Page 11234..1020..»

Global Internet Security Market Growth Opportunities & Factors and Profit Margin | Size, Share, Trends and CAGR Up To 2028 – The State News -…

New York City, NY: December, 2019 Published via (WiredRelease) The complete study of Global Internet Security market report provides new insights and clarification on the Internet Security market and help you to refine and polish your business strategies. The market categorized into Product Type And Service, Technology, Applications, And Region so that users could save time. The key market players are evaluated on various parameters such as company overview, product portfolio, Internet Security developed by the companies and recent development trends of the Internet Security market.

Internet Security Market research report provides the details about Market Competition, Size & Share, Industry Chain structure, Technological developments, Raw Materials, Consumer Preference, Development & Trends, Regional Forecast, Company Profile & Service.It studies global as well as the regional presence of the market. Information on major players of the market, their market position, revenue study, and growth tactics have been included. Growth rate and market value are also examined for global as well as region. It highlights the competitive territory of the business place that involves the key companies in the market. For the examination, market information, development possibilities, and market patterns are taken into consideration. Based year in this report is 2019; the historical data is from 2014-2019 and the forecast year is from 2019 to 2028.

Internet Security market research report also gives information on the Trade Overview, Policy, Regional Market, Business Operation Data, Market Features, Regional Trade, Investment Opportunity, Investment Calculation and other important aspect of the industry.

Click Here, And Download Free Sample Copy In Just One Single Step At:

Key Segments Covered Within This Report:

The key regions are extensively analyzed with respect to every parameter of the geographies in question, comprising, Europe (Germany, France, UK, Russia and Italy), North America (United States, Canada and Mexico), Asia-Pacific (China, Japan, Korea, India and Southeast Asia), South America (Brazil, Argentina, Colombia etc.), Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa).

Market segment

By product type and service:

Hardware serviceSoftware serviceBy technology:

Authentication technologyAccess control technologyContent filteringCryptography

Top players inInternet Securitymarket: Kaspersky Lab, Cyber Ark Software Ltd., Microsoft Corp., Hewlett Packard Company, Qualys Inc, Cisco Systems Inc, International Business Machine (IBM) Corp., Symantec Corporation, Trend Micro Inc. and Webroot Inc..

What Makes The Report Excellent?

The market review for the global market is done in context to region, share, and size.

The report offers a competitive market scenario among major players of the industry, a proper understanding of the growth opportunities.

The important strategies of top players in the market.

The study on to major players in the market with their both sales volume and size

Categorized and summarized data based on types, regions, companies, and applications of the product.

Data of the Wastewater Treatment Antifoam Agents insights, consumption, market share, and convictions over the globe.

The report offers complete guidance to provide in-depth market insights across all the industry verticals


People looking to enrich the decision-making capability by following points must buy the report:

1. Breakdown of the market share of the top industry players

2. Evaluations of market share for the regional and country-level sectors

3. Estimation of market for the forecast period of all the aforementioned classes, subclasses, and the domestic markets

4. Tactical recommendation for the newbies

5. Tactical recommendation in primary business industries based on the market forecast

Customize Report AndInquiry For The Internet Security Market Report:

Who we are and what we do: is a pioneering company in the fields of market research and analytical reporting. Our services enable clients to enhance business efficiency and focus on other core aspects of operations, while we take care of market research and reporting needs. conducts and executes detailed and in-depth research and analysis across all relevant domains and offers accurate and insightful estimations and forecasts to enable clients to take well-informed and crucial decisions in their respective industries, sectors, or companies.

Contact Us At

Mr. Benni Johnson

MarketResearch.Biz (Powered By Prudour Pvt. Ltd.)

420 Lexington Avenue, Suite 300

New York City, NY 10170,

United States

Tel: +1 347 826 1876


Email ID:[emailprotected]

This content has been distributed via WiredRelease press release distribution service. For press release service enquiry, please reach us at[emailprotected].

Go here to read the rest:
Global Internet Security Market Growth Opportunities & Factors and Profit Margin | Size, Share, Trends and CAGR Up To 2028 - The State News -...

Read More..

NATO Should Count Spending on Secure 5G Towards Its 2% Goals – Defense One

Getting internet security right is key to the alliances very future.

