Every single wave of VR/AR innovation and products has come only a small step closer to real mass adoption. Will the latest wave of self-contained mobile VR/AR (short history below), finally, provide the long-awaited breakthrough? Big players such as Facebook, Google and Microsoft have already, publicly, entered the ‘arena.’ It seems the biggest tech company is missing in an alternate reality…

BIG players competition

Google, Microsoft and Facebook are all well aware of the possibilities and see a huge market for AR/VR. They are not about to miss the opportunity and are positioning their solutions for a big chunk of the pie. While Google is ‘jumping in’ with rich experiences accessible via YouTube and overlaying information with the temporarily-discontinued Glass, Facebook positions VR/AR as the next logical step after sharing text, photos and videos as sharing entire experiences and adventures.

VR-AR Image

Microsoft continues its new strategy to enable their solutions everywhere with the HoloLens. It is to be used, both as a functional assistant and as an entertainment experience. All running on Windows 10…

Do we really need this?

Sometimes it feels like, this VR /AR technology is looking for a problem to solve. I find it rather amusing to see demos of Virtual Reality where we are dropped inside the Oculus Rift in an empty theater just to watch some kind of movie on a screen far, far away. That doesn’t seem like the future to me. Rapid design evaluation, interaction with virtualised prototypes, travel experiences and an assistant on complex operations feels much more logical. That is exactly how Microsoft, and more or less Google, is positioning it.

Apple Reality

It leaves us with the famous question: What is Apple doing? In my opinion, it is not something they want to be left out of, they have to be a part of this. Although, Apple apparently holds several patents on Virtual Reality, we have yet to see them join the battle in this world with real VR/AR products and services. Apple, recently, acquired a German Augmented Reality company Metaio, which is more screen-orientated than head-mounted for now. That truly feels like a step back to the mobile screen AR of Layar instead of the more immersive experiences of HoloLens and wearable Glass overlays.

What do you think? Is this wave of self-contained mobile VR/AR the the long-awaited breakthrough; or, are Facebook, Google and Microsoft too early? Is Apple missing out or are they just waiting to join the VR/AR party at the right moment?

A … very … brief history of VR

Ever since we have computers, we are looking for some kind of simulation of reality. In my previous job, as a Technical Manager of a Virtual Reality company, I have seen all kinds of tools and gadgets for simulating an artificial environment. Either to replace it completely (Virtual Reality) or to overlay info over the world around us (Augmented Reality). The slow level of adoption always disappointed me. It seemed that it was just too early to go mainstream, every time. From my early entrance in VR in the 90’s, I have seen the following five waves:

  1. Dedicated Hardware

In the 90’s, we needed special, rather expensive, hardware like the Onyx from SGI. Those computers with the size of a desk refrigerator were amongst the only hardware capable of doing 3D transformation in hardware. They ran their own proprietary Unix based operating system, but then OpenGL was already used for the simulation.


  1. The move toward Windows based PCs

In the late 90’s, the first Windows based PCs were built with a dedicated video card that used the OpenGL interface for visualisation in hardware. Among the most important was Intergraph, which later sold the 3DLabs division to SGI. Finally, we had the real simulation power on our desk. It was the time that Microsoft was getting initial traction with early versions of Direct3D and there were even talks about blending Direct3D and OpenGL to create one unified approach to use visualisation hardware. This was also the time of the first commercially-off-the-shelve head-mounted displays. Ironically, they were called the iGlasses…


  1. Going Online

The rise of the Internet and the accompanying bubble also lifted VR from the desktop to online. Huge worlds were created with VRML and the online worlds like Second Life and my personal favorite were opened. The latter was exactly the same size as earth and, for that clear reason, the US Department of Defense contracted the parent company to set up a specific defense-oriented branch. Around this time, America’s Army was also opened as an online game that was meant more as a recruitment tool than an actual simulation.

