Over the years in work or at home you gain mentors or people you listen to or look up to for advice. During these years the most impressive point was given to me by a friend and respected individual that I have held dear to this very day and are simple guiding principles at work and home.
4 things I have held dear in life the simple principles:
Humility – Someone else obligation, Before the opportunity
Humility or humbleness is a quality of being courteously respectful of others. It is the opposite of aggressiveness, arrogance, boastfulness, and vanity. Rather than, “Me first,” humility allows us to say, “No, you first, my friend.” Humility is the quality that lets us go more than halfway to meet the needs and demands of others.
Firm adherence to a code of especially moral or artistic values
The quality of being honest and having strong moral principles; moral uprightness.
The condition of being unified, unimpaired, or sound in construction.
Respect – Hierarchy is not a proxy
A feeling of deep admiration for someone or something elicited by their abilities, qualities, or achievements.
Due regard for the feelings, wishes, or rights of others
Hierarchy is not a proxy for the interactions between one another Hierarchy is just a method of getting what needs to be done, done. Everyone is equal everyone has some in Hierarchy above them, next to them and below them, we should never ever forget this at home or at work.
Conviction – Honorable Intentions and Belief
A fixedorfirmbelief the act of convincing a person byargumentor evidence.
If you keep these things dear to your heart and wear them on your sleeve, the results can be surprising, when you compromise on any you compromise on all of them and you tumble down the slippery slope.
A lot of people say they have principles, and they might be able to rattle off some thoughts and points, but it’s more what they action and actually what they do which is more important. Not just the talk but the action speak larger than the words its what can bind you together or show how far apart you might be.
Teams, individuals, and your family need to be able to do amazing things each and everything minute of the day. Having these 4 principles, it has given me a baseline to reference against.
The surge in data growth through the convergence of technologies is mind blowing. The enablement of Wi-Fi, mobility services, online digital social interaction, cloud services, and information in general being created digitally instead of paper has knock on effects in our physical world around privacy and security of the data stored about us. (Mellink 2013
Some figures predict a 10 to 50 fold growth of the digital data world from 2010 until 2020 this is driven by the transformation of our lives and the world we live in. (EMC Corp 2014)
Privacy and Security concerns come hand in hand with the explosion of the new information age and the availability of data. Some of the areas that have particular focus are: medical records, credit and financial, consumer and our personal or social information such as photos. Medical Industry and Medical Records:
The medical industry collects information at every interaction this information about you can now be captured and stored in an Electronic Medical Record (EMR). The privacy and security comes about how that data is stored, used, is it given to insurance companies, do family members have access to the information, what happens if a screen with a patients information is visible to others and what if diagnoses are incorrectly recorded and communicated and how does this information get changed. (NitroSecuirty FairWarning)
You might be surprised that once in the EMR system the Doctor or Organisation becomes the custodian of the data. (Potarazu 2013)
Financial and Credit Information:
The safeguarding of you privacy and security of your data in the USA as an example is regulated by the Gramm-Leach-Bliley Act (GLB) but this is limited to the ability to opt out of sharing information onward with other 3rd parties or outside companies. (Privacy Rights Clearinghouse 2013)
Privacy is dependent on the privacy notice sent to the customer and has to be sent out at least once a year. The data belongs to the financial organisation and you have rights to object to in accurate information. The GLB act only applies to individual consumers and does not cover business accounts or information. (Privacy Rights Clearinghouse 2013)
Store loyalty cards might seem a great idea but you sign the rights away for the profile information that is collected to the organisation running the card. These companies are entitled to use that information as there business possibly selling it on to 3rd parties our using it to sell you other products and services. (Beckett 2014)
Personal, Cloud and Social Media:
Google, Twitter, Microsoft and Facebook have all come under fire for allowing data to be viewed or accessed by 3rd parties. (Sangani 2010)Privacy policies have not been tight enough in the past. The data for example on Facebook is also owned jointly by you and Facebook, Facebook owns any IP you give it because you gave it permission via the Facebook statement of rights and responsibilities. (Facebook 2013). Security is focused around the user protecting the data and access as much as possible themselves.
