<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/Internet-of-Things/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #Internet of Things</title><description>GTconsult - Blog #Internet of Things</description><link>https://www.gtconsult.com/blogs/tag/Internet-of-Things</link><lastBuildDate>Wed, 01 Apr 2026 03:02:54 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[To leave or not to leave.... what are the alternatives? ]]></title><link>https://www.gtconsult.com/blogs/post/to-leave-or-not-to-leave....-what-are-the-alternatives</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.comhttps://images.unsplash.com/photo-1522033601-8c44cd8cb261?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXw0NTc5N3wwfDF8c2VhcmNofDV8fGVub3VnaHxlbnwwfHx8&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Whatsapp caused the first controversy of 2021. What would a fragmented messaging industry look like? are you prepared to chat to all of your current Whatsapp contacts across multiple platforms? What are your options come February 8?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_dt5BF_VCSm-SRWf_gcbbew" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hhbkLy5DSTOeMSLwSbfYfw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_h_2hNFsYRg2a3R5Vzafe5Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_fxXjK8IYS2aQN0CTzLrHzA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Whatsapp has caused the first controversy of 2021. What alternatives do you have come February 8?</h2></div>
<div data-element-id="elm_goW3nDIjRdCaaHokzTAXCw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1599382103240-5f2a57137d28?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=MXw0NTc5N3wwfDF8c2VhcmNofDJ8fHdoYXRzYXBwfGVufDB8fHw&ixlib=rb-1.2.1&q=80&w=1080"><span><br></span></p><p style="text-align:left;"><span><br></span></p><p style="text-align:left;"><span>The dust has barely settled from the New Years celebrations and we are already into our first drama of 2021. Whatsapp has decided to update its privacy statement which apparently allows it to sell certain information to Facebook. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Predictably, this has left a sour taste in many peoples mouths with a significant number of Whatsapp users exiting stage left. The world is being run by data and we are very protective of our privacy. So, what are the alternatives to Whatsapp and are they any better? Let us unpack this debate. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Go back to the beginning</span></b></p><p style="text-align:left;"><span>To fully appreciate the issue, we need to start at the beginning. I read an interview on Moneyweb where Moneyweb journalist, Dudu Ramela, spoke to Arthur Goldstuck, CEO of World Wide Worx, to unpack the issue. The written transcript of the interview, as well as an audio version, <a href="https://www.moneyweb.co.za/moneyweb-radio/safm-market-update/updated-policy-results-in-mass-exodus-of-whatsapp-users/">can be found here</a>.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: What is it that one needs to know to make an informed decision about whether to stay or to go?</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Thank you, Dudu. The first thing to know is that, if you do go, it means that you will not be able to keep in contact with most of your connections – family, friends, contacts – using WhatsApp as the main communication channel. If you use email primarily, if you use SMS or voice, or even Facebook Messenger for that matter, you will find that WhatsApp in South Africa is used by more than half the population. So, you have got to consider that before looking at all the other issues.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are two main issues that people are concerned about. The one is that people think this means Facebook would have access to the content of the chat – and that is not true. Facebook cannot access the content of any WhatsApp chat because it is encrypted. There are exceptions if you are involved in criminal activity, or [authorities] believe that you are a suspect or a person of interest in a terrorism case. Then they have the right to use various tools and techniques to access those messages. But besides those extreme circumstances, the contents of your messaging are completely secure.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The real issue here is that they are going to allow Facebook and WhatsApp to combine information about usage of the apps and your smartphone. So, if you use WhatsApp, for example, it automatically has access to your entire contacts list. And, in effect, that is what Facebook is telling you to share – from WhatsApp to Facebook – so they can target you more accurately based on how many people you are in touch with, what kinds of communication you have with those people, not what is in it. But the fact that you are involved in video communication, for example, could be used to target advertising at you.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>But, generally speaking, they can access your location data, the speed of your phone, or the battery level of your phone, to tell you are the kind of person who often lets your phone run down, for example, or who your real mobile operator is. All of that kind of information starts adding up to create a profile that allows their advertisers to target you more precisely.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Is it just WhatsApp, or are there plenty of other applications that actually do this? Dies it really matter.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: If you consider the extent to which you have been giving permission to Google over the years, then you could say that it does not make a difference because, if you use an Android phone, really Google has access to all your phone information and your current behaviour – not the contents, but certainly the activity. And then if you combine that with Google Search, for example, and Gmail and Google Maps and YouTube, suddenly they have a vast picture of who you are, what you search for, and what you buy. That is where you have really given up your privacy. So, it is the same situation that applies now with Facebook and WhatsApp and Instagram, combining all the data on you so they start taking a big picture.&nbsp; So, to avoid that, you have got to go to a completely independent messaging app.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Facebook has been hacked on a number of occasions. A lot of people are also worried about privacy in terms of security.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Security of the contents of your messages tends not to be an issue. It is the security of your personal data that becomes an issue. Facebook has not plugged the hole that allowed hackers, for example, to send you a link pretending, for example, that it is a video that includes something about you, or something embarrassing about you. You click on that link and what you really do is give permission to access your account, and that then starts giving access to deeper levels of information about you. Ultimately, they are looking for bank-account information and the ability to access your financial data as well as the actual money.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: What are the alternatives?</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Of two alternatives on the market at the moment the best known one is Telegram, which was started by Russian developers and in fact is not what you might call a pro-Russian app, because the Russian authorities banned it for two years because they refused to co-operate with them. That is perhaps the most widely used of the more secure apps. It does not share your information with any other application, so it does not allow any advertisers to build up a profile about you. You also have a desktop version of it, for example. So that is a little trick that WhatsApp introduced not too long ago.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The other big one is Signal. Signal was developed by, among others, the person who created WhatsApp, so he understands what it takes to create this kind of application, but also what the issues were. The reason that he left Facebook was because he disagreed with the direction of WhatsApp. And Signal is partly in response to that. So Signal is probably the most secure and the least likely to share your information or make your information available to any other application.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Who is regulating all of these social media platforms in terms of making sure that users’ data is not abused, if you will.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Here is the real problem. Regulators have been asleep at the wheel because it is technology and regulators tend to be the establishment’s real old-timers, even running governments around the world. They tend to have the courts behind the times in terms of the significance of these apps and also how widespread their use is. Only now, for example, are American antitrust authorities starting to look at the issue of whether Facebook should be allowed to integrate Instagram into its services. Because Instagram goes way back to 2011, at that stage the transaction was approved because the regulators had no idea of its significance.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The same with WhatsApp in 2014. So, Facebook is now arguing, hey, this is a moot issue because you already gave us approval back then. The difference is back then they had no idea of the extent to which so much information could be aggregated across all of these apps.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Interesting. It has got a lot of people talking, and we will see what happens come February 8, whether people will leave or stay with WhatsApp.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Greener pastures?</span></b></p><p style="text-align:left;"><span>So where to from here? It does sound a bit dodgy that Facebook does not want to read your messages but wants to access our personal information such as contact lists and geolocations. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>So, what are the alternatives? There are two that seem to be very popular in South Africa, and one that may prove to be popular going forward. A <a href="https://indianexpress.com/article/technology/techook/whatsapp-alternatives-signal-telegram-viber-faq-and-features-7138298/">recent article by the Indian Express</a> discussed these in detail. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Signal</span></b></p><p style="text-align:left;"><span>The article points out that, currently, the best alternative to WhatsApp if one were to consider the security features and the fact that this is run by a non-profit firm.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security Features. It has end-to-end encryption based on the Signal protocol, built by American cryptographer Moxie Marlinspike, who is also the CEO of Signal. It means no third-party or even Signal can read your messages. The Signal protocol is open source, which is another good thing. Signal does not support third-party backups either, which is actually a good thing. All data remains stored locally on the device, and if you do lose access to the device and try to set up Signal on another phone, your previous chat history is lost;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-Platform. Yes, the private messaging app can be used across platforms from Android, iOS, iPad, Mac, Windows and Linux as well. Signal is quite easy to use. The app shows the name of the contacts that are on Signal, which makes it easy for you to connect;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Signal is totally free. The app is run by a non-profit. Former WhatsApp co-founder Brian Acton helped found the Signal foundation along with Marlinspike, and has also poured in $50 million to fund the app. It does not sell your data or monetise it and does not have advertisements;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Yes, it supports Group features with a maximum of 150 members. It has recently added Group video calls. The app also supports regular video and audio calls, which are also end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Yes, you can turn on disappearing messages for each chat, which is great. The time can be set by you ranging from five seconds