Online Game

  1. Going Mobile

With the Google Glass, AR went mobile, although still connected to our most personal computer – our smartphone. The screen of a smartphone is also used in the Oculus Rift, which was acquired by Facebook for US $2B. The smartphones also became our mobile displays in Google CardBoard Virtual Reality. Recently, Google even introduced a new way of recording experiences in a full 360 view withGoogle Jump to be experienced with our cardboard like viewers.

wearable - VR-AR

5. Self-contained Mobile

While Google pulled Glass back to the drawing board, Microsoft introduced the HoloLens, a self-contained Windows computer with an advanced Holographic engine and display system. This superimposes dashboards, widgets and gadgets over the real world in a somewhat large form factor. The Kinect-like engine and speech enables us to interact with the simulated environment.


To read the original post and add comments, please visit the SogetiLabs blog: Will Apple be mobilizing VR/AR?

Related Posts:

  1. Holy Moly HoloLens
  2. Apple bets on mobile payment
  3. What would Google do now that IBM and Apple are friends?
  4. Choose your own reality


Arnd Brugman AUTHOR: Arnd Brugman
As an innovator Arnd helps organisations with innovative project delivery - from the initial idea and inspiration through to the vision, strategy and roadmap all the way through to assissting with proof of concepts and pilots. He has significant experience with innovation, product development and service delivery.

Posted in: 3D printing, Application Lifecycle Management, Behaviour Driven Development, Big data, Business Intelligence, communication, Developers, Digital, Digital strategy, e-Commerce, Innovation, Microsoft, mobile applications, mobile testing, Mobility, Open Innovation, Opinion, Virtualisation, wearable technoloy      
Comments: 0
Tags: , , , , , , , , , , , , , , ,


Throughout industry, whether business led or IT led, the mantra still seems to be if you are not ‘agile’ then you can’t survive or rather succeed in today’s market place. But what does ‘agile’ mean? In my role, I speak to numerous companies, whether in a business development capacity or networking at industry events or after presenting at conferences. The views of the World are polar opposite, sometimes disingenuous or contradictory to manifesto guidelines. Some of the questions and statements that I hear on a regular basis include:

  • “Do you develop products or technology in an agile way?”
  • “Does your company adopt business agility models?”
  • “Are you a Scrum fan or Kanban? “
  • “Actually we operate lean principles “
  • “We’re not quite there yet, so we are more scrumfall than anything”
  • “It sounds good, but it’s just so difficult to be heard”
  • “We have a daily stand up every day”
  • “The business/IT Management just don’t get it”
  • “The pressure of multiple releases is just intense”
  • And my personal favourite “We’re so agile, we go beyond agile”

The objective of agile is no different to the objective of more traditional approaches I.e. a working product (Quality), delivered on or under budget (Cost) in an acceptable timeframe (Time) to gain advantage over competition, by increasing company reputation and trust as the ideal solution provider.

There is a lot of talk in blogs regarding how ‘agile’ must adapt to keep up with the ever changing demands of the marketplace. I’m not sure that I completely agree with that, from the examples above there is already confusion in the marketplace, so change for the sake of change may make the gulf in ‘maturity’ even wider. A good example of change, is the kudos that DevOps brings. If you ask 10 different people how to describe agile, you’ll get many different views. If you ask the same people to describe DevOps you’ll likely receive more than 10 views, as was proven in my office when we discussed what our testing offering could offer to a DevOps environment. Everyone had a view about what it was, though the biggest consensus gained was how to spell it!

For me, that is the bottom line, if your project, company or industry wants to operate in an agile way or adopt a certain flavour of agile, you need to lay the foundations, in affect define your individual manifesto and publicise it

“Working software over documentation” could translate to “working software with just enough documentation to meet our regulatory demands”

I could go on, but I think the message here is clear, to be agile, you need to collaborate. To collaborate, you need to know what you are working towards, define a top to bottom understanding within your organisation or project team to enable change, transform your approach, and deliver success, and if you want to badge this as ‘agile’ that’s fine too.