The agenda at NATOs London summit reportedly includes talk about the future of internet security that is, establishing rules and roles for next-generation 5G gear. This is both a vital issue and a bellwether. If done right, moving to secure 5G systems can rejuvenate the alliance around its central mission: protecting democratic states from authoritarian incursion. Botch it, and the rift will onlyincrease.

Whether NATO comes together or falls apart over 5G presents an initial test of how it will handle Chinas rise. For Beijing, leapfrogging Western telecommunications firms is part and parcel of a vision to spread norms of authoritarian internet governance, promote surveillance technologies, build global dependencies, and undermine the liberal democratic order NATO anchors. U.S. officials can take several steps to help move the debate from admonition toaction.

First, NATO should allow members to count a portion of outlays on secure 5G systems towards national 2-percent defense spending goals. There are a number of ways 5G-inclusive targets could be defined, including one-time commitments or line-item funds, but if investing in technology built by trustworthy vendors is a priority for the United Statesand it should bethe alliances cost-sharing structure should reflectit.

Second, NATO should conduct thorough technical and political risk assessments on 5G networks and build shared cybersecurity standards. Last month,NATO announcedplans to update rules for civilian 5G. The United States should use this process to push for transparency requirements on the companies that build 5G networks, including disclosures on corporate ownership structures, direct government funding, and state influence and control. Whether an authoritarian government subsidizes telecommunications equipment to undercut local competitorsor controls a company to steal military, commercial, or personal datais relevant when considering allowing it to build the foundations of economic opportunity for NATO member states.


Receive daily email updates:

Subscribe to the Defense One daily.

Be the first to receive updates.

Put simply, NATO should require participating suppliers to show credible independence from foreign governments. In addition to helping secure networks, such a requirement fosters internet governance that resists authoritarian surveillance and erects barriers to the unfettered access of private citizendata.

Third, the United States should urge its allies to consider cooperative business models and infrastructure sharing arrangements that would help member countries choose trusted-yet-costlier systems over cheaper alternatives. Some creativity may be in order here, but NATO partnerships with the EU, Finland, and Sweden could build joint funding and research models for secure 5G and even 6Gsystems.

Proposing these initiatives would add constructive action to the U.S. governmentssteadydrumbeatagainst Huawei. Concerns over Chinese-made 5G have centered on espionage, but extend to amassing sensitive personal and corporate information and leveraging internet dependence for geopolitical control. In capital after capital, U.S. diplomats have warned allies and called for outrightbans.

For the rest of NATO, these concrete steps are also more politically viable. Amid divisions within allied nations over 5G and ample pressure from China, a tenuous plausible deniability consensus may emerge: to ratchet up requirements without singling out one country or company. A recentEuropean Union risk assessment on 5G, for example, notably cautioned against threats from state actors, but stopped short of naming Chinaexplicitly.

Disunity here has real consequences. A split over cybersecurity and the varying presence of untrusted suppliers from China in member countries 5G networks threatens vital NATO military and intelligence cooperation. The United States hasalready warnedthat it will limit intelligence sharing if allies build 5G networks with Chinese equipment. In the words ofone official, the Americans will assume that everything we share with Germany will end up with theChinese.

Such an outcome would be disastrous for the alliance. A NATO intelligence-sharing rift would open the door to greater authoritarian interference in Western democracies, and not just from China. NATOs intelligence sharing and threat analysis cell is a central tenet of itsplan to combat hybrid threatsfrom Russia and others: disinformation campaigns, malign financial flows, the annexation of Crimea, and more. Given Russias long-standing goal of fracturing NATO, its no coincidence that Russian state media championsHuawei.

Democracies need a competitive offer and a competitive vision for the future internet that starts with counting trusted 5G spending towards 2-percent targets, conducting joint risk assessments, and pursuing cooperative businessmodels.

Aligning on 5G wont solve all of NATOs problems. It wont stop Chinas economic coercion of NATO members or its human rights abuses in Xinjiang, and it wont stop Russias influence operations in Europe. But a failure to get 5G right most certainly will exacerbate them and bode ill for the future unity of thealliance.

The rest is here:
NATO Should Count Spending on Secure 5G Towards Its 2% Goals - Defense One

Read More..

Research center planned to help companies protect the Internet of Things more effectively – KU Today

LAWRENCE More and more, the internet connects to devices in our homes, our offices and even to critical infrastructure that supports the American way of life.

Yet, this snowballing interconnectivity of devices and systems dubbed the Internet of Things or IoT suffers from security vulnerabilities that leave people, companies and governments open to cyberattack from bad actors. Some liken the IoT tech frontier to a Wild West.

Now, a new planning grant from the National Science Foundation is enabling researchers from the University of Kansas School of Engineering to design a multi-institutional Center for High-Assurance Secure Systems and IoT (CHASSI) that would partner with private firms in the Kansas City area and across the United States to boost security of IoT products and systems ranging from medical devices to energy grids, real-time financial markets and national-defense infrastructure.

The center would be built around this notion of cybersecurity for high-assurance systems and the Internet of Things, said Michael Branicky, professor of electrical engineering & computer science at KU. We mean mission-critical items so we're not talking about using cryptography to secure cat videos. Well be working with people who manufacture things like medical devices, where it's critical to a company's business that these be secured. We've got five university partners, and KU is the overall lead institution.

Under the NSF grant, KUs partners in the CHASSI include the University of Minnesota, Syracuse University, Case Western Reserve University and Indiana University, each of which brings a distinct set of expertise, potential industry members and regional industrial strengths to the CHASSI partnership.

These are institutions that we have research relationships with or that have key expertise related to this area, Branicky said. Case Western Reserve University has expertise in the manufacturing and energy applications and industrial controls. Indiana University has done a lot in privacy and usability of IoT devices on the consumer side for instance, they have a lab where they tested a toy bear that has a camera connected to the internet. You know, parents might want to know if somebody would be seeing where their child is in the house and what they're doing. Syracuse University has a lot of expertise on certified security by design, where you formally construct proofs of the performance of the systems, and they've mainly done this for the military and the government, but they want to branch out to also doing this for companies. And then the University of Minnesota has expertise in the medical device area.

The five partnering institutions on the CHASSI planning grant would form a virtual center and work with tech companies in their geographic regions to develop more secure products and practices for cybersecurity. Multiple industry partners have signed letters of interest in hopes of coordinating with the prospective center.

We're trying to answer slightly broader hypotheticals that would give companies frameworks for IoT cybersecurity, offering them a toolbox for approaching these types of problems, Branicky said. This would work in the evaluation of not one particular product but maybe a family of products that would be applicable to more than one industry partner. But eventually centers like this could lead to proprietary research for partners. Once we understand a general framework, or general rules or tools that you could use to design these products, six months later a partner might have a new product and might want help that would be separate follow-on research we would also anticipate as an outcome of the center.

Branickys co-investigators on the planning grant from the KU School of Engineering are Perry Alexander, AT&T Foundation Distinguished Professor of Electrical Engineering and Computer Science and director of the Information and Telecommunication Technology Center; Victor Frost, the Dan F. Servey Distinguished Professor of Electrical Engineering and Computer Science; and Bo Luo, professor of electrical engineering & computer science.

At KU, the IoT cybersecurity researchers will leverage strengths in cybersecurity within the School of Engineering. For instance, the NSF CyberCorps Scholarship for Service program; students working toward undergraduate and graduate certificates in cybersecurity; the KU student cybersecurity group, the JayHackers (advised by Luo); and joint cybersecurity exercises of KU students with soldiers from Fort Riley and local high school students. Further, the researchers will tap diversity programs collected under IHAWKe (Indigenous, Hispanic, African-American, Women KU Engineering) to advance diversity and outreach and also join with KUs Women in Computing group to identify student researchers.

Branicky said researchers would conduct a planning workshop and submit a final proposal to NSF in 2020.


See the original post here:
Research center planned to help companies protect the Internet of Things more effectively - KU Today

Read More..

Internet freedom and security challenges: notes from the IGF 2019 – Democracy Without Borders

The Internet Governance Forum (IGF) was launched by the Secretary-General of the United Nations in 2006 and since then annual meetings have been held across the world. This year, Germany for the first time was the host country and organized the IGF in cooperation with the United Nations from 25-29 November in Berlin.

