Wednesday, September 11, 2019

Optimizing Digital Transformation


Digital transformation is a catchall term that includes a wide variety of goals. For some companies, digital transformation means leveraging cloud capabilities. For others, artificial intelligence and machine learning are more important. Increased analytics capabilities and Internet of Things implementations play roles as well. The point of digital transformation is not to take companies from paper processes to hyper-advanced and complex digitized alternatives. On the contrary, many components of digital transformation are subtle. Even the most technologically challenged business owners, given a bit of time, can lead an effective digital transformation with the right mindset. Company goals and challenges dictate the type of digital transformation to pursue. A company that seeks more customers, for instance, might consider how to implement new tech to improve the customer experience. An online chatbot or a user-friendly app might do the trick, or perhaps a business’s first step is to create store listings on Google and Apple Maps.

A company struggling to optimize its partner network, on the other hand, might invest in more analytics tools to make better choices about shipping and vendors. It doesn’t matter whether the company sells software or gravel: Digital transformation is for everyone. Businesses considering digital transformation should ask themselves where their threats and opportunities lie. Have comparable industry players already made moves toward digital transformation? Have customers begun to demand options that the company cannot provide today? Rather than wait for market influences to force their hands, though, businesses should proactively pursue digital transformation to stay ahead of the game. Most employees are set in their ways: In order to make the change go as smoothly as possible, business owners need to talk to employees about why the company is moving in a digital direction. Some employees worry that digital transformation will eventually cost them their jobs. Cents saved are cents earned, even for companies with growth goals. Before taking on new debt to tackle grand opportunities, consider how digital transformation could make existing processes cheaper and easier. Mosy small companies can’t afford to sink money into suboptimal campaigns the way big ones can. With a predictive analytics tool that integrates with existing tech, small businesses can stretch their advertising budget much further.

Most Bigger companies can afford to staff robust IT departments, but smaller companies don’t have that kind of cash. By outsourcing, small companies can maximize their resource pools and only pay for the aspects of digital transformation with the greatest impact. A good technology partner will recommend in-budget solutions that are compatible with a business’s infrastructure. Ask potential partners whether they have experience with small businesses, who at the vendor will be responsible for communications and what kind of preparations the business should make ahead of time. Digital transformation isn’t some vague buzzword. For small businesses, digital transformation includes all the little steps forward that add up to massive cost savings, happier customers and improved prospects. Look for areas with easy opportunities for big improvements, and then use these tips to turn those potential gains into reality. Fortunately, digital transformation doesn’t require businesses to move every process to the cloud, nor does it require them to invest millions of Rands in brand-new tech -- a critical note, The most effective digital transformations leverage existing infrastructure and find maximum value in the most sensible improvements.

c. 2018, MEP Digital Systems (Pty) Ltd.

Wednesday, August 28, 2019

Service Subscription Business Model


Subscription business models are taking hold in many different industries, supported by advances in cloud computing, data analytics, and the Internet of Things (IoT). Suppliers benefit from longer and wider revenue streams for their products, while customers avoid big upfront payouts and are able to standardize and spread out their expenses. Subscription-based services certainly aren’t new. But the model that’s evolved in the last several years is more robust and widely applicable than any previous one. It has radically overhauled at least one major industry. Subscription cloud computing services, with their flexibility, cost savings, and performance advantages, are increasingly replacing on-premises software as the technology platform of choice for enterprise IT. The as-a-service model is catching on quickly in other industries, including construction, where new, sophisticated machinery is extremely expensive and aging equipment is a competitive disadvantage. One major manufacturer of construction equipment is expanding its digital services for high-end products to include real-time monitoring of parts and performance to identify weaknesses and wear.

In healthcare, IoT-enabled devices already relay patients’ health data immediately and consistently to hospitals and medical practices, implemented as part of a remote monitoring service. In the auto industry, Volvo’s recent advertising campaign, extols the manufacturer’s new subscription program, under which its monthly vehicle charges include taxes, insurance, and both roadside and at-home services. This program eliminates the down payment and end-of-service fees typical of auto leases. Other auto manufacturers and dealers offer similar programs. Subscription services are popping up in unexpected places. In anticipation of the impending shift to 5G wireless networks, a major network device manufacturer is offering consumers 5G router hardware, software, and support bundled as a “premium service.” A European utility is offering consumers a service that, for a monthly fee, monitors temperature and functioning of a customer’s hot water tank through an attached IoT device. Temperature loss results in a text message and/or phone call to the customer, expediting a visit from a technician already armed with relevant data.

The as-a-service model appeals to millennials, according to recent reports, many of whom value convenience over ownership. Those strapped by college debt also appreciate the ability to spread out their costs—for everything from clothes to furniture. Still, the consumer-oriented subscription market isn’t without its challenges. For example, recent efforts to offer IoT-enabled, app-connected electric scooters as “shared services” have no doubt created a ready-made market of urban commuters looking for mobility alternatives, but issues related to traffic rules, safety regulations, and liability are holding back the services, while a glut of competitors is complicating the economics. All of this adds up to a typical day in e-commerce land. Which of these new online as-a-service businesses will succeed over the long haul, and in what form, isn’t exactly clear. What is clear is that the current “let’s see what sticks” business environment requires savvy companies to overcome any lingering trepidation about the model cannibalizing their current revenue streams and explore where “as-a-service” might fit into their product plans. In addressing such an open-ended imperative, cloud computing can help. MEP Digital Systems, for instance, offers field service management for subscription tailored specifically to the as-a-service model.

Cybersecurity Awareness Campaign!





Dear Future Victim,

PLEASE PANIC!

Cower in the corner under a toilet paper fort with a pile of ammo for a pillow. Meanwhile, I’m hacking your corporate network. Work from home, they said. Self-isolate, they said. Avoid contagion, they said. They forgot about me, for I am a DORMANT CYBER PATHOGEN. Dormant no longer While you’re avoiding biological infection, I am quietly spreading my digital contagion throughout your organization, ready to flip the switch at just the right moment: RANSOM TIME!

God, I love the smell of ransomware in the morning. Nothing like the sweet, sweet aroma of bitcoin in the aftermath of a little bit of racketeering. A racketeering cyber pathogen–that’s me! Mixing metaphors like bleach and sulfuric acid, but it don’t matter cause at the end of the day it’s BLING BLING, CHING CHING TIME, when I count up my illicit Bitcoin gains and then fill a vast silo with the same number of gold coins so I can swim in my loot like Scrooge McDuck. (Don’t tell me you never wondered what that would be like.)

How did I rise to my current eminence, sitting Smaug-like on a load of loot? Simple. I waited for you to make mistakes. Errors because the boss said, “Just make it work!” You had 24 hours to set up work-from-home for an army of cubicle natives, unaccustomed to sweat shops hours of pajama productivity. Some of my fave mistakes you make are also the easiest for you to fix. No wonder I’M KING OF THE WORLD!

DON’T DEPLOY A VPN. 

Force your employees to directly connect to the tons of new internet-facing services you just put online cuz your boss said productivity is the number one priority. We’ll see how much he likes productivity when I take his entire network for ransom. Go ahead. Punch a hole through the corporate firewall and give RDP access to a bunch of employees–and to the entire internet!

Just to make sure I was doing this crime thing correctly, I caught up with Johnny Xmas, obviously not his real name (duh!), a senior researcher for the cybersecurity R&D firm GRIMM. He told me I was totally on the right track. The number of remote desktop servers (RDP) appearing on the internet as a whole is increasing substantially on the whole day by day. Do they all have MFA on them? Probably not. Why are we directly exposing them to the internet? Employees should VPN into the corporate network and then RDP into the machine. Trust me, I’m gonna love that unpatched Windows XP box covered in dust the IT department just gave the whole world access to. In fact, my only real problem will be keeping other attackers from partying with me–that’s my box! Bad APT! Bad APT! Take your advanced persistency and go threaten someone else!

I get very territorial when doing crimes. It’s a question of ethics. Only one racketeering play at a time. This Windows box ain’t big enough for the both of us. DRAW, STRANGER! But I digress. Ever since escaping WestWorld things have been a bit strange. (Oops, now you know my secret, you won’t dob me in, will you? Please, guvnuh, can I have some more?) Oh look, an employee working from a personal device!

USE PERSONAL DEVICES.

I loves it when you do this. Access confidential business information from the unsecured personal laptop full of third-party softwaremalware! So easy to pop. SNAP CRACKLE POP, I’M RANSOMWARE! TAA-DAHHH! So when I send you my handcrafted, artisanal phishing emails linking to websites such as my freshly registered Covid19MedicalAdvice.com with an urgent subject line “Employee Health & Safety” from a spoofed email pretending to be the CEO, my RAT will out-CAT your consumer-grade anti-virus.

There’s never been a better time to go phishing. “When people get scared, they may not be as focused as they need to be, looking at these links and email addresses,” I once heard NetScout CSO Debby Briggs say. “If I’m the person trying to break in, I’m going after email, and I’m going to create fake websites.” When your panic-addled brain sends an electrical impulse to your mouse-clicking fingers, then my malware will be coming down your fiber optic like a giant uncovered digital sneeze. Here’s hoping COVID-19 doesn’t jump the meatspace-digital barrier and start infecting computers, I may be a dormant cyber pathogen awakening from my slumber, but compared to COVID-19, I’m an infectious amateur.

You’re l33t, bro. Yeah. I’m talking to you. You with the classy hacker handle: “COVID-19.” You may still be a teenager but mad respect for your skillz. Let’s get a little bro-mance going on here, between two infectious geeks. I know they say we can never be together, you a biological agent of doom, me a digital agent of doom, but look at how much we have in common: WE ARE BOTH AGENTS OF DOOM! Think about it, bro boo. You call me. Yeah, I’m making that thumb and little finger gesture that looks nothing like a phone. I never thought I could fall for a virus I didn’t create myself, but that’s love for you, I guess.

