When it Comes to Data, Go for Best, Not Perfect By Laura Patterson

What Grilling Has to Do With Data Management

Good data stimulates good decisions. This takes good data management. Living here in Austin, we can pretty much use our outdoor grill throughout the year. While we were recently grilling we were also talking about data. It occurred to use that one of the concerns about food quality relates to data quality.

Studies show that grilling meat can form carcinogens, that is, substances or agents that can promote cancer. Cancer cells differ from normal cells in many ways that allow them to grow out of control and become invasive, essentially corrupting normal functions. Perhaps you can relate this idea of out of control and corrupting normal functions to what’s happening with data.

Still wondering what grilling even has to do with data management? It will become clearer if we understand how carcinogens are created during the grilling process. Recent research suggests that there is a relationship between the types of charcoal and level of carcinogen formation, as well as the type of meat and the types of cancer it may induce. Similarly, the type of data, how you store it, and how you manage it makes all the difference when it comes to results.

5 Important Aspects for Good Data

The recommendations for avoiding these potentially harmful agents when grilling aptly apply to collecting and analyzing your data. Let’s look at five tips for good data management.

  1. Keep it Clean. Leftover bits of food and grease on your grill, especially from animal proteins, contain carcinogens. The more they’re scorched by the heat, the more concentrated the cancer-causing agents become. It’s strange how easy it is for little bits and pieces of data to accumulate. Dirty data costs companies millions of dollars each year. Errors and omissions in master data, incomplete data, duplicate data, inaccurate data, inconsistent data, all contribute to dirty data. It’s recommended that you clean the grill surface every time you grill so leftover pieces don’t get transferred to your next meal, potentially creating a health risk. The same applies to your data. Make sure it’s clean every time before you use it. We’re doing a project for a customer right now where we’re finding that close to 50% of the data is bad. It’s costing time and money to find workarounds.
  2. Proper Prep. In cooking, it common to apply a marinade or rub to prepare the food and add flavor. It just as important to address data prep. Informatica.com defines data preparation as “a pre-processing step in which data from one or more sources are cleaned and transformed to improve its quality before its use in business analytics.” Data prep is important before you merge different data sources with different structures and different levels of data quality in order to produce a clean, consistent format. When it comes to grilling you want to use alcohol and acid-based marinades because they hinder the release of a cancer-causing chemical produced when animal proteins are cooked at a high temperature. Prep your data by pulling it into an environment where it can be safely analyzed and manipulated.
  3. Avoid Free Radicals. Free radicals are unstable molecules that damage the growth, development, and survival of cells in the body. Their reactive nature allows them to engage in unnecessary side reactions causing cellular impairment and eventually injury when they are present in disproportionate amounts. When it comes to Bar-B-Q, we can use antioxidant herbs and seasonings to help decrease free radicals that are created when you grill. When it comes to data, the key is to apply the principles of validity and reliability to your data. Sloppy and inconsistent data will compromise your analysis and your insights.
  4. Think Thin. Fat dripping into the fire which results in flare ups is one of the primary trains of thought connecting grilling and cancer. It’s recommended to use thinner cuts of meat to reduce cooking time or to steam the meat before grilling to reduce the risk of juices dripping into the flame. For most organizations today, the lack of data isn’t a problem. It’s the opposite: there’s often too much information available to make a clear decision. Think thin – be clear about the question or questions you want to answer. Then only choose the data you need to inform your decision and draw an accurate conclusion.
  5. Cook Thoroughly but Don’t Char. According to the National Cancer Institute, grilling meats at high temperatures results in the formation of chemicals known as HCAs, which can increase the risk of cancer. Blackened and charred meat contains three and a half times more HCAs than medium-rare meat. Avoid over-analyzing your data. Data analysis is not about perfection. It’s about deriving an insight that will enable you to take the best step with the greatest impact. Go for best not perfect.