Working for a Global consultancy like Sogeti UK, where the majority of our business is in the testing space, when we are asked to assist with introducing agile testing to engagements, we look at the bigger picture. Trying to understand the landscape of the project and the company will determine the type of consultants that we deploy to the engagement. If a client needs to set their own manifesto, there isn’t much reason to deploy highly technical testers, as reputation could suffer if collaboration or rather the mechanics of the project are not smooth and delays occur or releases dates missed as the end game wasn’t known. Instead we’d look to utilise more rounded consultants that can embed into teams and coach and steer the team or company to defining “what looks good for us?” Setting the manifesto and expectations for all to understand and commit and collaborate too.

At Sogeti, we look to help companies achieve their own manifesto, through the use of workshops, involving senior stakeholders through to junior testers, with the objective of aligning objectives, and embedding consultants to assist companies with their transformation journey, to define an individual working ‘agile’ approach, irrespective of ‘flavour’ applied. At every step of the way, looking to support the needs as maturity I.e. Success is gained, to move to the seeming utopia of DevOps (I think that was the agreed spelling!)

If you’d like to find out more about the services Sogeti UK can offer, visit our website or drop me a line.

AUTHOR: Daryl Searle
Daryl is a Delivery Director at Sogeti UK, primarily working with financial services clients. He is both a mobile and an agile subject matter expert.

Posted in: Agile, Behaviour Driven Development, Business Intelligence, communication, Developers, DevOps, IT strategy, Scrum      
Comments: 0
Tags: , , , , , , , , , ,


TrustThe effect of trust on Scrum teams

Trust is something that any work situation demands. However, it’s hard to find trust nowadays, as it has been replaced by ‘control’ in traditional work environments. Our business models, leadership principles and relationships at workplaces, usually, do not accommodate trust.

I’ll give you an example from my youth. As a young student, I got an evening job in a supermarket. I helped replenish the store’s in-shop inventory. One night, my supervisor accused me of stealing. He claimed to have seen me putting something into my pocket (later, it turned out to be my own watch that had slipped off my wrist while doing my job). This incident questioned my integrity in a big way. I felt scared of losing the job and my reputation; and my expectation of justice suffered a severe blow. Although, I was cleared by HQ later, the relationship with my supervisor was never the same. He never trusted me after that and I must admit, I could never trust his judgment either.

Now, when I train people on Scrum, I hear about different work situations where ‘the level of trust my supervisor showed in me’ is quite common. When I say that a team should be self organised, they (management) object that people will slack off. I have never seen a team slack off in a Scrum environment; in fact, they thrive, improve, and have more pride than a lot of other teams. Scrum teams put more effort to deliver quality work and demonstrate technical excellence, exhibiting great performance overall. Often, I’m asked to validate it by providing relevant statistics, metrics, etc.

But trust comes from within. If you don’t give trust, you will not get it. Once a team is controlled, they may/will start to meet the numbers by using various devious means. For instance, they can double the team velocity without doing anything more, they can lie about the time spent or they can increase estimations to build in risk; so, eventually, the team output will decrease. Even worse… team members would get demotivated, because humans like their freedom, and controlling them too much will make them look for other opportunities. It affects loyalty, happiness and work satisfaction.

Just because the job I had at the supermarket was a student job, I decided to stay on long enough to make sure my reputation was restored and that I could leave without suffering from the incident. It did not affect my image and a few years later, I got through an atomic clearance investigation for a military position without any trouble. However, I used to get insecure every time I met my supervisor, even as a customer of the supermarket!

To read the original post and add comments, please visit the SogetiLabs blog: Trust goes all the way

Related Posts:

  1. Measuring performance in Scrum teams is an act of sabotage!
  2. Projects are dead!
  3. Scrum world domination
  4. 5 ways to get your Scrumteam gimped


Julya van Berkel AUTHOR: Julya van Berkel
Julya van Berkel is an Agile adept and coach and has been championing Agile and Scrum since 2007. In her role as Agile Coach Julya has helped numerous clients and colleagues in getting better at Agile and as teaches she has set up and taught hundreds of Agile and Scrum training and courses. For Sogeti in the Netherlands she helps set the direction in Agile and is involved in many groups within Sogeti and outside in the Agile community.

Posted in: Behaviour Driven Development, Business Intelligence, communication, Developers, Human Resources, Managed Testing, Scrum, User Experience      
Comments: 0
Tags: , , , , ,


The nature of IoT devices is such that the traditional separation between different types of testing is no longer affordable.

