
Enterprise Digital Transformation
Technology, Tools, and Use Cases
- 444 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Enterprise Digital Transformation
Technology, Tools, and Use Cases
About this book
Digital transformation (DT) has become a buzzword. Every industry segment across the globe is consciously jumping toward digital innovation and disruption to get ahead of their competitors. In other words, every aspect of running a business is being digitally empowered to reap all the benefits of the digital paradigm. All kinds of digitally enabled businesses across the globe are intrinsically capable of achieving bigger and better things for their constituents. Their consumers, clients, and customers will realize immense benefits with real digital transformation initiatives and implementations. The much-awaited business transformation can be easily and elegantly accomplished with a workable and winnable digital transformation strategy, plan, and execution.
There are several enablers and accelerators for realizing the much-discussed digital transformation. There are a lot of digitization and digitalization technologies available to streamline and speed up the process of the required transformation. Industrial Internet of Things (IIoT) technologies in close association with decisive advancements in the artificial intelligence (AI) space can bring forth the desired transitions. The other prominent and dominant technologies toward forming digital organizations include cloud IT, edge/fog computing, real-time data analytics platforms, blockchain technology, digital twin paradigm, virtual and augmented reality (VR/AR) techniques, enterprise mobility, and 5G communication. These technological innovations are intrinsically competent and versatile enough to fulfill the varying requirements for establishing and sustaining digital enterprises.
Enterprise Digital Transformation: Technology, Tools, and Use Cases features chapters on the evolving aspects of digital transformation and intelligence. It covers the unique competencies of digitally transformed enterprises, IIoT use cases, and applications. It explains promising technological solutions widely associated with digital innovation and disruption. The book focuses on setting up and sustaining smart factories that are fulfilling the Industry 4.0 vision that is realized through the IIoT and allied technologies.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Chapter 1 Get Technology to Contribute to Business Strategy
Contents
- Transformation Is a Strategic Initiative
- To Transform an Enterprise, You Need More Than Tech
- Tech-Only Is a Risk
- Tech Chosen without a âChoosingâ Process Is a Risk
- Tech Strategy Is a Risk
- Operational and Outcome Risks
- Broken Process
- Strategy-Driven Discovery-and-Design Process
- Corporate Strategy
- Step 1: Discover Domain
- Step 2: Transform Domain
- Step 3: Design Assets
- Predicted Outcomes
- Corporate Strategy
- How to Discover the Right Tech
- Discover Tech in the Business Context
- Discover While Exploring Four Things
- How to Design It Right
- Design Tech in the Business Context
- Design Approach
- Designing the Encapsulated Processes
- Designing the User Interface
- Getting Your Team to Make a Strategic Contribution
- Individual Contribution Is Important
- Potentially Chaotic Team
- How to Ensure Collaboration
- Managing Transformation Outcomes
- References
Transformation Is a Strategic Initiative
To Transform an Enterprise, You Need More Than Tech
- Implementing an isolated tech asset
- Choosing a tech asset without using a âchoosingâ process
- Using a tech strategy to drive the initiative
Tech-Only Is a Risk
What also seems to have been forgotten are the lessons from these earlier attempts to leverage IT. Unfortunately, the history of IT investments in most organizations is far from stellar: Research over the years suggests that the overall failure rate of IT projects is around 70%. We know that when IT projects fail, it is usually not because the technology didnât work (although this can sometimes be the case), but because the changes required at an organizational and employee level werenât managed effectively. Quite simply, adding technology does not automatically confer expected benefits; these benefits have to be unlocked and this can only happen through achieving organizational changes.
Tech Chosen without a âChoosingâ Process Is a Risk
- The technology is hot: Whatâs trending need not be the one that the organization needs. The problem with hot technologies is that there could be hype and poor understanding about situations where they really help.
- The competition has that technology: Some organizations are competition-obsessed. The problem is: what matters to competition need not matter to the organizationâs situation at the time. Competition obsession could also stifle purposeful innovation.
- The technology solves reported problems: The suggestion for a tech asset may come from employees. This is good. However, the suggestion could be siloed. A suggestion from a business unit may meet the functional goals of that unit, but fail to execute the corporate strategy.
- The technology solves standard problems: Often, organizations make a decision to invest in a tech asset based on standard expectations from the functional category to which it belongs or even merely based on standard benefits expected from âautomation.â
- The technology is in the portfolio: The organization might pick a tech asset from a so-called âStrategic IT Portfolio.â This approach sounds impressive, but picking from a pre-prepared list may not deliver strategic outcomes.
