwput staan.
Als ik mijn ogen dichtdoe hoor ik: „Lukt ie Buurman?” „Prima Buurman, A je to.”. Nou komt dat waarschijnlijk ook omdat mijn kinderen zo dol zijn op dat soort filmpjes en ik daar helemaal gehersenspoeld door ben. Maar om nu zelf te verworden tot een soort van Ed en Willem Bever die met Bob de Bouwer in overleg gaat…
Ik stel voor dat we stoppen met de bouwmetaforen op kantoor. Dus niet opbouwen, uitbouwen, of voortbouwen op die bouwtaal, maar juist afbouwen!

Amazon disrupts again Amazon is now testing a store in Seattle where customers can walk in, take food off of the shelves and leave, without the hassle of having to wait

Amazon is now testing a store in Seattle where customers can walk in, take food off of the shelves and leave, without the hassle of having to wait in line. This new service is called AmazonGo, and it uses Amazon’s “Just Walk Out Technology”.

Is this the result from Lean, checkout waste removal? Or Design Thinking of the most hassle free store experience?

 

How does Amazon Go work?

This checkout-free shopping experience is made possible by the same types of technologies used in self-driving cars: computer vision, sensor fusion, and deep learning. This technology automatically detects when products are taken from or returned to the shelves and keeps track of them in a virtual cart. When you’re done shopping, you can just leave the store. Shortly after, they’ll charge your Amazon account and send you a receipt.

How big is the store?

The current store in Seattle is roughly 1,800 square feet of retail space and designed so busy customers can get in and out fast.

Disruption yet again, but now for the big foodretailers like Ahold, Walmart, Tesco, Carrefour, Costco.

No more handheld scanners or phones and no more checkouts

Tesco homeplus supermarket experimented in 2011 with a campaign designed by the Seoul branch of advertising agency Cheil. It was a virtual grocery store in a South Korea subway station, permitting users to shop using their smartphones. A large, wall-length billboard was installed in the station, designed to look like a series of supermarket shelves and displaying images and prices of a range of common products. each sign also includes a QR code. Users could scan the code of any product they would like to purchase, thereby adding it to their online shopping cart. After the web transaction was completed, the products were delivered to the user’s home within the day. This strategy made productive use of commuters’ waiting time, while simultaneously saving shoppers time spent going to the supermarket.

Food retail will be an interesting area to watch with Amazon Go throwing their innovative IT in the mix.

LinkedIn acquired by Microsoft LinkedIn acquired by Microsoft for a whopping $26.1 billion. But why? LinkedIn is essentially the Facebook of the business world, and the

LinkedIn acquired by Microsoft for a whopping  $26.1 billion. But why?

LinkedIn is essentially the Facebook of the business world, and the digital repository of most of the world’s resumes. LinkedIn has roughly 100 million members in Europe of a total of 450 million. Very few people lie on their public view-able and controllable resume. And that’s information Microsoft is willing to pay for.

What will the use the data for?

Well Microsoft already knows a lot about you. They have your calendar (Outlook), your meetings (Outlook) and your accounts (Microsoft Dynamics CRM). By buying LinkedIn Microsoft gains even more data to feed into its machine learning and business intelligence processes. Some think to feed Cortana so the start of a business meeting may loook like this:

Right now, Cortana provides some basic information about your calendar, suggesting, for example, what time you’ll need to leave to arrive at your next meeting on time. In Microsoft’s digital future, Cortana will be able to sum up what you need to know about your business relationship, and what information you can use to cement a more personal connection, too.

Distribution of Trust: Social Blockchain? The blockchain originally is the technology behind the bitcoin. It is essentially a ledger. Ledgers are the basis of much of t

The blockchain originally is the technology behind the bitcoin. It is essentially a ledger. Ledgers are the basis of much of the information technology that we rely daily on and are essentially nothing more than lists in which all data and its changes are recorded.

Other registers operate in a similar manner. Identity information example, are carefully kept in identity repositories. Other examples of data held in databases are the register for Dutch domain names (SIDN), electronic patients file (EPD) or for patents (RVO). These central databases have a large role in our society. The security of these systems is crucial. As I said in a previous post (Blockchain could solve Data Integrity problems) data is vulnerable. It is not desirable that information in these systems are manipulated in any way.

These central databases and ledgers require a certain sense of trust and confidence that the data is properly maintained and accessible to the right stakeholders. This trust is not just based on the access, or refusal of, but also that the information will be there the next day. This requires a full set of management and reporting around the operations surrounding such a database.

The blockchain is based upon a different paradigm. Simply put, the blockchain is a distributed database, where every unit of transaction contains its own transaction history. It consists of blocks of timestamped transactions where each block contains the hash function – basically, a key – of the next block in the chain. Thus the name blockchain. For a great 2-minute introduction, take a look at this video on the blockchain from the World Economic Forum.