I truly enjoy grilling and find that it makes food look and taste better. Data when used properly make fosters better decisions. Thanks to more sophisticated technology, today it is easier to obtain and analyze data. And there’s a strong push to take a more scientific and data-derived approach to decisions over hunches, gut feel, and experience. With these five tips, you can keep your data from going out of control, corrupting your capabilities, hindering your decisions, or derailing your growth.

via Technology & Innovation Articles on Business 2 Community http://bit.ly/323b9FS

OAuth 2.0: What Is It and How Does It Work? By Dave Wallen

It’s no secret that data breaches can bring down businesses of any size. But what you may not know is that many of the most devastating breaches began with a single, vulnerable privileged account. According to a Black Hat survey, 32% of hackers stated that accessing a privileged account is the easiest and fastest way to steal critical data.

This is where software or SaaS solutions that use service accounts to access applications come under the scanner. These accounts entail the risky practice of storing privileged credentials, generally without multi-factor authentication (MFA). Essentially, one hack of your service account is all it takes for a data breach to occur. Despite the obvious risks involved, many vendors still use service accounts because they feel the reduced development costs outweighs the risk of customer data loss.

To avoid any chance of compromising a privileged account, security-focused applications like Spanning will provide application-level authorization leveraging the industry-standard OAuth 2.0 protocol.

What is OAuth?

An example of an OAuth authorization screen.

Image courtesy of ELEX.

Above: A splash page for a Google partner service requests the user permission to use Google authentication for application access. That’s OAuth 2.0 in action.

The OAuth (open authorization) protocol was developed by the Internet Engineering Task Force and enables secure delegated access. It lets an application access a resource that is controlled by someone else (end user). This kind of access requires Tokens, which represent delegated right of access. That’s why applications get access without impersonating the user who controls the resource.

How does OAuth work?

An OAuth Access Token transaction requires three players: the end user, the application (API), and the resource (service provider that has stored your privileged credentials). The transaction begins once the user expresses intent to access the API.

  • Application asks permission: The application or the API (application program interface) asks for authorization from the resource by providing the user’s verified identity as proof.
  • Application requests Access Token: After the authorization has been authenticated, the resource grants an Access Token to the API, without having to divulge usernames or passwords.
  • Application accesses resource: Tokens come with access permission for the API. These permissions are called scopes and each token will have an authorized scope for every API. The application gets access to the resource only to the extent the scope allows.

A simple diagram showing the OAuth 2.0 flow for authorization.

Watch the video below to learn more about OAuth 2.0 Access Tokens:

Why Your Backup Should Have OAuth 2.0

Many Office 365 and G Suite backup solutions use service accounts that require administrator rights and privileged credentials to access these systems.

However, a good backup solution enables OAuth data transfers to take place in Secure Sockets Layer (SSL) to ensure that the most trusted cryptography industry protocols are being used to keep your credentials secure.

While it’s clear that the right backup solution keeps privileged credentials out of the reach of hackers, finding the right backup solution for your business needs can be an overwhelming task.

To help you make an informed decision before purchasing a backup solution, download our whitepaper Securing Your SaaS Backup.

via Technology & Innovation Articles on Business 2 Community http://bit.ly/321qhnn

3 Reasons Why Even Apps with Impeccable UX Need User Onboarding By Gaurav Belani

User onboarding is one of the most crucial stages in an app’s user journey. It is essentially the first point of contact after a user signs up and therefore, it is vital for making a solid first impression.

Wait, what exactly is user onboarding again?

Before we delve into the reasons why user onboarding is super important for any app, let’s quickly define what it actually is. User onboarding is “the process of actively guiding users to find new value in your product or service,” according to OptinMonster.

You can view it as a bridge between acquiring new users and turning them into highly engaged ones. Alternatively, think of user onboarding as a small conversion funnel for new signups on their way to becoming heartily paying loyal users.

Why is it needed?

It may be challenging for new users to intuitively know how to navigate and get the most from your app, no matter how well you design it. That’s where user onboarding makes its value known.

Onboarding helps familiarize users with your app and allows them to quickly get started. It enables businesses to strategically communicate with new users, revealing the app’s value right from the start and ultimately, facilitating positive user experience.

Still not convinced? Here are three big reasons why you need user onboarding even if your app has stellar UX:

It makes good UX great

Your app may be extremely intuitive and user-friendly when you dive deep into it, but first-time users might not be able to appreciate that.

Don’t think of user onboarding as a confession that your app’s UX is poor because the user requires “assistance” in order to engage with the app in a meaningful way. That is simply not the case.

All major league apps the likes of Gmail, Facebook, and Tinder have a minimalist user onboarding that enhances their UX, not ruin it.

It sets up user expectations

People often install a bunch of competing apps in the same category and then choose one based on their first impressions. Consequently, the first few seconds of interaction that a new user has

with your app are pivotal.

A sublime user onboarding process that instantly shows the app’s value will make the user feel “Aha! I totally get it. This is what I needed the whole time.” This aha moment is what you want your users to experience as soon as possible.

Potential users shouldn’t have to guess or even think to understand what your app is going to offer once they start using it. In a matter of seconds, they should be able to understand what you have to offer and why they can’t miss it.

It makes your app look more professional

Another benefit that deserves attention is that a well-designed user onboarding process makes your app look much more polished.

When you log into an app for the first time and go through some thoughtfully designed swipeable screens that crisply explain what lies in store for you, you can’t help but feel that the app was designed by a competent company and not a bunch of amateur developers.

It allows you to neatly explain the advanced features

If your app is a bit complicated and has various advanced features that need further explanation, you can have a user onboarding process split into multiple phases. Use one phase for the initial onboarding and other phases later, when they are needed.

Because even with the most flawless UX design, there will always be users who would appreciate a helping hand in navigating your app.

Final thoughts

Designing an appealing first-time user experience is integral to your app’s success and increasing long-term user engagement.

Users would easily lose interest if your app if it is confusing and tricky to use when they open it for the first time. An elegant onboarding process helps make the first-time user transition as seamless as possible, mitigating potential pain points.

User onboarding is your chance to create a stellar first impression on newly signed-up users. So, commit to an intuitive and useful user onboarding regardless of how great you think your app’s UX is.

via Technology & Innovation Articles on Business 2 Community http://bit.ly/38xcPdn

3 Reasons Why Even Apps with Impeccable UX Need User Onboarding By Gaurav Belani

User onboarding is one of the most crucial stages in an app’s user journey. It is essentially the first point of contact after a user signs up and therefore, it is vital for making a solid first impression.

Wait, what exactly is user onboarding again?

Before we delve into the reasons why user onboarding is super important for any app, let’s quickly define what it actually is. User onboarding is “the process of actively guiding users to find new value in your product or service,” according to OptinMonster.

You can view it as a bridge between acquiring new users and turning them into highly engaged ones. Alternatively, think of user onboarding as a small conversion funnel for new signups on their way to becoming heartily paying loyal users.

Why is it needed?

It may be challenging for new users to intuitively know how to navigate and get the most from your app, no matter how well you design it. That’s where user onboarding makes its value known.

Onboarding helps familiarize users with your app and allows them to quickly get started. It enables businesses to strategically communicate with new users, revealing the app’s value right from the start and ultimately, facilitating positive user experience.

Still not convinced? Here are three big reasons why you need user onboarding even if your app has stellar UX:

It makes good UX great

Your app may be extremely intuitive and user-friendly when you dive deep into it, but first-time users might not be able to appreciate that.

Don’t think of user onboarding as a confession that your app’s UX is poor because the user requires “assistance” in order to engage with the app in a meaningful way. That is simply not the case.

All major league apps the likes of Gmail, Facebook, and Tinder have a minimalist user onboarding that enhances their UX, not ruin it.

It sets up user expectations

People often install a bunch of competing apps in the same category and then choose one based on their first impressions. Consequently, the first few seconds of interaction that a new user has

with your app are pivotal.

A sublime user onboarding process that instantly shows the app’s value will make the user feel “Aha! I totally get it. This is what I needed the whole time.” This aha moment is what you want your users to experience as soon as possible.

Potential users shouldn’t have to guess or even think to understand what your app is going to offer once they start using it. In a matter of seconds, they should be able to understand what you have to offer and why they can’t miss it.

It makes your app look more professional

Another benefit that deserves attention is that a well-designed user onboarding process makes your app look much more polished.

