Recent Blog Posts

A Bucket of Wings: A Case Study of Better-Informed Decisions

In my blog Use Data To Support Arguments, Not Arguments To Support Data, I articulated how better-informed decisions are typically made and the role that business intelligence (BI) should play. Shortly after I wrote the blog, I experienced a real-life event that clearly illustrates three main phases of “data-entangled decisions.”

 

Since my family likes to take a day off from cooking on Fridays, we recently visited the deli of our favorite organic grocery store. At the take-out bar, I noticed an unusually long line of people under a large sign reading, “In-House Made Wing Buckets. All You Can Fill. On Sale for $4.99, Regular $9.99.” Well, I love wings and couldn’t resist the temptation to get a few.

 

The opportunity was to add wings (one of my favorite appetizers) to my dinner. But instead of using the special wings bucket, I chose the regular salad bar container, which was priced at $8.99 per pound regardless of the contents. I reasoned that the regular container was an easier-to-use option (shaped like a plate) and a cheaper option (since I was buying only a few wings). My assumptions about the best container to use led to a split-second decision—I “blinked” instead of “thinking twice.”

 

Interestingly, a nice employee saw me getting the wings in the regular container and approached me. Wary of my reaction, he politely reminded me of the sale and pointed out that I may pay more if I use the regular container because the wing bucket had a fixed cost (managed risk).

 

Although at first this sounded reasonable, when I asked if it would weigh enough to result in a higher cost, he took it to one of the scales behind the counter and discovered it was less than half a pound. This entire ordeal took less than 30 seconds and now I had the information I needed to make a better-informed decision.

 

This clinched it, because now two factors were in my favor. I knew that a half pound of the $8.99, regular-priced option was less than the $4.99, fixed-priced bucket option. And I knew that they would deduct the weight of the regular deli container at the register, resulting in an even lower price. I ended up paying $4.02.

 

This every-day event provides a good story to demonstrate the three phases as it relates to the business of better-informed decisions and the role of BI—or data in general.

 

Phase 1: Reaction

When the business opportunity (wing purchase) presented itself, I made some assumptions with limited data and formed my preliminary conclusion. If it weren’t for the store employee, I would have continued to proceed to the cash register ignorant of all the data. Sometimes in business, we tend to do precisely the same thing. We either don’t validate our initial assumptions and/or we make a decision based on our preliminary conclusions.

 

Phase 2: Validation

By weighing the container, I was able to obtain additional data and validate my assumptions to quickly take advantage of business opportunities —exactly what BI is supposed to do. With data, I was able to conclude with a great degree of confidence that I had mitigated the risk that it was the right approach. This is also typical of how BI can shed more light on many business decisions.

 

Phase 3: Execution

I made my decision by taking into account reliable data to support my argument, not arguments to support data. I was able to do this because I (as the decision maker) had an interest in relying on data and the data I needed was available to me in an objective form (use of the scale). This allowed me to eliminate any false personal judgments (like my initial assumptions or the employee’s recommendation).

  • From the beginning, I could have disregarded the employee’s warning or simply not cared much about the final price. If that had been my attitude, then no data or BI tool would have made a difference in my final decision. And I might have been wrong.
  • On the other hand, if I had listened to the initial argument by that nice employee without backing it up with data, I would have been equally wrong. I would have made a bad decision based on what appeared to be a reasonable argument that was actually flawed.
  • When I insisted on asking the question that would validate the employee’s argument, I took a step that is the business equivalent of insisting on more data because we may not have enough to make a decision.
  • By resorting to an objective and reliable method (using the scale), I was able to remove personal judgments.

 

In 20/20 Hindsight

Now, I realize that business decisions are never this simple. Organizations’ risk is likely measured in the millions of dollars, not cents. And sometimes we don’t have the luxury of finding objective tools (such as the scale) in time to support our decision making. However, I believe that many business decisions mirror the same sequences.

 

Consider the implications if this were a business decision that resulted in a decision of $100 in the wrong direction. Now simply assume that these types of less-informed or uninformed decisions were made once a week throughout the year by 1000 employees. The impact would be $5 million.

 

Hence, the cost to our organization increases as:

  • The cost of the error rises
  • Errors are made more frequently
  • The number of employees making the error grows

 

Bottom Line

Better-informed decisions start and end with leadership that is keen to promote the culture of data-driven decision making. BI, if designed and implemented effectively, can be the framework that enables organizations of all sizes to drive growth and profitability.

 

What other obstacles do you face in making better-informed decisions?

 

Connect with me on Twitter (@KaanTurnali) and LinkedIn.

 

This story originally appeared on the SAP Analytics Blog.

Read more >

Malicious links could jump the air gap with the Tone Chrome extension

The new Google Tone extension is simple and elegant.  On one machine, the browser can generate audio tones which browsers on other machines will listen to and then open a website.  Brilliant.  No need to be connected to the same network, spell out a long URL to your neighbor, or cut/paste a web address into a text message for everyone to join.  But it has some serious potential risks.

Chrome Tone.jpg

Imaging being on an audio bridge, in a coffee shop, or a crowded space with bored people on their phones, tablets, or laptops.  One compromised system may be able to propagate and infect others on different networks, effectively jumping the proverbial ‘air gap’.  Malware could leverage the Tone extension and introduce a series of audible instructions which, if enabled on targeted devices, would direct everyone to automatically open a malicious website, download malware, or be spammed with phishing messages. 

 

Will such tones eventually be embedded in emails, documents, and texts?  A Tone icon takes less space than a URL.  It is convenient but obfuscates the destination, which may be a phishing site or dangerous location.  Tone could also be used to share files (an early usage for the Google team).  Therefore it could also share malware without the need for devices to be on the same networks.  This bypasses a number of standard security controls.  

 

On the less malicious side, but still annoying, what about walking by a billboard and having a tone open advertisements and marketing pages in your browser.   The same could happen as you are shopping in a store to promote sales, products, and coupons.  Will this open a new can of undesired marketing pushing into our lives?

 

That said, I must admit I like the technology.  It has obviously useful functions, fills a need, and shows the innovation of Google to make technology a facilitator of information sharing for people.  But, we do need controls to protect from unintended and undesired usages as well as security to protect from equally impressive malicious innovations.  My advice: use with care.  Enterprises should probably not enable it just yet, until the dust settles.  I for one will be watching how creative attackers will wield this functionality and how long it takes for security companies to respond to this new type of threat.

 

Twitter: @Matt_Rosenquist

IT Peer Network: My Previous Posts

LinkedIn: http://linkedin.com/in/matthewrosenquist

Read more >

Why Ransomware will Rise in 2015

Bomb2.jpgBe afraid. Seriously. Ransomware is growing up fast, causing painful disruptions across the Internet, and it will get much worse in 2015.


Ransomware is the criminal activity of taking hostage a victims important digital files and demanding a ransom payment to return access to the rightful owner. In most cases files are never removed, simply encrypted in place with a very strong digital lock, denying access to the user. If you want the key to restore access to precious family photos, financial documents, or business files, you must pay. 


An entertaining and enlightening opinion-editorial piece in The New York Times highlighted how an everyday citizen was impacted, the difficulties in paying the ransom, and how professional the attackers support structure has become. 

 

Everyone is at risk. Recently, several law enforcement agencies and city governments were impacted.  Some of which paid the attackers for their “Decrypt Service.” This form of digital extortion has been around for some time, but until recently it has not been too much of a concern.  It is now rapidly gaining in popularity as it proves an effective way of fleecing money from victims both large and small. 

 

With success comes the motivation to continue and improve. Malware writers are investing in new capabilities, such as Elliptic Curve Cryptography for more robust locks, using the TOR network for covert communications, including customer support features to help victims pay with crypto-currency, and expanding the technology to target more than just static files.

 

Attackers are showing how smart, strategic, and dedicated they are. They are working hard to bypass evolving security controls and processes. It is a race. Host based security is working to better identify malware as it lands on the device, but a new variant, Fessleak, bypasses the need to install files on disk by delivering malicious code directly into system memory. TorrentLocker has adapted to avoid spam filters on email systems.  OphionLocker sneaks past controls via web browsing by using malicious advertising networks to infect unsuspecting surfers.   

 

One of the most disturbing advances is a newcomer RansomWeb’s ability to target databases and backups. This opens up an entirely new market for attackers. Web databases have traditionally been safe from attacks due to technical complexities of encrypting an active database and the likelihood of good backups which could be used in the event of an infection. RansomWeb and the future generations which will use its methods, will target more businesses.  Every person and company on the web could come across these dastardly traps and should be worried.


Cybersecurity Predictions

 

In this year’s Top10 Cybersecurity Predictions, I forecasted the growth of ransomware and a shifting of attacks to become more personal. The short term outlook is definitely leaning toward the attackers. In 2015 we will see the likes of CryptoWall, CoinVault, CryptoLocker, RansomWeb, OphionLocker, Fessleak, TeslaCrypt, TorrentLocker, Cryptobit and others, continue to evolve and succeed at victimizing users across the globe.  It will take the very best security minds and a depth of capabilities working together to stunt the growth of ransomware. 