At the IGF 2019, I attended various sessions of different formats, mainly around the issues of digital democracy and identity. Here are my main learnings in short:

Blockchain technology (BC) is neither the solution to privacy nor to authentification issues: Public BCs seem to have their main advantage in providing for a high level of protection against fraud; and if they are used to serve as identity proof (e.g., for world citizens), there seems to be no way of avoiding a trusted authority, e.g. a public registry office, as a starting point. But there is obviously no privacy in a public BC, although there seem to be several ways of using a public BC with non-disclosed data, e.g. personal data that have been translated into hashes. The BC hype meanwhile seems to have been replaced by a more realistic approach in which BC offers interesting options in various software environments and for different purposes.

Democratic political regulation of the internet has become essential, and several speakers said that a global regulation frame was required. To me this is very convincing and it is also an issue for Democracy Without Borders: inclusive and participatory global democracy will require global digital communication but this can only work with internet platforms that are protected against misuse and domination. A bottom-up approach that takes a free global internet for granted is apparently no longer realistic.

Taking a free global internet for granted is no longer realistic

Maybe the European General Data Protection Regulation is a good first step in the direction of supranational data protection regulation and a good example for others; at least this view was shared by several speakers. And there seem to be plans for an European AI regulation as well. Regarding supranational regulation, however, there is a time issue: Referring to the issue of AI regulation it was said that the UN is too slow, so multilateral agreements would be a more promising approach. This will also be true for any form of internet regulation. Even more important, however, every global approach to internet regulation will also bear the risk that governments with an anti-freedom and anti-democracy agenda will try to exert their influence on this. So, democratic political regulation of the internet is by any means a difficult task and every step in this direction needs to be considered very carefully.

The internet gets nationally or regionally fragmented. In addition, in 2019 alone there apparently have already been 35 internet shutdowns (and counting). In Iran for instance, there has apparently been an internet shutdown by the government for five days in a row and it was said that due to effective preparations by the government the national/regional internet during this shutdown was working just fine (and even faster sometimes). Controlling and restricting the internet has become an attractive model for dictatorships all over the world and this is a real threat to global democracy. And there seems to be no technical way to circumvent such shutdowns. When discussing satellite technology options, a speaker from Iran commented sarcastically that even if this was feasible, it would certainly come under US sanctions as well.

There is a lot of influencing elections nowadays, and it is getting more. This has nothing to do with the way an election itself is being held (paper & pencil, electronic voting, etc.) but is all about fake news, targeted influencing and the like that is primarily done via online platforms and social media. It was said that maybe fact checking does not really help here when influencing works with identity issues and thereby addresses emotions that even may ignore opposing facts. However, empirical proof of the effects of influencing seems difficult or even impossible.

What are the conclusions for Democracy Without Borders, particularly the Global Voting Platform (GVP) initiative? In my view, the GVPs bottom-up approach of direct world citizen participation will have to be linked stronger with a regulatory top-down-approach of enabling and securing a free global internet by supranational regulation. Initiatives such as Contract for the Web should be supported. This, however, does not mean that authentification and security issues will be less important; and the potential use of BC technology is worth a more detailed consideration. Beside its still enormous potential for free global communication the internet obviously has also developed into a means of political control, manipulation and surveillance. It is no longer a neutral platform but has become a field of global politics and internet freedom is more and more under pressure from autocratic regimes.

Original post:
Internet freedom and security challenges: notes from the IGF 2019 - Democracy Without Borders

Read More..

A Sprint contractor left thousands of US cell phone bills on the internet by mistake – TechCrunch

A contractor working for cell giant Sprint stored on an unprotected cloud server hundreds of thousands of cell phone bills of AT&T, Verizon and T-Mobile subscribers.

The storage bucket had more than 261,300 documents, the vast majority of which were phone bills belonging to cell subscribers dating as far back as 2015. But the bucket, hosted on Amazon Web Services (AWS), was not protected with a password, allowing anyone to access the data inside.

Its not known how long the bucket was exposed.

The bills which contained names, addresses and phone numbers, and many included call histories were collected as part of an offer to allow cell subscribers to switch to Sprint, according to Sprint-branded documents found on the server. The documents explained how the cell giant would pay for the subscribers early termination fee to break their current cell service contract, a common sales tactic used by cell providers.

In some cases we found other sensitive documents, such as a bank statement, and a screenshot of a web page that had subscribers online usernames, passwords and account PINs which in combination could allow access to a customers account.

U.K.-based penetration testing company Fidus Information Security found the exposed data, but it wasnt immediately clear who owned the bucket. Fidus disclosed the security lapse to Amazon, which informed the customer of the exposure without naming them. The bucket was subsequently shut down.

A Verizon and AT&T phone bill from two customers. (Image: supplied)

A T-Mobile bill found on the exposed servers. A handful of Sprint bills were also found. (Image: supplied)

After a brief review of the cache, we found one document that said, simply, TEST. When we ran the file through a metadata checker, it revealed the name of the person who created the document an account executive at Deardorff Communications, the marketing agency tasked with the Sprint promotion.

When reached, Jeff Deardorff, president of Deardorff Communications, confirmed his company owned the bucket and that access was restricted earlier on Wednesday.

I have launched an internal investigation to determine the root cause of this issue, and we are also reviewing our policies and procedures to make sure something like this doesnt happen again, he told TechCrunch in an email.

Given the exposed information involved customers of the big four cell giants, we contacted each company. AT&T did not comment, and T-Mobile did not respond to a request for comment. Verizon spokesperson Richard Young said the company was currently reviewing the matter and would have details as soon as its available. (TechCrunch is owned by Verizon.)

Sprint spokesperson Lisa Belot would not disclose the nature of its relationship with Deardorff but said it was assured that the error has been corrected.

Its not known why the data was exposed in the first place. Its not uncommon for AWS storage buckets to be misconfigured by being set to public and not private.

The uptrend were seeing in sensitive data being publicly accessible is concerning, despite Amazon releasing tools to help combat this, said Harriet Lester, director of research and development at Fidus. This scenario was slightly different to usual as it was tricky to identify the owner of the bucket, but thankfully the security team at AWS were able to pass the report on to the owner within hours and public access was shut down soon after.

We asked Deardorff if his company plans to inform those whose information was exposed by the security lapse. We did not immediately receive a response.

Updated with Sprint comment.

Read more:

See the rest here:
A Sprint contractor left thousands of US cell phone bills on the internet by mistake - TechCrunch

Read More..

Most recent Internet Security Threats of 2019 – OBN

Hackers are getting smarter and superior over time. In order to deal with the new technologies, hackers are learning new abilities and they are finding new ways approach beat the systems. Therefore , you have to increase your security that will go without question. Here are some of the elements which are changing.

Supply: Phishing Protection

Phishing attacks means delivering fake emails or digital communications to target people, once they click on the hyperlink in the messages a malware will get installed into the user s program which can steal all kind private and financial information of the consumer.

While there has been improved awareness among users to identify this kind of threats, the hacking community has additionally changed their phishing methods. By making use of advanced machine learning techniques, cyber criminals can now draft and send extremely convincing digital messages, which attract even the most cautious users in order to fall into their trap.

Once the hackers get the access they could steal all kinds of sensitive information from the person s or organization t database. Such data can include delicate personal information, images or videos; sign in details and credit card information plus passwords, etc .

Source: Security Magazine

Ransomware attacks are a huge headache for the tech industry, every year it costs its victims vast amounts of dollars because of such attacks. During these kinds of attacks, the hackers kidnap an user s or company s database and ask for big sums of money to release back the particular victim s information or data source.

The hackers will also be hard to track due to the rise in the usage of cryptocurrencies like Bitcoin , Ethereum plus Ripple. As the transactions remain private it is very hard to track the identification of the hackers.

Cybersecurity experts suggest that over time people will certainly high net worth will be focused more by such attacks. These folks won t even file the complaint and pay even a wide range of ransoms to save their social standing.

Source: CSO

The evolution of cryptocurrency has many adverse effects upon cybersecurity, nowadays, hackers hijack private or organizational computing and digesting capacity to mine for cryptocurrencies.

While there are simply no direct monetary losses, such episodes indirectly cost a lot of performance problems for the victims. They also result in machine breakdown and downtime for many institutions which can cost a lot of money and reliability.

Source: ET CIO

If terrorist groups or even activists with hacking ability may physically get access to high-security systems, they could cause damage beyond imagination.

Some of the most vulnerable and higher priority targets include traffic, transport, water treatment, and electric main grid systems. Some cybersecurity experts think that even the US military systems are in high-level risk from such assaults.

If something like that occurs, you can only imagine the damage.

