Dr. Mehmet Yildiz

Dr. Mehmet Yildiz

Greater Melbourne Area
25K followers 500 connections

About

Serving as an independent technology consultant for architecture and design in emerging technologies.

Certified as a Distinguished Enterprise Architect, Design Thinking practitioner, Agile Champion, my focus is on helping generate revenue from IT investments applying smart structure and flexible governance.

Demonstrated experience in Cloud, IoT, and Big Data.

Founder / Editor in Chief for Technology Hits / ILLUMINATION Integrated Publications with 31,000 writers across the globe. Writer for News Break.

Worked as an Executive IT Architect, serving clients as a Trusted Advisor until Dec 2020.

40 years of Technology experience with valuable insights from the industry.

I share my experience in generating excellent outcomes.

As an Enterprise Architect, I planned, architected, and designed solutions for complex digital transformation initiatives.

Certified as a Thought Leader in Enterprise Architecture by IBM and Distinguished Architect by The Open Group.

IBM appointed me as a Senior Inventor.

Strong focus, experience in multiple industries including Banking, Telecommunications, Insurance, Energy, Utilities, Financial Markets, Petroleum, Chemicals, Government, Retail, Education.

Before IBM tenure, having worked in large global organisations (NATO and Siemens), I gained experience with a broad array of leading-edge technologies, processes, methods, tools. This experience helped me solve complex business problems.
I'm a published author with multiple books about digital transformation, enterprise and business architecture, Big Data Analytics. https://digitalmehmet.com

Writer on Medium and Vocal:
https://dr-mehmet-yildiz.medium.com/
https://vocal.media/authors/dr-mehmet-yildiz

Specialties:
Enterprise, Business, Technology, Infrastructure, Information, Application Architecture
Cognitive Transformation / Artificial Intelligence Adoption
Enterprise technology solutions
Agile delivery
Business Continuity, Resilience, Disaster Recovery
Advanced Research Methods for Industry Studies
Technical Strategy
Architectural Governance
Complex Technology Transition, Transformation Engagements
Technology Planning, Strategic Solution Roadmaps, Business Capability Assessment
Mining inventions, innovative ideas
Tacit Knowledge Transfer in Enterprise
Self Healing Infrastructure Systems (patented)
Emerging Technology Assessment at CxO level
Cloud Computing, Edge Computing
Data Architecture, Big Data Platforms
IoT (Internet of Things) Solutions
Blockchain, Cybersecurity
IBM CBM (Component Business Model)
Design Thinking Practitioner
Technology Leadership

Articles by Dr. Mehmet

See all articles

Contributions

Activity

Join now to see all activity

Experience

  • Substack Graphic
  • -

  • -

  • -

  • -

    United States

  • -

  • -

    Melbourne and Canberra Australia

  • -

    Melbourne, Victoria, Australia

  • -

    Melbourne, Victoria, Australia

  • -

    Melbourne, Victoria, Australia

  • -

    Melbourne, Victoria, Australia

  • -

    Germany

Education

  •  Graphic

    -

  • -

  • -

Licenses & Certifications

Publications

  • Architecting Digital Tranformation

    S.T.E.P.S. Publishing Australia

    Enterprises are facing enormous challenges to respond to the rapid changes and growing demands of digital consumers globally. There is constant search to find solutions to the growing problems. The most optimal solution to address this problem is to architect our enterprise digital transformation requirements aligning with digital trends and innovative frameworks as described in this book with an articulated 12-step method.
    Architecting digital transformations addresses the root causes of…

    Enterprises are facing enormous challenges to respond to the rapid changes and growing demands of digital consumers globally. There is constant search to find solutions to the growing problems. The most optimal solution to address this problem is to architect our enterprise digital transformation requirements aligning with digital trends and innovative frameworks as described in this book with an articulated 12-step method.
    Architecting digital transformations addresses the root causes of fundamental issues that we experience in the digital world. The proliferation of digital media in the form of images, sound, and videos created a massive demand for our infrastructure to scale globally. Relentless sharing of these media types creates an unsustainable load over the networks, applications, and other expensive infrastructure components unless an effective capacity plan is in place.
    Based on my architectural thought leadership on various enterprise architecture initiatives, digital transformation, and modernisation engagements, with my accumulated body of knowledge and skills from practical settings, I want to share these learnings in a concise book with a specific 12-step method hoping to add value by contributing to the broader digital community and the progressing digital transformation initiatives.
    I made every effort to make this book concise, uncluttered, and easy-to-read by removing technical jargons to make it readable by a broader audience who want to architect their digital transformation programs to align with the growing demands of their digital consumers.
    In this book, I highlight the problems from an architectural point of view, following established and emerging methods, and recommend effective solutions to address them in a methodical way.

    See publication
  • Digital Intelligence: A framework to digital transformation capabilities

    authored this book because dealing with intelligence, and the digital world is a passion for me and wanted to share my passion with you. In this book, I aim to provide compelling ideas and unique ways to increase, enhance, and deepen your digital intelligence and awareness and apply them to your organisation’s digital journey particularly for modernisation and transformation initiatives. I used the architectural thinking approach as the primary framework to convey my message.
    Based on my…

    authored this book because dealing with intelligence, and the digital world is a passion for me and wanted to share my passion with you. In this book, I aim to provide compelling ideas and unique ways to increase, enhance, and deepen your digital intelligence and awareness and apply them to your organisation’s digital journey particularly for modernisation and transformation initiatives. I used the architectural thinking approach as the primary framework to convey my message.
    Based on my architectural thought leadership on various digital transformation and modernisation engagements, with the accumulated wealth of knowledge and skills, I want to share these learnings in a concise book hoping to add value by contributing to the broader digital community and the progressing initiatives.
    Rest assured, this is not a theory or an academic book. It is purely practical and based on lessons learned from real enterprise transformation and modernisation initiatives taken in large corporate environments.
    I made every effort to make this book concise, uncluttered, and easy-to-read by removing technical jargons for a broader audience who want to enhance digital intelligence and awareness.
    Upfront, this book is not about a tool, application, a single product, specific technology, or service, and certainly not to endorse any of these items. However, this book focuses on architectural thinking and methodical approach to improve digital intelligence and awareness. It is not like typical digital transformation books available on the market. In this book, I do not cover and repeat the same content of those books describing digital transformations. My purpose is different.

    See publication
  • A Technical Excellence Framework

    S.T.E.P.S. Publishing Australia

    The primary purpose of this book is to provide valuable insights for digital transformational leadership empowered by technical excellence by using a pragmatic five-pillar framework. This empowering framework aims to help the reader understand the common characteristics of technical and technology leaders in a structured way.

    Even though there are different types of leaders in broad-spectrum engaging in digital transformations, in this book, we only concentrate on excellent technical and…

    The primary purpose of this book is to provide valuable insights for digital transformational leadership empowered by technical excellence by using a pragmatic five-pillar framework. This empowering framework aims to help the reader understand the common characteristics of technical and technology leaders in a structured way.

    Even though there are different types of leaders in broad-spectrum engaging in digital transformations, in this book, we only concentrate on excellent technical and technology leaders having digital transformation goals to deal with technological disruptions and robust capabilities to create new revenue streams. No matter whether these leaders may hold formal executive titles or just domain specialist titles, they demonstrate vital characteristics of excellent technical leadership capabilities enabling them to lead complex and complicated digital transformation initiatives.

    The reason we need to understand technical excellence and required capabilities for digital transformational leadership in a structured context is to model their attributes and transfer the well-known characteristics to the aspiring leaders and the next generations. We can reflect upon our understanding of these capabilities at an individual level and apply them to our day to day activities. We can even turn them into useful habits to excel in our professional goals. Alternatively, we can pass this information to other people that we are responsible for, such as our teenagers aiming for digital leadership roles, tertiary students, mentees, and colleagues.

    I attempt to define the roles of strategic technical and technology leaders using a specific framework, based on innovation, simplicity, agility, fusion and technical excellence. This framework offers a common understanding of the critical factors of the leader. The structured analysis presented in this book can be valuable to understand the contribution of technical leaders clearly.

