Three (and more) disruptive changes in the media landscape

 

Changes in media landscape (newspaper)I am a news junkie; I eat, drink, snack, swallow and dine copiously on any news source. My starter is the newspaper in the morning, followed by a quick look at some of my favorites online. During the day, when work allows it, I will visit some other sites and during lunch I might have a second look at the morning newspaper. The evening paper I read after dinner and around 8 or 10, I will watch the evening news on television. Just before turning in, I will check my usual favorite websites again. About 3 or 4 times a week I will check out new background stories on YouTube, TED or some local news sites – they will mostly serve the news in a video format, which is a good break from just reading about stuff.

Still, I am apparently an old fashioned guy:

“Smart mobility is opening up the media market in two dimensions. It is enabling personalized engagement with audience segments previously un-reached, and it is creating the opportunity for a near unlimited range of multi-screen services that enable the users to interact via the second screen.”

In a white paper published by the Atos Scientific community about disruptive changes in media, an overview is given of the impact of these changes and the increased use of smart mobile devices is the first one mentioned; I myself still like the paper format of the news, but am also increasingly drawn to using my phone or tablet.

 “Socially connected dynamic content creates the opportunity for mass media experiences that are unique to any social graph.”

Secondly the authors indicate a strong increase in the interactions between producers and consumers of news. This need for direct interaction was already existing with radio – many “shock-jocks” have chosen this format to increase the impact of their radio-shows in the past, but the social interaction allows for a much larger amount of interactions and sometimes, through the interactions, creates its own new news stories. We have seen this when web logs publish videos of a bank-robber or some hooligan beating up innocent people and the readers actively participate to find the identity of these persons.

“Any individual has the opportunity to become their own broadcaster, and there are millions of examples of successful user generated channels (…). In this new world, the sole barriers to entry are an idea and basic production skills.”

Thirdly the paper explains the impact of user generated content. This used to be a very modest part of the media landscape and most often initiated by the professionals – for example CNN or BBC asking their viewers to upload pictures and movies, but is now exploding into semi-professional channels on video services like YouTube and Vimeo. With the rise of consumer friendly video equipment paired with HD quality, it is no longer expensive to be a creator and I expect that when technologies like Google Glass become mainstream we will see (no pun intended) an ever bigger growth in user generated content.

The paper shows at least 4 more disruptive changes in the short/medium term, which you will need to discover when it is finally published (hint: Intellectual property, real time advertising, personalization, network capacity).


This blog post was previously published at http://blog.atos.net/blog/2013/11/21/watch-this-space-three-and-more-disruptive-changes-in-the-media-landscape/  


 

IPv6 – your next cash cow?

For anybody looking at the next big thing, the new 'killer app' or the new gold, I recommend to read a white paper by the Atos Scientific Community called "IPv6: How Soon is Now?".

The paper explains very well the problem with the way the internet is currently working. It points out that we have a serious issue, a 'time-bomb', with the way that devices (computers, networking components and other IT stuff) are connected with each other using this old IPv4 technology. The paper further explains why, in spite of all kinds of intermediate technologies, we need to adopt a new technology, called IPv6, and we need to do that very quickly.

"To sustain the expected Internet growth, there is no adequate alternative to adopting IPv6."

Furthermore you will read in the paper that we will be running into real problems if we do not make that change and unfortunately the change is happening much too slow.

"Unfortunately statistics from Google paint a (…) picture with less than 1% of total users being IPv6 clients"

This might sound awfully boring and a field of play for the technology wizards in your organizations – this is not for you right? But wait, because halfway through the paper, the authors start explaining that the benefit of this new technology is in the way it can support all possible technical devices (including cars, phones, traffic lights, wind mills, televisions, your shoes and wrist watch, medical devices and almost anything) can become connected – can talk with each other – when we switch to IPv6.

"(…) that IPv6 can now be used on virtually any communicating object, from servers to small sensors, regardless of the underlying (…) network technology."

I think this changes everything; it opens up a whole new world of play for consumers and manufacturers, for service providers and retailers; to create new businesses, to open up new markets and create new ways of making money.