Tech Strategy Is a Risk
The reality of business siloes means business units have launched their own digital projects. Marketing might be experimenting with real-time product recommendations pushed to customersâ smart devices, while manufacturing might be introducing sensors into the supply chain. Each business unit considers its challenges unique. Functional executives pay little heed to the connection, data integration, and analytics technologies that will ultimately be necessary to optimize these efforts.
- Tech strategy may be outdated: The Tech strategy may not accurately reflect the organizationâs current corporate strategy. This is highly likely because many organizations today use a âtransient strategyâ approach, where strategies are more dynamic (The End of Competitive Advantage: How to Keep Your Strategy Moving as Fast as Your Business, Rita McGrath [6]).
- Tech strategy cannot suggest the right portfolio: The so-called strategic IT portfolios are often premature in prescribing a list of tech assets. Such prescribed tech assets are unlikely to be integrated with business.
- Tech strategy may not offer directions for business innovation and change: Forrester Research founder George Colony used the phrase ânaked technologyâ to characterize technology with no business innovation.
- Tech strategy may be self-serving: âSelf-servingâ need not always be bad; it could deliver tech department level benefits. However, such benefits are more likely functional or standard than strategic.
Operational and Outcome Risks
- Poor adoption: The design of tech assets used to be notoriously poor from a human use perspective, but thankfully human factors are increasingly used in the design. Business factors though are still not systematically used in the design. Where there are poorly designed tech assets, users may find some workarounds or even refuse to use them.
- Recurrence: Recurrence is the situation where one or more old business problems exist even after transformation. Recurrence may be due to a wrong tech asset, that is, the absence of a solution to the problem. Recurrence may be due to simply âautomatingâ a process that already had problems. The accounting process at a restaurant chain remains the same-old after spending money on an accounting software; the existing accounting process is simply embedded in the new software and so if there were problems, those problems remain. A great opportunity to improve the organization was available, but it was squandered.
- Degradation: While deploying new tech assets, changes may be required to one or more connected assets to get everything to work together as one. Such changes are often not foreseen or addressed due to a tech-centric approach that lacks a holistic view. Result: Things such as customer experience may actually get worse instead of better.
- Here are a few symptoms of degradation: Different employees give different answers to the same question; different business processes complete the same work, but with different software; decisions by different departments are not coordinated; data are everywhere in the organization, but the information required to make decisions is not easily available.
- Implementing and using a silo tech asset or a point solution is often the reason for degradation. Writing about software applications, Ross, Weill, and Robertson [7] describe the silo problem: âIndividually, the applications work fine. Together, they hinde...
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Contents
- Editors
- Contributors
- Chapter 1 Get Technology to Contribute to Business Strategy
- Chapter 2 Introduction to Computer Vision
- Chapter 3 Essentials of the Internet of Things (IoT)
- Chapter 4 The Internet of Things Architectures and Use Cases
- Chapter 5 Challenges of Introducing Artificial Intelligence (AI) in Industrial Settings
- Chapter 6 Blockchain-based Circular-Secure Encryption
- Chapter 7 Security Challenges and Attacks in MANET-IoT Systems
- Chapter 8 Machine and Deep Learning (ML/DL) Algorithms for Next-Generation Healthcare Applications
- Chapter 9 A Review of Neuromorphic Computing A Promising Approach for the IoT-Based Smart Manufacturing
- Chapter 10 Text Summarization for Automatic Grading of Descriptive Assignments A Hybrid Approach
- Chapter 11 Building Autonomous IIoT Networks Using Energy Harvesters
- Chapter 12 An Interactive TUDIG Application for Tumor Detection in MRI Brain Images Using Cascaded CNN with LBP Features
- Chapter 13 Virtual Reality in Medical Training, Patient Rehabilitation and Psychotherapy Applications and Future Trends
- Chapter 14 Complexity Measures of Machine Learning Algorithms for Anticipating the Success Rate of IVF Process
- Chapter 15 Commuter Traffic Congestion Control Evasion in IoT-Based VANET Environment
- Chapter 16 Dyad Deep Learning-Based Geometry and Color Attribute Codecs for 3D Airborne LiDAR Point Clouds
- Chapter 17 Digital Enterprise Software Productivity Metrics and Enhancing Their Business Impacts Using Machine Learning
- Index