IoT testing requires that functional, security and performance testing, traditionally separate phases are unified into one integrated phase.

It’s important to ensure that the functional, security and performance testing needs of any IoT device are considered not just during the development but during the planning and design phases.

“A kettle should work. Updating the firmware is not going to be popular.”

When your software is going to be built into a physical device that will be in homes, cars, offices then the cost of pushing out a new version is going to be high. Software updates aside, if you have to recall the product, the cost to reputation and to the bottom line will be high.

All the traditional methodologies e.g. V-Model, Waterfall and Agile require changes in their approach to ensure they deliver the maximum return on investment for the minimum effort and cost.

What’s need is a way to cut down the time it takes to design and build and test a product. The time to market seems to be growing shorter each year and the cost of getting it wrong seems to increase.  If you do get it wrong, then cost in time, money and most importantly reputation can be very high. Especially with the rapidly growing media attention to stories around IoT.

The sooner that security, functional and testing issues can be detected and fixed, the better. Sogeti has produced a method that works well for us called Point Zero™ which you can find out more about at

PointZero™ helps guide an organisation through the challenges involve in moving to this new and exciting new world of opportunities.

“PointZero™ drives success.”



Andrew Fullen AUTHOR: Andrew Fullen
Andrew is a managing consultant who looks after strategy for technical aspects of testing in the quality centre.

Posted in: Agile, functional testing, High Performance Analytics, Innovation, Internet of Things, Point Zero, Security, waterfall      
Comments: 0
Tags: , , , , , , , ,


iotpubsubFollowing my previous post on Getting Started with the Internet of Things , I would like to share, from my practical experience, some more ways of discovering what amazing things you can do by mixing the digital and the physical world (I purposely avoid naming the latter “real,” because to me they both are very ‘real’ ;-) ).

This time, I will focus on the importance of complementing the transactional or “Request/Response” model, used by most traditional IT systems, with a more near real-time or “Publish/Subscribe” model, better suited for the Internet of Things. There are many reasons for doing this, and one important reason is the rapidly increasing volume of both things (devices) and data. Another important reason is the security problems that occur due to the fact that a pure Request/Response model would require each thing that needs to be controlled, to act as a (web) server. Almost anything that is a “server” can be hacked, so making each thing a “client” in a “Publish/Subscribe” model will decrease that security risk significantly.

The first video is about the de facto standard Publish/Subscribe protocol MQTT: Internet of Things – Why You Need MQTT

In the second video, I show how to share (publish) sensor data using MQTT: Internet of Things – Publish Sensor Data

The third video is about how to control things (sensors) using MQTT: Internet of Things – Control Sensors

To read the original post and add comments, please visit the SogetiLabs blog: Getting Hands-On with Internet of Things

Related Posts:

  1. Getting Started with the Internet of Things
  2. Get started on building Apps
  3. Coming Up: My Webinar on “Internet of Things Report 5″
  4. Our top 10 2014: A business model for the Internet of Things for every CXO


Christian Forsberg AUTHOR: Christian Forsberg
Chris Forsberg is Sogeti's Global Digital Channels Lead Architect, and his passion is apps and the Internet of Things. He has been involved in the implementation of more than 100 apps on iOS and Android, and most with integration to back-end systems.

Posted in: Big data, Digital, Digital strategy, Internet of Things, IT strategy, Security, Smart      
Comments: 0
Tags: , , , , , , , , , ,



I love technology. I love innovation. I love communication. But please, can we now stop inventing new iterations of the same thing? Can we please stop making up new ways to share content? We can now send long or short texts, pictures, video and live streams. We can send them to individuals, to groups, to all our friends or to anyone. We can do so with name attached or anonymously. We can do so on mobile or computer or both. We can invite responses or not. We can like,Facebook Heart, share or retweet. We can even say that content should only be available for a short time, for people in the same area or for people with a special key.

