
SEARCH RESULTS
52 items found
Services (5)
- Risk Awareness Workshop
Learn to identify the residual risk of a project or the company as a part of planning the project or service We learn the basics of risk management: SWOT, PESTLE, DPIA and ISO31000 through pragmatic stories in groups Attendees can be project managers, quality managers or data protection managers that need risk awareness in their daily working. End result of this workshop is risk oriented thinking, counting the residual risk and materials of the course: attendees will get the risk management toolbox used in the workshop (as long as the elements aren't behind a license) Workshop is suitable for HR, communications, risk managers (finance), directors, project managers and service managers.
Events (3)
- December 11, 2019 | 12:55 PMMannerheimintie 46, 00260 Helsinki, Finland
- November 23, 2020 | 3:00 PM
- February 1, 2021 | 4:00 PM
Blog Posts (10)
- Secrets of a role of a coder (aka Developer)
Coding is a bit different skill in Tech than other skills. For some, it is a good selection, but for some, not that much. I began coding in early childhood and worked my way up step by step in Tech, continuously learning. I have seen behaviors of many kinds. The question is how do you like to spend your time at work. With people, or less with people? Resolving complex problems requires more uninterrupted time than many other job functions in Tech and therefore developer roles are vulnerable to interruptions. It is closer to a research role as it requires a lot of thinking and not that much talking. Of course, reflecting on others is a big part, but it is different than in other roles in Tech. Hence, it is a horror to see people who code working in noisy and busy spaces, instead of silent rooms. All the noise and hassle around will most definitely increase the brain's negative wiring and stress due to constant interruption in the flow and it also will have a severe impact on the efficiency and timelines. Overcoming the biases in developer recruiting and team building Sometimes I see bias in recruitment, or for instance, in DevOps team planning because if you are a coder, you are a loner, and of course, you need to be a people-hating introvert. The reason for this is a lack of understanding of the role. You can try with a timer of how your brain reacts when you take a puzzle that is a bit more complex to solve and ask someone to interrupt, walk by, ask or speak on the phone next to you. Then try it without interruptions. What is the difference between interrupted and uninterrupted time? Therefore there are different skills in Tech. Not everyone will become a developer or learn how to code properly. No-code and low-code will help to some extent. Bad habits of learning and unlearning them to be successful in learning Bad habits that I have found when some of the people first time come to my class to learn: 1. Expectation setting. I have seen some creating an overwhelming emotion by setting the bar themselves and being stressed before they have even started to learn. 2. Competition, trying to be better than those who have much more experience. These bad habits I typically train people away from, because they are actually obstacles in successful learning. And successful they have also become after. Setting too high expectations and focusing on others makes us being overwhelmed before learning, and internal competition just nourishes a poor culture, which costs approx. 67% of the efficiency of a team. That's why bad habits need to go. One of my students once said: "I find this positive environment to have an impact on my learning skills, I seem to learn faster and more when I let loose and have a bit of fun as well" Well said! You can read more about our EDULINE100 concept here. We developed a program, that helps companies to enable their employees to become the best professionals in Tech! Tessa, Founder of Techie Stories
- Former Cybersecurity Field CTO at Microsoft, CISO at IBM, GM at Symantec Zoom visiting lecturer!
When my students had a question about how to sell Cyber Security without threats to C-Suite, I decided to ask Diana Kelley to visit in one of my lectures. My students have been asking from the beginning about hearing actual stories from the field. I decided to surprise them! It was amazing to see so many students inspired by Diana Kelley’s visiting my Cybersecurity for Business- lecture at Metropolia University of Applied Sciences. I want to thank Diana for accepting the invitation and the added value for my students! Diana has been in Tech for over 30 years. She has been working in C-Suite (Cybersecurity Field CTO at Microsoft, CISO at IBM, General manager at Symantec), co-authored books about Cryptographic Libraries For Developers and Practical Cybersecurity Architecture: A Guide to Creating and Implementing Robust Designs for Cybersecurity Architects. She has inspired many people during her career, including me. The first time I heard Diana speaking was at the Cybersecurity Nordics event for thousands of people. What I was inspired by was her understanding of business to technical detail. I had an opportunity to discuss with other great women in Cyber Security. They were working either in business development or management. Some of them were working in forensics and STEM-related Cyber Security roles. The most fascinating was that they were not only good at a business perspective, but they all were also highly skilled in processes and technology. The feedback Diana’s lecture received was astonishing. The students were able to dig their way out from the technical perspective to the C-suite level. This shift is difficult, I agree. When a comfort zone is in technical binaries, it is always hard to shift the mindset towards business. Many times we are missing actual company goals when it comes to Cyber Security. It is about securing businesses, not only about all the threats that are lurking around. It is about the impact on the strategy and the business goals. Business Planning requires risk planning. The same risk models apply to Cyber Security as it does for business in general. The most known models are PESTLE (Political, Economical, Social, Technology, Legal, Environmental) and SWOT (Strengths, Weaknesses, Opportunities, Threats). So why so many companies are pulling the plug when it comes to Cyber Security and deciding to outsource even the most critical roles? It is all about communication. Even though negativity might get viewers on social media, it does not resonate with C-suite professionals. One of the anecdotes in Diana’s lecture was about understanding where the listener is. Think about going to a doctor. If the first thing the doctor would say to you was cancer, without diagnosing first. How would this make you feel? In business, the same thing applies. C-suite is responsible for the company, its employees, its business. If you tell them at first that they have all the threats in the world, they will stop listening. Typical topics in the mainstream media are mainly about the leaks and the threats. Trying to sell and market with threats causes people to react by pulling away from the topic. Securing business crown jewels and goals should be the center of the discussions. The same applies when it comes to demographics in the Cyber Security field. Over 80% of the companies have outsourced Cyber Security in Finland, according to Etla Digibarometri 2020 study https://www.etla.fi/julkaisut/digibarometri-2020-kyberturvan-tilannekuva-suomessa/. Seldom do I see Cyber Security as part of the business as usual functions, such as in Business Development, Product Development, Quality Management, Enterprise Risk Management. I believe it is time to build, By Design and By Default Cyber Security instead of building Silos. When Cyber Security is business as usual, the milestone marks the start of a new chapter.
- Meet our new Data Economy Advisor Jarkko Moilanen Ph.D
Jarkko defended his doctoral dissertation on 3D printing focused Peer Production: Revolution in design, development and manufacturing, and the related dissertation is one of the few works describing the 3D printing ecosystem. The dissertation consists of articles, all of which have been co-written with other researchers. Jarkko's way of working as a writer is to collaborate with others instead of writing everything himself. In October 2017, Jarkko got the idea to write an API Economics book and came up with the name "API Economy 101". The title reflects the purpose of the book, which is to provide a basic package of API economics information to people in charge of business, rather than addressing the issue from a technology perspective. Jarkko invited 3 other experts in the field he knew to participate in the writing process. The book was published under an ideological name in August 2018 by Alma Talent. The book was translated into 2019 in English as "API Economy 101". In the autumn of 2018, Jarkko began working on a new book in English on "Build for Developers - Application Developers as Customers in API Economy". Jarkko also invited other experts in the field to this work, but this time in the role of advisors. The invitees mainly represent application developers, i.e. typical API economy customers and interface consumers. As the writing work progressed slowly, Jarkko decided to try a new approach from July 2019 onwards. He started writing one developer-related writing a day for his own writing series called 100 Days DX. The last summary article in the series was completed on November 6, 2019. Editing the material for the book is in progress. At the same time as 100 Days DX was completed, Jarkko began the video production developer experience of business significance. Doctor of Developer eXperience includes approximately 10-15 minutes of informative videos, often based on scientific articles. In November 2019 Jarkko started to develop Data Product Toolkit, which is a set of canvases to design data products which are the building blocks of the data economy. Data productizement process and tools are part of the research aimed at Jarkko's second dissertation.
