Smes Need to Digitise to Thrive in the Digital Economy

Total Page:16

File Type:pdf, Size:1020Kb

Smes Need to Digitise to Thrive in the Digital Economy KDN-PP19103/09/2016(034592) JUNE 2017 MARKET PRODUCTS PROMOTIONS VENDORS PEOPLE EVENTS Do or Die: SMEs need to digitise to thrive in the digital economy Dell EMC VMware unveils Schneider Electric iPay88 allows celebrates with IoT management launches IoT others to channel partners solution platform Pay4Me PG 6 PG 22 PG 9 PG 5 Turning ideas into business value. Faster. The 4 secrets to success in the Idea Economy. Success today is defined by the ability to turn ideas into value faster than the competition. But how? Find out how you can accelerate your business by building a partnership with Hewlett Packard Enterprise. Learn more at hpe.com/my © Copyright 2016 Hewlett Packard Enterprise Development LP. WITH YOUR I.T. DO MORE SECURED BY ESET Turning ideas into business value. Faster. Whether you’re managing your business, or overseeing your company’s IT, ESET’s security products are fast, easy to use, and deliver market-leading detection. We deliver the protection that allows you to DO MORE. Find out more at ESET.COM/MY/BUSINESS The 4 secrets to success in the Idea Economy. Success today is defined by the ability to turn ideas into value faster than the competition. But how? Find out how you can accelerate your business by building a partnership with Hewlett Packard Enterprise. Learn more at hpe.com/my © Copyright 2016 Hewlett Packard Enterprise Development LP. It is time to digitise our SMEs S mall to medium enterprises (SMEs) are the backbone of the Malaysian economy, providing employment to 65.5% of our workforce. I do not know if that is good news or bad. They are doing well but can’t they do more? In the world of business, companies should be constantly growing, from small to medium and on into large corporations and eventually into global conglomerates. With the exception of government-linked companies, very few SMEs seemed to have transitioned into the big times, so to speak. Too many are still at SME levels. Not surprisingly, 73% of Malaysian SMEs have little to no ICT usage in their business operations, and their total contribution to GDP is a paltry 36.3%. Is there a correlation here? Could their low adoption of ICT be affecting their efficiency, productivity and competency? With the growth in online shopping – including cross-border transactions – SMEs can no longer afford to be reticent in ICT. They cannot stick their head in the sand and hope that it will all go away. They cannot just post their products on Facebook and hope for the best. If they do not evolve, update their business strategies and empower these strategies with technology, they will be in for a bumpy and potential- ly business-ending ride. Indeed, it is no longer business-as- usual. It is do-or-die. This is a great moment of opportunity for resellers. The market is practically waiting to be tapped! This is a time to get creative in overcoming traditional resistance – “it’s too expensive!” “I don’t have any technical staff!” – and present feasible solutions with case studies to back up your case. Those who do, will not only boost their bottom line, but also perform national service by raising the competitiveness and productivity of our home-grown companies Our main feature explores why SMEs are reluctant to embrace digitisation and why they should, with some suggestions on how they can. The weather is cloudy with a chance of windfall. We hope you enjoy our issue and look forward to serving up more. Please share this with your fellow resellers, visit our website at www.resellermalaysia.my for more news and articles, and feel free to write in with your comments and suggestions. Best regards! Stephen Chin, Editor PUBLISHED BY EDITOR: GRAPHICS DESIGNER: Verve Infotech Sdn Bhd Stephen Chin Milly Milk Ville - Sharon Sen / [email protected] Suite 33A, Avenue Business Center, www.millymilkville.space 111 Block E, Phileo Damansara 1 ACCOUNT MANAGER: 9 Jalan 16/11, off Jalan Damansara Lim Chia Nean / [email protected] PRINTER: 46350 Petaling Jaya +60 12 320 1171 / +603 7493 5012 Super Yueta Print, No. 40, Jalan PBS 14/8, Taman Perindustrian PUBLISHER ADVERTISING: Bukit Serdang, 43300 Seri Kembangan, Selangor. Satish [email protected] EDITORIAL CIRCULATION [email protected] 2500 copies 2 Reseller Malaysia www.resellermalaysia.my | JUNE 2017 CONTENTS P5 News Local P5 P5 iPay88 allows others to Pay4Me P6 Dell EMC celebrates with channel partners P8 Outsourcing Malaysia opens office in Iskandar Malaysia P9 Schneider Electric launches IoT platform International P10 MS Azure to enhance support for SAP workloads P11 Survey: Organisations ramping up digital investment P12 Dell Technologies rolls out flexible IT consumption models P13 P13 WannaCry a reminder not to neglect basic cybersecurity P15 Dell EMC enhances products in SDS portfolio P16 Cover Story Do or Die: SMEs need to digitise to thrive in the digital economy SMEs remain a relatively untapped market as far as digital transformation is concerned. We look at why this goldmine is waiting to be tapped. P16 P19 Product News P19 HID Global introduces mobile authenticator app P20 Qualcomm boasts Snapdragon Mobile PC platform, Intel unfazed P21 Epson launches industrial-strength labeller P21 P22 VMware unveils IoT management solution P23 Feature It is time for Cloud 2.0 The cloud landscape is ever-evolving. IDC’s William Lee and Pranabesh Nath spoke to Reseller Malaysia about Cloud version 2.0 P23 CONTENTS P26 Column Machine learning: the future of cyber security? As cyber threats grow in numbers and sophistication, the next generation of cyber security P26 will likely be intelligent... P28 Survey Modern Tech Users and their Habits In the world of mobility, users are increasingly creative in how they use their phones and computers. Here are some interesting statistics of their habits. Cybersecurity Cybersecurity Cybersecurity Professional Professional Company of of the Year of the Year the Year 2015 2016 2015 EC-Council Global Services Malaysia 606 Block G, Phileo Damansara 1, Jalan 16/11, Off Jalan Damansara, 46350 Petaling Jaya, Selangor. +60-3-7954-6896, [email protected] CYBER SECURITY CONSULTING AND ADVISORY SERVICES EC-Council’s world renowned Cyber Security Experts now in Malaysia Compliant Resilient Competitive News iPay88 allows PIKOM reminds organisations to remain others to Pay4Me vigilant against cyberattacks Lim Kok Hing, co-founder and executive director, iPay88. PIKOM is also inviting companies O nline payment gateway provider iPay88 Sdn Bhd introduced a new and agencies to feature that allows a person to make consult with us on payment for purchases made by another. this issue With Pay4Me, the payer, who is not the purchaser, may pay on behalf of the purchase for online transactions. “Pay4Me is useful and convenient online payment solution ideal for families with youngsters and older folks or even Chin Chee Seong, PIKOM chairman domestic helpers who do not have easy access to credit or debit cards or online T he National ICT Association of Malaysia (PIKOM) advises all users to be vigilant and banking facilities,’ said Lim Kok Hing, take precautions to avoid being caught by malware such as the recently much- co-founder and executive director, iPay88. publicised WannaCryptor (also known as WannaCry) attack. “We developed Pay4Me to reduce the PIKOM said it has not received any report or alert of being hit by WannaCry from its hassle in payment settlements for the 1,000-plus members to date. No members reported any clients having been issued a payer, who is usually also the main ransom. family dependent. Such role is normally shouldered by the parents or working “This is expected as many would rather keep a low profile and hope the issue blows over,” member of the family,” he said. said PIKOM chairman Chin Chee Seong in a statement. “However, these issues cannot be swept under the carpet. Organisations must take the necessary steps to prevent and Online groceries shopping, routine thwart cyberattacks.” payment of tuition or school fees, mobile phone top-ups and other items or services The first step is to ensure the assets are protected by having the right tools to guard that a family network usually requires and against attacks and intrusions. Second, organisations must ensure their staff are trained obtains online, can be directed to the with the necessary skills and knowledge to deal with cyberattacks. payer for payment, in a secure, convenient and efficient manner. “Chief information officers (CIO) and heads of IT departments play an integral part in protecting their organisations against cyberattacks. Their roles must be recognised by any Existing iPay88 merchants can opt to organisation in this digital age,” Chin said. “Companies should not compromise when they integrate Pay4Me as one of their payment engage knowledgeable CIO or IT security experts.” options at no extra cost. “The process is simple and only requires activation from A company should have a good cybersecurity defence which involves a proper business our end,” Lim explained. risk assessment; having an appropriate IT security policy and procedures; deploying the right security technologies; ensuring compliance; constantly monitoring the environment, To use Pay4Me, the online shopper simply educating employees; alerting and responding to security incidents quickly; and conducting chooses the option at check out and forensic and root cause investigation. “Malaysian companies cannot take a wait-and-see provide the payer’s email address, contact attitude anymore,” Chin warned. number and an optional message to the payer. The payment link is sent to the “We are encouraged by the efforts of the Malaysia Computer Emergency Response Team payer by email. When clicked, the payer (MyCERT) under national agency CyberSecurity Malaysia in providing up-to-date alerts, is redirected to iPay88’s payment page advisories and assistance to affected organisations and users to address this grave for credit card input or online banking situation,” Chin added.
Recommended publications
  • Lessons Learned from AI in Enterprise
    Lessons learned from AI in enterprise Rajen Sheth, Vice President of Product, Cloud AI & ML Confidential & Proprietary Over the next decade every business will be transformed through AI AI has transformed nearly every Google product Used across products: Unique project directories Unique project Time Domains with the most practical advancement Vision Conversation Structured Language Data Personalized Efficiency & Spotting Adding customer agility patterns and structure to your interactions trends data Major benefit to many industries Retail Government Energy Media & Gaming Entertainment Financial Manufacturing Healthcare & Technology Marketing Services Life Sciences Businesses are still nascent in their AI journey I know I should I know why I I know why and use AI, but need AI, but how, but what why? how? tools? 10,000s 2M Who can actually DL researchers ML experts use AI today? +23M Very few people can create Developers custom ML models today +100M business users 9 Some other major challenges with AI Use Case ! Is it mission critical, or is it just cool? Trust ! Can I trust AI, and what are the implications? Deployment ! 60% of models intended for production and integration never see the light of day Data ! Data is scarce or hard to use Solving the talent and data gap: AutoML Controller: proposes ML models Train & evaluate models 20K times Iterate to find the most accurate model Solving the talent gap: Teach the world Changing workforce Bias in the data Impact of the use of AI AI should: Applications we will not pursue: 1 be socially beneficial
    [Show full text]
  • Digital Transformation Review Eleventh Edition
    Digital Transformation Review Eleventh Edition Artificial Intelligence Decoded 2 Artificial Intelligence Decoded Digital Transformation Review Eleventh Edition Artificial Intelligence Decoded Edited by Capgemini Research Institute About the Capgemini Research Institute: The Capgemini Research Institute is Capgemini’s in-house think-tank on all things digital. The Institute publishes research on the impact of digital technologies on large traditional businesses. The team draws on the worldwide network of Capgemini experts and works closely with academic and technology partners. The Institute has dedicated research centers in India, the United Kingdom, and the United States. @capgemini #DTR11 www.capgemini.com/the-digital-transformation-institute Artificial Intelligence Decoded 3 Contents 06 Academia Lanny Cohen’s foreword 32 Professor Luciano Floridi, University of Oxford AI: Adaptable Intelligence 08 Editorial Artificial Intelligence: Preparing Organizations and their People for 38 Drastic Change Michael Schrage, MIT AI: Survival of the Smartest View from Large Organizations The ‘Valley’ 16 Michael Natusch, Prudential Plc 46 AI: Augmented Intelligence Frank Chen, a16z Matches People and Machines Make AI a Daily Habit 22 56 Rajen Sheth, Atif Rafiq, Google Volvo Cars Putting AI to Work: With Customers Democratizing AI for Traditional and Within the Enterprise Businesses 4 Artificial Intelligence Decoded 62 Capgemini Babak Hodjat, Perspective Sentient Technologies AI: Already Delivering Measurable Results across Sectors 92 Turning AI Into
    [Show full text]
  • Business in the Cloud
