About
Serving as an independent technology consultant for architecture and design in emerging…
Articles by Dr. Mehmet
Contributions
Activity
-
The "always-on" culture is killing us. Your phone buzzes at 7 PM. Your heart drops. Dinner goes cold. Family time gets interrupted. We've…
The "always-on" culture is killing us. Your phone buzzes at 7 PM. Your heart drops. Dinner goes cold. Family time gets interrupted. We've…
Liked by Dr. Mehmet Yildiz
-
🎉 Celebrate Your Substack, No Matter the Size! 📢 CONGRATULATIONS on starting your Substack! Whether you have one subscriber or a thousand, every…
🎉 Celebrate Your Substack, No Matter the Size! 📢 CONGRATULATIONS on starting your Substack! Whether you have one subscriber or a thousand, every…
Shared by Dr. Mehmet Yildiz
Experience
Education
Licenses & Certifications
-
Applied Data Science with Python - Level 2
IBM
Credential ID https://www.youracclaim.com/badges/4b30d00f-8866-4de7-8554-0eadbe5f0226 -
Big Data Foundations - Level 2
IBM
Credential ID https://www.youracclaim.com/badges/59e11e0b-3549-4857-99c6-74d3994ef327 -
Enterprise Design Thinking Practitioner
IBM
Credential ID https://www.youracclaim.com/badges/4d3cff09-5a09-42bc-ae9e-c8ba43f9dd05 -
IBM Cloud Kubernetes Service
IBM
Credential ID https://www.youracclaim.com/badges/dc4edde7-e836-4698-b6d2-3c26c8d3e08f -
IBM Profession Champion 2017, 2018, 2019
IBM
Credential ID https://www.youracclaim.com/badges/0eeb4b22-6b75-4843-b7dd-092893808535 -
IBM Recognized Speaker/ Presenter
IBM
Credential ID https://www.youracclaim.com/badges/cadfe763-816f-4662-8bec-5571d770a3e5 -
IBM Recognized Teacher/ Educator
IBM
Credential ID https://www.youracclaim.com/badges/5341bc43-fc89-45f8-9471-20bc3bb2b2c6 -
IBM Services Platform with Watson
IBM
Credential ID https://www.youracclaim.com/badges/029d0b8c-c08d-4036-baf4-0164da6117b2 -
Machine Learning with R - Level 1
IBM
Credential ID https://www.youracclaim.com/badges/5da1024c-dabf-4cf0-8215-b3be80e5fa62
Publications
-
Architecting Digital Tranformation
S.T.E.P.S. Publishing Australia
Enterprises are facing enormous challenges to respond to the rapid changes and growing demands of digital consumers globally. There is constant search to find solutions to the growing problems. The most optimal solution to address this problem is to architect our enterprise digital transformation requirements aligning with digital trends and innovative frameworks as described in this book with an articulated 12-step method.
Architecting digital transformations addresses the root causes of…Enterprises are facing enormous challenges to respond to the rapid changes and growing demands of digital consumers globally. There is constant search to find solutions to the growing problems. The most optimal solution to address this problem is to architect our enterprise digital transformation requirements aligning with digital trends and innovative frameworks as described in this book with an articulated 12-step method.
Architecting digital transformations addresses the root causes of fundamental issues that we experience in the digital world. The proliferation of digital media in the form of images, sound, and videos created a massive demand for our infrastructure to scale globally. Relentless sharing of these media types creates an unsustainable load over the networks, applications, and other expensive infrastructure components unless an effective capacity plan is in place.
Based on my architectural thought leadership on various enterprise architecture initiatives, digital transformation, and modernisation engagements, with my accumulated body of knowledge and skills from practical settings, I want to share these learnings in a concise book with a specific 12-step method hoping to add value by contributing to the broader digital community and the progressing digital transformation initiatives.
I made every effort to make this book concise, uncluttered, and easy-to-read by removing technical jargons to make it readable by a broader audience who want to architect their digital transformation programs to align with the growing demands of their digital consumers.
In this book, I highlight the problems from an architectural point of view, following established and emerging methods, and recommend effective solutions to address them in a methodical way. -
Digital Intelligence: A framework to digital transformation capabilities
authored this book because dealing with intelligence, and the digital world is a passion for me and wanted to share my passion with you. In this book, I aim to provide compelling ideas and unique ways to increase, enhance, and deepen your digital intelligence and awareness and apply them to your organisation’s digital journey particularly for modernisation and transformation initiatives. I used the architectural thinking approach as the primary framework to convey my message.