When you log into an app for the first time and go through some thoughtfully designed swipeable screens that crisply explain what lies in store for you, you can’t help but feel that the app was designed by a competent company and not a bunch of amateur developers.

It allows you to neatly explain the advanced features

If your app is a bit complicated and has various advanced features that need further explanation, you can have a user onboarding process split into multiple phases. Use one phase for the initial onboarding and other phases later, when they are needed.

Because even with the most flawless UX design, there will always be users who would appreciate a helping hand in navigating your app.

Final thoughts

Designing an appealing first-time user experience is integral to your app’s success and increasing long-term user engagement.

Users would easily lose interest if your app if it is confusing and tricky to use when they open it for the first time. An elegant onboarding process helps make the first-time user transition as seamless as possible, mitigating potential pain points.

User onboarding is your chance to create a stellar first impression on newly signed-up users. So, commit to an intuitive and useful user onboarding regardless of how great you think your app’s UX is.

via Technology & Innovation Articles on Business 2 Community http://bit.ly/38xcPdn

5 Disadvantages of Business Intelligence and How to Avoid Them By Caleb Danziger

Data analytics is shaping business today. As more information and processes take on a digital format, tools like business intelligence (BI) have become increasingly valuable. Proper integration of these technologies can give your company an edge over the competition.

Despite its many benefits, BI comes with its fair share of disadvantages. You’d expect as much with any developing technology, but there are only so many issues you can deal with before something isn’t worth the investment. If you’re to use BI successfully, you’ll have to know what obstacles to expect.

Here are five common problems with BI and how you can avoid them.

1. Data Breaches

One of the most pressing concerns with any data analysis system is the risk of leaks. If you use BI applications to handle sensitive information, an error in the process could expose it, harming your business, customers or employees.

More than 30% of surveyed businesses cited security issues as the biggest challenge facing BI. However, the prevalence of this issue means many BI providers take it seriously and will provide robust safety measures. When looking at different apps and providers, always consider their security options. It may also help to be careful about what kinds of data you allow your BI to access.

2. High Prices

Business intelligence software can be expensive. While the potential for a high ROI can justify this, the initial price can be a barrier to smaller companies. You also have to consider the costs of the hardware and IT staff needed to implement the software effectively.

You can avoid paying too much by opting for self-service BI tools over a more traditional model. These systems will allow you to avoid costly IT support and cut down the time it takes to implement or adjust your BI.

3. Difficulty Analyzing Different Data Sources

The more encompassing your BI, the more data sources you’ll use. A variety of different sources can be beneficial in giving you well-rounded analytics, but systems may have trouble working across varied platforms.

The good news is this problem is gradually disappearing. More advanced BI systems can incorporate a range of different data sets. You can look for an all-in-one BI software that offers these services or use independent tools like data connectors to consolidate all your varied information.

4. Poor Data Quality

In this digital age, you have more information at your disposal than ever, but this can prove to be problematic. A surplus of data can mean that a lot of what your BI tools analyze is irrelevant or unhelpful, muddying results and slowing down processes.

To avoid this, you can implement a data quality management initiative. It also helps to use key performance indicators that are relevant to your particular needs and goals.

5. Resistance to Adoption

Not all disadvantages of BI deal with the software itself. One of the most substantial obstacles facing BI is employees or departments not wanting to integrate it into their operations. If your company doesn’t adopt these systems across all areas, they won’t be as effective.

You can help your staff accept BI by making it easier to integrate. If your software is user-friendly and everyone understands its benefits, they’ll be more likely to adopt it.

Use BI to Your Advantage

Any innovation will have a downside or two, and business intelligence is no different. If you take care in selecting and implementing your BI, its advantages will far outweigh any costs.

via Technology & Innovation Articles on Business 2 Community http://bit.ly/2USdvGc

Cybersecurity Is Not Only Important For Businesses By Lanre Onibalusi

Image Credit: Unsplash

Hacking is a crime that comes with a low risk for a high reward. With the help of a program and the knowledge of the right keyboard strokes, hackers can launch a cyberattack in minutes. Allowing hackers access to privileged information like phone numbers, email addresses, and financial accounts.