"The IPv6 "Killer App" is likely to be the enablement of the Internet of Things (IoT)"

Based on this you would be stupid to not support this move to IPv6; it will be the engine that allows your business to innovate and grow; your IT landscape will increase thousand fold and you can bring any type of information, sensor or other device into your business platform. That is cool and exciting.

But it will not be easy.

"Although many people think that a migration to IPv6 is primarily a networking issue, the truth is that all IT organizations across server, network, storage and application domains must be equally trained to contribute to both the planning and execution."

The authors explain in quite some detail that you will need to overcome technical hurdles (IP Space Management, IP Address Provisioning, IPv6 to IPv4 interoperability, Application IPv6 readiness and Security Challenges) as well as business challenges (Coordination across silos and companies, Timing issues on what to do first and governance to establish End-to-end responsibility).

"We predict a tipping point when there will be more IPv6-connected users and devices, and therefore opportunity, than the IPv4 landscape provides today."

So, want to grow your business, do the strategically right thing and set yourself up for business growth, agility and all the other stuff you need and like? Migrate to IPv6 now.


This blog post was previously published at http://blog.atos.net/blog/2013/09/03/watch-this-space-lucky-7-avoiding-information-overload/

Lucky # 7 – avoiding information overload

I feel much more at ease than I did yesterday. The reason is that I just read a whitepaper of the Atos Scientific Community on ‘Information Overload’.

The paper explains that in general we humans can only remember 7 things – what a relief! Trying to remember more creates stress.

Young Girl Talking On Telephone (by David Castillo Dominici at freedigitalphotos.net)

So I decided to stop trying.

Human beings have clear limits on the amount of information they can process, often called bounded rationality. The phenomenon is clearest in the ‘magical number’ that is linked to our short-term memory: at most, we can keep seven (+/- two) items at once in our working memory, (…). Any item beyond seven, causes the added item (…) to be partially ignored, forgotten, distorted, or otherwise lost.

Suffering from Information overload is clearly a choice. If you suffer from it, it is because you fail to recognize your boundaries and/or, in relationship to that, fail to use the proper tools to manage your work.

In many corporations we see that there is a fundamental shift in the way information gets distributed and used for collaborative purposes – moving away from email and ‘the corporate newsletter’ (the push mechanisms) into a more ‘social’ network of information sharing and collaboration.

These Enterprise Social Networks (ESN) are modelled after public social networks as Facebook, Twitter and others and are being explored as alternative ways of working in enterprises.

Within a corporate social network, much of the potential for Information Overload can be avoided if the phenomenon is kept in mind during the design, creation and use of the network.

So the premise of the paper is that a properly designed and implemented ESN can help avoid Information Overload and increase efficiency in the workplace, but if done incorrectly can increase the problem and create a very unhealthy and inefficient working environment.

In order to understand the success-factors, we need to understand human behavior and make sure they get addressed:

  • Noise filtering; the capability to assess and reflect on information and filter the data in a way it makes sense for the work we have to do.
  • Predictability; the fact that standardization and methodologies help us structure the way we work, focusing on the content instead of the process increases motivation and quality of work.

If the ESN allows us to address these elements we have a good chance of success and we can further increase the quality by understanding how an ESN will impact the way we work.

The concept that every message must be seen by everyone, and that everything that is said on a corporate social network is relevant to every user has become outdated in the social media era.

I believe this is a fundamental characteristic of what we will be able to achieve through a successful implementation of an ESN; empowerment of people.

Moving away from the top-down pushing of information, but instead creating cross company collaboration processes in (virtual) communities.

 


This blog post was previously published at http://blog.atos.net/blog/2013/09/03/watch-this-space-lucky-7-avoiding-information-overload/


The consequences of a stolen phone

Your wallet is stolen. You wanted to pay for your tall latte and it is gone. You search all of your pockets and looked around, bewildered.

Maybe somebody found it and will hand it to you. No. It’s gone. The nice lady at the counter understands and gives you your coffee anyhow. That’s nice.

 

Cafe Latte (by amenic181 at freedigitalphotos.net)It doesn’t change the fact that your wallet is stolen. In your mind you create a list of everything that is in it. Some money, the tickets for the theater, your bank card and your credit card, some pictures of your children and a business card you got while you bumped into an old friend on your way to the coffee shop.