Security organizations will eventually get the upper hand, but it will take time, innovation, and a coordinated effort. Until then, do the best you can in the face of this threat. Be careful and follow the top practices to protect from ransomware:


  1. A layered defense (host, network, web, email, etc.) to block malware delivery
  2. Savvy web browsing and email practices to reduce the inadvertent risk of infection
  3. Be prepared to immediately disconnect from the network if you suspect malware has begun encrypting files
  4. Healthy regular backups in the event of you become a victim and must recover

 

Alternatively, if you choose not to take protective measures, I recommend becoming familiar with cryptocurrency transfers and stress management meditation techniques.

 

Twitter: @Matt_Rosenquist

IT Peer Network: My Previous Posts

LinkedIn: http://linkedin.com/in/matthewrosenquist

Read more >

Intel IoT and Jaguar Land Rover Collaborate on Autospaces 2025

The intersection of automotive technology and innovation merged on the Internet of Things (IoT) fast lane today with Autospaces 2025: Future Car Experiences, a symposium concluding an innovation-focused program sponsored by Intel and Jaguar Land Rover bringing together the Media … Read more >

The post Intel IoT and Jaguar Land Rover Collaborate on Autospaces 2025 appeared first on IoT@Intel.

Read more >

An interview with Ravi Iyer, IEEE Fellow and New Business Initiatives CTO

Our guest blogger for this post is Mark Francis. Mark is a venture lead in Intel’s New Business Initiatives (NBI) incubator, where he has spent the last four years developing new ventures focused on wearable computing and smart toys/games. Before that … Read more >

The post An interview with Ravi Iyer, IEEE Fellow and New Business Initiatives CTO appeared first on New Business@Intel.

Read more >

Using Electronic Data Exchange to Coordinate Care and Improve Member Experience

The health and well-being of any workforce has a direct impact on worker productivity, efficiency and happiness, all critical components of any successful organization. With this in mind, Intel has developed a next-generation healthcare program, called Connected Care, which includes an integrated delivery system based on a patient-centered medical home (PCMH) approach to care.

The shift to value-based compensation and team-based care is driving the need for improved collaboration and patient data sharing between a growing number of providers and medical systems. While we’ve successfully introduced the Connected Care program in smaller locations, bringing it to Oregon and the larger Portland Metropolitan area presented us with a common healthcare IT challenge, interoperability. Shah.PNG

 

Advanced Interoperability Delivers Better Experiences for Clinicians, Patients

 

Intel is using industry standards to address these challenges, geared towards advancing interoperability in healthcare. The ability to quickly share clinical information between on-site Health for Life Center Clinics and delivery system partners (DSPs) enables:

 

  • Efficient and seamless experiences for members
  • Informed decision-making by clinicians
  • Improved patient safety
  • Increased provider efficiency
  • Reduced waste in the delivery of healthcare, by avoiding redundant testing

 

These improvements will help us make the Institute for Healthcare Improvement’s (IHI’s) Triple Aim a reality, by improving the patient experience (quality and satisfaction), the health of populations, and reducing the per-capita cost of health care.

 

Kaiser and Providence Part of Intel’s Connected Care Program

 

Intel’s Connected Care program is offering Intel employees and their dependents two new options in Oregon. Kaiser Permanente Connected Care and Providence Health & Services Connected Care have both been designed to meet the following requirements of Intel and their employees:

 

  • “Optimize my time” – member and provider have more quality interactions
  • “Don’t make me do your work” – no longer rely on members to provide medical history
  • “Respect my financial health” – lower incidence of dropped hand-offs/errors
  • “Seamless member and provider experience” – based on bi-directional flow of clinical data

 

Now that we have eliminated the interoperability barrier, we can enable strong coordination between providers at Health For Life Centers (on-campus clinics at Intel), and the Kaiser and Providence network providers, enabling the ability to quickly share vital electronic health records (EHRs) between varying systems used by each organization.

 

In our efforts to deliver optimal care to every Intel employee, we sought solutions that would ensure all providers serving Intel Connected Care members are able to see an up-to-date patient health record, with accurate medications, allergies, problem lists and other key health data, every time a Connected Care member needs care.

 

Learn More: Advancing Interoperability in Healthcare

 

What questions do you have?

 

Prashant Shah is a Healthcare Architect with Intel Health & Life Sciences

Read more >