NO 2FA? NO PROBLEM!

For the love of my ill-gotten plunder, do not, I repeat, DO NOT enroll your employees in any kind of two-factor authentication program. Nothing bursts my bubble as a digital agent of doom than having to end-run around properly configured 2FA, especially you awful, horrible people who use U2F tokens like Yubikeys. See that cartoon steam pouring horizontally from both of my ears? That’s how I feel about 2FA, YOU WASCALLY WABBIT, YOU! What? I’M the wascally wabbit? Wow. Looking in a mirror hurts.

FORGET EMPLOYEE TRAINING

Embrace your cynicism and repeat after me: “If education is the solution to your security problem, you’ve already lost.” Everything is lost! Give in to panic! Give in to hopelessness! What’s the point of living? Just accept my malware into your life, like the Gospel of badness it is! Because in a pinch training can be quite effective, and we do NOT want any of that happening, now do we, my dears? “It’s not possible in a two-week period, much less 24 hours, to roll out a full MDM [Mobile Device Management] solution to enforce and monitor policies,” Xmas says. “So, it’s important to get the verbal policy out there, to train work staff on secure practices.” 

“People won’t listen all the time when dealing with this emergency,” he adds, “but security is never all or nothing. We do what we can when we can and work towards building up to a perfect solution in the end.” Remember, folks: The good is the enemy of the perfect. Strive for the impossible! Strive for true innovation! Meanwhile, I’ll be holding your network for ransom. Now you’ll excuse me, I have a silo of gold coins to go swim in.

Sunday, August 25, 2019

Information Logistics


All organisations and companies are dependent on information. It can be found within IT systems, in binders and computer files on individual computers or in the management information systems which is sophisticated and powerful science in existence. Information logistics is the branch of computer science and logistics which is concerned with implementing systems that can perform many complex tasks using advanced mathematics and highly sophisticated algorithms. The discipline can be viewed as the bedrock of route planning software in the global distribution business. In this sphere, the industry is concerned with optimising the flow of goods and services and all relevant information between an origin and destination point.

An Information Element (IE) is an information component that is located in the organizational value chain. The combination of certain IEs leads to an information product (IP), which is any final product in the form of information that a person needs to have. When a higher number of different IEs are required, it often results in more planning problems in capacity and inherently leads to a non-delivery of the IP. Data Logistics is a concept that developed independently of Information Logistics in the 1990s, in response to the explosion of Internet content and traffic due to the invention of the World Wide Web (WWW). The growth in the volume of Web hits, combined with the steady increase in the size of Web-delivered objects such as images, audio and video clips resulted in the localized overloading of the bandwidth and processing resources of the local and/or wide area network and/or the Web server infrastructure. The resulting Internet bottleneck can cause Web clients to experience poor performance or complete denial of access to servers that host high volume sites (the so-called Slashdot effect).

The goal of Information Logistics is to deliver the right product, consisting of the right information element, in the right format, at the right place at the right time for the right people at the right price and all of this is customer demand driven. If this goal is to be achieved, knowledge workers are best equipped with information for the task at hand for improved interaction with its customers and machines are enabled to respond automatically to meaningful information. Methods for achieving the goal are:
- the analysis of information demand
- intelligent information storage
- the optimization of the flow of information
- securing technical and organizational flexibility
- integrated information and billing solutions

The supply of a product is part of the discipline Logistics. The purpose of this discipline is described as follows:

Logistics is the teachings of the plans and the effective and efficient run of supply. The contemporary logistics focuses on the organization, planning, control and implementation of the flow of goods, money, information and flow of people. Information Logistics focusses on information. Information (from Latin informare: "shape, shapes, instruct") means in a general sense everything that adds knowledge and thus reduce ignorance or lack of precision. In stricter sense information becomes information only to those who can interpret it. Interpreting information will provide knowledge.

It entails the organisation and prioritisation of tasks by using applications such as resource planning software and associated algorithms within the overall supply and distribution infrastructure. In such contexts, route optimisation is a keyword as there is almost certainly never going to a perfect set of delivery circumstances. These constraints to perfection in the real world are exemplified by such things as diversions or adverse operational conditions and are often updated in real time. Information logistics system such as a multi-use resource planner, the constraints are expressed as a series of mathematical equations and functions which take the form of an inequality. In advanced mathematics, an inequality occurs when two values in a relationship are not equal. This may sound obvious, but it must be made clear that the term inequality does not mean that one value is greater or that they can be compared, it merely means that value X does not equal value Y. In the most simplistic terms when an inequality occurs a further constraint is placed on route optimisation, and that means the delivery schedule may be affected, at the very least the schedule must be flexible enough to accommodate the change. The presence of an inequality means that new information must be input to the computer network and a new set of options displayed.

The Digital Evolution in Technology


JAMstack is revolutionising the way we think about workflow by providing a simpler developer experience, better performance, lower cost and greater scalability. JAM stands for JavaScript, API & Markup. A modern web development architecture based on client-side JavaScript, reusable APIs, and prebuilt Markup. Dynamic functionalities are handled by JavaScript. There is no restriction on which framework or library you must use. Server side operations are abstracted into reusable APIs and accessed over HTTPS with JavaScript. These can be third party services or your custom function. Websites are served as static HTML files. These can be generated from source files, such as Markdown, using a Static Site Generator. JAMstack websites don't have to be static. There are great services available to help bring some dynamic data to your product. You can also abstract your own functions into reusable APIs. For this you can use AWS lambda functions or Netlify Functions. Many JAMstack products have dynamic comment sections. These are typically used on blogs and a great way to interact with your audience. Setting up an online store on the JAMstack has never been easier.....

Lets also look at single-page application (SPA) which is a web application or web site that interacts with the user by dynamically rewriting the current page rather than loading entire new pages from a server. This approach avoids interruption of the user experience between successive pages, making the application behave more like a desktop application. In a SPA, either all necessary code – HTML, JavaScript, and CSS – is retrieved with a single page load, or the appropriate resources are dynamically loaded and added to the page as necessary, usually in response to user actions. The page does not reload at any point in the process, nor does control transfer to another page, although the location hash or the HTML5 History API can be used to provide the perception and navigability of separate logical pages in the application. Interaction with the single page application often involves dynamic communication with the web server behind the scenes.

Let’s say your next project is going to be a simple HTML website for a resumé, marketing a product or service, documenting your software, or something along those lines. A great option for you is to build your website using static site generators (SSG). There are tons of static site generators in a range of programming languages, such as JavaScript, Ruby, Go — the list goes on. A common CMS (Content Management System), like WordPress for instance, builds the web page dynamically as it is being requested by the client: it assembles all the data from the database, and processes the content through a template engine. With all the options available, it’s easy to feel paralyzed when it comes to choosing a static site generator that fits the bill. There are some considerations that could help you sieve through what’s on offer. Your project’s requirements should throw some light on the features you should be looking for in your SSG. If your project needs lots of dynamic capabilities out of the box, then Hugo and Gatsby could be a good choice. As for build and deploy time, all of the SSGs listed above perform very well, although Hugo seems to be the favorite, especially if your website has a lot of content. Is your project a blog or a personal website? In this case, Hugo and Gatsby could be excellent choices, while for a simple documentation website VuePress would be a great fit. If you’re planning an e-commerce website, then you might want to consider which SSG fits in well with a headless CMS for store management. In this case, Gatsby and Nuxt could work pretty well. One more thing you might want to consider is your familiarity with each of the SSG languages. If you program in Go, then Hugo is most likely your preferred choice. As for the remaining options, they’re either built on top of React (Next and Gatsby) or Vue (Nuxt and VuePress).


Now, headless content management system, or headless CMS, is a back-end only content management system (CMS) built from the ground up as a content repository that makes content accessible via a RESTfulAPI for display on any device. The term “headless” comes from the concept of chopping the “head” (the front end, i.e. the website) off the “body” (the back end, i.e. the content repository). Next is serverless architecture (also known as serverless computing or function as a service, FaaS) is a software design pattern where applications are hosted by a third-party service, eliminating the need for server software and hardware management by the developer. Applications are broken up into individual functions that can be invoked and scaled individually. Next is serverless architecture (also known as serverless computing or function as a service, FaaS) which is a software design pattern where applications are hosted by a third-party service, eliminating the need for server software and hardware management by the developer. Applications are broken up into individual functions that can be invoked and scaled individually. Hosting a software application on the internet usually involves managing some kind of server infrastructure. Typically this means a virtual or physical server that needs to be managed, as well as the operating system and other web server hosting processes required for your application to run. Using a virtual server from a cloud provider such as Amazon or Microsoft does mean the elimination of the physical hardware concerns, but still requires some level of management of the operating system and the web server software processes.

With a serverless architecture, you focus purely on the individual functions in your application code. Services such as Twilio Functions, AWS Lambda and Microsoft Azure Functions take care of all the physical hardware, virtual machine operating system, and web server software management. You only need to worry about your code. PaaS, or Platform as a Service, products such as Heroku, Azure Web Apps and AWS Elastic Beanstalk offer many of the same benefits as Serverless (sometimes called Function as a Service or FaaS). They do eliminate the need for management of server hardware and software. The primary difference is in the way you compose and deploy your application, and therefore the scalability of your application. With PaaS, your application is deployed as a single unit and is developed in the traditional way using some kind of web framework like ASP.NET, Flask, Ruby on Rails, Java Servlets, etc. Scaling is only done at the entire application level. You can decide to run multiple instances of your application to handle additional load. With FaaS, you compose your application into individual, autonomous functions. Each function is hosted by the FaaS provider and can be scaled automatically as function call frequency increases or decreases. This turns out to be a very cost effective way of paying for compute resources. You only pay for the times that your functions get called, rather than paying to have your application always on and waiting for requests on so many different instances.