Today, everyone from small businesses to everyday families stores sensitive information on digital devices. And, hackers don’t discriminate when finding a target, which is why both businesses and families need to take measures to ensure their cybersecurity.

Cybersecurity in the business world

The global business landscape is rapidly becoming more dependent upon digital technology. While businesses have undoubtedly benefited from taking their business digital, there are risks associated with an interconnected business. This is due to the fact that the same technology that makes doing business easier and more effective also provides hackers with the ability to wreak havoc.

Whether you’re a large or small business, no one is immune to a cyber attack. This is because cyber attackers will take any chance to hack into operating systems in an attempt to access personal and financial records.

Implementing cybersecurity in a business setting

The systems and terms used in the cybersecurity industry are hard to grasp at first. There is a lot of jargon and seemingly complex solutions to navigate through. However, at the end of the day, cybersecurity comes down to being prepared, educated and proactive.

Once you are able to identify a means of cybersecurity that is not only proven to work, but a good fit for your business, implementing cybersecurity only gets easier. This is because all that is left is to ensure that employees are trained and equipped to deal with preventing, identifying and dealing with cyberattacks.

Cybersecurity at home

Cybersecurity isn’t a concept that only businesses have to handle. Cybersecurity is for everyone and this stems from the fact that almost everyone in society has some sort of device that connects to the internet.

The rise in popularity of smart home devices has also been accompanied by an increase in the discovery of critical vulnerabilities that threaten to expose unsuspecting individuals to privacy breaches. This is due to the fact that most homes have multiple devices that can be hacked by cyberattackers.

A cyberattack isn’t only for the vulnerable either. Something as simple as opening an ad that appears while you’re playing a game or opening a link that appears to be sent from a friend could open you up to being hacked. Any shiny gadget or device that connects to the internet to provide us with hours of fun is also a hacker’s secret passage into our homes.

Practicing cybersecurity at home

Employing means of cybersecurity at home doesn’t mean that you have to put down your devices altogether. Instead, it’s simply about remaining vigilant and proactive.

A big step towards cybersecurity at home is to have a look at the privacy and permission settings on your devices. By actively choosing settings you are comfortable with, instead of going with the factory settings, your devices are already more secure.

Another step towards achieving cybersecurity at home is to regularly maintain all devices that can connect to the internet. Software regularly gets updated to ensure security measures, so keep your devices up to date. Hackers tend to prey on individuals who have not updated their software, using bugs that do not exist in the new software to gain access to your information.

The importance of cybersecurity in the modern world

The modern world’s increasing reliance and obsession with all devices great and small have both positives and negatives. The big bonus of technology is that it allows information and connection at the touch of a button. However, this positive is also technology’s downfall, as hackers benefit from the ease at which information can be accessed.

Cyberattackers don’t just target big business either. In a game that sees low risk for high reward, hackers look to access the information of anyone with a device. And that includes business owners and everyday families. Highlighting the importance of educating kids and adults on the means necessary to be cyber secure.

via Technology & Innovation Articles on Business 2 Community http://bit.ly/2SFJg2o

The Case for Rapid — Not Gradual — Digital Demand Transformation By Adam Needles

Marketing and sales once were considered separate, but allied, disciplines, but major change is afoot. Companies are starting to consider “go-to-market” more holistically and so they’re building teams focused around integrative concepts such as Revenue Operations” (RevOps) and “Strategic Demand.” Taking a rapid approach to digital demand transformation is key to this process.

This movement is more than simply bringing together marketing and sales activities. It represents a fundamental shift towards aligning people, process, content, technology and data around the buyer journey. Instead of just creating more and more leads, we’re emphasizing how all of the different marketing and sales touchpoints work together to drive the buyer towards revenue goals. The objective is to build a repeatable, optimizable, go-to-market engine to drive growth with clear levers for success.

This is a substantial change for most companies in the marketplace. Shifting from tactical, activity-based goals to strategic, outcome-oriented goals is a major undertaking, and you can’t get there with incremental changes. It’s an evolution, and it’s transformational.

Moving away from tactical activities to strategic, outcome-oriented demand requires true Digital Demand Transformation. A Digital Demand Transformation is an emerging discipline that brings both science and change management as solutions to the challenge of demand optimization in a business environment.

