Daily Tech Digest - February 05, 2021

Riding out the wave of disruption

Disruption is not necessarily the crisis it’s frequently considered to be for incumbents, the researchers stress. Two technologies can often coexist in the marketplace for a significant period. Thus, it’s important for incumbent companies not to overreact. They should target dual users and reexamine the factors that have led to the old technology sticking around for so long. Of course, the profit implications of cannibalization of the old technology and leapfrogging depend on which type of firm is trumpeting the new technology. New entrants will always stand to gain when they introduce a technology that takes off. But incumbents rolling out a successive technology will also gain if their competitors would have introduced it anyway or if the 2.0 version has a higher profit margin than the original. The authors write, “Leapfroggers are an opportunity loss for incumbents, but switchers are a real loss.” Regardless of the predictive model they use, marketers should strive to understand how the various consumer segments identified in this study will grow or shrink over time and use that information in their forecasts of early sales or market penetration of successive technologies.


AI and APIs: The A+ Answers to Keeping Data Secure and Private

Adding to the complexity is ensuring that AI and data are used ethically, Marques points out. Two key categories comprise secure AI, he says: responsible AI and confidential AI. Responsible AI focuses on regulations, privacy, trust, and ethics related to decision-making using AI and ML models. Confidential AI involves how companies share data with others to address a common business problem. For example, airlines might want to pool data to better understand maintenance, repair, and parts failure issues but avoid exposing proprietary data to the other companies. Without protections in place, others might see confidential data. The same types of issues are common among healthcare companies and financial services firms. Despite the desire to add more data to a pool, there are also deep concerns about how, where, and when the data is used. In fact, complying with regulations is merely a starting point for a more robust and digital-centric data management framework, Jahil explains. Security and privacy must extend into a data ecosystem and out to customers and their PII. For example, CCPA has expanded the concept of PII to include any information that may help identify the individual, like hair color or personal preferences.

What is a data center REIT?

The rationale for converting to REIT status will vary from company to company, but broadly it offers beneficial tax status and greater access to capital for growth. “The biggest benefit is that REITs don’t pay any corporate tax,” says Millionacre’s Frankel. “Think of a data center company that isn't a REIT. Its income can effectively be taxed twice; once at the corporate level when the company earns a profit, and again on the individual level when the company pays a dividend to investors.” The rules on whether an organization can apply for REIT classification vary from country to country, but broadly having a portfolio of properties from which real-estate activities such as rent is the majority of your revenue is derived, and having a number of investors to which you provide the majority of that revenue, is the minimum requirement. “REITs are able to raise capital more easily via share issuances and/or joint venture partnerships as investors have a better idea of the company’s financial situation once public, says Cushman & Wakefield’s Imboden. “The degree of difficulty [on becoming a REIT] depends largely on if the company was structured and managed with the intention of becoming a REIT, or if the decision was made after years of operating.”


12 security career-killers (and how to avoid them)

“The biggest problem I’ve seen is security people who think security is the be-all and end-all. They go in with that attitude, and they don’t see how they have to enable the business,” says James Carder, CSO of the security tech company LogRhythm. He says they instead need to collaborate with their business-unit colleagues to understand their objectives and then be an enabler, not a hinderance. Others agree. “Security is a profession that has plenty of standards and regulations and frameworks, but too many times we try to implement them in a blind way, from the perspective of the standards instead of trying to implement them in the context of the business,” adds Russ Kirby, CISO of software company ForgeRock. Similarly, Kirby has seen security pros become so focused on their own objectives that they alienate other departments that may otherwise want to work together to find a solution. He points to one scenario, where security staffers wanted to change an application’s minimum password length from 8 characters to upwards of 20. The IT application team pushed back, explaining that they could go to 12 characters but anything more would take significant time and money to change.


Six industries impacted by the combination of 5G and edge computing

"Weather and humidity can impact the performance of 5G,'' Roberts added; he also noted that, as 5G continues to proliferate, there will be many more cell towers. That's consistent with recently released research by PwC, which reported that "the performance of 5G networks remains uneven." Widespread usage is not here yet "because it's a big challenge to upgrade infrastructure," agreed Mark Sami, a director at West Monroe. Right now, for example, to get Verizon's Ultra Wideband network, "you need a line of sight to a tower so you have to be in close proximity," Sami said. ... "It's all about driving applications and how do you make these 5G and edge solutions [work] in a manner where you create more opportunities for the developer community to write applications to that infrastructure architecture,'' said Sid Nag, a vice-president at Gartner. Some 90% of industrial enterprises will use edge computing by 2020, according to Frost & Sullivan. "The applications are endless,'' observed Chris Steffen, a research director at Enterprise Management Associates. "Every vertical is going to be impacted in some way,'' he added, depending on specific use cases and relevance.


Why Disconnected Data Grinds Customer Journeys to a Halt

Business architecture matters because it defines and explains the relationships between customer business processes. And information and application architecture matter because they define the major types of information and the applications that process customer data. Clearly, this kind of systems thinking is essential to defining holistic customer journeys — or in the language of marketing, the friction points between customer facing systems and data that flows between them. Thinking this way raises questions like why customers need to interface with applications separately and why they have to enter data multiple times when interacting with these separate applications — two big sources of customer journey friction. Data limits the quality of the customer journey at three major points: a company’s sales, marketing and service processes. According to economist Theodore Levitt, any sales and marketing processes should focus on the following: “the role of marketing is creating and keeping the customer.” To create or obtain new customers, organizations must simplify the processes to become a customer, regardless of the customer channel chosen. In practice this means integrating customer facing systems, so customers enter information only once.


Rust Could Be the Secret to Next-Gen Computing

The team think there are good prospects for using ‘rust’ to create super-efficient computers. This is because although very simple in architecture, the Fe2O3-based device where merons and bimerons were found already contains all the ingredients to manipulate these tiny bits quickly and efficiently – by flowing a tiny electrical current in an extremely thin metallic ‘overcoat’. In fact, the team state that controlling and observing the movement of merons and bimerons in real time is the goal of a future X-ray microscopy experiment, currently in the planning phase. Moving from basic to applied research means cost and compatibility considerations are of paramount importance. While iron oxide is extremely abundant and cheap, the fabrication techniques employed by researchers at Singapore and Madison are complex and require atomic-scale control. However, the team are optimistic as they recently demonstrated that is possible to ‘peel off’ a thin layer of oxide from its growth medium and stick it almost anywhere, with its properties being largely unaffected. They say their next steps will be the design and fabrication of proof-of-principle devices based on ‘cosmic strings’ .


New Opportunities from Tech-Driven Industry Convergence

When we study the evolution of information technology, we find that companies traditionally leveraged technology solutions to serve specific business functions within an industry. For example, in life sciences or pharmaceutical companies, technology solutions were usually grouped by function such as commercial, R&D, and supply chain. Most answers were explicitly designed for the specific process and had little scope for portability across sectors. However, as technologies evolved, solutions have become increasingly broad-based and sector-agnostic. While cloud and high-tech companies still provide industry-specific solutions, there is a convergence in the types of problems they solve for customers across industries. ... As the lines are getting blurred, we need to rethink our traditional approach to grouping various sectors when building technology solutions. For instance, all consumer-facing industries such as CPG, pharma, insurance, and manufacturing are likely to have significant overlap in the challenges they face. Similarly, healthcare, finance, medical devices, retail, and telecommunications are likely to find common ground.


Networking software can ease the complexity of multicloud management

Cloud providers offer essential tools in three key areas: security, networking, and management and orchestration (MANO). Their security capabilities and controls often must be manually implemented, and their networking requires that their on-ramps and off ramps—which providers optimize--be specifically routed. Each cloud has its own MANO tools to provide management, visibility, and automation tools that must be set in order to gain visibility see and tune application performance. That means a learning curve and fragmented MANO for enterprise IT teams that support multicloud environments. These factors combine to make many IT operations involving IaaS multiclouds difficult to scale and the task of troubleshooting performance slowdowns tedious and time consuming. The leading IaaS providers are building new access capabilities at the edge of their networks. Key to user experience is network performance, which relies on network routing to and from the nearest cloud on-ramp. Leveraging WAN network intelligence is essential to delivering a reliable, high quality experience between applications in the public cloud and end-users. Enterprise IT will require the network intelligence to connect to the best IaaS point of presence to accelerate application delivery.


The transportation sector needs a standards-driven, industry-wide approach to cybersecurity

We have already witnessed attacks on electronic charging stations via the Near-Field Communication (NFC) card, which handles billing for EV charging. The ID cards have inherent vulnerabilities due to third-party providers not securing customer data. Research has shown malicious individuals can copy these cards and use them to charge other vehicles. Another concern is related to traditional lithium-ion batteries, which are used in EVs and have the potential to explode. While this issue is being addressed by battery suppliers with investment in R&D, this safety effort must also consider the risk of cyber attacks. If it’s known that a battery in an EV can explode, this may increase the likelihood that a bad actor may target this type of car with the intent to cause harm. As EV battery technology advances, it’s imperative that comprehensive cybersecurity measures evolve and improve in parallel so automakers and technology providers can prevent this type of hacking from occurring. As the AV industry advances, so will the incentives for hackers. There is an increased potential for financial crimes committed via ransomware attacks. Further, these attacks could cause vehicles to behave abnormally, potentially endangering human lives.



Quote for the day:

"To accomplish great things, we must not only act, but also dream, not only plan but also believe." -- Anatole France

No comments:

Post a Comment