You should especially consider using a serverless provider if you have a small number of functions that you need hosted. If your application is more complex, a serverless architecture can still be beneficial, but you will need to architect your application very differently. This may not be feasible if you have an existing application. It may make more sense to migrate small pieces of the application into serverless functions over time.

c. 2019, MEP Digital Systems (Pty) Ltd.

Saturday, August 24, 2019

Document Management


An electronic document management system (EDMS) is a software system for organizing and storing different kinds of documents. This type of system is a more particular kind of document management system, a more general type of storage system that helps users to organize and store paper or digital documents. EDMS refers more specifically to a software system that handles digital documents, rather than paper documents, although in some instances, these systems may also handle digital scanned versions of original paper documents. An electronic document management provides a way to centrally store a large volume of digital documents. Many of these systems also include features for efficient document retrieval.

Some experts point out that the electronic document management system has a lot in common with a content management system (CMS). One major difference, though, is that most CMS systems involve handling a variety of Web content from a central site, while a document management system is often primarily used for archiving.

In order to provide good classification for digital documents, many electronic document management systems rely on a detailed process for document storage, including certain elements called metadata. The metadata around a document will provide easy access to key details that will help those who are searching archives to find what they need, whether by chronology, topic, keywords or other associative strategies. In many cases, the specific documentation for original storage protocols is a major part of what makes an electronic document management system so valuable to a business or organization.

Typically, document management refers to a centralized software system that captures and manages both digital files and images of scanned paper documents. Electronic document management systems share many similar features with enterprise content management (ECM) systems; however, document management software systems focus on the use and optimization of active documents and structured data, such as Word documents, PDF files, Excel spreadsheets, PowerPoint, emails and other defined formats, whereas ECM systems also manage unstructured content and rich media formats.

However, electronic document management is much more than simply scanning and saving: it is a comprehensive system that enables knowledge workers to efficiently organize and distribute documents across the organization for better, integrated use within daily operations. Electronic document management systems contain tools for:
- Creating digital files and converting paper documents into digital assets.
- Easily sharing digital documents with the right knowledge workers.
- Centrally organizing documents in standardized file structures and formats.
- Storing and accessing information for more efficient use.
- Securing documents according to standardized compliance rules.

By centralizing information use and access, document management is the hub on which broader information management strategies like ECM, records management and business process automation can be connected and deployed. Organizations typically start using electronic document management systems to transform paper-based operations after reaching an internal tipping point in which customer response times become too slow, departments don’t have enough bandwidth to solve recurring process bottlenecks, paper archiving becomes too costly or large-scale regulatory risks are exposed during a data breach or compliance fines.

For organizations that have defined but resource-intensive business processes, EDMS is an ideal fit. Document management helps organizations across industries side step this busy work entirely by eliminating manual document maintenance, reclaiming valuable staff time and boosting the bottom-line. Document management projects are often initiated by IT departments as means to standardize information access when data practices vary greatly between departments. If one department is using its own imaging system and another team keeps files in uncontrolled shared drives, personal file folders or cloud storage solutions, IT leaders will look for a comprehensive EDMS system to provide one corporate standard for modernizing and managing document use while digitizing existing business rules for each department.

Specifically, department managers that oversee back-office processes like HR management, accounting and contract management (or other repetitive processes with defined steps) also frequently catalyze the move towards an EDMS system. Starting a small-scale document management project for a specific process pain point helps demonstrate initial gains that can be applied across other areas of the business. Modern EDMS systems can offer a hybrid of on-premise and cloud-based solutions in order to cover all the bases of data extraction and use in core business processes. Process automation not only saves time but positions EDMS as a necessary tool for improving customer and client satisfaction.

Tuesday, August 20, 2019

Commercial Digital Displays


As a digital signage solution provider, MEP Digital Systems consultants get asked this question constantly, by all our potential clients and will go through some of the most compelling reasons to use commercial screens or Large Format Displays (LFD) versus residential screens for in store digital signage. When you look at residential screens or screens sold at local electronics retailer, all of them have been designed to work in homes and are not designed to be installed in a QSR – Quick Service Restaurant, where there is excess heat and oil in the air or at a airport where they have to run for 24 hours a day. All LFD’s are designed with enclosures that are built to handle the stresses of the environments we build them into, with additional cooling vents, toughened front panels and covers that can handle corrosion and dust. Additionally the long lasting displays are designed with thinner bezels to maximise the viewing area, which is key to digital signage.

