For a company, It is increasingly important to set up a communication and digitization strategy. The infrastructure thus takes a strategic place in the conduct of business. This technological development was only possible through the establishment of efficient computer networks. Whether for telephony, collaborative software suites or connected objects, it becomes important to choose the right infrastructure in order to optimize operational costs without any compromise on the service quality.
Telecommunications technology has developed throughout the 20th century, especially during the first part. The first computers were developed and marketed there. These machines worked alone and were not networked. The first networking took place in 1969 with the arrival of ARPAnet (internet prototype).
From these years appear the first mobile networks, and development forces are mainly focused on mobile telephony but also on the development of the internet and related services such as Internet telephony and all cloud services.
With the development of network capabilities, applications can be centrally installed on servers. From this moment on, it is no longer necessary to acquire a software license per workstation, but these can be managed centrally on a server. Thus, it becomes possible to acquire only the number of licenses necessary for the operational needs.
The physical size of computers themselves is decreasing and at the same time the power of mobile networks is increasing. This promotes mobility. Thus, from the 2000s, everything was in place for the development of the cloud services:
Given that at the beginning of the 21st century, the democratization of the internet and mobile telephony brought pressure on telecommunications prices, operators had to develop new business models. The transport of voice and data has become a commodity and operators have become either partners or competitors of GAFAM.
Conventional operators have thus diversified and now offer services such as video on demand (content offering). Using cloud technology, they have also developed contracts in the form of packages of services. They offer voice services via the cloud.
To complement these voice services, the following collaborative software suites are available:
GAFAM also provides cloud services such as:
It is important for an SME, that the tools and services it selects are adapted to its business. It will have to define its needs through a precise set of specifications
When choosing a solution, it is also necessary to evaluate the costs of the solution. It is important to consider the necessary investments and all operational costs (maintenance costs and subscriptions).
According to the McKenzie Global Institute study "Disruptive technologies: Advances that will transform life, business, and the global economy." 12 technologies are identified as disruptive technologies that will change medium-term consumption patterns, management and corporate governance. Of these 12 technologies, 2 most particularly hold our attention:
The advent of Cloud technology allows remote access of data and applications according to a business model that is closer to leasing and away from the ownership of software.
Not less expensive, this model is interesting for businesses. Renting an application is not an investment expense but an operational expense. This model is more flexible:
It also allows the development of big data technology according to the 3V model:
The data collected and correlated are highly coveted and the volume of business they generate will be multiplied by 3 by 2020.
6 types of actors are needed to deploy the cloud:
These different actors will negotiate bitterly among themselves to set up whole services. For example, Netflix can be distributed bundled with an internet subscription.
Generation Y entering the labor market is the first generation of the mobile Internet that has changed the ways to work and to distract. Collaborative mode replaces hierarchical organizations.
Training is also a sector using cloud technology to set up E-learning services. This new form of training also brings new forms of marketing. Prospects can be solved through the content of training.
Number of cultural exchanges are based on the free. The actors offering these services must find new business models. It also appears sites exchange services such as carpooling, exchange of apartments for holidays etc ...
With the collected data, the Cloud brings new methods of espionage including economic and industrial. In the United States, the "Patriot Act" allows US authorities to directly access server data from US-based companies.
More than 15,000 requests were submitted by the FBI in 2012 as part of the "Patriot Act" without it being known if European companies are involved.
With the Cloud you must be careful about:
Throughout the past century, telephone operators have expanded their business by offering voice transport services. With the advent of Arpanet in the 1970s, a data transport network developed in parallel. In the early 2000s, it became more efficient to carry voice over IP rather than the historical network. With this evolution, transportation has become a commodity and business is rather generated by content. Thus, appeared services like :
Therefore; operators have a role to play in this new ecosystem. However, they must undergo an in-deep molt. In fact, they must globalize their business, define services and business models compatible with the various legislations in place. The services developed must be compatible with both US law and European law; one privileging the security of the state, the other protecting the privacy of the citizen.
While large companies have the resources to finance their adaptation to the digital economy, SMEs are struggling to make the digital shift, which is crucial for them. Indeed, it has a major impact on their internal processes, marketing, customer relationships and their business model. The following questions arise quickly:
Indeed, business model and operational processes must be adapted. The degree of digitalization must be taken into consideration to determine the purpose of the digital shift and help the company to redefine its business model. Moreover; the project can be planned.
The success key of this technological change is the adaptation of the corporate’s culture and business model. To define the most appropriate tools and introduce the right skills, a company strategy must be defined.
Innovation is not simply about acquiring technical knowledge. It does not have to be a marketing polish. the added value, it brings to the company and its customers is imperative . This involves new forms of collaboration. With his customer’s collaboration, the SME will be able to identify the digital tools which need to be implemented.
The advent of big data and connected objects technologies have favorized the digitalization. This has made it possible to move from the data collection to the data exploitation stage. In this new paradigm, companies are forced to rethink their infrastructure and business processes.
Innovation is becoming more complicated. Now the innovation is the result of the collaboration between companies. Digitization makes possible to deploy the most appropriate tools to enable this collaboration.
Digitization involves a change in the legal environment. A new adapted ecosystem is being set up. The laws on data protection are adapted to this new environment. Compagnies need to deploy the right tools allowing them to follow the new rules and laws put in place. Moreover; data protection laws must not be bridged. Our last article “Cybersecurity, loopholes for Small and Medium Enterprises.” give you more details.
Historically computer attacks was managed by IT teams. Today with the digitalization development, IT and telecommunications infrastructures are part of the company business. Therefore; now, the management has to take care about security.
Computer security budgets are increasing by 15% each year, while the security infrastructures are often used at less than 20% of their capacity. The actors in the computer security sector talk about costs between ten francs a year to one million for an XXL structure.
in most cases of hacking, human behavior has contributed actively. Most of phishing attacks such as the CEO scam use human behavior as a vector of propagation. Therefore; the exchange of information between all actors is essential. It allows to identify attacks behavior. In general, the most efficient measures against these attacks require the training of employees:
With the entry in force the May 25 in European union of the General Data Protection Regulation(GDPR), compagnies using customer files have the obligation to actively protect themselves against potential loopholes.
What are the obligations of a company in case of incidents on his databases?
The convergence of technologies (telecommunications and IT) has brought a drastic change in the IT and telecommunications departments operational procedures. Historically, the main functions of these departments were to make available and operate the infrastructure.
Cloud technology is disrupting the entire industry because of its operational impact.
The IT infrastructure become secondary; on the other hand, the offered services and the applications must be innovative. On this basis, new business models are developped and Processes of internalization and outsourcing are taking place.
To succeed in such a migration, it is necessary to define the specifications for the services providers. It is also important to accurately identify the impact on operational procedures. The formation of the teams will have to be considered.
For the implementation of cloud technologies, it is essential to implement a solution adapted to operational procedures and to identify the impact in order to minimize it. The solution must fit the business and not the other way around.
A key step to transform the migration in a success will consist in writing specifications for the Cloud services provider. The following points will have to be taken in account:
It is important that these specifications are written in a very professional manner and that they are the result of a very precise business analysis. As a startup or a small company, you cannot afford to have a full-time employee for such task. Cloud service providers propose to write these specifications in order to present to you one of their solutions as the solution. This way of proceeding is not optimal: Moreover; the choice of the solution will have to be as neutral as possible. An external consultant can be the solution: