With CX18 in the books, we asked Onliner (and conference attendee) Jay Gunnell to share some of his thoughts on what he observed at the conference.
Having been a Business Analyst (BA) for many years, I was given the opportunity in 2015 to step into a role that I considered new territory. I accepted a project assignment as an OCM Practitioner/Analyst for a multi-year program, with multiple projects, that was introducing massive changes to the client. There were both enterprise-wide changes and cultural shifts that were required to support the future growth of the company.
It’s no surprise that our workforce is changing. If your workplace is like most, a quick glance around the office will likely reveal that there are fewer Baby Boomer workers than in the past and more Gen X and Millennial workers. Canadian Business reports that Millennials are becoming the most sizable working generation in Canada, completely overtaking the other generations of employees.
With RSA Conference 2018 behind us, we asked Onliner Derek Nwamadi to share some of his observations from the conference floor.
This year’s RSA Conference did not disappoint. Once again attendees were treated to a great line up of presentations, events, and an always impressive expo floor. Looking back at my week at RSA, one word kept coming to
Trust; we seem to be living in an age where we are technology and data rich but trust poor.
As always, there are some technologies and buzzwords that become industry hot buttons and generally drive it for the rest of the year (more on that later).
In light of Mark Zuckerberg’s appearance in front of Congress last week, Business Insider reported that Zuckerberg’s personal notes had the following reminder:
It’s not uncommon for me to be asked how often an organization should review its own InfoSec alerting framework and library. My answer usually goes as follows: Like so much of security, nothing is straightforward, but there are some fundamental best practices that provide critically helpful guidance. The bottom line is that Threat Detection and Response (TD&R) management is really a lifecycle operation.
In the first part of this blog, I covered how organizations of all kinds are increasingly adopting user centered Design Thinking practices instead of dreaming up features or digital products they think their users need. I then discussed the MVP Effort, Proposed Solution, and Aim steps of the infographic below. In this final part, we will be covering viability milestones during the post-launch impact stage, including how to track the milestone's using your metrics system and what warning signs to look for that could indicate you’re not hitting all six of them.
Topics: Digital Experience
With the European Union’s GDPR regulation coming into effect on May 25, we sat down with Online’s legal counsel/privacy consultant, Laura Sulymosi, to discuss the biggest questions being asked by organizations looking to be compliant.
Organizations of all kinds are increasingly adopting user centered Design Thinking practices instead of sitting around boardroom tables with their peers, dreaming up the next big feature or digital product they think their users need. But depending on your company culture and organizational structure, you may still be finding it challenging to break the “grand assumption” habit.
Topics: Digital Experience