Other Pages (34)
- Services | Techie Stories
Ask for Quota Every design starts from human and ends with an experience Techie Stories' immersive design portfolio is focusing on human interaction, experience, and communications without boundaries. The benefits of understanding humans in the loop when designing as it has an impact on well-being in form of elements such as mood. All of our design methods are inspired by the top University professors in Artificial Intelligence, Robotics, Design and Economy workshops, design and architecture experience in the tech industry. Cultural elements shaped over the years after our founder had been traveling in over 20 countries. If you wish to have real-time information on our journey follow us on Instagram, Linkedin, and TikTok accounts. Our account name is @techiestories Ask for Quota Every architecture is different. Successful architecture cuts across every business vertical and architectural layers Moving away from traditional architectural design in tech requires a mindset shift towards human behavior and experience. Today architecture has even more importance from the perspective on the human experience than before. Therefore in architectural design, we use iterative peer review processes through the business view, functional view, technical view, and implementational experience view. It is not feasible to think of architecture as a general service or a technology, it requires experience to lead architecture. It is not about technology itself or product or service but about meeting the needs of humans. If you wish to have real-time information on our journey follow us on Instagram, Linkedin, and TikTok accounts. Our account name is @techiestories Ask for Quota Right skills at the right time with the right for the right purpose Education should be about inspiration. It should never be about telling. We have educated over 200 people since Techie Stories was established with a method that has a higher value because we have designed our programs from the perspective of brain well-being. Some of us have been and are lecturing in either Universities or Universities of Applied Sciences and with the positive response, we have received from our reflective programs we decided to keep education in our portfolio because it is part of the user adaptation journey as well. Our method is to educate people within the projects to create positive and safe DevOps culture and lead them in the right direction when it comes to skill gaps, communication, and project workspaces. We not only teach how to create automated communication flows between teams during onboarding but we also develop tools, bots, and text/audio/video content based on the project need. This reduces time and frustration. As we have been teaching developers as well, so we have listened to them and shaped our method to meet the criteria and reporting metrics for each of the user personas. We have been successful in each complex project with our method, regardless of the project size and complexity. We have been able to reduce the overall costs of the projects with our method with a proven track record. If you wish to have real-time information on our journey follow us on Instagram, Linkedin, and TikTok accounts. Our account name is @techiestories Ask for Quota Cybersecurity for businesses -Designing human-centered and feasible security After over 20 years of designing security for high regulatory environments, we came up to the conclusion that it is not only feasible but added value element for businesses to include the security element by default and by design. When it comes to humans who use the products and services there is no room for threat-related anxiety causing communication. Therefore our goal is to change aggressive and negative communication in the cybersecurity field and transform unfriendly designs into more human-centered empathic communication in Cybersecurity. We have already had success in the high regulatory field even with people who are not native digital users. If you wish to have real-time information on our journey follow us on Instagram, Linkedin, and TikTok accounts. Our account name is @techiestories Ask for Quota All work, no play? We love to combine both in our designs. The interactive journey starts from human natural behavior and feelings. At its best, well-designed interactions also reduce stress and anxiety within organizations. Our interactive designs are about interactions and socialization, and our immersive designs are about the depth of an experience rather than interaction. Rewarding people for doing the right thing is important. It creates a sense of safety and increases loyalty and trust. It also provides direction to better working culture. If you wish to have real-time information on our journey follow us on Instagram, Linkedin, and TikTok accounts. Our account name is @techiestories DEMOS AND VIDEOS Techie Stories on the road Play Video All Videos Our public work Play Video All Videos
- Events | Techie Stories
Subscribe EVE NTS Mon, Feb 01 Online Event Techie Stories Ltd. Launch Party! Join us for hearing about the new services, technologies, new way of doing business and meet some of our Partners! Share Details Mon, Nov 23 Free online event API Meets Hypertrace What in common does have Australia, Japan, Canada and Switzerland regarding businesses! Do come and find out and also check out our personal introductions from the event video! https://www.eventbrite.com/e/api-meets-hypertrace-webinar-tickets-128460676341 Share Details Wed, Dec 11 Scandic Park Helsinki GDPR19 Speaker at 14:55-15:25 - Digital Identity Crisis - Ten Stories from the field how to protect your digital identities, the most valuable digital assets within your company Share Details
- Media | Techie Stories
ME DIA