Business advice from industry experts


This is a sponsored post on behalf of Microsoft Cloud who have been working with The Economist. To find out more about sponsored content on Technology Bloggers, please visit our Privacy Policy.

Multinational business magazine The Economist has been working with Microsoft Enterprises business solution, Microsoft Cloud, to create a micro site called Empowering Business.

The site contains some very interesting bite-sized video snippets of business advice from industry experts. In this article I’m going to explore some of the advice that is offered on the site.

Marketing

Professionals in a meetingIn under 30 seconds, the CMO of technology news site Mashable, Stacy Martinet, explains how businesses can control their own publicity channels. Historically, businesses have been dependant upon buying advertising, or relying upon the media to cover their brand. Now however they can control – to a much to a much greater extent – what messages they send out, when they send them and how; through the use of blogging, social media and other forms of new media. This has fundamentally changed the way we (consumers) perceive organisations, and also how they market themselves to us.

On the Empowering Business site, Stacy Martinet also explains what she believes is the biggest mistake made by marketing professionals. She believes that thinking about marketing campaigns in an old fashioned way – running a project for a set period to achieve specific results – is a mistake. She suggests that businesses today should focus on constantly and consistently building and improving their brand(s) on a 24 cycle, rather than focusing on producing a specific return every 3 or 6 months.

Technology

Liz Crawford, CTO of beauty subscription service Birchbox believes that having a good understanding of your market and then being able to use technology to your advantage, to make your organisation more efficient, more effective and more innovative, is the key to being a successful Technology Officer.

Economist Advice Centre screenshot

The Economist in Partnership with Microsoft Cloud – Empowering Business

Leadership

Senior Lecturer at MIT School of Management, Claus Otto Scharmer, suggests that self-leadership is a skill that every leader needs. He states that before you can lead others, you need to be aware of how to lead yourself. If you can assess yourself to enable to you understand what you do and how you could improve, then you can transfer this knowledge into how you can make other people better too.

Human Resources

HR Consultant Jessica Miller-Merrell, from Xceptional HR, explains how company culture is a bottom-up phenomenon. She suggests that many high level mangers believe that they can dictate company culture from the top-down. Jessica states that because the employees are the culture, managers must get employee buy-in for an organisation to change how it operates.

Information technology security and business

This article is written in partnership with Dell. To find out more about promotional content please visit our Privacy Policy.

Technology has had an undeniably colossal affect on how we do business. We can now communicate with people around the world in real time, pay for goods with the swipe of a card or click of a mouse and download files from the cloud with the push of a button.

Like with most things in life though, technology does have its downsides. Historically, technological problems have centred around speed and reliability. Thanks to advances in programming, processing power and cabling, technology is now faster and more reliable than it has ever been. This is also in part thanks to more people becoming ‘tech savvy’. People expect more of technology, and more people are working to improve it. As such, the age old issues of speed and reliability which have plagued almost all forms of technology, are no longer under the spotlight. I would argue that security is now a bigger issue.

A padlock on an ethernet cableThe growth of the global tech savvy population means that more people understand how technology works, which is great in some respects, but from a security perspective, it can be concerning. If your employees know how to access confidential files you store on your server, or your customers are able to apply 99% discounts to products in your online shop then you have a problem.

In 2014 eBay was one of the most high profile victims. Vulnerabilities in Javascript and Flash code on some listing pages enabled hackers to steal users information, post fake listings and redirect visitors to fake payment pages. In 2013 Sony was fined a quarter of a million pounds by the ICO in the UK for compromising customer details in a 2011 data breach.

In it’s recently released business security e-book, Dell state that they believe many of the security problems we face today are because businesses use fragmented systems and they use a different security solution to protect each one. Whilst your payment system might be completely watertight, if it’s linked to your website, which happens to contain some vulnerable Java technology, then hackers may be able to crawl into your systems. To quote Dell’s Director of Product Marketing, Bill Evans “Patchwork solutions that combine products from multiple vendors inevitably lead to the blame game“. He goes on to say that when using fragmented systems, each vendor “is responsible for only part of the problem” making it very difficult to properly secure your systems.

There are many different solutions for companies out there. As a business you could ground yourself firmly in the first half of the 20th century and refuse to adopt technology of any kind. After all, if all the details on your client, Mrs Jones, are kept in a file in filing cabinet 35B on the sixth floor of the of your customer information storage centre, a hacker cannot squirrel their way into your network and then publish Mrs Jones’ details on the Internet. That does however mean that when Mrs Jones pops in to see you, you have to keep her waiting for 20 minutes whilst you go to find her file – as opposed to typing her name in and pulling up her details on your tablet.

There are often benefits of using software and technologies from different vendors, and it would be foolish to dismiss a good business system just because it has a few minor potential security floors. The challenge then is to find a security system than can protect your new technologies.

A security key on a keyboardUsing a single, comprehensive security system, such as Dell Endpoint Security to protect all your information technologies would help top alleviate many of the problems that arise when using a patchwork network of security systems. Using one system would instantly eliminate conflicts between security software. It can also be much easier to manage one unified system than trying to juggle several separate schemes.

Naturally each individual security system may have some specific advantages that one universal security system may not, but the fact that a universal system is just that, universal to all your businesses technology, is a huge advantage.

Dell believes that all good universal security systems should: protect the entire business both internally and externally; comply with all internal policies and indeed national laws; and enable employees to adopt technologies with confidence and ease, promoting efficiency and innovation.

What are your views on business technology security? Let us know in the comments below.

What’s in Your Computer (and phone, and WiFi)?

gates

Lenovo

This week the news is full of Lenovo, a computer manufacturer that has been selling machines that they have already fitted with what some call Malware or just Adware. Magic in the machine indeed!

The mal/adware in question is made by a company called “Superfish.” The software is essentially an Internet browser add-on that injects ads onto websites you visit. Details here.

Besides taking up space in your computer, the add-on is also dangerous because it undermines basic computer security protocols.

That’s because it tampers with a widely-used system of official website certificates. That makes it hard for your computer to recognize a fake bank website. This means that you are more likely to give all of your personal data away, let nasty things into your computer, and allow people to monitor your use.

No good I hear you say, and all so that they can feed you adverts while you are browsing.

Hidden Extras?

But this news does bring up another question, what else is in the computer? What else is it programmed to do? The simple answer is that I and probably most of you do not know. We have bought a machine that does the things we want it to do, but who knows what else?

Now as I eat my breakfast, I like to read the ingredients on the side of the packet. It is good for language skills as it is usually in several languages. But can I do this with my computer? You don’t get much in the way of documentation with a $400 laptop. Certainly not considering what is inside it.

So the computer company in question have disabled something at their end and the problem is resolved. But if they tell you that they fixed the problem are you going to believe them? After they did something that put your computer and everything saved on it at risk? Or should you put a new operating system on the new machine, wipe the hard drive and start again?

Why do we trust these manufacturers when they consistently do things that are not in our interest? WiFi providers that con your computer into trusting fake certificates so that they can block certain sites (and read your mail or follow your searches)? Samsung that record your voice through your smart TV and send it non encrypted over the Internet to unnamed third parties, social media sites and search engines that collect your data, mobile phone companies that map your every movement, the list goes on.

So if you cannot trust wifi, or computer manufacturers, or Google, or Facebook, or Samsung to treat our data securely and correctly, who can you trust? And more to the point why are we giving them our lives to play with?

Misshapen Food

bendy-marrow

More About Food Waste

I read with interest this week that leading UK supermarket chain Asda is starting to sell oddly shaped vegetables in a bid to waste less food. This announcement leads me to draw a few conclusions that I would like to share with you all, and brings back a few memories.

My mum and dad had 3 boys to bring up, in the dark shadow of the mills of Manchester, and they probably weren’t what we would call rich (today). Every year we went to Skegness for our summer holidays, and every Sunday went to the market.

Markets were a different thing then I think, everyone went. My mum used to buy her biscuits there. She bought them in a bag, a huge bag a bit like the ones we use today to put the rubbish in. The biscuits were broken. They had not made it into the boxes in the factory, were collected up and sold in huge sacks for next to nothing (I presume).

There was a chip shop too that put batter bits on your chips if you asked, the crumbs that had fallen into the fat off the fish, lovely.

As I became some form of adult I continued the tradition. A local chocolate maker sold bags of ‘misshapes’, again chocolates that had come out of the mold wrong, had treacle dribbling out of them or had got squashed. The same chocolates that cost a fortune in their branded high street shops.

Surely this must be a good way to use the wasted ones, although there is the issue of supply and demand that I raised in my previous post about food waste.

Vegetism

So back to Asda. They are going to sell strangely shaped vegetables for less than their regularly shaped cousins. Are they going to sell them for less though because maybe they are worth less (or worthless)? This is a strange idea for sure. They are all fresh vegetables, they all contain exactly the same nutritional value, you can cook them all and they all taste the same, so why sell them for less?

Well we live in a society here in Europe that has engineered a situation in which only certain shapes are good. You might recall I mentioned ableism in a recent post and it certainly isn’t difficult to see how the human figure has been moulded into an ideal type, with all variations somewhat frowned upon or in need of correction (particularly I feel in the case of women).

And this is also the case for vegetables. In this case aesthetics is enshrined in law, as the European Union has regulations about the size and shape of fruit and vegetables. These regulations were ridiculed in the popular press ten years ago as it was said that straight bananas could not be sold. Read all about it here.

And vegetables come in at least 3 categories; nice looking that go into supermarkets, not so nice looking that go into processed food production, and unfit for human consumption, that go into animal feed. But it can all be used, you get less for the ugly ones however.

So producers have always been able to sell these vegetables, but for different uses and at different prices, so I must come to the conclusion that this is a marketing ploy in order to sell them for more. Just my opinion of course, but cynicism runs deep in my line of work.

It would be great to see them though in with their cousins for sale all together at the same price, but reports are that they are often left on the shelf to rot. Apparently people prefer a correctly curved banana to a straight one, and a straight marrow to the one in the photo above.