Next wave

There are now countless organisations running applications on blockchain technology, from banking to transportation to employment. The next wave where blockchain technology can also be transformative: social organization and the smarter use of resources.

A lot of people are being quite optimistic about the social potential of blockchain applications, and saw blockchain technology as a way to decentralize and formalize trust – yielding great potential for new and larger forms of social organization. Because it allows for transactions to be made reliably, but without third parties – which is also why it could transform not just money, but other forms of social organization, such as voting, property, or work.

Blockchain cloud be more like a society-shifting technology than just an application of technology. The blockchain could be seen as a general purpose technology, one that might fundamentally alter society, economy and culture – like the steam engine, electricity and the internet have done before.

My point here is not necessarily that that the blockchain will become the new internet or the steam engine – it is simply too early to tell. What is certain, though, is that safe and viable applications of blockchain technology will only come about through repeated iteration after iteration. The emergence of technology takes time.

Blockchain could solve Data Integrity problems As the world relies more heavily on data as the basis for critical decision-making, it is vital that this data can be tru

As the world relies more heavily on data as the basis for critical decision-making, it is vital that this data can be trusted. And that trust is the key issue here.

People (Data Scientists, Chief Innovation Officers) are looking for ways to automate using data. Automation translates to efficiency which translates to value. This automation trend has increased through advances in business intelligence, big data, the rise of IoT and the necessary cloud infrastructure.

So why do I raise this trust issue? Isn’t this solved perhaps by the Industry standard DMBOK? It states the possible Data Quality Management processes.

Because data is vulnerable, not just to the breaches we hear about in the news, but to a much more subtle, potentially more destructive class of attack, an attack on data integrity. Data isn’t stolen but manipulated and changed.

Like this tech-savvy Staten Island high school student who studied advanced computer programming at an elite computer camp who used his skills to hack into a secure computer system and improve his scores.

Enter the Blockchain

A possible solution for assuring data integrity could be blockchain technology.

In a blockchain, time-stamped entries are made into an immutable, linear log of events that is replicated across the network. Each discrete entry, in addition to being time-stamped, is irreversible and can have a strong identity attached. So it becomes irrefutable who made the entry, and when. These time-stamped entries are then approved by a distributed group of validators according to a previously agreed-upon rule set.

Once an entry is confirmed according to this rule set, the entry is replicated and stored by every node in the network, eliminating single points of failure and ensuring data resilience and availability.

Future

Because the promises of data integrity and security are so strong, new systems can be built to share blockchain-enforced data among organizations who may not trust each other. And once an ecosystem has shared data that everyone can trust in, new automation opportunities emerge.

Smart contracts are perhaps the next step. It makes it possible that different parties create automated processes across companies and perhaps industries. Blockchain could be an ecosystem for cross-industry workflows involving data from multiple parties. Now an entire new class of loosely coupled integration applications can be created.

Blockchain could solve Data Integrity problems As the world relies more heavily on data as the basis for critical decision-making, it is vital that this data can be tru

When I first started my journey online I was still on dial-up. Once every while, I listened to the whirly noises the little grey box on my computer made as it performed a ‘handshake’ with another modem somewhere.

Like magic, I was online and I used those few expensive minutes to connect to a BBS, upload code, download email, perform a search via Altavista and various other simple tasks. Then I hurried to disconnect. Dialing in was expensive after all.

As I relax here in the beautiful Dordogne in the south of France, I’m oddly reminded of those hectic times. It’s very quiet here and there’s no Wi-Fi. The mobile signal we do have is hardly enough to download a single email and constantly switching from one provider to another. I promised my wife and kids that I am going to try to disconnect, get away and enjoy our vacation as much as possible. So once every couple of days I switch on my data connection, and wait for the weather forecast (turns out to be very important when camping) and other messages to trickle into to my phone.

I’m not complaining – it’s nice to focus on other things. I read books (albeit mostly pulpy action novels), take different walk in the hills or mountains as I am used to the flatness of the Netherlands, and am enjoying being slightly disconnected from the office and my life back home.

 

I know every photo I want to upload to Facebook is going to take a few minutes, and it will cost some money. While I’m only paying a couple of cents per megabyte here, it all adds up when you realize a photo easily comes in at 4MB.

By putting a price on those things you’re forced to think about the value of each updated status on Facebook, reloading your Twitter feed, or casually browsing Instagram.

I’m not passing judgement here, I’m merely recognizing that I’m part of a generation that is still very much delighted by the technology that we have access to, because we grew up in a time when that all didn’t yet exist. I realize how fortunate those of us are to live in a time where technology is so ubiquitous and available to almost anyone at almost any time.

“Who’s on First?”

The movie Purple Rain mixes up nicely with Abbot and Costello

Morris: Okay. What’s the password?
Jerome: You got it.
Morris: Got what?
Jerome: The password.
Morris: The password is what?
Jerome: Exactly.
Morris: The password is exactly?
Jerome: No, it’s okay.
Morris: The password is okay?
Jerome: Far as I’m concerned.
Morris: Damn it, say the password!
Jerome: What.
Morris: Say the password, onion head!
Jerome: The password is what?
Morris: [frustrated] That’s what I’m asking you!
Jerome: [more frustrated] It’s the password!
Morris: The password is it?
Jerome: [exasperated] Ahhhhh! The password is what!
Morris: It! You just said so!
Jerome: The password isn’t it! The password is?
Morris: What?
Jerome: Got it!
Morris: I got it?
Jerome: Right.
Morris: It or right?

“Who’s on First?” is a comedy routine made famous by Abbott and Costello. The premise of the sketch is that Abbott is identifying the players on a baseball team for Costello, but their names and nicknames can be interpreted as non-responsive answers to Costello’s questions.

But it also reminds me of Rain Man or Rush Hour 3 – He is Mi and I am Yu

Afbeeldingsresultaat voor who are you Yu

 

New platform lets people make money leaking confidential files A team of cryptographers and developers want to create a website where anyone can sell data sets to the h

A team of cryptographers and developers want to create a website where anyone can sell data sets to the highest bidder. “You’ll hate it,” is the slogan of the service, which is accessible via Tor. Payments are made via Bitcoin.

Who wants to leak a file to the highest bidder, must upload it to Slur, a marketplace for data. There are no restrictions on the type of data that is offered or the motives of the seller, says spokesman Thom Lauret of U99, the group cryptographers and developers behind the website. The design of the site is to “subvert and destabilize the established order“.

The website expects stolen databases, source code for proprietary software, zero-day exploits and other confidential documents, as well as “unflattering” pictures and videos of celebrities. Only the highest bidder will get the data, and then may choose to release the data, or just to keep it hidden. Large companies may be able to deposit money to keep leaks from publicity. In order to stem this, the website allows users to create a form of crowd sourcing/bidding that creates a larger bidding deposit .

Slur.io ensures that “whistleblowers” are to remain completely anonymous, and compensated. “Slur introduces a balanced system with the material interests of whistleblowers protected in exchange for the risks they take” said spokesman Lauret. Datasets can only be offered once.

To prevent false claims are made about the content of the data, the buyer can see the data before the seller gets the money. If the buyer is not happy with the content, you can start an arbitration involving other members to vote from the community about the content. If they agree with the buyer, the buyer gets his money back.

Payments are made via Bitcoin and the site will only be accessible via Tor to keep out the different governments. The developers do not expect to be targeted by the government because source code would fall under free speech and they do not claim to benefit from data that is sold on the site. The question is whether the American government agrees; the site is now based in San Francisco.

The developers of the website hope they get public money to pay for the development of the platform. In April, a beta version of the site was to be opened, and should follow a full release in July.

Masterclass Serie 1 “CIO Office anno 2020” – (BE)DENKEN – Van visie naar praktisch uitvoerbaar Actieplan De bijdrage van informatie en IT aan het succes van de onderne

Masterclass Serie 1 “CIO Office anno 2020” – (BE)DENKEN – Van visie naar praktisch uitvoerbaar Actieplan

Martijn Veldkamp

“Strategic Technology Leader | Customer’s Virtual CTO | Salesforce Expert | Helping Businesses Drive Digital Transformation”