Based on my…authored this book because dealing with intelligence, and the digital world is a passion for me and wanted to share my passion with you. In this book, I aim to provide compelling ideas and unique ways to increase, enhance, and deepen your digital intelligence and awareness and apply them to your organisation’s digital journey particularly for modernisation and transformation initiatives. I used the architectural thinking approach as the primary framework to convey my message.
Based on my architectural thought leadership on various digital transformation and modernisation engagements, with the accumulated wealth of knowledge and skills, I want to share these learnings in a concise book hoping to add value by contributing to the broader digital community and the progressing initiatives.
Rest assured, this is not a theory or an academic book. It is purely practical and based on lessons learned from real enterprise transformation and modernisation initiatives taken in large corporate environments.
I made every effort to make this book concise, uncluttered, and easy-to-read by removing technical jargons for a broader audience who want to enhance digital intelligence and awareness.
Upfront, this book is not about a tool, application, a single product, specific technology, or service, and certainly not to endorse any of these items. However, this book focuses on architectural thinking and methodical approach to improve digital intelligence and awareness. It is not like typical digital transformation books available on the market. In this book, I do not cover and repeat the same content of those books describing digital transformations. My purpose is different. -
A Technical Excellence Framework
S.T.E.P.S. Publishing Australia
The primary purpose of this book is to provide valuable insights for digital transformational leadership empowered by technical excellence by using a pragmatic five-pillar framework. This empowering framework aims to help the reader understand the common characteristics of technical and technology leaders in a structured way.
Even though there are different types of leaders in broad-spectrum engaging in digital transformations, in this book, we only concentrate on excellent technical and…The primary purpose of this book is to provide valuable insights for digital transformational leadership empowered by technical excellence by using a pragmatic five-pillar framework. This empowering framework aims to help the reader understand the common characteristics of technical and technology leaders in a structured way.
Even though there are different types of leaders in broad-spectrum engaging in digital transformations, in this book, we only concentrate on excellent technical and technology leaders having digital transformation goals to deal with technological disruptions and robust capabilities to create new revenue streams. No matter whether these leaders may hold formal executive titles or just domain specialist titles, they demonstrate vital characteristics of excellent technical leadership capabilities enabling them to lead complex and complicated digital transformation initiatives.
The reason we need to understand technical excellence and required capabilities for digital transformational leadership in a structured context is to model their attributes and transfer the well-known characteristics to the aspiring leaders and the next generations. We can reflect upon our understanding of these capabilities at an individual level and apply them to our day to day activities. We can even turn them into useful habits to excel in our professional goals. Alternatively, we can pass this information to other people that we are responsible for, such as our teenagers aiming for digital leadership roles, tertiary students, mentees, and colleagues.
I attempt to define the roles of strategic technical and technology leaders using a specific framework, based on innovation, simplicity, agility, fusion and technical excellence. This framework offers a common understanding of the critical factors of the leader. The structured analysis presented in this book can be valuable to understand the contribution of technical leaders clearly. -
A Modern Enterprise Architecture Approach Empowered with Cloud, Mobility, IoT & Big Data
S.T.E.P.S. Publishing Australia
I authored this book to provide essential guidance, compelling ideas, and unique ways to Enterprise Architects so that they can successfully perform complex enterprise modernisation initiatives transforming from chaos to coherence. This is not an ordinary theory book describing Enterprise Architecture in detail. There are myriad of books on the market and in libraries discussing details of enterprise architecture.
As a practising Senior Enterprise Architect myself, I read hundreds of those…I authored this book to provide essential guidance, compelling ideas, and unique ways to Enterprise Architects so that they can successfully perform complex enterprise modernisation initiatives transforming from chaos to coherence. This is not an ordinary theory book describing Enterprise Architecture in detail. There are myriad of books on the market and in libraries discussing details of enterprise architecture.