Summary / Conclusions
Analysts IDC estimate that only 20% of the digital world has protections around privacy and security and the level of protection varies globally, there is also much less protection in emerging markets. (Gantz and Reinsel 2012). The data and information is always owned solely by yourself when it is under your control and until you let it out to a third party. In the new digital world data privacy and security understanding is lagging behind the adoption and use. Information on how companies protect your privacy and security is varied and tends to be in the small print of privacy and security statements. When you have given over your data to a 3rd party in most instances the data is now owned by the 3rd party that is custodian of the data, you might have the rights to obtain a copy of what they hold and adjust in accuracies but not the rights for them to copy or use the data for their business purposes. (Pentland 2014). There is only one way to keep your information private and secure and that is not to share it in the first place, but is that really possible in the connected world we live in today, realistically probably not but could we change the model now?
Artificial Intelligence (AI) that incorporates Autonomous (Intelligent) Software Agents are being exploited more and more to resolve complicated challenges. The applicability of these solutions bring some benefits however, based on current focussed research trends and limitations associated, the opportunity and possibilities that this technology brings has not yet been fully realised. To look at this further we need to break down and understand the basic definition of what AI autonomous intelligent software agents are.
An AI autonomous intelligent software agents is anything that humans create that is capable of executing an activity based on information it perceives, (Carnegie Mellon University 2012) based on previous experiences and lastly is has to be autonomous to perform functions and make decisions how to execute the tasks it is asked to perform on its own. (Brookshear, Smith and Brylow 2012)
(Terziyan) Some of the current trend areas of focus and applicability for AI autonomous intelligent software agents are:
Simulation of interaction’s and flows: Simulating environment usage, Film making, Digital animation or Video Gaming – Multi Agent Simulation System in Virtual Environment (MASSIVE) is the ability to use intelligent agents as crowds, oppositions, or movement simulations around buildings or roads. (MASSIVE Simulating Life 2011) such films as iRobot, Avatar have used (MASSIVE Simulaing Life 2013) (Georgge 2009)
Interaction, Information retrieval, management and diagnosis: Agents that can communicate and create natural language speech responses, hypothesis generation, and evidence-based learning outcomes such as IBM Watson that is being used in healthcare diagnoses (Shacklett 2014)
E-Commerce platforms: Agents can be used in auction or buying sites such as amazon, ebay. Consumers can also use agents to shop for them, automated negotiations and decision-making. (Dignum et al. 2002)
Business process function management and planning: Planning or managing functions based on patterns of information such as scheduling on mass transportation systems. Scheduling or route planning of trains on the London Underground or analysis station patterns of movement. (Basra et al. 2005) (Skobelev 2011)
Some benefits of AI autonomous intelligent software agents based on the focus areas above can include:
Decentralisation of the tasks to agents allows each agent to execute tasks at their most reliable manner as they are able to. The agents are not tied to centralised system that will allocate and execute tasks as needed.
The capability to interact and connect to multiple systems and take feeds and react to information
Agents can become part of a large problem solving model by interacting with other agents
Some limitations of AI autonomous intelligent software agents:
Agents as stated are artificial creations that execute tasks assigned to them without doing anything greater than or less than the predefined task assigned.
Agents require input sensors to gather data, the more inputs the better the action can be defined and generate better outcomes. If inputs were limited the tasks can only be carried out based on simplest logic of the sensors available this could be limiting factor and could create errors. I.e. not creating enough complexity of the problem results in less complex answers. (Carnegie Mellon University 2012)
Example would be using IBM Watson as a doctor and only allowing it take inputs via speech. In this case if a patient had a chest infection and the patient said to IBM Watson “I have a temperature”, IBM Watson doesn’t have the ability to check the breathing of the patient’s chest that a regular doctor might have the result therefore from IBM Watson could be a wrong diagnosis to the patient “you have flu” instead of the a chest infection. (Shacklett 2014)
Developing technology such as Intelligent Software Agents isn’t easy and not that cheap to do, but over the past years this industry has grown significantly. Once they have been created though training an agent or creating groups of agents doesn’t need a very high level of skill. (MASSIVE Simulaing Life 2013) Therefore because of this companies have to see a business reason for using the technology to get a return on their investment. Software agents are in are actually more normal than we really think about.