Startups have been exploring all the cross-sections of these dimensions and marketing them as Snapchat, Twitter, Meerkat, Instagram, Facebook, Google+, etc. So, let me be a grumpy old man for a minute; but now it has to stop! Seriously. I cannot be expected to track who of my friends is on what channel. I cannot be expected to track my friends’ activities across all these things. I just want ONE interface where I can quickly choose what to send, who to send it to and let the tool figure out what channel to use, how to package it or how to make sure I get the responses I need. I want one interface where I collect friends, contacts and other sources of relevant interactions. Ideally with some prioritisation, so I don’t drown in the well-intended tweets of a high-school friend while the message from my boss is urgently awaiting my reply.

Marshall McLuhan already wrote that the medium IS the message, that the channel you choose matters in what the effect of your interaction will be. But please, let’s not overdo it. I also want the message to be the message and most of all: I don’t want to waste time on the medium, if I can spend it on the message.

Oh, and if you have a comment, please share it because I love comments! Feel free to send them on Twitter, LinkedIn, Facebook, as a comment below this post, Instagram or send me a text, email, Skype IM, Whatsapp or whatever other channel you can find. I promise… I’m there, waiting for your reply!

Related Posts:

  1. Understanding media, look at the pattern
  2. How do Facebook and Google handle privacy and security?
  3. Google+ is dead, long live Google+!
  4. Facebook needs big data to stay on top

Erik van Ommeren AUTHOR: Erik van Ommeren
Erik van Ommeren is responsible for VINT, the international research institute of Sogeti, in the USA. He is an IT strategist and senior analyst with a broad background in IT, Enterprise Architecture and Executive Management. Part of his time is spent advising organizations on innovation, transformational projects and architectural processes.

Posted in: e-Commerce, Innovation, Internet of Things, Marketing, mobile applications, Social media, Social media analytics      
Comments: 0
Tags: , , , , , , ,


The technology evolution is happening at rapid speed, which is making it hard to keep track of advancements in cyber-security. Through this blog I will try to argue why a ‘tortoise’ approach could be crucial in order to secure peoples’ private information and prevent a hacker’s utopia.

How will IoT affect the market and society?

At the age of 10 I bought my first mobile phone. Little did I know what the future of technology had in store for my generation.

In the year I was born (1994) Rich Gold asked ‘How smart does your bed have to be, before you are afraid to go to sleep at night?’. He predicted, in his own questioning way, that smart homes would become critical to the way we live our lives. Gold used old science fiction novels to showcase his concerns for the future. Ironically, in 1994 most people saw Rich Gold’s article as the real science fiction! Now, 13 years after his death, it seems his ideas are becoming a reality.

The Internet of Things (IoT) is a collection of the greatest modern advancements in IT; it is the physical world clashing together with the web. An example of this could be the new Amazon ‘Smart Buttons’ called the Dash Button Introducing Amazon Dash Button: Place it. Press it. Get it. – YouTube. Smart Buttons are Wifi enabled buttons that are capable of reordering grocery and more; let’s say you are out of milk – press the button and a brand new bottle of milk will arrive the next day! Amazon is even providing the device with the ability to be so smart that it notices by itself when you are low on supplies, and re-orders for you.  Another – at Defcon a couple of years ago, a hacker showed how he could break into a car system to deploy airbags without a crash, and if the car had parking assistance collision avoidance, the hacker could accomplish full control of the steering wheel and disable the breaks. A study on agile developers Internet of Things survey: How agile developers view the IoT by HP presented that the biggest market opportunity of the IoT is believed to be connected automobiles/driver assistance technology.

Convenience for the consumer must be the key word here, and in most cases of the IoT – but convenience shouldn’t be the only thing that matters.

Are you ready for the security issues?

Are we ready for this revolution that is supposed to make everything from automobiles to street lights ‘smart’? Well we better be, because it is already happening. Now, in 2015 there are already about 4billion smart devices in the world and a Gartner report estimates a staggering 25billion smart devices will be available by 2020. This underlines the speed in which the market is moving, opening an ocean of possibilities for businesses – and consumers – to indulge in.