Large Format Displays do not only have the basic input ports which are found on normal residential screens, which is used to connect your Blu-Ray, DSTV and Surround Sound System at home, but have Serial ports to monitor the LFD so that we can centrally detect if the display is on or off, manage the LFD’s temperature, etc. Additional ports such as Ethernet, RS232 and additional USB ports, further enhance the capability to network and communicate with the display. Electrical power unit’s onboard commercial displays are also more industrial to manage the variation in electricity feed to the display. In retail environments for instance, there are many more electrical requirements than in a residential environment, this will lead to power outages. A residential screen will not automatically switch on after an outage, as a commercial screen will and is also able to automatically switch on and off based on a schedule.

The individual components of LFD’s are all designed and built from heavy-duty parts, which ensures that commercial screens are up to the task of working constantly for 12 – 24 Hrs per day in harsh environments. This is in contrast to the family room or lounge where residential screens work for up to 8 hrs a day. LFD’s are also built to work perfectly on both landscape and portrait mode, which will normally cause ghosting of an image on a residential screen if positioned in portrait mode. Over the years most reputable residential screen suppliers have been offering a basic warranty, but with Samsung our LFD supplier, you get a three year warranty that provides you the client with peace of mind over the period. Large Format Displays have always been perceived to be more expensive but they are designed for digital signage and are robust enough to deliver on your 24/7/365 day business requirement.


Saturday, August 17, 2019

Blockchain For Supply Chains


Leaders from the global supply chain and logistics industry, the world’s largest ports, blockchain start-ups, importers/exporters and civil society have partnered with more than 20 governments, to accelerate the use of blockchain responsibly and strategically across supply chains. The Blockchain in the Supply Chain project is a new initiative to help supply chain decision-makers cut through blockchain hype to ensure the emerging technology is utilized in a secure, responsible and inclusive way that benefits all stakeholders. Globally, the supply chain industry is fragmented – with many parties operating in silos. Blockchain presents a technology promise that would have far-reaching implications for global trade and supply chains – bringing standardization, alignment and transparency. But, the technology is prone to hype.

A blockchain is a decentralized, distributed and public digital ledger that is used to record transactions across many computers so that any involved record cannot be altered retroactively, without the alteration of all subsequent blocks. This allows the participants to verify and audit transactions independently and relatively inexpensively. A blockchain database is managed autonomously using a peer-to-peer network and a distributed timestamping server. They are authenticated by mass collaboration powered by collective self-interests. Such a design facilitates robust workflow where participants' uncertainty regarding data security is marginal. The use of a blockchain removes the characteristic of infinite reproducibility from a digital asset. It confirms that each unit of value was transferred only once, solving the long-standing problem of double spending. A blockchain has been described as a value-exchange protocol. A blockchain can maintain title rights because, when properly set up to detail the exchange agreement, it provides a record that compels offer and acceptance. Blocks hold batches of valid transactions that are hashed and encoded into a Merkle tree. Each block includes the cryptographic hash of the prior block in the blockchain, linking the two. The linked blocks form a chain. This iterative process confirms the integrity of the previous block, all the way back to the original genesis block.

Sometimes separate blocks can be produced concurrently, creating a temporary fork. In addition to a secure hash-based history, any blockchain has a specified algorithm for scoring different versions of the history so that one with a higher score can be selected over others. Blocks not selected for inclusion in the chain are called orphan blocks. Peers supporting the database have different versions of the history from time to time. They keep only the highest-scoring version of the database known to them. Whenever a peer receives a higher-scoring version (usually the old version with a single new block added) they extend or overwrite their own database and retransmit the improvement to their peers. There is never an absolute guarantee that any particular entry will remain in the best version of the history forever. Blockchains are typically built to add the score of new blocks onto old blocks and are given incentives to extend with new blocks rather than overwrite old blocks. Therefore, the probability of an entry becoming superseded decreases exponentially as more blocks are built on top of it, eventually becoming very low. There are a number of methods that can be used to demonstrate a sufficient level of computation. Within a blockchain the computation is carried out redundantly rather than in the traditional segregated and parallel manner.

Blockchain has the potential to revolutionize a range of sectors where trust is needed among parties with misaligned interests. But it is precisely within these contexts that deploying such a new and complex technology can be the most difficult. Providing increased efficiency, transparency and interoperability across supply chains has been one of the most fertile areas for blockchain experimentation, illustrating both the opportunities and challenges in realizing the transformative potential of this technology. Over 100 organizations and experts have joined the project to co-design an open-source toolkit which will streamline the deployment of blockchain throughout a broad and diverse sector. A multistakeholder community, representing large shippers, supply chain providers and governments, will design governance frameworks to accelerate the most impactful uses of blockchain in port systems – in a way that is strategic, forward-thinking, and globally interoperable; and by which countries across the economic spectrum will be able to benefit. This team will release white papers each month focusing on the findings from the project community. The recommendations will include guidelines on data privacy, security, creation and use of data, public versus private platforms, interoperability, digital identity and signatures. Supporting an approach that considers the entire ecosystem promises to ensure an inclusive perspective and result that will benefit all stakeholders.

The World Economic Forum’s project, Redesigning Trust: Blockchain for Supply Chains, is the work of the Centre for the Fourth Industrial Revolution – which brings together governments, leading companies, civil society and experts from around the world to co-design and pilot innovative approaches to the policy and governance of technology. An issue in this ongoing debate is whether a private system with verifiers tasked and authorized (permissioned) by a central authority should be considered a blockchain. Proponents of permissioned or private chains argue that the term "blockchain" may be applied to any data structure that batches data into time-stamped blocks. These blockchains serve as a distributed version of multiversion concurrency control (MVCC) in databases. Just as MVCC prevents two transactions from concurrently modifying a single object in a database, blockchains prevent two transactions from spending the same single output in a blockchain. Opponents say that permissioned systems resemble traditional corporate databases, not supporting decentralized data verification, and that such systems are not hardened against operator tampering and revision. A blockchain, if it is public, provides anyone who wants access to observe and analyse the chain data, given one has the know-how. We can join in the effort to streamline new and complex technologies like blockchain, helping to revolutionize sectors and ecosystems and build trust globally.


Wednesday, August 7, 2019

Tag Management System

tag management extends chart

Tags are small snippets of code that add new features or functionalities to your site, like web analytics tracking, remarketing or conversion tracking, optimization and testing services, and many other marketing technologies. A tag, sometimes called a pixel, is a piece of JavaScript code that most vendors require users to integrate into their web and mobile sites to perform a task such as advertising, live chat, and product recommendations. In addition to supporting your digital marketing efforts, these ‘tags’ collect unique visitor behaviour information. A tag management system (TMS) makes it simple for users to implement, manage, and maintain tags on their digital properties with an easy to use web interface. Using a TMS is integral to providing a foundation for your organization’s data collection and governance needs while helping to drive better customer experiences. Tag management is not the most exciting name for a crucial technology, often being confused with blog tags, tag clouds or search engine meta tags. Tag management is not related to any of those. Tags are a means to collect and move data between a website or mobile app session, and the technology vendor. Nevertheless, that is how the industry evolved, and the name stuck, although it is quickly becoming part of a larger data conversation. Tag management has moved rapidly to help manage tags and data outside of the traditional website. Companies are using tag management to control and manage their customer data and vendors across web, mobile, IoT, and connected devices. One thing to note about mobile apps is that instead of using a master tag from the tag management provider, they leverage a library that serves the same essential purpose. Once the library is added to the mobile app, marketers and mobile developers can add analytics and other solutions without having to recertify the app in the mobile app marketplaces. Tag management systems control the deployment of all other tags and mobile vendor deployments via an intuitive web interface, without requiring any software coding. Tag management systems make it easy to add, edit or remove any tag with point and click simplicity. Enterprise tag management solutions – compared to free tag managers – also deliver a variety of advanced capabilities, such as customization, data management, privacy controls, mobile application support and much more. Because of its strategic position in the data supply chain, tag management systems have rapidly evolved to become a key part of the foundation for data management and collection. A tag management system collects first party data. First party data is considered the most powerful and relevant data because it is the behaviors and interactions you compile on visitors. This robust first party data can be used to create unified customer profiles, driving more timely and relevant omnichannel experiences while fueling business intelligence initiatives and streamlining data warehouse projects.

Monday, August 5, 2019

Enterprise Mobility Management


Enterprise mobility management (EMM) is the set of people, processes and technology focused on managing mobile devices, wireless networks, and other mobile computing services in a business context. As more workers have bought smartphone and tablet computing devices and have sought support for using these devices in the workplace, EMM has become increasingly significant. The goal of EMM is to determine if and how available mobile IT should be integrated with work processes and objectives, and how to support workers when they are using these devices in the workplace. Because mobile devices are easily lost or stolen, data on those devices is vulnerable. Enterprise mobility management is a set of systems intended to prevent unauthorized access to enterprise applications and/or corporate data on mobile devices. These can include password protection, encryption and/or remote wipe technology, which allows an administrator to delete all data from a misplaced device. With many systems, security policies can be centrally managed and enforced. Such device management systems are programmed to support and cooperate with the application programming interfaces (APIs) from various device makers to increase security compliance. EMM grew out of mobile device management (MDM), which focused solely on device-level control and security. After Microsoft's 2015 release of Windows 10, most EMM software providers expanded into unified endpoint management (UEM), which allows IT to manage PCs and mobile devices through a single console. EMM typically involves some combination of MDM, mobile application management (MAM), mobile content management (MCM) and identity and access management. These four technologies started off as individual products, but they are increasingly available through larger EMM software suites.