    The Authority on the Future of Technology October 2011 BUSINESS www.technologyreview.com IMPACTPublished by MIT OCTOBER 2011 Business in the Cloud www.technologyreview.com Corporate Energy Strategy 1 Executive Summary CONTENTS The Meaning of the Cloud The Big Question The cloud isn’t just a convenience. It’s a new way of doing business. 2 The Cloud Imperative But as with any new opportunity, there are risks. 3 Cloud Computing Defined By ANTONIO REGALADO Emerged Technologies 4 Facebook Shares Its Designs 5 How to Bid on Computing Power loud computing is an idea whose ernments (see “Transcending Borders, but 6 The Social-Network Chip time has come. As Simson L. Gar- Not Laws,” page 15) or by hackers. While 7 New Directions: TR’s Picks Cfinkel explains in his opening essay, most experts say the cloud is as safe as, if not 9 4 Ideas for Using Server Heat “The Cloud Imperative,” on page 2, the safer than, most company IT departments 11 Google’s Chromebook Experiment notion of purchasing computing power as if (see “Being Smart about Cloud Security,” it were a utility—such as electricity—dates page 20), other researchers are discovering Case Studies 12 The Battle for the Government to the 1960s. What has changed is that this major vulnerabilities (see “Researchers Rain idea has become technically and economi- on Amazon’s Cloud,” page 19). It turns out 13 Hollywood’s Cloud cally feasible. Whether using Gmail, shar- the power of the cloud is nearly as helpful 14 File Sharing Is Serious Business ing files online, or trying out new business to criminal enterprises as it is to legitimate 15 Transcending Borders, but Not Laws software, we now increasingly rely on com- ones (see “The Criminal Cloud,” page 22).
    [Show full text]
  • 2019 Annual Report 2019 Annual Report Society for Science & the Public
    For more information, please contact: NEW FRONTIERS Bruce Makous Chief Advancement Officer 202-872-5138 | [email protected] www.societyforscience.org | www.sciencenews.org 2019 ANNUAL REPORT 2019 ANNUAL REPORT SOCIETY FOR SCIENCE & THE PUBLIC SCIENCE NEWS | MARCH 2, 2019 To create new elements and study the chemistry of the periodic table’s heaviest atoms, researchers at the Letter from Mary Sue Coleman, Chair 2 GSI Helmholtz Center for Heavy Ion Research in Darmstadt, Germany, Letter from Maya Ajmera, President & CEO 4 use the apparatus shown below to create beams of ions that scientists then smash into other elements. Society Top Moments of 2019 6 GSI HELMHOLTZZENTRUM FÜR SCHWERIONENFORSCHUNG GMBH/JAN Competitions 8 MICHAEL HOSAN 2018 Regeneron Science Talent Search 10 Intel International Science and Engineering Fair 12 Broadcom MASTERS 14 Alumni 16 Science News Media Group 18 Science News 20 SN 10 22 Science News for Students 24 Outreach & Equity 26 Science News in High Schools 28 Advocate Program 30 Research Teachers Conferences 32 STEM Research Grants 34 STEM Action Grants 36 Financials 38 SCIENCE NEWS FOR STUDENTS | JUNE 6, 2019 New ISEF Sponsorship Model 40 ”Grid,” by math artist Henry Segerman, explores mathematical Giving 42 concepts using projections. This 3D-printed sculpture is a patterned Leadership 52 sphere. When light shines through the openings from above, the shadows form a square grid. Executive Team & Staff 55 H. SEGERMAN SCIENCE NEWS | MARCH 30, 2019 Maybe only 30 out of 1,000 icebergs have a green hue, earning them the nickname “jade bergs.” Now scientists may know why the ice has this unusual color.
