Empowering Business Through Connected Data
We live in a digital age consumed with instantaneous access to information. Ninety percent of the world’s data has been generated in the past two years, nearing 2.5 quintillion bytes each day. With 4.9 billon unique mobile users, 8.4 billion Internet of Things (IoT) devices and innumerable unstructured transactions generated from the web and social media each second, the global datasphere’s growth rate dwarfs Moore’s Law.
Our ability to transform bits and bytes of data into actionable real-time information, coupled with predictive analytics, is still in its infancy. As companies connect these disparate data points, new innovative opportunities will emerge, and long standing processes will be disrupted. Agile tech savvy firms will unlock creativity, bringing new solutions to market at an accelerated pace. To stay competitive, how do traditional businesses embrace today’s digital first paradigm that empowers employees to achieve more through connected data?
In practice, the heart of our ubiquitous digital universe is a comprehensive ecosystem designed to deliver collaboration and transparency while supporting a corporate vision. To put this into a business context, we invested in a comprehensive overhaul of our long-established residential leasing process. Our goal was to reduce the number of system touch points, automate manual processes, connect disparate unsynchronized silos of information, and provide a greater level of self-service. Secondarily, we would replace Excel as the reporting tool of choice with analytic platforms delivering real-time insight and visibility into trends, fostering a proactive management style.
Based on anecdotal conversations, we started to analyze a broad spectrum of roles and responsibilities. It became apparent many daily tasks had become disconnected and layered with unnecessary duplication. As we assessed the way people worked, our end users struggled to visualize the possibilities and were becoming increasingly uncomfortable with change. This dilemma is one every agent of change has faced, knowing that without stakeholder’s support, moving forward is fraught with risk and uncertainly.
To rebuild confidence and trust in technology, we turned to a new digital approach to illuminate our vision: storyboarding. Through a series of meetings with key employees, we delved into current processes, pain points, system usability and reporting requirements. The result utilized a graphical UX / UI approach that brought our findings to life in a simple, intuitive fashion. Through a "Business Lifecycle Storyboard," our end users were able to clearly visualize how technology would enhance their daily tasks and interactions with prospects and clients.
During our development cycle, the intrinsic value of preparing detailed workflow process blueprints, with accompanying swim-lane diagrams, became evident. It guided our strategic in-depth review of each application's ERD (Entity Relationship Diagram), focusing on table indexes and field attributes essential to successful data mapping. Furthermore, the creation of custom staging tables facilitating field level transformation based on business process triggers were developed to maintain system integrity.
With disparate data silos now connected, our employees had the ability to see trends and behavioral patterns across the entire lifecycle, building a foundation for strategic engagement. Through an intuitive graphical interface, managers and analysts could also visualize data from different viewpoints empowering them to make more accurate and timely business decisions. Over time, as historical data points are collected, new patterns will emerge allowing dynamic decision-making to drive revenue increases and operating efficiencies.
Cybersecurity risks are growing daily, and with proprietary data, intellectual property and perhaps a firm’s competitive advantage traversing the cloud, our vulnerabilities will grow as well. When constructing system interfaces and data connections, always incorporate a few simple precautionary cyber guidelines:
- Require VPN connections for data exchange
- Whitelist traffic using firewall rules
- Encrypt data at 256 AES, both in transit and at rest
- Implement strong passwords policies
- Monitor system intrusion alerts
This Week’s Sponsor
CBRE|ESI helps its clients successfully manage the energy use of complex building portfolios. We help companies take control of their infrastructure, connect disparate systems, lower energy costs, increase occupant comfort and safety, and prolong reliability and uptime in a way that lets them focus their time and talent on their core business. Please visit our website at www.thinkesi.com
UPCOMING REALCOMM WEBINARS
Commercial and Corporate Real Estate Cyber Risk - Developing a Comprehensive Strategy - 10/25/2018
Hardly a day goes by that we don’t hear about a Cyber breach. The most recent of scale was Equifax, the credit reporting agency in which credit information of 143 million of its clients was breached. While most of the incidents we hear about involve data or financial theft, there is a looming threat…our built infrastructure. This infrastructure includes everything from power plants to dams, but also includes the millions of buildings we use every day to work, shop, learn, recreate, manage our health and more. The threats range from unwanted building access to pirating of video surveillance and everything in between. This webinar will focus on the entire spectrum of Commercial and Corporate Real Estate cyber challenges, solutions and strategies.
Founder of Realcomm Conference Group, an education organization that produces Realcomm, IBcon and CoRE Tech, the world's leading conferences on technology, automated business solutions, intelligent buildings and energy efficiency for the commercial and corporate real estate industry. As CEO, Jim interacts with some of the largest companies globally pertaining to some of the most advanced and progressive next generation real estate projects under development.
Tom Shircliff is a co-founder and principal of Intelligent Buildings, a nationally recognized smart real estate professional services company that was started in 2004. Intelligent Buildings provides planning and implementation of next generation strategy for new buildings, existing portfolios and urban communities. Tom is a speaker and collaborator with numerous universities and national laboratories, a gubernatorial appointee for energy strategy and policy and founding Chairman of Envision Charlotte, a Clinton Global Initiative.
As CIO at Meridian Capital, Sandy Jacolow oversees the firm’s nationwide innovation and technology initiatives that support the company’s brokerage, investment sales and retail leasing businesses and growth activities.
Ron Victor is a Silicon Valley based technology entrepreneur with 20 years of experience and expertise launching new ventures at start-ups and fortune 1000 technology companies. To-date he has enabled raising more than $30Million in start-up capital for multiple start-ups in silicon-valley. Ron has founded and led three companies to-date with successful exits. His latest venture is IoTium Inc. – a Silicon Valley start-up that provides a secure, cloud-managed, easy-to-deploy software defined network infrastructure for all IoT verticals.
Coleman Wolf has extensive experience developing enterprise-wide access control and alarm monitoring systems, developing business analyses, and conducting detailed security surveys and assessments of corporate offices, power generation plants, and facilities related to national critical infrastructure. Coleman has also managed numerous security system installation and upgrade projects. He holds a Master of Science, Computer Information Systems degree from Northwestern University and a Bachelor of Science, Electrical Engineering degree from the University of Michigan. He is also CPP (Certified Protection Professional) and CISSP (Certified Information Systems Security Professional). Coleman also holds the following Professional / Civic Affiliations: ASIS (Member of American Society for Industrial Security), Chairman of the ASIS Information Technology Security Council, and is an active member of the ASIS Security Architecture and Engineering Council.