Supply: Careers in Cybersecurity

Not just hackers, different countries are on the verge of internet warfare. There have been instances when the cyberattack on one country was pointed out in order to, sponsored by and originated from the rival country.

Because everything relies on the internet nowadays, by using better cyber teams even smaller sized and hostile countries can harm bigger and developed the nation ersus infrastructure.

Source: WhiteSource

IoT might appear like very innovative and useful technology, but if hackers can get entry to your devices like webcams, smartwatches, household items, medical equipment, self-driven cars, security systems, you can t even imagine what kind of chaos they can cause.

Source: FinancesOnline. com

As more are more private hospitals and clinics are moving their particular patient data and other information on the internet, it can be a serious threat if this kind of personal and sensitive information drops into wrong hands.

According to the Software Engineering Institute of Carnegie Mellon College, As more devices are linked to hospital and clinic networks, individual data and information will be more and more vulnerable. Even more concerning is the danger of remote compromise of a gadget directly connected to a patient. An opponent could theoretically increase or reduce dosages, send electrical signals to some patient or disable vital indication monitoring.

Supply: Connexas

Could seems like very innovative and soothing technology, in its background it contains severe safety and privacy concerns. Just for hackers, this technology will create as another weapon in their arsenal. When they have accessed a vehicle h system and take control they can quickly blackmail the passengers.

Source: Online Levels

Another severe issue is the shortage of qualified cybersecurity experts, according to reports the industry is certainly short of more than one million skilled experts in this sector.

If you are searching for more such technology tips plus news please don t miss to visit .

Joel is a journalism major and worked with major publishing companies around the country before becoming a writer at OBN. He currently reports on everything from entertainment to business.

See the article here:
Most recent Internet Security Threats of 2019 - OBN

Read More..

5,183 breaches in first nine months of 2019 exposed 7.9b data records – TEISS

As many as 7.9 billion data records were leaked, stolen or exposed as a result of 5,183 data breaches that took place in the first nine months of 2019, making it the worst year ever for data breaches.

This alarming statistic was revealed by security firm Risk Based Security which observed that based on recent trends, the number of breached data records could touch 8.5 billion by the end of the year.

The firm also noted that the total number of data breaches worldwide rose by 33.3 percent compared to the mid-year of 2018 and the number of records breached also rose by 112 percent. As many as 3.1 million data records were breached as a result of six data breach incidents that took place between 1 July and 30 September.

"Whether its a phishing campaign that ultimately provides malicious actors with a toehold into systems or misconfigured databases and services that leave millions of sensitive records freely available on the internet, it seems to be human nature coupled with weak controls that contributed heavily to the number and severity of breaches weve seen this year," noted Inga Goddijn, executive vice president at the firm.

Goddijn added that a majority of data records were exposed or leaked as a result of accidental exposure of data on the internet by organisations. The fact that hackers are quite willing to take advantage of such data exposure has also led to a rise in the number of breached records.

"While malicious actors have been responsible for most incidents, it is accidental exposure of data on the internet that has put the most records at risk. This year over 6 billion records have been made freely accessible thanks to misconfigured databases, backups, end points, and services."

Internet security firm Norton also revealed earlier that the number of data records breached in the first six months of 2019 touched 4.1 billion and the number of reported data breaches in the period was 54 percent higher compared to the first six months of 2018.

According to insurance broking firm Gallagher, the first six months of 2019 also saw more than 500 million cyber attacks targeting local councils across the UK. Gallagher found that almost half of all local authorities had experienced an attempted cyber-attack on their IT systems since 2017 and 37% of them had experienced cyber-attacks in the first half of this year.

In the first quarter alone, an average UK business suffered as many as 119,659 internet-borne cyber attacks, noted cyber security analysts at Beaming who found that hackers used 442,091 unique IP addresses to target UK business, many of which were traced to other countries. While a little over 51,000 IP addresses were located in China, 32,386 were located in Brazil, and 31,131 were located in Russia.

See the original post:
5,183 breaches in first nine months of 2019 exposed 7.9b data records - TEISS

Read More..

Click Moment | ‘Weak internet signals showed us our strong impact’ – Livemint

While transitioning into civilian life after more than a decade in the Indian Air Force, I was struck by how the growing propensity to ask for goods and services to be home delivered was causing disruptions in traditional security processes at gated communities.Security guards were unable to deal with the increased traffic at the gate and the existing processes and technologies were proving inadequate. It became clear that the authentication process needed to be digitized. This was a weak signal, no doubt, but I was convinced that it warranted deeper analysis.

We built a strong solution for these problems, and, in doing so, we were not only able to ensure seamless verification of all visitors, but deliver a number of other conveniences to residents. We could help them manage their deliveries when they were away, inform them of the arrival of their maid, enhance the security of their children, notify guards if delivery executives overstayed their welcome, among much else. A business is always looking for ways to quantify the utility of its solution. You want to know that it is a painkiller (need to have), and not just a vitamin (good to have). It is difficult to be certain.

Then, for the second time in three years, rains hit Chennai in November 2017. Connectivity dropped all across Bengaluru, which receives internet from cables laid under the port city. Our services were hit. Gate notifications werent reaching our customers and there was nothing we could do about it. Every one of us had to drop what we were doing and answer the phone. Within eight hours, around 40% of our customer base had contacted us to complain. We were delighted! A day or two later, internet speeds went back to normal and we went back to work, buoyed by the knowledge that what we were building really was a painkiller. Fast forward two years and MyGate has seen phenomenal growth. Our security solution is now in 1.2 million homes across 5,000 gated premises in 11 Indian cities. Ironically, the strongest indicator of our impact was a weak (internet) signal.

There was one moment when fate turned their way, a moment that they can look back upon and say, that was when it started. Capturing click moments.

Here is the original post:
Click Moment | 'Weak internet signals showed us our strong impact' - Livemint

Read More..

The New Paradoxes of the Cloud Computing World – Forbes

Sometimes the greatest truths make no sense. Thats not just a paradox, its also the definition of one.

Finding the truth at the heart of certain contradictions may be the best way to move forward.

Here is a list of paradoxes about the modern world of technology and work. Besides providing work-type entertainment, this list is intended to make a larger point about contending with the great technological changes of our time: When youre in a landscape of technological novelty as dramatically different as ours is from even the recent past (Pocket computer smartphones! Cloud computing! Artificial intelligence!), locating the major landmarks can be a challenge. Some features are too novel to be well comprehended or applied. Language that described the previous world struggles to describe interactions of the new.

Finding the truth at the heart of certain contradictions may be the best way to move forward. Here are some attempts at new ways of seeing, via illuminating paradoxes:

1.The worlds biggest computer is also the most personal.

The big clouds are global computing systems with over a million servers apiece, cleverly networked to represent millions more computers. At any given time, millions and billions of people are diving in and out of these systems, enjoying their email, their version of the internet, their business experience, etc. No two users are the same, and a service like Google Cloud strives to anticipate particular business and personal needssome configured by the user, some utilize artificial intelligence agents that enable people to write and find documents more effectively.

By comparison, servers and PCs, sold individually by the millions, have traditionally deliveredimpersonal experiences. The more individualized experiences that we enjoy through these devices today derive largely from the connection of servers and PCs to the cloud, infusing what was limited and cold with unbounded potential for customization.

2.In a digital world of eternal storage, vanishing analog moments rule.

A couple of years back, I calculated that 100 years ago, it cost about $30 in todays money both to see the opera star Enrico Caruso and to buy one of his records. These days, recorded music is basically free on YouTube or other services, and the average price of a ticket for Springsteen on Broadway was almost $1,800 on the open market.

I believe that the reason for this, and the reason for the explosion of conferences and live business events, is that as the number of digital moments has exploded, authentic human moments have become relatively scarce. Adding to the irony, we are seeing smart ways companies are using digital technology to make the human experience more vivid, like when a sports company offers an app for a better experience navigating a sports stadium.

This observation brings me to the next paradox.

3.The jobs are going! Here come the jobs!

Theres significant concern that millions of people will have their lives turned upside down by robots and artificial intelligence (AI). Maybe so, though predictions are mixedthis well-researched McKinsey study projected both major job losses and major job gains.

While weve seen some robots doing relatively simple tasks, like moving things around warehouses, the impact on manual labor so far has been relatively smalland for good reason. Jobs like mowing a lawn or driving a truck turn out to require a lot of contextual judgement.