Unfortunately this could be the hare and tortoise story all over – the faster the market evolves, the quicker new, smart technology businesses will arise. This is potentially a great thing, however the alarming pace manufacturers will need to deliver to keep or grow market share, combined with our increased dependence on intelligent connected devices unfortunately means larger security risks. And it’s not certain that we are prepared for these.  In fact, a survey by HP shows that 70% of IoT devices are vulnerable to security problems. Have in mind that these devices include healthcare systems, smart cars, door locks and infrastructure – and they contain all of your private information.

To me, impatience is one of the key words of my generation…We don’t need it tomorrow, we need it now!  Because of this, pressure is being put on developers to keep up. However, as Larry Downes (writer of Laws of Disruption) puts it, “technology changes exponentially, but social, economic, and legal systems change incrementally.” Or, in other words, personal data is moving at a faster speed than the laws that are in place to control and protect it.

Another factor that affects my generation is the issue of naivety; we have no issue giving applications access to our Facebook, Twitter and Instagram profiles… We’re in the mind set of “As long as it doesn’t post anything on my wall without my notice, I’m fine.” But, what we don’t realise is that now an organisation has all of this personal information about us. In the best case scenario it is used for advertisement targeted at us, but the worst case is scary; what could people really do with your information? I’ll tell you: they can create fake profiles, follow where you are at all times, find it easier to hack your email/ smart device/ bank account and a big deal more! If you’re sitting back thinking “this is not going to happen to me,” think again.

If the IoT market will be one of the fastest growing, shouldn’t the related security advances follow suit? Mike Armistead from HP comments that: “With the continued adoption of connected devices, it is more important than ever to build security into these products from the beginning to disrupt the adversary and avoid exposing consumers to serious threats.”

Over 90% of tested devices in a recent IoT research study HP News - HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack collected at least one piece of personal information through the product itself, the cloud or its mobile application. In order to fully secure an IoT product, security testing has become more important than ever and the ability to identify software weaknesses before they hit the market is crucial. Developers and testers must stay creative but also adapt to the security needs of the IoT. It is now paramount that your software or system can’t be breached so that hackers can’t connect with your numerous smart devices and create a so called domino-effect.

As Spiderman’s uncle once said in the Marvel comics: “with great power comes great responsibility.” in my opinion companies should focus their energy on being thorough and looking for long term security solutions. The product should only be introduced to the market when it’s tested, and ready. Releasing it before carrying out the necessary checks could end up harming your businesses reputation and revenue.

This should all be food for thought and, it is my belief that we should use our power to learn all about the water before jumping head first into it.


Reference List

AUTHOR: Alexander Bonde
Marketing Intern

Posted in: Agile, Apps, Cloud, Developers, Internet of Things, IT strategy, Marketing, mobile applications, Quality Assurance, Security, Smart, Social media      
Comments: 0
Tags: , , , , , , , , , ,


e, Cyber-Physical systems, Cybersecurity vulnerabilities, digital development, Digital Disruption, dotcom, Web Stra

From brutal aggressors to confident incumbents — everyone, these days, seems to be perfectly comfortable with the notion of Digital Disruption. Centered around competitive advantage, its application ranges from the abrupt and irreversible stealth takeover of market dominance to a mere irritating interference of “fireflies before the storm” or even “wampum,” as the dotcom insurgents were famously depreciated by competitive advantage,’s Lou Gerstner and GE’s Jack Welch, at the end of the 20th century. In our modern Cyber-Physical Systems universe, however, where the digital mycelium has been pervasively mushroomed, Cybersecurity vulnerabilities and threats rank among the most dangerous disruptive forces, because they are inextricably linked to the omnipresent phenomenon of competitive Digital Disruption.

Image credit: www.industryweek.comImage credit: 

Digital Disruption Beyond the Buzz
By the end of June 1999, seven months before the dotcom crash set in, BusinessWeek devoted an issue to the then prevalent “Internet Anxiety.” Its symptoms were on the cover: “You’re Merrill Lynch when comes along. You’re Barnes & Nobles when hits big. You’re Toys “R” Us when eToys shows up. What would you do?” The response, then, was the cover story’s caption: “Part in envy, part in fear, Corporate America is embracing a radically new business model.” Although Mr. Welch surely didn’t have to fear or envy any competitor, his stance toward the Internet was utterly respectful: “I don’t think there’s been anything more important or more widespread in all my years at GE. Where does the Internet rank in priority? It’s No. 1, 2, 3, and 4.” At that time, many mainstream corporate giants were racing to solidify and build out what was called a company’s “Web Strategy,” while digital development exploded.

