06Jun

Is your change management sufficiently agile to facilitate the digital transformation that the disruptive technologies of 5G and artificial intelligence bring?

That’s just the kind of talk CIOs and other IT leaders wish to banish from all our conversations.

“Buzzwords start out as powerful ideas,” says Matt Seaman, Lockheed Martin’s director and chief data and analytics officer of enterprise. “It’s not until they’re misused and watered down that they become a problem.”

And all the buzzwords we used in the first sentence of this blog post are words so often abused and twisted that CIO magazine listed them among the “10 misused buzzwords in IT.”

Take “digital transformation” for example. It’s a phrase CIO writer Clint Boulton says is one “CIOs love to hate because it’s often pitched as a cure-all for modernizing legacy businesses.”

No matter how much tech is implemented it won’t make a difference if it isn’t accompanied by business transformation, maintains Mark Bilger, CIO of One Call. “Digital solutions do not magically transform the business. A fool with a tool is still a fool.”

OK, but what about change management?

Consider it the twin of digital transformation. Jenny Gray, senior director of application development at Power Home Remodeling, tells CIO the phrase suggests the “antiquated” idea that change should come through major initiatives and strategies. Change, she says, should be happening constantly in businesses.

Change also happens “more slowly than people think,” insists Target CIO Mike McNamara, who is tired of hearing of “disruptive technology.” The notion that there are technologies that will transform an industry overnight is a mistaken one, he says. “There is no disruptive technology out there right now, because the whole point of disruption is that you don’t see it coming.”

What other buzzwords made CIO’s list?

  • Agile – It’s applied indiscriminately, complains Bilger. Most teams are anything but agile, he says.
  • DevOps – It’s used so often and so incorrectly that it has “an identity problem.” Especially by vendors pitching DevOps tools, “The definition gets watered down,” says Brittany Woods, a cloud automation engineer at H&R Block. “People need to stop using DevOps in the wrong context.”
  • Minimal Viable Product — MVP is (wrongly) used to describe a technology proof-of-concept, says Lockheed Martin’s Seaman. “MVP isn’t complete until the enterprise improves the product based on user feedback,” the article explains.
  • Artificial intelligence – There’s nothing “intelligent” about the processes and applications that get labelled AI, says Target’s McNamara. “Machine learning” is his preferred term.
  • Machine Learning – Vendors are to blame for the common misuse of this term. When not erroneously describing smart automation tools as AI, they’re describing them as machine learning. Bilger, of One Call, says ML is a valid description, but only when applied properly.
  • 5G – Because of all the hype, Matt Clair, CIO of Clair Global, complains, “Everyone is talking about 5G, but 90% of them don’t know what they’re talking about.”
  • Extended reality — Virtual reality and augmented reality apparently weren’t enough, so extended reality entered the jargon and now gets misapplied to all sort of computer environments.

Of course, just because these words and phrases get misused and misapplied on a regular basis doesn’t mean we’ll all stop using them – or learn to apply them correctly.

“Reasonable minds differ on what constitutes legitimate or sketchy applications of terminology. Sometimes 5G really means 5G. XR can include a legitimate application of AR or VR.”

Photo by Jason Rosewell

[bdp_post_carousel]

Winning Teams Solve Pandemic Problems in First Nurse Hackathon

Five teams of nurses and technologists are winners for the innovative projects they entered in the first Nurse Hack 4 Health virtual hackathon.

sen out of 30 entries, the winning teams earned the highest scores for their solutions to challenges presented by the COVID-19 pandemic laid out in five categories ranging from “Acute Care Patient Monitoring” to “Resiliency & Self-Care.”

Sponsored by Microsoft, John & Johnson, dev up and the Society of Nurse Scientists, Innovators, Entrepreneurs & Leaders (SONSEIL), the entries were judged on “solutions that answer the challenge, but also do so in a way that balances simplicity with creativity.” A second criterion was the project’s readiness: “High scores will be given to solutions that are ready to deploy, provide appropriate instruction for use, etc.”

The 25 judges included practicing nurses, Microsoft’s chief nursing officer, the dean of nursing at the University of Pennsylvania, software application and development firm executives, the head of Deloitte’s Healthcare Transformation team and senior executives in technology and nursing and HCP strategy at Johnson & Johnson.