Meantime, the Bureau of Labor Statistics says there are now about 357,000 personal trainers in the U.S., and the category is expected to grow at 13% over the next decade, faster than the average job. There are 160,000 massage therapists, growing at 22%. And 55,000 marriage and family therapists, growing 22%. You get the picture: Were putting more money toward people who look at us, touch us, and listen to us the way machines dont.

And thats before we get to the jobs that didnt exist 15 years ago: drone pilot, mobile app developer, social media manager, machine learning specialistyou get the idea.

4.Specialize, especially by focusing on general relationships.

In our new data-centric world, software developers who are also experts in a companys core business are often highly valued. Thats because connected products, the digital expression of that core business, now collect information about the products performance in real time, and developers can build in adjustments based on user demands or changing market conditions.

As AI becomes more important, domain-specific data plays an increasingly critical role in how products are built and optimized. The most successful developers have not just the domain expertise of a specialist, but an understanding of what data around that domain matters most, how its collected, and how to keep it free of bias. Its the reason that big technology companies increasingly employ experts in healthcare or transportation or retail, for example, rather than simply hiring engineers with generalized skill sets. No data stands alone, and how things relate matters too.

5.Information is easy. Questions are hard.

A related point to the above: AI can move through unimaginable amounts of data, finding previously unknown patterns and insights. That doesnt mean the patterns are valuable, as this entertaining chart shows. If you take all of your companys data, petabytes of it, and only focus on demanding that it make you more money, youre likely to end up with garbage.

Ask specific questions, however, prioritized based on a companys core competitive advantages and the best-quality data, and youll likely get the most useful results. This can be difficult, but is critically important to deriving real value from data.

6.The only certainty is approximation.

Im lifting this one from an observation by Jeff Dean, the head of Googles research and AI efforts. He notes that advanced AI, like deep learning, doesnt indicate decisions based on certainty, but on likelihood (what he terms gradient points in the direction of improvement). Moreover, given the many layers and sequences of a deep learning system, sometimes its hard to figure out exactly how the system came to its conclusion. Its a machine that isnt always good at explaining itself, unlike, say, a car engine, which can be observed and understood with a lot of certainty (a little bit of gasoline is ignited by a spark plug, causing a piston to move).

In a world increasingly dependent on statistical approximation, many of our existing legal and social rules, which are premised on an illusion of certainty, may be challenged.

7.In an uncertain new world thats full of cutting-edge technology, the best advice can be found in an 85-year-old religious poem.

T.S. Eliot nailed our situation in one of the choruses from The Rock: They constantly try to escape / From the darkness outside and within / By dreaming of systems so perfect that no one will need to be good.

In other words, no matter how much we understand and perfect the world, well all still have the hard work of trying to be good. Machines dont fix that.

Go here to read the rest:
The New Paradoxes of the Cloud Computing World - Forbes

Read More..

Andy Jassy’s 12 Boldest Remarks On The Future Of Cloud Computing – CRN: The Biggest Tech News For Partners And The IT Channel

Its still the very early days of cloud adoption, and Amazon Web Services CEO Andy Jassy says AWS channel partners should prioritize customers long-term success over any short-term gains for themselves to build sustainable businesses.

There is so much opportunity for all of us if we can make sure that we get deep in the cloud and in the services, that we give the right advice to customers, we make sure that we focus on what matters most to customers, Jassy told CRN. If you do right by customers over a long period of time, the business usually follows as well.

CRN sat down with Jassy in October for an exclusive interview at AWS headquarters in Seattle, where he shared his thoughts on the future of cloud computing, including whats driving public cloud adoption, the cloud cost equation, AWS customer base, the AWS Partner Network and AWS new channel chief. He also addressed where partners should be channeling their investments, AWS market-leading position and competition, the U.S. Department of Defenses Joint Enterprise Defense Infrastructure (JEDI) contract and Oracle among other topics.

We're still at what I think of is the early stages of the meat of enterprise and public sector adoption in the U.S., Jassy said. Outside of the U.S., they're about 12 to 36 months behind, depending on the industry or the country. We're still at the beginning of this titanic shift to the cloud.

Heres some more of what Jassy had to say.

Continued here:
Andy Jassy's 12 Boldest Remarks On The Future Of Cloud Computing - CRN: The Biggest Tech News For Partners And The IT Channel

Read More..