But to succeed with transformation, companies must move quickly to achieve results faster and ensure these results are fully realized and engrained.

Why transform demand?

As noted in a recent blog post, numbers don’t lie.

We see a state in the marketplace today of lead-to-revenue activities that are substantially inefficient.

According to SiriusDecisions, the typical lead-to-revenue conversion rate ranges from 0.375% to 0.6%, depending on the type of market. That’s not great.

Companies that have transformed demand and shifted to a Strategic Demand state can substantially improve lead-to-revenue conversion – typically 4-5X the industry average (i.e., 400-500%). That’s substantial!

Aligning around buyer journey addresses a key arbitrage opportunity and can clearly provide sales lift. But it also has other benefits including:

  • Improvement in the customer experience
  • More sustainable and predictable pipeline
  • Higher ROI of marketing and sales investments
Why rapid transformation vs. incremental change?

There are many reasons why rapid transformation is necessary for a successful Digital Demand Transformation, but these are the five most important.

  1. The sooner the better: This one is obvious. The sooner you get there, the better. If you can provide 4-5X sales lift in your business, why wait?
  2. Competitive advantage: Moving quickly with Digital Demand Transformation offers a critical, competitive advantage. It enables companies to significantly outpace their cohort in go-to-market efficiency with targeted segments. So not only does transformation improve results, it also distances your company from the pack, and the faster you can drive this distance, the more competitive benefit you achieve.
  3. Sustaining your transformation: When transformation is approached incrementally, and the process is dragged out it often encourages organizations to revert back to a previous state. In fact, the longer it takes to move to the ‘new,’ the more likely the ‘old’ will remain – especially as organizations get caught up in cultural and political elements of transformation. Moving quickly helps organizations transcend those elements that can block transformation, and thus it can be critical to ensuring the change is engrained and sustained.
  4. Keeping pace with buyer change: At the core of Digital Demand Transformation is an effort to better align go-to-market motions to the rapidly changing buyer journey. Moving slowly to tackle this change can mean that the buyer insights driving the new model may have changed by the time the transformation is complete. Keeping pace with your buyer requires moving quickly.
  5. Achieving your ‘full’ objectives: It’s important to approach transformation in a way that ensures you’ll achieve the goal of buyer-centricity throughout the entire business. Companies pursuing this evolution are not merely trying to notch up performance a few percentage points; rather, they are attempting to change the fundamental dynamics of their business model — setting their sights high.Approaching transformation in an incremental way and/or insufficiently setting and communicating targets can result in transformation failing to meet its objectives. McKinsey highlights in a recent post:

    “[E]xecutives propose fundamental changes in how the business operates but don’t go through the hard process of setting commensurate performance targets. They often set targets too low, aiming for incremental change. When they do set their sights appropriately high, they often fail to adequately make clear to key stakeholders who owns the goals and responsibilities associated with various elements of the transformation. As a result, value can end up ‘leaking’ even from good initiatives, which can sap companies’ efforts to meet bottom-line targets, drain momentum from good investments, and impede buy-in for change efforts generally.”

You want to fail fast.

A Forbes post notes, “as counter-intuitive as it might sound for those of us trained in the leadership model of the industrial era, iterating fast failures achieves a desired result faster than perfecting the solution.”

Transformation initiatives are not perfect; in fact, multiple elements of your original hypothesis will be disproven. A Digital Demand Transformation is complex and multi-faceted.

The faster you move, the more quickly you learn from any failures that occur and course correct, and the more quickly you can tackle the multiple layers involved in the transformation initiative.

Getting to the bigger vision means tackling a lot of smaller elements along the way. Parsing it out as a series of smaller elements is always more digestible; moreover, signaling that mistakes will be made along the way improves the likelihood of the overall initiative succeeding. And this is where speed comes in: the problem is that when organizations move slowly, the minute something doesn’t work out as planned, they immediately get caught up in the mistakes and fail to grow to the next level.

Speed is crucial. Clearly there is a very strong case for rapid – not gradual – Digital Demand Transformation.

via Technology & Innovation Articles on Business 2 Community http://bit.ly/2tQR4G6