    See publication
  • A Modern Enterprise Architecture Approach Empowered with Cloud, Mobility, IoT & Big Data

    S.T.E.P.S. Publishing Australia

    I authored this book to provide essential guidance, compelling ideas, and unique ways to Enterprise Architects so that they can successfully perform complex enterprise modernisation initiatives transforming from chaos to coherence. This is not an ordinary theory book describing Enterprise Architecture in detail. There are myriad of books on the market and in libraries discussing details of enterprise architecture.
    As a practising Senior Enterprise Architect myself, I read hundreds of those…

    I authored this book to provide essential guidance, compelling ideas, and unique ways to Enterprise Architects so that they can successfully perform complex enterprise modernisation initiatives transforming from chaos to coherence. This is not an ordinary theory book describing Enterprise Architecture in detail. There are myriad of books on the market and in libraries discussing details of enterprise architecture.
    As a practising Senior Enterprise Architect myself, I read hundreds of those books and articles to learn different views. They have been valuable to me to establish my foundations in the earlier phase of my profession. However, what is missing now is a concise guidance book showing Enterprise Architects the novel approaches, insights from the real-life experience and experimentations, and pointing out the differentiating technologies for enterprise modernisation. If only there were such a guide when I started engaging in modernisation and transformation programs.
    The biggest lesson learned is the business outcome of the enterprise modernisation. What genuinely matters for business is the return on investment of the enterprise architecture and its monetising capabilities. The rest is the theory because nowadays sponsoring executives, due to economic climate, have no interest, attention, or tolerance for non-profitable ventures. I am sorry for disappointing some idealistic Enterprise Architects, but with due respect, it is the reality, and we cannot change it. This book deals with reality rather than theoretical perfection. Anyone against this view on this climate must be coming from another planet.

    See publication
  • An Integrated Virtual Ethnographic Study: Use of Computerised Social Networks to Transfer Tacit Knowledge for Mass Collaboration in the IT Workplace

    The International Journal of Technology, Knowledge and Society

    The purpose of this paper is to report the key findings of a number of independent research projects conducted in virtual settings. The first research project was to understand the knowledge transfer process and activities in the virtual teams for mass collaboration. The second project was to evaluate the efficiency of major social networking tools used by the IT professionals. The third project was identify the correlation between computerized social networking and knowledge transfer…

    The purpose of this paper is to report the key findings of a number of independent research projects conducted in virtual settings. The first research project was to understand the knowledge transfer process and activities in the virtual teams for mass collaboration. The second project was to evaluate the efficiency of major social networking tools used by the IT professionals. The third project was identify the correlation between computerized social networking and knowledge transfer. Integration of these three research projects, particularly comparing the findings from each, enabled to discover new patterns and useful learning lessons for the knowledge management discipline in the IT workplace.

    See publication
  • Issues in User Generated Content Process and a Proposed Model to Solve them

    The International Journal of Technology, Knowledge and Society

    User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large enterprises. This study provides review of extensive literature search for the technical issues of UGC globally. Based on the experience of authors in the field, and considering the gaps identified, it provides a macro level technical management model to address these issues using…

    User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large enterprises. This study provides review of extensive literature search for the technical issues of UGC globally. Based on the experience of authors in the field, and considering the gaps identified, it provides a macro level technical management model to address these issues using findings from a number of case studies.

    Other authors
    • Tuncay Ercan
    See publication
  • Semantic Access Control for Corporate Mobile Devices

    Springer

    any of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the…

    any of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or organizations have become totally distributed between peers and partners. Designing applicable access control mechanisms in this environment is difficult from the point of traditional security measures. Semantic web technologies offer appropriate access opportunities to the corporate resources by using related context in user devices and servers under the trust philosophy. Semantic web technology combines user requests and service descriptions for an efficient matchmaking. This paper examines various access control mechanisms and semantically analyzes them. The purpose of this paper is to present a more secure access control mechanism for mobile corporate devices. This model can be used as an additional security framework that enforces access control mechanisms in the organizations.

    Other authors
    • Tuncay Ercan
    See publication
  • A Layered Security Approach for Cloud Computing Infrastructure

    IEEE

    This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be…

    This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.