The year 2000 not only saw the dotcom bubble burst, but also the birth of Web Services (“a software system designed to support interoperable machine-to-machine interaction over a network”), as a new defining mechanism for what was commonly called the Digital Economy. Now, fifteen years later, Amazon has matured from a pure-play search / recommendation engine around books to the poster child of modern retail, Amazon Web Services is a 5 billion dollar business, and much of the attention has shifted to APIs, i.e. to programmable flexibility.

The Internet has expanded to the “Internet of Things” – the phrase that Kevin Ashton had coined in 1999, as he couldn’t think of something better. Radically new business models, once again, are transforming the way in which companies and industries operate. Sensor-laden smartphones and Smartphones On Wheels (aka Connected Cars) have followed the well-known application of RFID tags for Collaborative Planning, Forecasting and Replenishment (CPFR) purposes at Procter & Gamble; where Mr. Ashton – who headed the MIT Auto-ID Center – implemented, for the first time and successfully, his Connected Things That Talk & Think .

We have traded in dotcoms for lean startups, GE’s FastWorks proudly touting itself as The Biggest Startup Ever, and added both “Industrial” and “of Things (and Services)” to the Internet. Ours is the Age of Exponential Organizations where new entrants may well be ten times faster, better, and cheaper than incumbents. Increasingly, enterprises organize themselves around embedded automated sense & respond data feedback loops, which enable better operations, faster product innovation, new service models, and vastly-enhanced customer-targeting and retainment. The “Anything Internet” phase that we have entered is based on three mutually dependent “C” pillars: Cloud Computing or simply digital infrastructure, Cognitive Computing or digital intelligence, and last but not the least Cybersecurity.

cybersecurityCybersecurity Beyond the Buzz
The security of products and services is a key element of the overall security of cyber-physical systems, but a number of things are affecting organisations’ ability to put in place a solid digital defense system. These include an expanded attack surface, inefficiencies in the development process, a weak security architecture of the entire system, lack of specialised security skill sets, and insufficient use of third-party support. Securing a cyber-physical system is a challenge, because of its multiple points of vulnerability. These include the products and the services involved, the embedded software and the data residing within, plus the data aggregation platform, the data centers used for analysis, and of course, the communication channels.

The current Top 10 list from the Open Web Application Security Project (OWASP), covers the following alarming basic issues:

1 – Insecure Web Interface
2 – Insufficient Authentication/Authorisation
3 – Insecure Network Services
4 – Lack of Transport Encryption
5 – Privacy Concerns
6 – Insecure Cloud Interface
7 – Insecure Mobile Interface
8 – Insufficient Security Configurability
9 – Insecure Software/Firmware
10 – Poor Physical Security

Probably, Target, Home Depot, Sony, JP Morgan Chase, the U.S. Postal Service, the Office of Personnel Management, the White House, and many other organisations and institutions around the globe could have done more to prevent their breaches. On top of security fundamentals, we badly need more sophisticated data-handling techniques: access control management, tracking and auditing; anonymisation; encryption; separation of data; plus well defined and enforced data destruction policies. We simply cannot afford Internet Anxiety Disorder to disrupt economic progress and technological trustworthiness.

Want to know more? Then check out the new edition of Beyond the Buzz, and all other ones.

To read the original post and add comments, please visit the SogetiLabs blog: Competitive Disruption and Cybersecurity Beyond the Buzz

Related Posts:

  1. Coming Up: My Webinar on “Cybersecurity Kill Chain” theory
  2. UX and Cybersecurity – Seemingly Unrelated, Inextricably Linked
  3. 5 Platform Disruption Design Lessons
  4. Disruption and disruptors


Jaap Bloem AUTHOR: Jaap Bloem
Jaap Bloem is in IT since the PC and now a Research Director at VINT, the Sogeti trend lab, delivering Vision, Inspiration, Navigation and Trends.

