future-machine

The Blended Mindset – Converging Through The Screen

The Blended Mindset

It has been a long time since a phone was just a phone. In fact, people start to show their age when they refer to their device as a “cellphone.” It is far more than that. The modern portable device is capable of infinite tasks, whether it draws upon its own internal assets, or through apps that work with the rest of the world via cellular or wireless. In its immensely portable versatility, business leaders can see the future of their organizations: people and machinery demonstrating blended and agile abilities rather than sticking to one specific talent.

cloud_173

The smartphone (also a dated term) is a hand-held tool for life. So too is the modern car. Hand-held through the steering wheel at least, its available phone and 4G technologies, along with USB ports and remote diagnostics, turn it into an office with wheels, adaptable to any industry, from farming to construction to accounting. In a few more years, as the Internet of Things takes root, other traditionally single-function devices, from refrigerators to hospital gowns, will play a more active and diverse role in communicating back and forth between suppliers and consumers, making decisions and guiding actions.

The transformation of these devices from one-trick-ponies to jacks-of-all-trades must not go unnoticed by company leaders, since it reflects two levels of progress: machine and human. In league with technological change, people too are becoming more versatile in their skills and approaches, rendering the traditional career path and organizational chart hierarchy somewhat redundant.

human-machine-learning

(Image Source: Shutterstock)

Take IT as an example. In earlier years, the IT department lived and worked in essential isolation, its employees using their wizardry to ensure that networks and personal computers functioned properly and safely. But in recent times, the IT manager has been given a wider range of responsibility. No company operating today can consider itself relevant if it does not offer IT and security executives a seat at the C-suite table. With an ever-increasing variety and sophistication of cyber-attacks, the necessity of migrating to the cloud and the pressure to translate commerce into an omni-channel universe, IT executives must offer strategic leadership advice in concert with the technical facts.

Finding The Hidden Talent

IT, like all other departments in an organization, can no longer operate inside a silo. The silo has been flattened. Departments can now see each other better and talk to each other; but more importantly, they are becoming each other.

Employees too are becoming more diverse, not simply in age, culture or other demographic delineation, but in attitude and aptitude. This is why many employers are turning to social media to identify hidden talent. Whereas résumés and personality tests succeed in pegging individuals for certain jobs, a review of social media profiles tends to reveal latent talents that may otherwise go unnoticed. Leadership skills, emotional intelligence, creativity, comfort with risk and, most importantly, career self-determination paint pictures of individuals whose passions exist untapped, until discovered by reading between the lines on social media.

These “possessions” – like tiles that make up an individual personal mosaic – indicate skills and powers that an agile organization might see fit to employ for a certain task at a certain moment in time, without resorting to the traditions of seniority or process. This demands the same type of agility and versatility that exists within a mobile device.

More significantly, it matches the mindset demonstrated by the modern world’s most successful leaders such as Elon Musk and Steve Jobs. These individuals are mentioned often simply because they blend their fierce commitment to their sense of destiny, with a willingness to change and adapt to better ideas. This is the blended mindset that exists at the pinnacle of a successful company’s management structure, and which can and must be discovered and encouraged throughout the entire organization.

Human beings are very good at learning and adapting. Modern education need not enforce the traditional multi-year, Ivy-League style in order to yield practical skills and abilities; there are numerous online educational systems that give the knowledge away for free. Just like Elon Musk did with the code behind Tesla, openness and versatility continue to drive modern commerce.

Digital Social Transformation

social-media-future

It is very natural for those in positions of senior responsibility to greet the modern age of change with mistrust. But this is the age in which business is now being done. It will be of greater value for a company to shore up its presence on a growing social media platform – especially those favored by the younger generations, whose economic and social influence reaches every corner of the world economy – than to focus on more traditional mailing lists and CRM techniques from a decade ago. Business effectiveness in the next few years depends a great deal on a shift of mindset, from channels and hierarchies to an open concept, which pulls diverse and blending talents from all corners of a company’s human and technical resources to solve problems in real time and test them as they unfold.

Every time company leaders take their mobile phone out of their pocket, they should look at it anew. This is a device whose value exceeds the sum of its parts, and for which the telephone feature is merely a bit player. This is a blended device, and it has changed the world by virtue of its openness. And so will it be for businesses everywhere.

For more on this topic, go to businessvalueexchange.com sponsored by Hewlett Packard Enterprise.

By Steve Prentice

Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website

CONTRIBUTORS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
5 Ways Cloud Computing Is Having an Impact on The Energy Sector

5 Ways Cloud Computing Is Having an Impact on The Energy Sector

Computing Energy Sector We’ve discussed here in the past how cleantech (a blanket term that includes technologies that affect recycling, ...
Driving Transformation? It is possible to predict the future.

Driving Transformation? It is possible to predict the future.

Driving Transformation Previously, I wrote about the criticality of defining the Vision for your transformation - what is your real objective, how ...
Big Data Career Opportunities

Big Data Analytics Career Job Opportunities

Big Data Career Opportunities With the inception of Big Data, we have witnessed a data revolution around us.  Big data ...
Where Are Your Users Learning About The Birds And The Bees Of Cloud?

Where Are Your Users Learning About The Birds And The Bees Of Cloud?

Clouding Around Where did you learn about the birds and bees – from your adolescent peers? How did that work ...
The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing ...
Endpoint Security

WordPress Security 101 – Endpoint Security And Disaster Preparedness

Endpoint Security And Disaster Preparedness Continued from part 4 Setting up a secure password for your admin dashboard is a ...
Why An Inside-Out Approach to Cloud Security Is Your Safest Bet

Why An Inside-Out Approach to Cloud Security Is Your Safest Bet

Cloud Security In September, McKinsey released what might be looked back upon as a seminal survey. It opened the report ...

NEWS

Cloud Security Alliance Issues New Code of Conduct for GDPR Compliance

Cloud Security Alliance Issues New Code of Conduct for GDPR Compliance

EDINBURGH, Scotland, Nov. 21, 2017 /PRNewswire-USNewswire/ -- The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining and raising awareness of best practices ...
EU privacy regulators to discuss Uber hack next week

EU privacy regulators to discuss Uber hack next week

BRUSSELS (Reuters) - European Union privacy regulators will discuss ride-hailing app Uber’s [UBER.UL] massive data breach cover-up next week and ...
HPE CEO Whitman's surprise exit stumps Wall Street

HPE CEO Whitman’s surprise exit stumps Wall Street

(Reuters) - Shares of Hewlett Packard Enterprise Co (HPE.N) fell 6 percent on Wednesday after Chief Executive Officer Meg Whitman’s ...

SPONSORS

Security: The Goodwill Virus That Keeps On Giving

Security: The Goodwill Virus That Keeps On Giving

The Goodwill Virus When Caitlyn Jenner officially introduced herself to the world by way of a Vanity Fair cover story ...
How Printers Help Hackers Hide In Plain Sight

How Printers Help Hackers Hide In Plain Sight

Printers and Hackers Spies and thieves often do their best work by hiding in plain sight. No one suspects the ...
Hybrid IT Matures Just In Time To Tackle Complex Challenges

Hybrid IT Matures Just In Time To Tackle Complex Challenges

Tackling Complex IT Challenges Today’s sophisticated business environment demands a dynamic and robust IT infrastructure which is a far cry ...