Corporate Life And The Internet of Everything

Corporate Life And The Internet of Everything

The Internet of Everything

When looking at the four component pillars of the Internet of Everything, people, process, data, and things, a great deal of focus is placed on the “things,” the tools and toys that demonstrate the tangible change from what “was” to what could be.

But there is progress starting to happen on the human side too, most significantly perhaps, in the shift from uniformity to a more personalized approach in everything from onboarding to individual management and feedback styles, thanks in great part to an evolution of technology that has ultimately led to the Internet of Everything.

BYOD Personalization

The most obvious example of the personalization of work might be seen in the BYOD concept, in which employees are now expecting and even demanding to be able to work from their own devices rather than use a company-issued laptop. Although there remain serious and legitimate concerns regarding security and compliance, the integration of personal machinery into the workplace brings along with it a further blending of personal and professional lives, since the same device that contains a work-related file might also be the one that an employee uses to check the current safety/status of her home using an IoE device such as Canary or Piper.

Onboarding, too, is better empowered to switch from having employees thrown into the deep-end during their first two weeks of work, to a more progressive and productive approach. So many new hires tell me stories about sitting alone at their new desk with only a binder of policy papers to refer to, and with the HR person responsible for their guidance away on leave. With the development of smarter smartcards and the introduction of wearables it is possible now for a smart office to deliver timely advice, guidance and directions through access to Wikis, videos or even maps – all designed to not only get a new employee up to speed faster, but to also get him/her engaged and enthusiastic more quickly.

The processes within the IoE make it possible now for employers to discover the other 90% of an employee’s potential – those hidden abilities and aptitudes that never show up on traditional résumés – innate skills that are seldom discovered due to an archaic and overburdened personnel system that relies in large part on personality tests that date back decades, or in the case of Myers-Briggs, almost a century.

Connecting Through Good Communication

How, for example, could a regional manager identify a great candidate who is both willing and able to take on a new and risky project? How might the skills required – leadership, comfort with risk, diligence, delegation, discipline – be truly demonstrated? Social media sites such as Facebook are natural places to discover such abilities, not through overt verbal job titles, but through actual real-life proof. For example, consider an employee who reveals on her Facebook site that she loves to scuba dive and is certified to teach scuba to others. The connection between the ability to lead people through risky behavior in this way might not show up on a traditional personality assessment or performance review, but it is evident in her real life activities.

How about those individuals who are natural communicators? The ones who, for whatever reason, everyone turns to in order to get things done? Not because they are workaholics, but because they have a natural ability to network, to put people in touch with other people, to move, shake and make things happen? Technology that identify these types of people as well as fostering the same types of connective behavior in others will strongly assist in breaking down silos and enhancing the productivity and profitability potential of a company or department.

Thirdly, what about those people whose skillsets are complementary and whose synergy – if only they could find each other and talk – could create that better mousetrap that their employer has been seeking? There is real-world evidence of this type of matchmaking through sites such as Innocentive, an outsourcing/crowdsourcing/innovation hatchery that has already brought forth improvements in design, manufacture and marketing for a wide range of products and companies. The right combinations of people should never be left to chance. In many cases these people are already working for you. But the deep connection has not yet been made. The trick is not to wait for them to meet by accident in the cafeteria, but to identify and locate complementary skillsets through the soft data available online, found by building databases of actions and aptitudes that stretch beyond traditional black and white job descriptions.

Flagship Tools – Internet of Everything

To illustrate this point, consider one of the flagship tools of the Internet of Everything: Nest, the intelligent thermostat and the intelligent smoke alarm, both of which learn the particulars of the house in which they reside and speak both to the human occupants and to other appliances in order to best carry out their duties in a tailored fashion. This type of intelligent data gathering occurs in people’s homes. It can be available in-office also. A single example might be in an analyzing the propensity of certain people to choose texting, email or face-to-face communications as their preferred method of interaction. By building profiles based on preferred actions, a new age of team-building and internal cohesion could be engineered.

The final point to be made here is that of the full integration of work and life. As opposed to balance, it is now becoming a blend. Old-school attitudes that expect total focus for hours at a time (something that never really happens) are slowly being replaced by a more practical notion that if people are allowed to work in-line with their own specific attention spans, punctuated by 2 or three minute “databreaks” to check personal email, check the status of the house, and obtain a snack as proscribed by a nutrition app, the quality of output actually increases. In other words the Internet of Everything allows human beings to work, interact and produce in a fashion that actually fits their personal and physiological abilities, while better serving the objectives of the company.

These changes are happening slowly, but the pace of progress is being hamstrung not by the scarcity of available technology anymore, but by long-held approaches to work, discipline and loyalty that existed for the age of the typewriter. When a CEO wonders why his/her company has not made the list of the best places to work for, or why the churn rate of employees or customers is so high, s/he might do well to observe just how this elegant blending of people, processes, data and things could attain a new level of excellence simply by leveraging and embracing the human talent and dedication that already exists, but has been hitherto so very hard to pinpoint.

This is a sponsored post by InnovateThink and Cisco.

Cisco_logo

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation Changing with the times is frequently overlooked when it comes to data center security. The technology powering today’s networks has become increasingly dynamic, but most data center admins still employ archaic security measures to protect their network. These traditional security methods just don’t stand a chance against today’s sophisticated attacks. That hasn’t stopped organizations…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Benefits A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…