Story image

Three tips for creating a digital transformation roadmap

24 Oct 2017

The benefits of shifting to a more digital environment are well known, but actually getting started on this journey can be anything but simple.

That’s according to Paul Timmins, global director Microsoft, DXC Eclipse, who says it’s hard to know where to start or what areas to focus on for the greatest benefits when undergoing digital transformation.

“Mapping the path to digital transformation is the most important step for success. Getting the plan and approach right can make the difference between a successful transformation project that propels the business forward, and one that costs time and money without delivering the promised benefits,” says Timmins.

The first step is to take stock of the business’ current situation versus the desired state, a critical milestone in establishing a business and technology roadmap, explains Timmins.

“Without a roadmap, businesses could find themselves going down wasting time and money on solutions or approaches that don’t work for the business, or, as is often the case, may work well now but can’t keep up with the business’s growth into the future.”  

“It is essential to have a strategic plan in place to make sure the digital journey accounts for the present and future state of the organisation, with a focus on business objectives first and foremost.”

Timmins suggests three points for businesses to consider when creating their digital transformation roadmap:

1. Enable the virtual environment

Businesses today are staring down the barrel of the digital revolution, which is driving shifts in the way people work and collaborate rather than just focusing on the technology itself.

Geographic location and time zones, for example, are no longer a barrier because businesses are essentially working in a virtual environment where anything is possible.

2. Deliver the flexibility people demand

Work isn’t a destination; it’s merely an activity that people expect to be able to do from anywhere.

This changes the expectations for all stakeholders including employees and customers. There is plenty of technology available to help meet these expectations.

3. Strike a balance between user demands, available technology, and business goals

The challenge for business leaders is to balance the demands from people and the technology from vendors, as well as the business goals, and to make all three work together.

This means only choosing technology that serves the business goals as opposed to implementing technology just because it’s new or interesting.

Gartner: NZ server grows at same rate as shipments decline
In New Zealand, server revenue grew by almost 50% in the 4Q18 compared to the same quarter of 2017, while shipments declined 43.3%.
NVIDIA announces Jetson Nano: A US$99 tiny, yet mighty AI computer 
“Jetson Nano makes AI more accessible to everyone, and is supported by the same underlying architecture and software that powers the world's supercomputers.”
Unity and NVIDIA announce real-time ray tracing across industries
For situations that demand maximum photorealism and the highest visual fidelity, ray tracing provides reflections and accurate dynamic computations for global lighting.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
How Dotscience aims to deliver end-to-end governance
NGC is supposedly the hub of GPU-optimised software for deep learning.
HPE launches 'right mix' hybrid cloud assessment tool
HPE has launched an ‘industry-first assessment software’ to help businesses work out the right mix of hybrid cloud for their needs.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.