    [Show full text]
  • Deloitte Consulting Were Preparing to Launch Our Firm’S First Annual Tech Trends Report
    10TH ANNIVERSARY EDITION Tech Trends 2019 Beyond the digital frontier EXPERIENCE & DIGITAL REALITY ANALYTICS & COGNITIVE CLOUD BLOCKCHAIN Asset User Wireless Information Information Cloud intelligence engagement and mobility management automation revolution User Applied Real Capability Social engagement mobility Visualization analytics clouds computing User Enterprise Geospatial Big data Hyper-hybrid Gamification Social business empowerment mobility visualization goes to work cloud unleashed Gamification Social Finding goes to work reengineering Mobile only the face of by design (and beyond) your data Industrialized Digital Cognitive crowdsourcing Social engagement Wearables analytics Cloud activation orchestration Dimensional Ambient Amplified marketing computing intelligence API economy AR and VR Internet Industrialized Blockchain: go to work of Things analytics Democratized trust Machine Dark Everything- Blockchain: Mixed reality intelligence analytics as-a-service Trust economy Enterprise API Blockchain to Digital reality data sovereignty imperative blockchains Beyond Intelligent AI-fueled NoOps in a marketing interfaces organizations serverless world 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 Trending the trends: A decade of research Connectivity DevSecOps Risk of tomorrow and the cyber implications Exponential imperative technology No-collar Reengineering The new Risk watch list workforce technology core implications Exponentials IT unbounded Inevitable Risk watch list architecture implications Social impact of Right- Autonomic
    [Show full text]
  • CYBERSECURITY As Threats to Critical Infrastructure Grow, Businesses and Government Must Do More—Together by Erik Bataller P.21 How Wall Street’S Doing It Right P.26
    CIOs changing lives, changing the world 9 | Software licensing absurdity 12 | VMware’s hybrid cloud plan 18 | UC and mobility, united 29 | Dr. Dobb’s: Big data architecture 33 THE BUSINESS VALUE OF TECHNOLOGY MARCH 28, 2011 CYBERSECURITY As threats to critical infrastructure grow, businesses and government must do more—together By Erik Bataller p.21 How Wall Street’s doing it right p.26 informationweek.com [PLUS] APOTHEKER’S VISION HP’s software gap p.16 Why WebOS? p.46 Copyright 2011 United Business Media LLC. Important Note: This PDF is provided solelyCAN as$5.95, a reader US $4.95 service. It is not intended for reproduction or public distribution. For article reprints, e-prints and permissions please contact: Wright’s Reprints, 1-877-652-5295 / [email protected] COTHE BUSINESS VALUENT OF TECHNOLOGY ENMarch 28, 2011 Issue 1,295 TS [QUICKTAKES] 16 Apotheker’s Vision To deliver on its new CEO’s promises, HP needs more software 17 Count HP In On Cloud Data centers and outsourcing give HP a start, but its ambition is grand 18 VMware Goes Hybrid It tries to manage virtual machines inside and outside the firewall 19 Google Takes It Slower IT can now get Google Apps features at a more predictable pace What’s A Cloud OS? Ex-Amazoners lead startup Nimbula in new software category COVER STORY 21 Cybersecurity The public and private sectors must collaborate in new ways to 16 ward off dangerous threats 26 How Wall Street Does It Banks first balked at sharing security data with government, but now they’re getting it right informationweek.com
    [Show full text]
  • Amicus Brief
    No. 12-831 IN THE M. LEE JENNINGS, Petitioner, v. HOLLY BROOME, Respondent. On Petition for a Writ of Certiorari to The South Carolina Supreme Court BRIEF OF AMICI CURIAE NINETEEN NATIONAL PRIVACY, CIVIL LIBERTIES, AND CONSUMER ORGANIZATIONS IN SUPPORT OF PETITION FOR A WRIT OF CERTIORARI MARC ROTENBERG Counsel of Record ALAN BUTLER DAVID JACOBS ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) 1718 Connecticut Ave. NW Suite 200 Washington, DC 20009 (202) 483-1140 [email protected] February 7, 2013 i TABLE OF CONTENTS TABLE OF CONTENTS............................................ i INTEREST OF THE AMICI CURIAE.....................1 SUMMARY OF THE ARGUMENT..........................8 ARGUMENT................................................................9 I. Given the Central Importance of E-mail to Our Economic and Social Activities, It Is Critical to Clarify the Application of Current Electronic Privacy Rules................ 10 A. E-mail is the Primary Method of Electronic Communication and an Important Part of All Modern Business, Education, and Social Life........................ 10 B. The Increased Use of Cloud-based E- mail Services Among Government, Businesses, Education Institutions, and Consumers Heightens the Need for Clarity........................................................ 13 C. All Service Providers Maintain Redundant Copies to Ensure Backup Protection, and the Decision Below Will Only Cause Harmful Confusion............... 17 II. E-mail Privacy is a Necessary Element of Economic and Social Activities.................... 20
    [Show full text]
  • Implementing and Developing Cloud Computing Applications [2011]
    Implementing and Developing Cloud Computing Applications K11513_C000.indd 1 10/18/10 2:47 PM Implementing and Developing Cloud Computing Applications DAVID E.Y. SARNA K11513_C000.indd 3 10/18/10 2:47 PM Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2011 by Taylor and Francis Group, LLC Auerbach Publications is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number: 978-1-4398-3082-6 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, micro- filming, and recording, or in any information storage or retrieval system, without written permission from the publishers.