MDM is the foundation of any enterprise mobility suite. It relies on the combination of an agent app, which is installed on an endpoint device, and server software running in the corporate data center or in the cloud. Administrators use the MDM server's management console to set policies and configure settings, and the agent enforces these policies and configures these settings by integrating with APIs built into mobile operating systems. MAM provides more granular management and security. It allows admins to set policies for a specific app or subset of apps, rather than for the whole device. Some apps have specific MAM APIs built in, while others rely on the device-level MAM APIs in most major mobile operating systems. With MCM, only approved applications may access or transmit corporate data. And identity and access management controls how, when and where workers may use corporate apps and data, while also offering some user-friendly features, such as single sign-on. These technologies all address specific concerns, and the overlap between MDM, MAM and MCM is quite minimal. As more organizations embraced enterprise mobility, vendors started to productize EMM, usually by adding MAM or MCM features to their MDM products. An enterprise app store or other self-service portal for application delivery and deployment is also a common component of EMM software.

Microsoft built MDM APIs into Windows 10, which opened the door for EMM software to manage PCs in the same way it manages smartphones and tablets. Apple also allows its macOS desktops and laptops to be managed in this fashion. All major EMM vendors support this functionality, marking a market shift from EMM to UEM. In 2017, Gartner named four leaders -- VMware, MobileIron, IBM and BlackBerry -- in its Magic Quadrant, which ranks vendors according to their completeness of vision and ability to execute on that vision. IDC, which ranks vendors based on their capabilities and strategies, named VMware, MobileIron, BlackBerry, IBM and Citrix as leaders. Enterprise mobility management (EMM) is a growing force as the modern workforce becomes increasingly dependent on personal and enterprise mobile devices. MEP Digital Systems provides a solid EMM platform, as well as show you how to build a solid business case for EMM. We assess and evaluate the key features a solid EMM platform should possess and how to compare the leading options on the market for you. Lastly, we are certified associates of the leading EMM providers on the market.

Sunday, August 4, 2019

Workflow Automation



Automation in and of itself can raise productivity...... However, we acknowledge that automation cannot solve everything. We found through experience that what may be hindering a businesses is often the processes that is followed, whether it is assembling a product or delivering a service. The solution is optimizing the workplace for efficiency and productivity, and using automation as one of the multiple tools at your disposal to achieve set objectives......One of the methods we use during our consultation to improve workflow efficiency in organizations is to list all of the processes and workflows in the business that is followed on a daily basis. We list each process, the purpose, and everyone involved in the process. As the customer is working, we start to list the periodic processes people follow such as weekly and monthly activities. At the end of a month or two, we’ll have a list of every major process and an idea of how often it is done. We take the time to document the recommended way to complete the task. This alone makes things more efficient, since everyone now has a standard way to perform the task, and training new hires becomes much simpler.

We then rank the processes, List what is most important to least important. At this point many people are be able to save time and effort by no longer doing the less important tasks so often. The business certainly benefits by them prioritizing the most important tasks first. This has the side benefit of allowing the customer to identify which processes are worth streamlining first.

Next comes looking for ways to streamline the operation, one process at a time. Identify the most commonly performed tasks. Then look for ways to streamline those common tasks. What steps are redundant or no longer necessary? We then solicit feedback from key stakeholders; these tells us what is working, what isn’t working and how things can be improved. We then get performance data from other departments within the business/operation on what works which then leads to best practices. Or even find that steps are no longer necessary and can be abandoned. Eliminating them in the formal procedure and training everyone in the new, approved process means we’ve just streamlined that operation. If we find that the entire process is irrelevant, such as reports generated that no one reads anymore, we make certain to inform everyone involved to stop doing it.

Having a new and improved official process doesn’t matter if people don’t follow it. Once we’ve modified the processes, formally documented it and trained everyone, then we encourage the customer to audit the team to make sure they’re following the new process. Customer can also compare the way things are working relative to their ideal work stream and sometimes they may find additional areas for improvement. Workflow automation doesn’t eliminate the human element. Instead, it automates the management of tasks and moves things along the workflow, notifying those who have work to do and allowing managers to run reports to check on the status of things. Workflow automation via specialized software can facilitate communication, such as sending an email for someone to give feedback on a report or document under review. And the notes can be automatically saved for review by someone else later.

Moving to electronic records also reduces the risk that critical written information is lost. Data can be accessed any time it is necessary by anyone who should have access to it. We install software that can streamline back office operations which yields major savings in this area. For example, purchasing and integrating software to handle filing claims, sending bills/invoice and processing payments will reduce the amount of time spent on these time-consuming, detailed tasks. It also reduces the odds of mistakes that can cost the business money. Communication is often seen as an interruption in the workflow. However, opening up lines of communication reduces one’s workload long-term. For example, if customers can email a question to our technical support or the subject matter expert, that person can answer it as time allows without having the interruption and additional time required to answer a phone call. If staff can readily communicate with others when potential problems arise, they may get solutions before things get worse. Another way to improve workflow efficiency in an organization is to open up the floor to feedback from everyone involved. Ask staff members, managers, people in other departments and customers how they think things could be improved. Sometimes they can identify small changes with a major impact.

(c) 2017, MEP Digital Systems (Pty) Ltd.

Content Analytic Platforms

One of the huge upsides in the digital distribution economy is access to data. Content creators have more tools for tracking their content...