As a practising Senior Enterprise Architect myself, I read hundreds of those books and articles to learn different views. They have been valuable to me to establish my foundations in the earlier phase of my profession. However, what is missing now is a concise guidance book showing Enterprise Architects the novel approaches, insights from the real-life experience and experimentations, and pointing out the differentiating technologies for enterprise modernisation. If only there were such a guide when I started engaging in modernisation and transformation programs.
The biggest lesson learned is the business outcome of the enterprise modernisation. What genuinely matters for business is the return on investment of the enterprise architecture and its monetising capabilities. The rest is the theory because nowadays sponsoring executives, due to economic climate, have no interest, attention, or tolerance for non-profitable ventures. I am sorry for disappointing some idealistic Enterprise Architects, but with due respect, it is the reality, and we cannot change it. This book deals with reality rather than theoretical perfection. Anyone against this view on this climate must be coming from another planet.
-
An Integrated Virtual Ethnographic Study: Use of Computerised Social Networks to Transfer Tacit Knowledge for Mass Collaboration in the IT Workplace
The International Journal of Technology, Knowledge and Society
The purpose of this paper is to report the key findings of a number of independent research projects conducted in virtual settings. The first research project was to understand the knowledge transfer process and activities in the virtual teams for mass collaboration. The second project was to evaluate the efficiency of major social networking tools used by the IT professionals. The third project was identify the correlation between computerized social networking and knowledge transfer…
The purpose of this paper is to report the key findings of a number of independent research projects conducted in virtual settings. The first research project was to understand the knowledge transfer process and activities in the virtual teams for mass collaboration. The second project was to evaluate the efficiency of major social networking tools used by the IT professionals. The third project was identify the correlation between computerized social networking and knowledge transfer. Integration of these three research projects, particularly comparing the findings from each, enabled to discover new patterns and useful learning lessons for the knowledge management discipline in the IT workplace.
-
Issues in User Generated Content Process and a Proposed Model to Solve them
The International Journal of Technology, Knowledge and Society
User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large enterprises. This study provides review of extensive literature search for the technical issues of UGC globally. Based on the experience of authors in the field, and considering the gaps identified, it provides a macro level technical management model to address these issues using…
User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large enterprises. This study provides review of extensive literature search for the technical issues of UGC globally. Based on the experience of authors in the field, and considering the gaps identified, it provides a macro level technical management model to address these issues using findings from a number of case studies.
Other authors -
Semantic Access Control for Corporate Mobile Devices
Springer
any of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the…
any of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the corporate resources by using related context in user devices and servers under the trust philosophy. Semantic web technology combines user requests and service descriptions for an efficient matchmaking. This paper examines various access control mechanisms and semantically analyzes them. The purpose of this paper is to present a more secure access control mechanism for mobile corporate devices. This model can be used as an additional security framework that enforces access control mechanisms in the organizations.
Other authors -
A Layered Security Approach for Cloud Computing Infrastructure
IEEE
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be…
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.
Other authors -
Governance of Information Security Elements in Service-Oriented Enterprise Architecture
IEEE
This paper identifies and analyzes governance roles and tasks in SOA security governance at macro level. Drawing from Information security management standards and frameworks on one hand and SOA considerations on the other hand, the identified governance elements are mapped to a governance structure that specifies planning and execution aspects at four organizational decision-making levels, resulting in a prescriptive model with practical relevance. This constructive study combines theoretical…
This paper identifies and analyzes governance roles and tasks in SOA security governance at macro level. Drawing from Information security management standards and frameworks on one hand and SOA considerations on the other hand, the identified governance elements are mapped to a governance structure that specifies planning and execution aspects at four organizational decision-making levels, resulting in a prescriptive model with practical relevance. This constructive study combines theoretical models and standards with industry experience of the authors.
Other authors -
Technological Trends and their Impacts on the Virtual Teams’ Learning in the IT Workplace
The International Journal of Learning
The emerging information technologies play a significant role for the learning process of IT professionals in the workplace. This presentation will have a three pronged approach to inform the audience of this phenomenon. Firstly it will provide a trend analysis using a historical view of last 7 years of recorded (qualitative/quantitative) data in the presenter’s doctoral / postdoctoral studies in ethnographic settings. Secondly, it will elucidate the impact of key technologies and processes on…
The emerging information technologies play a significant role for the learning process of IT professionals in the workplace. This presentation will have a three pronged approach to inform the audience of this phenomenon. Firstly it will provide a trend analysis using a historical view of last 7 years of recorded (qualitative/quantitative) data in the presenter’s doctoral / postdoctoral studies in ethnographic settings. Secondly, it will elucidate the impact of key technologies and processes on the cognitive development of these professionals and how they affect the productivity in the workplace. Thirdly, in conclusion, an attempt will be made to predict the future progress in this field.