    Other authors
    • Abawajy J.   Ercan T.   Bernoth A.
    See publication
  • Governance of Information Security Elements in Service-Oriented Enterprise Architecture

    IEEE

    This paper identifies and analyzes governance roles and tasks in SOA security governance at macro level. Drawing from Information security management standards and frameworks on one hand and SOA considerations on the other hand, the identified governance elements are mapped to a governance structure that specifies planning and execution aspects at four organizational decision-making levels, resulting in a prescriptive model with practical relevance. This constructive study combines theoretical…

    This paper identifies and analyzes governance roles and tasks in SOA security governance at macro level. Drawing from Information security management standards and frameworks on one hand and SOA considerations on the other hand, the identified governance elements are mapped to a governance structure that specifies planning and execution aspects at four organizational decision-making levels, resulting in a prescriptive model with practical relevance. This constructive study combines theoretical models and standards with industry experience of the authors.

    Other authors
    • Mykkanen j
    • Korhonen J.J.
    See publication
  • Technological Trends and their Impacts on the Virtual Teams’ Learning in the IT Workplace

    The International Journal of Learning

    The emerging information technologies play a significant role for the learning process of IT professionals in the workplace. This presentation will have a three pronged approach to inform the audience of this phenomenon. Firstly it will provide a trend analysis using a historical view of last 7 years of recorded (qualitative/quantitative) data in the presenter’s doctoral / postdoctoral studies in ethnographic settings. Secondly, it will elucidate the impact of key technologies and processes on…

    The emerging information technologies play a significant role for the learning process of IT professionals in the workplace. This presentation will have a three pronged approach to inform the audience of this phenomenon. Firstly it will provide a trend analysis using a historical view of last 7 years of recorded (qualitative/quantitative) data in the presenter’s doctoral / postdoctoral studies in ethnographic settings. Secondly, it will elucidate the impact of key technologies and processes on the cognitive development of these professionals and how they affect the productivity in the workplace. Thirdly, in conclusion, an attempt will be made to predict the future progress in this field.

    See publication
  • A Practical Guide for IoT Solution Architects: Architecting secure, agile, economical, highly available, well performing IoT Ecosystems

    -

    he focus of this book is to provide the IoT Solution Architects practical guidance and a unique perspective. Solution Architects working in IoT ecosystems have an unprecedented level of responsibilities at work.
    Dealing with IoT ecosystems can be daunting. As an experienced practitioner of this topic, I understand the challenges faced by the IoT Solution Architects. I reflect my insights based on my solution architecture experience spread across three decades.
    This book can also guide…

    he focus of this book is to provide the IoT Solution Architects practical guidance and a unique perspective. Solution Architects working in IoT ecosystems have an unprecedented level of responsibilities at work.
    Dealing with IoT ecosystems can be daunting. As an experienced practitioner of this topic, I understand the challenges faced by the IoT Solution Architects. I reflect my insights based on my solution architecture experience spread across three decades.
    This book can also guide other types of architects and designers who want to learn architectural aspects of IoT and understand key challenges and practical resolutions in IoT solution architectures.
    Each chapter in this book focuses on the key aspects set as a framing scope for this book. They are security, availability, performance, agility, and cost-effectiveness.
    Besides, the book provides useful definitions, a brief practical background on IoT, and a guiding chapter on solution architecture development. The content is mainly practical hence can be applied or be a supplemental input to the architectural projects at hand.

    See publication
  • Architecting Big Data Solutions Integrated with IoT & Cloud: Create strategic business insights with agility

    -

    IoT, Big Data, and Cloud Computing are three distinct technology domains with overlapping use cases. Each technology has its own merits; however, the combination of three creates a synergy and the golden opportunity for businesses to reap the exponential benefits. This combination can create technological magic for innovation when adequately architected, designed, implemented, and operated.
    Integrating Big Data with IoT and Cloud architectures provide substantial business benefits. It is…

    IoT, Big Data, and Cloud Computing are three distinct technology domains with overlapping use cases. Each technology has its own merits; however, the combination of three creates a synergy and the golden opportunity for businesses to reap the exponential benefits. This combination can create technological magic for innovation when adequately architected, designed, implemented, and operated.
    Integrating Big Data with IoT and Cloud architectures provide substantial business benefits. It is like a perfect match. IoT collects real-time data. Big Data optimises data management solutions. Cloud collects, hosts, computes, stores, and disseminates data rapidly.
    Based on these compelling business propositions, the primary purpose of this book is to provide practical guidance on creating Big Data solutions integrated with IoT and Cloud architectures. To this end, the book offers an architectural overview, solution practice, governance, and underlying technical approach for creating integrated Big Data, Cloud, and IoT solutions.
    The book offers an introduction to solution architecture, three distinct chapters comprising Big Data, Cloud, and the IoT with the final chapter, including conclusive remarks to consider for Big Data solutions. These chapters include essential architectural points, solution practice, methodical rigour, techniques, technologies, and tools.
    Creating Big Data solutions are complex and complicated from multiple angles. However, with the awareness and guidance provided in this book, the Big Data solutions architects can be empowered to provide useful and productive solutions with growing confidence.

    See publication

Patents

  • METHOD AND SYSTEM FOR PROVIDING IMMUNITY TO COMPUTERS

    Issued US 8,271,834

    A method and system for providing immunity to a computer system wherein the system includes an immunity module, a recovery module, a maintenance module, an assessment module, and a decision module, wherein the immunity module, the recovery module, the maintenance module and the assessment module are each linked to the decision module. The maintenance module monitors the system for errors and sends an error alert message to the assessment module, which determines the severity of the error and…

    A method and system for providing immunity to a computer system wherein the system includes an immunity module, a recovery module, a maintenance module, an assessment module, and a decision module, wherein the immunity module, the recovery module, the maintenance module and the assessment module are each linked to the decision module. The maintenance module monitors the system for errors and sends an error alert message to the assessment module, which determines the severity of the error and the type of package required to fix the error. The assessment module sends a request regarding the type of package required to fix the error to the recovery module. The recovery module sends the package required to fix the error to the maintenance module, which fixes the error in the system.

    See patent
  • GLOBAL PROFILE MANAGEMENT METHOD AND SYSTEM

    Issued US 12/631,967

    A profile management method and system. The method includes retrieving by a computer processor from a user of social network, a user request for generating a profile. The computer processor retrieves user data and an encrypted master security token comprising an identifier associated with the user. The computer processor generates the profile with the user data and associates the profile with the encrypted master security token. The computer processor receives from the social network a request…

    A profile management method and system. The method includes retrieving by a computer processor from a user of social network, a user request for generating a profile. The computer processor retrieves user data and an encrypted master security token comprising an identifier associated with the user. The computer processor generates the profile with the user data and associates the profile with the encrypted master security token. The computer processor receives from the social network a request associated with a membership to the social network. The computer system adds communication data to the encrypted master security token and enables access to the profile based on the encrypted master security token. The computer processor transmits to said first social network, a copy of the profile.

    See patent
  • FACILITATING ELECTRONIC KNOWLEDGE TRANSFER IN ORGANIZATIONS

    Filed US 0100106536

    The present invention provides an approach for facilitating (electronic) knowledge transfer in organizations. Specifically, under the present invention, knowledge objects are collected, a set of questions are generated and classified, and a set of checklists are generated. Based on the knowledge objects, response to the questions, and the checklists, a set of analyses is performed, and a resulting set of reports generated. The reports as well as the knowledge objects, questions and/or…

    The present invention provides an approach for facilitating (electronic) knowledge transfer in organizations. Specifically, under the present invention, knowledge objects are collected, a set of questions are generated and classified, and a set of checklists are generated. Based on the knowledge objects, response to the questions, and the checklists, a set of analyses is performed, and a resulting set of reports generated. The reports as well as the knowledge objects, questions and/or checklists can be archived for later use.

    See patent

Languages

  • Turkish

    Native or bilingual proficiency

  • English

    Native or bilingual proficiency

  • German

    Professional working proficiency

Recommendations received

More activity by Dr. Mehmet

View Dr. Mehmet’s full profile

  • See who you know in common
  • Get introduced
  • Contact Dr. Mehmet directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Dr. Mehmet Yildiz

Add new skills with these courses