Personal Assistants: Self-Contained systems that really look after that scheduling, organising and optimize people’s tasks. (Moraitakis 1997) (Salden 2013)
Visitor Hosting Systems: Carnegie Mellon University has a Visitor Hosting System. This system looks after events participated in by visitors at a site, and are organizes and coordinates through the cooperation of local agents with the visitors’ personal agents. (SYCARA and ZENG 1998)
Data Mining: This field is one of the fastest-evolving (as we read about Google and Facebook buying in to this technology) ones at the moment given the explosive growth of the amount of accessible information transmitted and received via networks and digital communications. (Bose 1998) (Yasemin 1999)
Network Management: Collaborative agents collect and exchange information on network statistics in order to achieve automation and optimization of network administration tasks these could be routing, access, service provisions, monitoring and statistical evaluation, within a global view or cloud platform. (Hermans 1996)
Air/Land Traffic Control: Multi-agent systems are installed in both controlling sites and travelling vehicles to help resolve control decisions in routing and scheduling. (Pinedo 1995)
Mobile technology: Agents to help with selecting and helping with finding frequently used functions or doing tasks (Mills and Stufflebeam 2005) (Intelligent and Mobile Agents Research Group)
Summary / Conclusions There are some outstanding use cases for AI autonomous intelligent software agents today and there is ongoing development and need to solve more and more complex challengers. This continuation and ongoing development of this technology in to new applications to support human lives, are being created all the time from mobile phones to films this also in turn sparks even more possibilities or ideas for this technology. The dream by some is to one day model human biology into a computing device thus no longer having a computing device be static logical thing but instead making a device that has “Intelligent and have the ability to think” and can even make decisions. One day this all might become reality and taking to a robot or system might become normal. (Brookshear, Smith and Brylow 2012)
Charles Aunger – “Why not choose and be bothered about the way we think about the IT Industry, IT Adoption Strategy, Architect, Vision, Cloud Computing”
IT technologists and leaders are the ones that can and should make a difference that’s what you’re employed to do. Keep thinking everything is possible
Moonshot thinking from https://www.solveforx.com/about/whatisamoonshot/
Moonshots live in the gray area between audacious projects and pure science fiction; instead of mere 10% gains, they aim for 10x improvements. The combination of a huge problem, a radical solution, and the breakthrough technology that might just make that solution possible is the essence of a Moonshot.
Great Moonshot discussions require an innovative mindset–including a healthy disregard for the impossible–while still maintaining a level of practicality.
We hope our Solve for X speakers inspire people to work on solutions to seemingly insurmountable problems. We selected speakers who answered the three Solve for X questions particularly well or are finding a way to drive Solve for X thinking.
Most of the speakers are working hard on making their <x> a reality. Others are giving proposals for moonshot projects but have no current plans to tackle them. Perhaps you and a small team can build on these proposals and make them a reality.
If Random Access Memory (RAM) in computing systems was almost unlimited as it might be in the future, this would have a significant affect the way data or files are accessed, stored from a performance, structure, availability and longevity perspective.
RAM is available in two types, Dynamic (DRAM) and Static (SRAM). DRAM most common in computers today. DRAM is required to be refreshed with data every few milliseconds whereas SRAM is used as cache memory due to it begin a lot faster than DRAM, secondly SRAM does need the data refreshing like DRAM does. RAM is a volatile type of data storage effectively data is only available while the memory is powered.
File structure is the definition how data is structured, organised and stored in secondary memory. These file structures are usually created and organised to minimise the impact on I/O from disk access.
Benefits of a RAM in memory computing systems:
RAM is very quick at reading and writing date to run applications. (Trivedi 2013).
Accessing data with RAM is possible in any order thus the need for organising and structure data for time saving to increase I/O performance of external storage would no longer be required. (Paredes and Scoutapp 2011)
The need for programs or algorithms to guess what data or files might be needed to be accessed ahead of time i.e. pre-reading or queuing (Brookshear, Smith and Brylow 2012) ahead information from disk to increase performance would also no longer be required instead all the data would be longed in to RAM at one time. (McQuain 2004)
In memory computing becomes reality applications no longer load or query parts of data stored on secondary storage instead the application code access the data loaded as whole into memory. (Savitz 2013)
There would be no need in a RAM only system to create data indexing caches or files that are periodically updated as files or data structure changes. Instead more complex querying algorithms and multiple dimensional complex analytics can used on large data or file sets in memory with near immediate responsiveness. (Janssen 2014) (Elliot 2013)
A drawback of a pure RAM based system would be relating directly to the fundamentals of RAM itself:
Due to RAM’s defined volatility the system would have to have ways of loading an exporting data very quickly to secondary storage so not to be lost in case of restart or power loss. (Trivedi 2013)
Storage devices would be significantly be impacted by the change in methodology with the availability of more in memory type computing systems.