    [Show full text]
  • Google in Cloud
    Universitatea “Alexandru Ioan Cuza” Facultatea de Informatică Prof. Dr. Lenuța Alboaie [email protected] Google in Cloud 2020| http://www.info.uaic.ro/~adria Cuprins • Google in Cloud – …pasi – Google App Engine • Costuri • Instrumente (GWT, GAS) • Caracteristici • Aspecte arhitecturale • Servicii – Concluzii 2 2020| http://www.info.uaic.ro/~adria Google in Cloud| …pasi • ? Google face managementul celor mai mari ferme de servere din lume Initial – Intreg continutul oferit era disponibil; se baza doar pe suportul oferit de publicitate (Servicii: Google Maps, Google Finance, Google Voice) • Mantra: “it’s free to the consumer” – 15GB pentru stocare per cont – Google Apps – free hosting pentru serverul de e-mail (cu propriul nume de domeniu), Google Talk, Google Calendar, Google Drive, Google Sites <- Rajen Sheth – Google Apps pentru Educatie – Urmind modelul Apple: Apps Market- www.google.com/enterprise/marketplace – Pentru dezvoltatori: o versiune free de Google App Engine™ http://code.google.com/appengine 3 2020| http://www.info.uaic.ro/~adria Google – Google App pentru Business => multi utilizatori business 4 2020| http://www.info.uaic.ro/~adria Google – Google App pentru Business/ G Suite => multi utilizatori business (preturi in 2016) 5 2020| http://www.info.uaic.ro/~adria Google 2017- 2020 [https://cloud.google.com/pricing/price-leader] 6 2020| http://www.info.uaic.ro/~adria Google 2020 [https://cloud.google.com/pricing/price-leader] 7 2020| http://www.info.uaic.ro/~adria Google – [ [https://cloud.google.com/pricing/price-leader] [https://www.ascamso.com/905-2/] 8 2020| http://www.info.uaic.ro/~adria Google Google Web Toolkit – GWT • http://code.google.com/webtoolkit/gettingstarted.html - Set de instrumente open-source ce permite dezvoltarea de aplicatii Web complexe - “The GWT SDK contains the Java API libraries, compiler, and development server.
    [Show full text]
  • Print: Colleges Get out of E-Mail Business - Chronicle.Com
    Print: Colleges Get Out of E-Mail Business - Chronicle.com http://chronicle.com/cgi-bin/printable.cgi?article=http://chronicle.com/w... http://chronicle.com/weekly/v54/i18/18a00103.htm From the issue dated January 11, 2008 Colleges Get Out of E-Mail Business By DAN CARNEVALE Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like Google Apps Education Edition or Microsoft Live@edu. It seems like a no-brainer. More than 1,000 colleges have signed up with those two companies because, college administrators say, it makes sense to let professionals take over. After all, colleges are educational institutions, not technology enterprises. With heavyweights like Google and Microsoft offering their already-popular services to colleges for free, the officials figure this is one sweet deal. "It has been one of those rare opportunities where there are a lot of upsides and no downsides," says Kevin Roberts, chief information officer at Abilene Christian University, which recently let Google take over its e-mail. "It's been a great deal for us." Many colleges decided to outsource their e-mail after pressure from students who already used Gmail or Hotmail on their own and persuaded administrators to go with one or the other. But not everyone has jumped on the outsourcing bandwagon, and others are looking carefully before they leap.