So now you reach for your phone, you have to call the bank to block your cards, you do not want some punk to get his dirty hands on your salary.

Oh wait and sh@#$%^&*, your phone is gone too…

In a recent white paper of the Atos Scientific Community the security aspects of mobile devices is addressed , as well as other aspects in the management of devices in the new bring-your-own-device concept that is being allowed by many companies and full heartedly embraced by employees.

The quotes below are from that white paper.

“Enterprise Mobile Management solutions currently available in the market address different aspects of BYO. Balancing those with network & access as well as data and applications usage will pave the way for a successful BYO implementation…”

Ok. It is gone, you do a quick mental inventory of what is on your phone.

Access to your personal and business email, Twitter and Facebook account. Your contact list of about 400 people with their email addresses, home addresses and telephone number included. On top of that access to your DropBox account with all the info on a recent bid and the complete cost break down of all products.

And because you have a new NFC enabled phone, your credit card is also in digital format on your phone. Now what?

“The key area to support BYO in 2016 will be tablets and their descendants (e.g. wearable computers), along with smartphones. We see these as the two key device segments.”

The white paper does not only cover this case of a stolen phone – it goes into all measures you can take if you adopt the bring-your-own-device scenario in your company.

What to do with applications, data and network access; all these aspects are clearly explained and some best practices are listed for any CxO that is looking into this.

“Security in such dynamic environments as BYO must be built on the assumption that anyone or any device may get access to the data, but that only authorized users should be able to use it for the intended and agreed purpose, and under a defined context.”

“Sir? Is this yours?” When you turn around you see a nice person holding up both your phone and wallet – you start breathing again.

At the same time you think about what you could do to avert the disaster that did not happen this time.

 

 


This blog post was previously published at http://blog.atos.net/blog/2013/06/24/watch-this-space-the-consequences-of-a-stolen-phone/


Curiosity drives cloud computing

I like asking questions and I like getting good answers even better. It is because of that, I now have a love / hate relationship with search engines. Most of the time they give me a 50% answer, a kind of direction, a suggestion, a kind of coaching to the real answer. It is like the joke about the consultant; “the right answer must be in there somewhere, because he or she gives me so many responses”.

PH03797IIn spite of all kind of promises, search engines have not really increased their intelligence. Complex questions with multiple variables are still nearly impossible to get answered and the suggestions to improve my question are mostly about my spelling or because the search engine would have liked a different subject to be questioned on.

So nothing really good is coming from search engines then? Well most arguably search engines have brought us cloud computing and a very powerful access to lots and lots and lots of data, otherwise known as ‘the world wide web’.

No wonder I envision that powerful access and cloud computing are the two most important values we want to keep while increasing the capacity and intelligence to do real analytics on large data sets.

In a whitepaper of the Atos Scientific Community, these 2 elements are explored in great depth:

  • Data Analytics needs cloud computing to create an “Analytics as a Service” – model because that model addresses in the best way how people and organizations want to use analytics.
  • This Data Analytics as a Service – model (DAaaS) should not behave as an application, but it should be available as a platform for application development.

The first statement on the cloud computing needs suggests we can expect analytics to become easily deployed, widely accessible and not depending on deep investments by single organizations; ‘as a service’ implies relatively low cost and certainly a flexible usage model.

The second statement about the platform capability of data analytics however, has far reaching consequences for the way we implement and build the analytic capabilities for large data collections.

Architecturally, and due to the intrinsic complexities of analytical processes, the implementation of DAaaS represents an important set of challenges, as it is more similar to a flexible Platform as a Service (PaaS) solution than a more “fixed” Software as a Service (SaaS) application

It is relatively easy to implement a single application that will give you an answer to a complex question; many of the applications for mobile devices are built on this model (take for example the many applications for public transport departure, arrival times and connections).

This “1-application-1-question” approach is in my opinion not a sustainable business model for business environments; we need some kind of workbench and toolkit that is based on a stable and well defined service.

The white paper describes a proof of concept that has explored such an environment for re-usability, cloud aspects and flexibility. It also points to the technology used and how the technology can work together to create ‘Data Analytics as a Service’.


This blog post was previously published at http://blog.atos.net/blog/2013/03/25/watch-this-space-curiosity-drives-cloud-computing/


<