Premium Content

Access "Code Halos – How the digital lives of People, Things, and Organisations are Changing "

Code-Halos-(1402933344_737).jpg

Sponsored by ComputerWeekly.com

Code Halo refers to the data that accumulates around people, devices, and organizations—data that’s robust, powerful, and continually growing in richness and complexity. The halos contain the code that companies, brands, employers, and partners can use to enhance their understanding of people or objects more deeply. Decoding the information within that invisible field, teasing out the insights, and creating new commercial models does not happen automatically or easily. But every employee, product, building, and organization should have a Code Halo, and this book is going to explain how and why. While technology makes Code Halos possible, they transcend constructs like IT or Big Data or analytics. Code Halos make meaningful connections between people, organizations, and devices in a business context. Extracting meaning from Code Halos—and applying that understanding to business strategies and practices—is a new and essential yet not clearly or widely understood management skill. This book’s extract’s purpose is to provide a fact-based understanding of the Code Halo phenomenon and outline a practical approach to improving performance by harnessing their power.  Access >>>

Table of contents

  • A Trillion-Dollar Opportunity or an Extinction Event
  • The Personal Code Halo
  • The Five Business Code Halos

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Social Media: IT Purchasers get social, marketers play catch up ?
    VB-CW social media PowerPoint (2)-1.jpg
    E-Handbook

    IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.

  • Can national security and privacy co-exist?
    CWE_260814_ezine_22p-1MED.jpg
    E-Zine

    In this week’s Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how ...

  • Cultivating IT Talent
    CWE_190814_ezine_24p-1MED.jpg
    E-Zine

    While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses...