​Deloitte Discusses Disruptive Technology​

Comments Views

​Deloitte’s Tech Trends 2013 is a pretty detailed and interesting look at the disruptive effects of technology on business — and the necessary change in the role of the CIO.

I recommend a read by board members, executives, IT professionals, and risk and governance practitioners. Each of the topics includes not only useful insights but real life examples.

Deloitte examines 5 so-called "forces," which they refer to as “Analytics, Mobile, Social, Cloud, and Cyber.” (By "cyber," Deloitte refers to information security and privacy.) They discuss 10 "trends":

  • CIO as the Postdigital Catalyst.
  • Mobile Only (and beyond).
  • Social Reengineering by Design.
  • Design as a Discipline.
  • IPv6 (and this time we mean it) — by which they refer to the need to address limitations in the Internet by adopting a new standard.
  • Finding the Face of Your Data.
  • Gamification Goes to Work.
  • Reinventing the ERP Engine.
  • No Such Thing as Hacker-proof.
  • The Business of IT.

Each of these is interesting, especially (a) the need for the CIO to step out of the comfort of a role as janitor (keeping the IT infrastructure running) and into the role as a catalyst for the early and effective adoption of new technology in every pore of the organization, and (b) a recognition that it is unrealistic to think you can keep the bad guys out of your system. You need to ask how you will know when they are in, and how you will minimize any damage.

I have two quibbles:

  1. I think Deloitte has underestimated the potential effect of in-memory technology. Pioneered by SAP and others, including Oracle and IBM, this has the ability to increase the speed of analytics and calculation-intensive computing by up to 300,000 times. It is a critical need if the value of Big Data is to be realized (otherwise, extracting big value from Big Data will take big globs of time).
  2. As Gartner and others have reported (e.g., in Gartner’s Nexus), organizations are not just implemented cloud, social, mobile, etc. individually. They are building applications on a combination of these technologies. The potential for value is amazing.

I welcome your comments.

​The opinions expressed by Internal Auditor's bloggers may differ from policies and official statements of The Institute of Internal Auditors and its committees and from opinions endorsed by the bloggers' employers or the editors of Internal Auditor. The magazine is pleased to provide you an opportunity to share your thoughts about these blog posts. Some comments may be reprinted elsewhere, online or offline.

 

 

Comment on this article

comments powered by Disqus
  • Ideagen_Pentana_Mar2015
  • TempleUnivITACS_Mar2015
  • IIA_MembersOnly Webinar_Mar2015