Storage devices would have to continue to store more and more data and files but moreover the devices would have to be able to act as back up devices instead of tape type devices. With the volatility of RAM memory secondary storage devices to load from offload from will still be critical and needed. Where we have tape, CD-ROMS and hard drives with disk platters today (McQuain 2004) in the future these will be to slow and not big enough to store the data. New types of storage will have to store large amounts of data in smaller physical space such flash or crystal storage 360 TB/disc data capacity and read at light speed such. (University of Southampton 2013)
Storage will change tape will relatively disappear, disk will become the archive method or old tape, flash Memory or new storage types will become the secondary storage and memory will become primary storage. (Candan 2011)
In memory or RAM systems effectively that are not using the disk secondary storage types that are available today would have effect of reducing power and cooling requirements in a system environment. IBM showed that memory is 99% less power that spinning hard drives. (Elliot 2013)
In the future new storage methods or even more advanced technologies might be used to support the move to RAM based computing systems:
These technologies might include:
Memristors work by remembering a previously-applied charge in the form of a resistance when a charge in the circuit is reversed.
Phase-change memory (PRAM) uses heat to exploit the unique behaviour of chalcogenide glass to switch between an amorphous and a crystalline state, thereby storing binary data.
Racetrack memory or domain-wall memory (DWM)
Racetrack memory or domain-wall memory (DWM) offers higher densities than flash and performance similar to that of DRAM.
Atomic memory Atomic scale memory uses a scanning tunnelling microscope to perform this feat – and one would be needed in order to read the memory.
Summary / Conclusions
In memory computing will happen it is happening today but will become more prolific over the coming years as great performance for all types of data and file access is required. Significant rethinking and use of algorithms and complex querying will be enabled. Persistence of data and retrieving data in to memory is an issue today but is being overcome by the change of traditional storage devices to flash or new types of storage based devices and more this type of storage becomes mainstream and standard the more performance at the computing level will be require thus more in memory computing systems will be used.
BROOKSHEAR, J Gleen, SMITH, David T and BRYLOW, Dennis (2012). Chapter 8: Data Abstractions – Lists, Stacks and Queues. In: HORTON, Marcia (ed.). Computer Science – An Overview. 11th ed., Addison-Wesley – Pearson, 341-345.
BROOKSHER, J Gleen, SMITH, David T and BRYLOW, Dennis (2012). The Concept of an Algorithm. In: Computer Science – An Overview. 11th ed., Addison-Wesley – Pearson, 189-200.
During life we have to think about the assumption that the words we write could be classed as intellectual property in the western world we create laws and rules to govern ownership of intellectual property. The trade body World Intellectual Property Organisation looks at intellectual property as “industrial entities who’ve had the contours of their regulatory monopolies violated,” or “people who’ve had their property stolen”. (World Intellectual Property Organization, 1967)
However ideas toward intellectual property have changed over time (Bowden, 1996). Are our words, actions, creations that we create constructed on information that has been founded on knowledge that each of us learns, has it taken in and then replayed as and when we need it, even paraphrasing to complete our tasks and actions at home, office, or academic life?
Globalization and the use of the internet now as a source for information, learning (online education), entertainment and news, has become popular from 2000 – 2012 growth of 566.4% and approximately 34.3% (Miniwatts Marketing Group, 2014) of the world population now has access to the internet. This ubiquitous access to information has changed the way people think about information and data ownership. Just as the internet was setup to be an information sharing hub so users could connect and share materials: the definition “Internet: providing a variety of information and communication facilities to its users” (Oxford University Press, 1974). So the thought of the internet being a sharing mechanism has led to the thought materials are shared, publically available for download and therefore are available to be used when they might actually be copyrighted, protected under confidentially or even someone else’s work.
The newer generations might see the internet as an open and sharing environment and don’t see an issue with taking a selfie or copying someone’s work because of the belief that once it’s has be put on the internet it’s available to everyone to use unless explicitly marked, they believe you can access it then the materials are “Public Domain” that it has been made available on the internet for public interest.
