Category Archives: Operations

More of your data for sale

“Wall Street Analysts Are Selling More Data,” The Wall Street Journal, November 8, 2018 B11. Analysts are searching and make available a bunch of information on your information, including “social media sentiment … and geospatial mapping.”  Think of it as expanded research reports.

Well, they are in the business of reviewing data and offering opinions (for a price).  Is it much of a disintermediation for them to start selling the information directly?  I guess there’s money in it.  Or service.

Advertisements

Leave a comment

Filed under Access, Analytics, Collect, Controls, Corporation, Duty, Information, IT, Management, Operations, Ownership, Security, Third parties, Use, Use, Value

Old dogs, new tricks

“Old Spy Plane Tries to Learn New Tricks,” The Wall Street Journal, June 8, 2018 A3. Using new data analytical techniques to harvest more information from U2 spy photos taken from 70,000 feet, freeing up human viewers for other duties.

What old information do you have that you could process differently with newly available technology?  What value could you harvest?

 

Leave a comment

Filed under Analytics, Collect, Data quality, Information, Management, Operations, Technology, Use, Value

Do your customers have an alternative?

What happens to your business if you or your customers can’t get to the Internet?

“Visa Hit by Outrage In Parts of Europe,” The Wall Street Journal, June 2, 2018 B12.  Users of Visa cards in Europe couldn’t use their cards on Friday as the result of a hardware failure.

Are you prepared for a hardware failure that prevents your customers from reaching you?  Is this an aspect of information governance?  Business continuity planning?  Both?

Leave a comment

Filed under Access, Business Continuity, Interconnections, IT, Operations, Risk

A Mayor’s challenge

“Probes, Cyberattack Distract Atlanta as It Pitches Amazon,” The Wall Street Journal, May 29, 2018 A3.  Investigations of former mayor and the aftermath of a ransomware attack hamper efforts to entice Amazon to the city.

Corporations should conduct structured risk assessments.  Do cities?

One assumes Atlanta has done a risk assessment and identified the risk of official misconduct.  Did it also capture the risk of a cyberattack?  Did the risk assessment suggest that if these risks occurred, Atlanta would lose the chance of phenomenal growth?

 

Leave a comment

Filed under Business Continuity, Communicate, Compliance, Compliance, Controls, Duty, Duty of Care, Governance, Government, Internal controls, IT, Management, Operations, Oversight, Protect assets, Risk assessment, Security, Third parties

Extra credit reading

Interesting Journal Report on health care technology.  Several articles on new uses of information, or uses of new information, in order to do everything from brain surgery to looking after aging parents.

Headlines:

  1. “Augmented Reality Gives Brain Surgeons a Better View,” The Wall Street Journal, May 29, 2018 R1.
  2. “AI Tools Help the Blind Tackle Everyday Tasks,” The Wall Street Journal, May 29, 2018 R4.
  3. “Robots and Chatbots Look After the Elderly,” The Wall Street Journal, May 29, 2018 R6.
  4. “Apps Promise to Help Avoid Pregnancy,” The Wall Street Journal, May 29, 2018 R7.
  5. “For Those With Dementia, an Assist From Technology,” The Wall Street Journal, May 29, 2018 R8.
  6. Doctors, Beware: You’re Being Watched,” The Wall Street Journal, May 29, 2018 R10.”

Interesting.

Leave a comment

Filed under Collect, Definition, Information, Operations, Use, Use, Value

Keeping conversations semi-private

“Police Move to Make Their Radio Traffic Private,” The Wall Street Journal, May 18, 2018 A3. Police encrypt or delay release of radio traffic, limiting but not preventing public access.  Keeps the crowds down.

So, they can’t limit your speech, but they can delay your access to theirs?  Makes sense, if they’re planning a SWAT raid.  How transparent do we want the police to be?  How transparent should your company be?

Leave a comment

Filed under Access, Business Continuity, Controls, Duty, Government, Information, Internal controls, Operations, Security, Third parties, Value

Value through use

The value of information is in its use, or perhaps in the ability to prevent others from using it.

“H&M Ramps Up Data Use,” The Wall Street Journal, May 8, 20189 B4. Store chain mines social media to identify and track trends, and analyses store-specific information to determine what to stock in that store.

So, they use a common technology approach to data analysis chain-wide to derive a store-specific stocking strategy.  They find that computers don’t get distracted by emotions as much as humans.

Leave a comment

Filed under Access, Analytics, Collect, Information, IT, Knowledge Management, Management, Operations, Use, Use, Value