-
A Practical Guide for IoT Solution Architects: Architecting secure, agile, economical, highly available, well performing IoT Ecosystems
-
he focus of this book is to provide the IoT Solution Architects practical guidance and a unique perspective. Solution Architects working in IoT ecosystems have an unprecedented level of responsibilities at work.
Dealing with IoT ecosystems can be daunting. As an experienced practitioner of this topic, I understand the challenges faced by the IoT Solution Architects. I reflect my insights based on my solution architecture experience spread across three decades.
This book can also guide…he focus of this book is to provide the IoT Solution Architects practical guidance and a unique perspective. Solution Architects working in IoT ecosystems have an unprecedented level of responsibilities at work.
Dealing with IoT ecosystems can be daunting. As an experienced practitioner of this topic, I understand the challenges faced by the IoT Solution Architects. I reflect my insights based on my solution architecture experience spread across three decades.
This book can also guide other types of architects and designers who want to learn architectural aspects of IoT and understand key challenges and practical resolutions in IoT solution architectures.
Each chapter in this book focuses on the key aspects set as a framing scope for this book. They are security, availability, performance, agility, and cost-effectiveness.
Besides, the book provides useful definitions, a brief practical background on IoT, and a guiding chapter on solution architecture development. The content is mainly practical hence can be applied or be a supplemental input to the architectural projects at hand. -
Architecting Big Data Solutions Integrated with IoT & Cloud: Create strategic business insights with agility
-
IoT, Big Data, and Cloud Computing are three distinct technology domains with overlapping use cases. Each technology has its own merits; however, the combination of three creates a synergy and the golden opportunity for businesses to reap the exponential benefits. This combination can create technological magic for innovation when adequately architected, designed, implemented, and operated.
Integrating Big Data with IoT and Cloud architectures provide substantial business benefits. It is…IoT, Big Data, and Cloud Computing are three distinct technology domains with overlapping use cases. Each technology has its own merits; however, the combination of three creates a synergy and the golden opportunity for businesses to reap the exponential benefits. This combination can create technological magic for innovation when adequately architected, designed, implemented, and operated.
Integrating Big Data with IoT and Cloud architectures provide substantial business benefits. It is like a perfect match. IoT collects real-time data. Big Data optimises data management solutions. Cloud collects, hosts, computes, stores, and disseminates data rapidly.
Based on these compelling business propositions, the primary purpose of this book is to provide practical guidance on creating Big Data solutions integrated with IoT and Cloud architectures. To this end, the book offers an architectural overview, solution practice, governance, and underlying technical approach for creating integrated Big Data, Cloud, and IoT solutions.
The book offers an introduction to solution architecture, three distinct chapters comprising Big Data, Cloud, and the IoT with the final chapter, including conclusive remarks to consider for Big Data solutions. These chapters include essential architectural points, solution practice, methodical rigour, techniques, technologies, and tools.
Creating Big Data solutions are complex and complicated from multiple angles. However, with the awareness and guidance provided in this book, the Big Data solutions architects can be empowered to provide useful and productive solutions with growing confidence.
Patents
-
METHOD AND SYSTEM FOR PROVIDING IMMUNITY TO COMPUTERS
Issued US 8,271,834
A method and system for providing immunity to a computer system wherein the system includes an immunity module, a recovery module, a maintenance module, an assessment module, and a decision module, wherein the immunity module, the recovery module, the maintenance module and the assessment module are each linked to the decision module. The maintenance module monitors the system for errors and sends an error alert message to the assessment module, which determines the severity of the error and…
A method and system for providing immunity to a computer system wherein the system includes an immunity module, a recovery module, a maintenance module, an assessment module, and a decision module, wherein the immunity module, the recovery module, the maintenance module and the assessment module are each linked to the decision module. The maintenance module monitors the system for errors and sends an error alert message to the assessment module, which determines the severity of the error and the type of package required to fix the error. The assessment module sends a request regarding the type of package required to fix the error to the recovery module. The recovery module sends the package required to fix the error to the maintenance module, which fixes the error in the system.