    [Show full text]
  • Google Apps Including Webauthing
    Google Apps including Webauthing Barry Cornelius Google Apps including Webauthing Summary Agenda Details about GAFYD Barry Cornelius Details about the Apps Managing Oxford University Computing Services users Outsourcing June 2007 Conclusions Questions, comments http://www.oucs.ox.ac.uk/oucsweb/gapps/ and resources Summary Google Apps including 1 Summary: what is GAFYD? Webauthing 2 Barry Summary: managing users Cornelius 3 Summary: which Apps? Summary 4 Summary: outsourcing applications Agenda Details about GAFYD Details about the Apps Managing users Outsourcing Conclusions Questions, comments and resources Summary: what is GAFYD? Google Apps including Google Apps include: Webauthing Gmail, Calendar, Docs and Spreadsheets. Barry Cornelius Google Apps For Your Domain enables an organization Summary to make these Apps available to their users Agenda (using the organization’s own domain name in URLs). Details about GAFYD Google says it’s providing GAFYD to Details about ‘meet the needs of different organizations: ... a small the Apps business, a Fortune 500 company, a group or a school’. Managing users They provide three different editions of GAFYD. Outsourcing One of these is for educational establishments. Conclusions Questions, OUCS is using the domain gapps.oxuni.org.uk comments and resources for an experiment with GAFYD. Summary: managing users Google Apps including When using GAFYD, each user in the organization has Webauthing a separate account, where they can store their Barry Cornelius messages, calendars, documents and spreadsheets. Summary Google provides the administrator of the domain with Agenda facilities for managing the users. Details about GAFYD If the organization already uses a Single-SignOn Details about system, the domain can be configured in Google so the Apps that the SSO is used instead of the user having to use Managing users a different username-password for their account.
    [Show full text]
  • Week8 25 Generating Value with AI
    NEXT OnAir 2020 8. CLOUD AI 베스핀글로벌 세션브리핑 Generating Value with AI AI를 사용해서 가치 창출하기 Rajen Sheth VP, Product Management, Google Cloud Sai Vivek Executive Director Technology-Verizion Consumer Group, Verizon Ting Liu Principal Software Engineer, Google Cloud #AI #ML #AI Platform #CCAI #Document AI #Engineer #DevOps © 2020 BESPIN GLOBAL, ALL RIGHTS RESERVED. NEXT OnAir 2020 베스핀글로벌 세션브리핑 Week8. cloud AI Generating Value with AI AI를 사용해서 가치 창출하기 성공적으로 AI를 도입해서 기업 가치를 올리세요. 맥킨지 “2025년까지 AI를 완전히 흡수하는 기업은 2030년 세계 경제를 장악할것이다. 곧 모든 기업은 1990년대 웹 팀을 만들었던 것처럼 AI 팀을 만들것이다.” 많은 기업들은 AI를 각 비즈니스에 도입을 하고 있으며 결국에 모든 기업들은 AI를 도입 할 것 입니다. 그렇다면 AI를 어떻게 도입을 해야될까요? 1. 기업이 현재 직면하고 있는 가장 기본적인 문제를 발굴을 해야합니다. AI의 가치를 충분히 활용하려면 기술이 아닌 비즈니스 문제에 집중해야합니다. 예) 고객 서비스 개선, 대량 문서의 보관/ 분석 자동화를 통한 효율성 개선 2. 특정분야 기업의 전형적인 문제 해결을 위한 AI 도입을 결정해야합니다. AI 도입을 위해 구글이 필요한 이유 1. 구글 연구를 통한 AI 연구와 구글 제품을 통한 AI의 실제 응용 분야에서의 리더 a) MLperf 8개 분야 중 6개 분야의 리더 ( DLRM, Transformer, BERT, SSD, ResNet-50, Mask R-CNN) 2. Google Photos, Gmail 등 구글 전반의 프로덕션 환경에서 AI를 배포한 경험 3. 기업의 신뢰와 직원 및 고객과의 신뢰 우선 1. AI를 통한 가장 근본적인 문제 해결 1)고객 서비스 개선 및 2)문서관리 1) Contact Center AI (CCAI) - 말하고 이해하고 상호작용하는 가상 에이전트 AI를 통해 고객과 자연스럽게 대화하고 운영 효율성과 고객 서비스 개선 - 상담사가 보다 전문적인 상담 통화에 집중 할 수 있도록 가상 에이전트를 통한 실시간 정보, 워크플로우, 단계별 안내 제공 - 맞춤 지원, 즉각적 서비스, 빠른 문제해결을 제공함으로써 개별 거래마다 지속적인 관계 형성 © 2020 BESPIN GLOBAL, ALL RIGHTS RESERVED.
    [Show full text]