Posted in: Behaviour Driven Development, Big data, Business Intelligence, communication, Developers, Digital strategy, Enterprise Architecture, Innovation, Internet of Things, IT strategy, mobile applications, Open Innovation, Opinion, Security, Technical Testing, Technology Outlook, Testing and innovation, Transformation, Transitioning      
Comments: 0
Tags: , , , , , , ,


Sogeti is proud to offer web and mobile testing services through our uk based lab, Sogeti Studio, to support your digital or omni-channel strategy.

As part of this we are committed to researching the current trends in desktop, tablet and mobile devices as well as the operating systems and browsers that run on them. This allows us to ensure we can thoroughly test across the most popular types in each category, whilst also offering the ability to test across more niche types to deliver the test coverage our customers need.


AUTHOR: Sogeti Studio
Sogeti Studio is our London-based web and mobile testing lab.

Posted in: Apps, Digital, Digital strategy, Innovation, Marketing, Microsoft, mobile applications, mobile testing, Mobility, Omnichannel, Reports, SMAC, Software testing, Sogeti Studio      
Comments: 0
Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,


Kilroy Was Here-StyxMaybe I was 12 when I listened to ‘Mr Roboto’ by Styx for the last time. The song was recorded for the album ‘Kilroy Was Here’ in 1982. That was 11 years before the first release of the Mosaic web browser, 17 before the term ‘Internet of Things’ was coined and approximately 30 years before the rise of IoT.

“… My heart is human, my blood is boiling, my brain I.B.M…” — Styx

It’s fascinating how the song talks about some kind of cyborg and also gives a glimpse of the possible impact of social media technologies and the very existence of IoT, not to mention the ‘time machine effect’ that the song still has over my mind.

“The problem’s plain to see, too much technology Machines to save our lives…” — Styx

The world in the 1980’s, as Styx knew it, was transformed into this hyperconnected place we live in today, where computers are omnipresent.

Nowadays, we are doing anything and everything to enhance or merge ourselves with technology. We’ve learned about Google Glass, Microsoft HoloLens and more recently about a hacker who implanted an NFC chip in his hand to bypass security scans and exploit android phones. We also know about how Amazon is trying to fill our skies with drones to deliver products to customers; Doctors implanting pacemakers with WiFi capabilities, so they can monitor their patients; and toothbrushes, light bulbs and coffee machines being web-enabled to send information to Cloud, Big Data and Machine Learning enabled services. Furthermore, the way we interact with the Internet of Things or should I say Internet of Addictions, makes us all behave like tech junkies.

“…So if you see me acting strangely, don’t be surprised…” — Styx

It’s clear that the disruption created by Social, Mobile, Analytics, Cloud and Things (SMACT) is reshaping / transforming our world really fast. So fast that the thought of the hypothetical advent of artificial general intelligence, as stated by the Technological Singularity theory, is no longer considered a taboo.

The question, here, is not whether the Singularity will happen, but WHEN will it happen?

“Domo arigato, Mr. Roboto…” — Styx

Watch the original video for the song

To read the original post and add comments, please visit the SogetiLabs blog: When will Singularity happen?

Related Posts:

  1. Ray Kurzweil and the Singularity in 3 minutes
  2. Expert Talk: Ted Dunning on singularity, privacy and consumers in a Big Data world (part 2)
  3. Big Data, changing business models and singularity
  4. Starbucks puts Bucks in connecting machines



Carlos Mendible AUTHOR: Carlos Mendible
Carlos Mendible has been .Net Architect for Sogeti Spain since 2012. He is Head Solutions Architect in, one of our major clients, A3 Media, and is also responsible for assisting with the sales process as Pre-Sales Engineer and for conducting workshops and training sessions.

Posted in: Big data, Cloud, Social media, Social media analytics, Technology Outlook, Transformation      
Comments: 0
Tags: , , , , , , , , , , , , ,