September 23, 2014

De bijdrage van informatie en IT aan het succes van de onderneming neemt alleen maar toe. Reden genoeg om de organisatie die daar over gaat op de juiste manier in te richten en, als dat nodig is, drastisch te veranderen. Deze Masterclasses geven aan welke ‘spelers’ belangrijk gaan worden, welke vraagstukken moeten worden opgelost en in welke richting we de antwoorden moeten zoeken op de vraagstukken die zich aandienen in de (nabije) toekomst. Waarbij samenwerking tussen de disciplines Informatiemanagement, Architectuur en Information Risk Management onont-koombaar is en de beslissers in de IV kolom meer dan ooit het stuur van de onderneming in handen hebben om de juiste koers te varen. De wereld verandert snel en ingrijpend. Een aantal ontwikkelingen die hierbij een rol spelen zijn:
Technology push;
Information push: big data, business intelligence, door data gedreven, personificerende processen, internet of things;
Society push of de crowd push: social media, de crowd die de expert vervangt.
Allemaal veranderingen die sterk zijn verbonden met informatie en IT waarbij de juiste inzet hiervan bepalend is voor het succes van een organisatie.Opzet van de Masterclass SerieMaar hoe ga je hier nu mee om? In een drietal Masterclasses geeft Quint op basis van eenvoudige richtlijnen en concrete praktijk cases van verschillende bedrijven aan hoe ondernemingen hun business- en ICT/IV-strategie (kunnen) formuleren en omzetten in succesvolle realisatie. Reserveer daarom alvast elke laatste donderdag van de maanden oktober, november en december in uw agenda.Donderdag 30 oktober: (BE)DENKEN – Van visie naar praktisch uitvoerbaar ActieplanOrganisatie, informatie en IT raken meer en meer verweven. De eerste Masterclass gaat in op de vraag hoe we een handzame en praktische visie, strategie en richting kunnen definiëren en hoe we die omzetten tot een realistisch en haalbaar actieplan.Voor wie is deze Masterclass interessant?
CIO’s en IT Management
Informatie- en Domeinmanagers
Risk en Security Managers
Architecten
Business Managers betrokken bij Innovatie
Programma & DeelnameWe beginnen om 14:00 uur en sluiten af rond 17:00 uur. Tijdens de sessie zullen er twee presentaties worden gegeven over het onderwerp. Naar aanleiding van die presentaties wordt op interactieve wijze een dialoog gevoerd met elkaar.Deelname is kosteloos. Indien u zich wilt inschrijven voor meerdere Masterclasses uit deze serie, gebruik dan het opmerkingenveld van het aanmeldformulier om uw wensen door te geven. Neem gerust een collega mee!Overige Masterclasses uit deze serie:Donderdag 27 november: DURVEN – Strategie moet je durven uitvoeren Elke organisatie heeft wel een strategie of een missie. Maar wie is er binnen de organisatie concreet bezig met het realiseren van die strategie? En hoe weten we dat we met de juiste dingen bezig zijn en blijven? Het concretiseren van de strategie dwingt de verschillende disciplines (informatie management, architectuur, IRM) in de organisatie om samen te werken. De tweede Masterclass laat zien hoe de rollen en activiteiten van deze disciplines samenwerken om de strategie daadwerkelijk te realiseren. Donderdag 18 december: DOEN – Wat heeft de bedrijfsvoering nodig en waar moet ICT aan (gaan) voldoen? Nieuwe technologie, samenwerken in ketens en een toenemende mix van intern en extern betrokken diensten vragen om een organisatie die niet alleen procesmatig, maar ook inhoudelijk de regie kan nemen. Activiteiten zoals informatiemanagement, information risk management en architectuur zullen zich sterk moeten ontwikkelen. Naast een inkijkje in de toekomstige ontwikkeling van deze disciplines kijkt deze Masterclass juist naar de stappen die u morgen al kunt zetten om in de toekomst het stuur in handen te blijven houden. Deze nieuwe reeks Masterclasses staat in het teken van trends, ontwikkelingen en uitdagingen in ons vakgebied en is gebaseerd op de visie van Quint. Ervaren consultants, betrokken managers en gedreven vakmensen gaan met elkaar in gesprek en in debat om visies met elkaar te delen en ervaringen uit te wisselen.schrijf je nu in

Cloud adoption! Do you have a strategy? As conversations about the Cloud continues to focus on IT’s inability at adoption (or the gap between IT and Business), organiza

Reliability is often attributed as one of the reasons some organizations are wary of the cloud.

Last week, Amazon, Rackspace and IBM had to “reboot” their clouds to deal with maintenance issues with the Xen hypervisor. Details were scarce but it was pretty quickly established that an unspecified vulnerability in the Xen hypervisor was the issue.

The vulnerability, discovered by researcher Jan Beulich, concerned Xen hypervisor, open-source technology that cloud service providers use to create and run virtual machines. If exploited the vulnerability would have allowed malicious virtual machines to read data from or crash other virtual machines as well as the host server.

Not all providers had to reboot their clouds to upgrades or maintenance. Google and EMC VMware support the notion of live migration, which keeps internal changes invisible to users and avoids these Xen reboots and Microsoft uses (customized) Hyper V so they did not have that vulnerability.

It is interesting to see what “uptime” means in this context. In many reports of this nature, “uptime” doesn’t take into account “scheduled downtime.” And that could very well be the case here, as well. If one does a little bit of math:

  • 99.9% uptime is 8.77 hours of downtime per year
  • 99.99% uptime is 52.60 minutes of downtime per year
  • 99.999% uptime is 5.26 minutes of downtime per year

Although some users complained about the outage most where complaining about (the lack of) the providers’ communications.

Cloud providers cannot be considered as a black box anymore. As an architect we need to know the limitations of the architectural components the provider uses such as Xen. We need to know how often these kinds of reboots have occurred, and how the provider handles transparent maintenance.

We also need to consider the lines of communications. Providers often drop the ball here. People are often unhappy because they didn’t get much (or any) heads-up about the reboot, not about the reboots itself.

We should remember that outages and other disruptions are few and far between these days, so these rare event get extra media attention.