All the participating team solutions that made it to the final round are open source, posted on GitHub to enable health systems and others to, as the hackathon sponsors explained, “make changes needed to fit their systems or processes.”

From DailyNurse, here is a brief look at the winners and their projects. (The links go to each team’s video presentation for the judges):

Resiliency & Self-Care category – The team developed Well Nurse a peer-to-peer app to help nurses cope with stress, connect with one another, and identify best practices to foster mental well-being.

Acute Care Patient Monitoring category — HearNow connects patients and their loved ones separated by social distancing. With this system, loved ones can transmit video and audio messages from home that nurses can share when patients are alert and in need of comfort.

Data & Reporting category – The team’s project Activate School Nurses connects h school nurses with nursing students in need of clinical experience who will assist them in preparing for school reopening and maintain and monitor student health data to reduce the danger of further outbreaks.

Patient Care Coordination category – In a busy facility, it can take time to locate needed equipment. Nurse GPS proposes to solve that challenge by tracking equipment, giving nurses the floor and room location for each device. The aim is to reduce delays and lessen the danger of infection by making it unnecessary for a nurse to leave and reenter a room multiple times.

At-Home Patient Monitoring category – Social distancing and stay at home directives are driving a boom in telemedicine. But in areas with broadband access and among groups, especially seniors, without smartphones, remote access to medical professionals is difficult or impossible. Project Flourish works around those limitations, using a 1990s era technology to broaden the reach of telemedicine in rural areas and among seniors.  

Photo by Ani Kolleshi on Unsplash

[bdp_post_carousel]

Studies, Surveys Tell the Story of COVID’s Cybersecurity Risks

When the COVID-19 lockdown hit, companies worldwide transitioned millions of employees from working in offices to working at home. There were bumps to be sure, but from an IT perspective the process generally went smoothly.

What’s happened since then is enough to keep IT security professionals up at night.

“Once the transition was complete,” says an article on CSO.com, “Organizations found their attack surface had changed immensely and threat actors attempted to seize upon the opportunity. Phishing, brute-force and malware attacks surged while the number of endpoints connecting to corporate networks ballooned.”

We blogged about this subject a few weeks ago when a survey of IT leaders reported that 41% of them had experienced more security attacks than ever.

In light of the collection of surveys and studies in the CSO.com article, that now looks like an understatement.

Though the study we referenced in our post said in the early days of the lockdown companies were spending an extra $15 billion a week on IT, CSO cites a study that helps explain why: 66% of organizations had no pandemic preparedness plan in place. Others, including those that did, failed to account for the sheer scale of having every employee working remotely.

Infoblox’s COVID-19 Challenges for the Borderless Enterprise report said 38% of organizations shifted funds from cybersecurity to provide for remote worker access. 46%, however, shifted IT resources to shore up the security of their networks. Another study cited by CSO.com tells us that 60% of organizations that adopted work-from-home technology accelerated or bypassed their normal privacy/security reviews.

Consequently says CSO.com, chief information security officers “should go back and ensure that any checks that were skipped or accelerated have been redone to ensure all the risks have been accounted for.”

The article cites Zoom’s security issues as one example of a remote tool that was quickly adopted by many without considering security.

The most worrisome part of the article by CSO editor Dan Swinhoe cites a baker’s dozen of studies, surveys and reports of cyberattacks skyrocketing during the lockdown with many continuing unabated since. Here’s a sample:

  • Supply chain attacks rose 38% since the start of the pandemic;
  • Phishing incidents rose 220% at the height of the pandemic;
  • Ransomware attacks spiked more than 100%;
  • Insider-threats increased 27%;
  • RDP brute-force attacks (attempts to remotely control a computer or computer system) grew 400%.

With the majority of companies expecting more employees than ever to work from home even when the pandemic ends, a PwC Insights Survey found 96% of organizations saying they are adjusting their cybersecurity strategy due to COVID-19. 50% said cybersecurity and privacy will be baked into every business decision or plan.

“This focus on security,” observes CSO, “Should provide CISOs with more influence at the most senior levels of the business.”

Photo by Jefferson Santos on Unsplash

[bdp_post_carousel]