-
GLOBAL PROFILE MANAGEMENT METHOD AND SYSTEM
Issued US 12/631,967
A profile management method and system. The method includes retrieving by a computer processor from a user of social network, a user request for generating a profile. The computer processor retrieves user data and an encrypted master security token comprising an identifier associated with the user. The computer processor generates the profile with the user data and associates the profile with the encrypted master security token. The computer processor receives from the social network a request…
A profile management method and system. The method includes retrieving by a computer processor from a user of social network, a user request for generating a profile. The computer processor retrieves user data and an encrypted master security token comprising an identifier associated with the user. The computer processor generates the profile with the user data and associates the profile with the encrypted master security token. The computer processor receives from the social network a request associated with a membership to the social network. The computer system adds communication data to the encrypted master security token and enables access to the profile based on the encrypted master security token. The computer processor transmits to said first social network, a copy of the profile.
-
FACILITATING ELECTRONIC KNOWLEDGE TRANSFER IN ORGANIZATIONS
Filed US 0100106536
The present invention provides an approach for facilitating (electronic) knowledge transfer in organizations. Specifically, under the present invention, knowledge objects are collected, a set of questions are generated and classified, and a set of checklists are generated. Based on the knowledge objects, response to the questions, and the checklists, a set of analyses is performed, and a resulting set of reports generated. The reports as well as the knowledge objects, questions and/or…
The present invention provides an approach for facilitating (electronic) knowledge transfer in organizations. Specifically, under the present invention, knowledge objects are collected, a set of questions are generated and classified, and a set of checklists are generated. Based on the knowledge objects, response to the questions, and the checklists, a set of analyses is performed, and a resulting set of reports generated. The reports as well as the knowledge objects, questions and/or checklists can be archived for later use.
Languages
-
Turkish
Native or bilingual proficiency
-
English
Native or bilingual proficiency
-
German
Professional working proficiency
Recommendations received
13 people have recommended Dr. Mehmet
Join now to viewMore activity by Dr. Mehmet
-
An Insightful story and Invitation to scholarly writers to Medium by Brittany Jezouit: "How academics use Medium to share research and ideas easily…
An Insightful story and Invitation to scholarly writers to Medium by Brittany Jezouit: "How academics use Medium to share research and ideas easily…
Shared by Dr. Mehmet Yildiz
-
📚 From Manuscript to Masterpiece: Why I Chose Spines for My Book Journey Dear aspiring book authors, As an author of multiple books, I know the…
📚 From Manuscript to Masterpiece: Why I Chose Spines for My Book Journey Dear aspiring book authors, As an author of multiple books, I know the…
Shared by Dr. Mehmet Yildiz
-
🚀 From Zero to Substack Hero: A Collaboration to Empower Writers Last month, Aiden approached me with an exciting idea: embedding the content of my…
🚀 From Zero to Substack Hero: A Collaboration to Empower Writers Last month, Aiden approached me with an exciting idea: embedding the content of my…
Shared by Dr. Mehmet Yildiz
-
Nice to meet you Yoofi Biney. Thank you for sharing Aiden MC. Let's connect to each other, learn from each other and grow together. 💯 🙏🏾 🤎…
Nice to meet you Yoofi Biney. Thank you for sharing Aiden MC. Let's connect to each other, learn from each other and grow together. 💯 🙏🏾 🤎…
Liked by Dr. Mehmet Yildiz
-
A Free December Gift for Freelance Writers on Substack 🎁 Feeling stuck on how to grow your newsletter? You’re not alone—I’ve been there too. But…
A Free December Gift for Freelance Writers on Substack 🎁 Feeling stuck on how to grow your newsletter? You’re not alone—I’ve been there too. But…
Shared by Dr. Mehmet Yildiz
-
History of Black Friday: One Day Only? https://lnkd.in/gsCUjfqw
History of Black Friday: One Day Only? https://lnkd.in/gsCUjfqw
Liked by Dr. Mehmet Yildiz
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Dr. Mehmet Yildiz
1 other named Dr. Mehmet Yildiz is on LinkedIn
See others named Dr. Mehmet Yildiz