How this effects companies and the workplace can be hard to enforce or create understanding on. As an employee joining a company or a student joining a course you might sign a confidentially agreement, code of conduct stating you will obey the ethics rules and material usage rules. These rules might outline the materials are not yours they are the organisations even when you’re at home because the organisation could have allowed you to learn what you leant and you have used that learning to create your thoughts. This thought is now becoming harder and harder to understand for people as we have seen we spend more time connected to each other. Leaks on Twitter or WikiLeaks or using information can cause direct and indirect effects, people are held accountable for leaking or using materials even if they are no longer with that company. The Edward Snowden leaks from the US National Security Agency in 2013 showed interesting thoughts again toward information that was leaked, copied and published in the name of public interest and once available were then redistributed, republished and copied even more. (DESILVER, 2014)
Bowden, D., 1996. Stolen Voices: Plagiarism and Authentic Voice.. Composition Studies/Freshman English News, 24(1-2), pp. 05-18.
DESILVER, D., 2014. Most young Americans say Snowden has served the public interest, Washington: Pew Research Center.
Macfarlane, B., 2009. Researching with Integrity: The ethics of academic equiry. NewYork: Routledge.
First of all if you can remember the Commodore 64 (C64) a 1Mhz, 8 bit, 64k RAM (Commodore Computers, 1983) computer created by Metal Oxide Semiconductor Technology (MOS Technology) also known as Commodore Business Machines (Veit, 1999) should be listed as one of the most symbolic and state of the art personal computing systems of the 1980’s. The C64 was focussed to provide a great video game machining experience, outstanding performance and value for money compared to the other market players of the time.
· In January ‘1981 engineers decided to produce a state-of-the-art video and sound chip. The VIC-II 6567 video chip and the SID 6581 sound chip were created to be the most powerful chips of their time. The C64 equipped with these chips was able to display 16 colours and be reproduce a human voice without additional peripherals. (Matthews, 2010). Personally the game I enjoyed was a flight simulation called Ace of Aces (Personal Computer Museum, 2006) Ace of Aces very simple compared today’s 32bit graphics and millions of colours in say Flightgear (Flightgear Flight Simulator Project, 2010 – 2014)
· Initially called the VIC 30 the C64 design started 1981 and main production ran from 1982 through to 1989 (Matthews, 2010) (Bagnall, 2005) even today not many machines can say they have lasted that long in production the Apple iMac G3 lasted 1998-2001. (Edwards, 2008)
· The C64 made it into the Guinness Book of World Records in 2007. As of 2006 the C64 was the “Greatest selling single computer of all time”. Sources count units sold between 12 and 17 million (Peggy Mihelich – CNN, 2007).
· The C64 priced at $595 was less than half the price of the Apple II at $1395. (Commodore Computers Canada, 1983) and establish an estimated dollar value market share in the US of 43%. (Personal Computer Museum, n.d.)
Apple iMac G3 computing system should be badged as the system that ignited the drove colour into the personal computer industry and enable internet experience. What also made the iMac a focus was it marked the return of Steve Jobs as Chief Executive Officer (CEO) role.
· The iMac G3 design was led by Jonathan Ive (Arlidge, 2014) and Steve Jobs. Steve jobs launched and marketed the iMac in 1998 at Macworld (Channel, 2006). The marketing line most generally associated with the iMac G3 was it wasn’t another ‘beige box’. (Edwards, 2008) Still today you don’t see many beige box computers mainly grey black or coloured. (Lohr, 2002)
· The iMac G3 was launched 1998 and discontinued in 2003. The G3 name came from the PowerPC 750 G3 processor, and coupled with an ATI Rage graphics card creating excellent rendering performance. The newest generations have replaced the PowerPC chip in favour for Intel chip sets. (Simon, 2009)
· The main case colour was “bondi blue” but later thirteen colours became available. Today nearly all Apple Mac products are White, Silver no more bright colours but still no beige (Simon, 2009)
· Making iMac G3 more user-friendly, with attractive design translucent back and at the time of i for internet, built in browser and modem enabling internet access brought Apple in to the future, on this Steve Jobs interim CEO 1997 (Stone, 2011) started to rebuild the company. The built in speakers and internet access was personally a simple and easy to use experience.
Information Technology Service Providers use of Service Delivery Methodologies as a Trend in delivering successful IT Project.
Information Technology (IT) Service Providers Service Providers are companies that provide other organisations with augmented ranges of IT services to enhance or supplement the organisation internal staff, IT technology delivery or IT technology needs. The services provided can range from delivering simple services such as IT desktop support through to more complex technical consulting, application development, or datacentre solutions.
The IT service provider’s capability to successfully deliver these simple or complex IT projects to the organisation they are employed by can be aligned to two distinct items.
1) The use of the correct IT service delivery methodology:
An IT Service Delivery Methodology is a repeatable and extensible framework used to rapidly design, deliver, measure and improve your IT services. (Smith, 2010)
The service delivery methodologies that the IT service providers use are varied and can be made up of parts from many methodologies as well as industry standards. Key methodologies in use in IT service providers and IT departments are Rapid Application Development (RAD), SCRUM, Waterfall development, Prototyping, ITIL, TOGAF, Prince 2, Six Sigma, ISO 27000 Series (International Organization for Standardization, 2005). (ABC-Groep, 2011).
2) Correctly defining the key success criteria for the IT project and thus the IT Service Providers goals and objectives:
Defining a success criteria and what makes up what success is for the IT project and therefore the success of the IT service provider can usually be split into standard categories the main ones being “Business, Project Management and Technical Success” (SYMONDS, 2012). As well as these standard categories reporting on Key performance indicators (KPIs) are common (Suchan, 2003), an example of a KPI would be in an IT project “Reduce infrastructure costs by 10%” or “Increase application performance by 15%”
Delivering an IT project by identifying or not the correct service delivery methodologies and the success criteria’s can lead to a success or failure of the IT project. Identifying and aligning all parties involved in the IT project with the IT service provider’s service delivery methodology chosen and success criteria from the start of a project to an end of a project can streamline and drive toward having successful outcome.
Three summary areas or questions that can benefit and help to identify the correct service delivery methodology and success criteria’s
Three summary areas or questions that have worked toward streamlining and assisting identify the correct methodology and success criteria’s thus creating a framework for success and reducing miss-understandings are:
WHY are we:
Wanting to do the IT project?
Why should we use a specific methodology?
HOW are we going to:
Identify the correct methodology?
Align everyone and stay aligned to this methodology?
Execute on this project?
Measure we are succeeding?
Manage miss-alignment and change?
Methodology are we going to use and stick to?
Are we going to report on?
With so many methodologies and criteria’s used there can be misunderstanding based on lack of knowledge or disagreements based on miss alignment. Once alignment has been created on these two distinct items Methodology and Success Criteria IT Projects and IT Service Providers can be focussed more on the delivery and execution of the project and successful outcome.
ABC-Groep, 2011. IT Buzzword Bingo, Ekeren,Antwerpen, : s.n.
International Organization for Standardization, 2005. ISO 27000 Series, Geneva: International Organization for Standardization.
Smith, D., 2010. itsmf – Service Excellence using an Integrated Service Delivery Methodology. [Online]
WHY NOT BE PASSIONATE AND MOTIVATED ABOUT INFORMATION TECHNOLOGY (IT)
Why not wake up every day, forget yesterday and think about how I can make a difference for customers today and in the future. I have a strong passion and belief that each one of us is looking for a life experience every day. In an Information Technology (IT) driven world the focus of the experience relates to a physical technology, usage interaction and support personality experience, this is what can build confidence, enjoyment, relationships, support change and fuels the ability to deliver amazing results.
With this in mind, I believe that everyone is a consumer be it a college, other business user, a vendor, or everyone that we interact with. The way we think about and use IT and innovation, be it in business or personally, can be an amazing enabler as long as the vision, strategy, and technology are correctly executed. Delivering the right technology and innovation are the only methods that can truly support change or radically impact a company’s P&L, as well as improve our lives. I often say, to my team to think like the Chinese saying “From Crisis/ Issue becomes an opportunity”. Therefore we should stop highlighting the crisis and figure out why there is a crisis or issue existing and the work on solving this using the best basic principles of how do we deliver for the customer / user the right service in the best possible time with the best quality, keeping it simple and supportable.
The opportunity is that change is a given, we can’t stop change. Actually every day we enable change so instead of fighting change we need to embrace and work in an adaptive, agile manner to make change easier.
Question: Isn’t there something in life that we should have a passion about. I would ask myself why we aren’t all aligned on WHY’s not HOW’s and WHAT’s, why are we doing what we are doing and how do we make IT happen?
“IT isn’t easy but IT can be rewarding in lots of ways”`and the “Hope to make IT, better, simplier, faster and cheaper”
The Naked Brand takes aim at traditional advertising and its future. With their constant use of technology and social media,
today’s consumers are smarter and more invested in what they buy and marketers are taking advantage of this newly
empowered customer by creating transparent and positive stories about their companies and products. (Source: Bloomberg)