to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other features. Yes, there is a screen lock feature. You can also set a PIN to the Signal account to keep your account secure. There is also an incognito keyboard option, which basically does not allow your keyboard to save what you are typing. Other features include fingerprint lock, read Receipts, location sharing, relay calls, archive chats, and more. There is also a feature called Message Requests, which gives you the option to block, delete, or accept messages from an unknown person. Signal lets you react to any message with emojis. You also get the option to not allow a user to take chat screenshots. In order to add anyone in a group, the individual will be required to accept the group invitation, unlike WhatsApp. The storage management of the app is really good and quite similar to WhatsApp. You can clear messages, remove videos or images, and check different files in the storage management tool;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Data collected. The key priority of Signal is user privacy, which is why the app does not collect any user data, as per the privacy labels provided on the App Store. The app only stores your phone number or contact information.&nbsp; When it comes to data collection, this is one of the most minimal apps out there. You can learn more about the Signal app here.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Telegram</span></b></p><p style="text-align:left;"><span>The Indian Express article adds that Telegram is another popular alternative Whatsapp and you will likely find a lot of your friends there. A user will not really find it difficult to switch to this app as it is simple to use and has most of the WhatsApp users. In fact, some of the Telegram features are not present in WhatsApp.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security features. Telegram is encrypted, and it is open source, though in the past issues have been raised about its encryption. While normal chats are not end-to-end encrypted, as they are on Signal and WhatsApp, if you start a secret chat on Telegram, it is secured and does not get saved. You can also set a timer to destruct these secret chat messages. To protect the data that is not covered by end-to-end encryption, the company uses a distributed infrastructure. Regarding the issue over end-to-end encryption, Telegram CEO Pavel Durov wrote in a blog, “We rely on our own distributed cross-jurisdictional encrypted cloud storage which we believe is much more protected,” compared to say Apple or Google;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-platform. Yes, it is a cross-platform app, which is available on Android, iOS, Mac, Windows. Given it relies on its own cloud backup, Telegram ensures that when you set up the app on a different device, the entire chat history is retained;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Telegram is free. It is an ad-free service for now. But Telegram recently announced its monetisation plans as the company says the project of this “size needs at least a few hundred million dollars per year to keep going.” The service also confirmed that the advertisement interface will be user-friendly, and it will respect user’s privacy, which means no data will be taken. As per Telegram, it will soon launch premium features for business or power users. The current features will remain free for all the Telegram users, but the new ones might fall in the premium plan. The company will also add ads in massive public channels. Note that one-on-one and private group chats will not have ads;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Telegram is really popular for groups and allows more than 200,000 users in a group. It also supports audio and video calls as well. Interestingly all video calls are end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Disappearing messages are part of the Secret Chat feature and you can set a timer for messages. The time range offered is one second to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other Features. The best part about Telegram is it is a cloud service, which is why you do not need to worry about backing up chats to other servers to restore them on a new device. With Telegram, you can access your data from any of your devices as the data is synchronised across all your registered devices through cloud-based service. The good part about Telegram is you can send up to 1.5GB of files, create channels, add up to 2 lakh users in a group, forward files without downloading them, schedule messages, archive chats, and more. Telegram allows users to find anyone by username or phone number. Further users can edit messages as well. Telegram even displays the name of the original source from where you have forwarded a message and once you tap on it, you will be redirected to that group or channel. Telegram supports Picture-in-Picture mode, which means that you can video call while using other apps like Instagram. On Telegram, a group admin can set different permissions for every user. Telegram offers really cool and fun animated stickers, which you will not find on any other messaging app. In order to create an account, you just need to provide your mobile number and some basic information;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Data collected. The data collected by Telegram includes name, phone number, contacts, and user ID, according to the privacy label on the Apple App Store.</span></p><p style="text-align:left;"><br></p><p style="text-align:left;"><b><span>Viber</span></b></p><p style="text-align:left;"><span>Viber is the wild card in the South African market as it has not received massive amount of airtime in terms of an attractive alternative to Whatsapp. However, the Indian Express article points out that it may be more attractive than we think. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security Features. This is yet another privacy messenger app, which supports end-to-end encryption. All types of messages, photos, videos, voice and video calls and group chats are encrypted. The company says that everyone will have to make sure that they are using the latest version of Viber to get maximum protection. Similar to WhatsApp, all your chats can be backed up to Google Drive, from where you can restore your chats. Viber says that once you upload your chats to Google, it will not be responsible for your data protection and privacy will depend on Google’s policy;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-Platform. Yes, Viber can be used across platforms from Android, iOS, and Windows as well;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Like all the other apps, Viber is also free. However, you will witness a few ads in the popular messaging app. The company says, “Showing you these tailored and relevant offers help us keep the app free for you to use.” “Since we do not have access to your chats, neither advertising providers nor brands can access your chats. The content of your chats stays in your chats always and never will be used for showing your relevant ads,” Viber said in a blog post;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Yes, it supports Group features with up to 250 members. One can only add members by sending an invitation to a Viber user. This feature works similar to Signal. The app also supports regular video and audio calls that are also end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Similar to Telegram, you get a secret chat mode here too. You can set the timer, and screenshot/forwarding feature is disabled. The time can be set by you ranging from one second to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other features. The screen lock feature is available, but not for the mobile version. You can send stickers and GIFs, delete, or edit messages, share location, voice messages, and share files. You can create your own GIF, search, and send YouTube videos in the app itself and do a lot of other things. However, the privacy features that Signal offers are not present in both Telegram and Viber;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>What data does Viber collect? Viber collects location and device ID identifiers. It also collects device ID identifiers. It collects phone numbers, user ID, product interaction, purchase history, other contact information such as email ID, name, and contacts.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>In the end, privacy matters</span></b></p><p style="text-align:left;"><span>Privacy does matter. We want to be able to use these social media platforms confident that we can do so without any concerns about where Big Brother is watching. Privacy does matter. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are a few interesting questions that need to be asked at this juncture. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The first is, can we live without Facebook and other social media platforms in the modern age? While there are a lot of people in the world without a social media presence at all, there is a reason why Facebook has so many users. If Facebook were a country, it would be the third most populous country in the world. Facebook is mostly used to communicate with people in far flung corners of the world, to provide people with a platform to publicise their lives (vomit), and for people to consume news. It is also increasingly being used for people to do business and to connect with small businesses. If this is the case, why does Facebook have such an obsession with a free user model. Let us answer this. Facebooks current user base is 2,7 billion users. If Facebook charged its users $0.50 a year, it would generate an annual income of close to $1,3 billion. This is significantly less than what it made from advertising revenue in 2019, which was $69 billion. To get close to the last benchmark, Facebook would either have to reach 7 billion users, which is impossible considering that the world population is 8 billion (as of 2020), or it would have to charge its 2,7 billion users about $25/year. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Therefore, the advertising model is significantly more profitable. So how long will Facebook get away with this. In order to get more advertising revenue, advertising needs to be more relevant. In order for it to be more relevant, it needs to be targeted. In order for it to be targeted, it needs data. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Facebook could just ask people about what their expectations are when it comes to advertising. But would they get a genuine answer? No. They only way to guarantee proper data is to use the methods discussed earlier in the blog. So, when will Facebook finally stop this? When the US will finally catches up with the rest of the world and entrenches the right of privacy as a Constitutional Right thereby forcing Facebook to take data privacy seriously. The UK led this with the GDPR, and many countries followed in its wake. By entrenching this right into the constitution, you are guaranteeing that companies cannot take advantage of the public’s right to privacy and it is punishable by law. Companies who do not comply with the GDPR face massive fines and a restraint of trade that is debilitating. A <a href="https://www.theverge.com/2020/12/15/22176008/twitter-gdpr-fine-protected-tweets-ireland-data-protection-commission">recent report</a> showed that Ireland’s Data Protection Commission (DPC) has fined Twitter €450 000 (around $546 000) over a data breach it disclosed back in January 2019, the regulator announced today. The security flaw exposed some supposedly private tweets from the service’s Android users for over four years. Twitter was found to have violated the EU’s General Data Protection Regulation (GDPR) because it failed to notify the regulator within 72 hours of discovering the breach, The Wall Street Journal reports.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The fine is notable because it is the first time a US tech giant has been hit with a GDPR fine in a cross-border case, meaning one in which the Irish regulator consulted its EU counterparts as part of the decision. The investigation was headed by Ireland’s DPC because Ireland is where Twitter’s international headquarters are based.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>The major problem</span></b></p><p style="text-align:left;"><span>There are a few problems which sees Facebook, and Whatsapp, sitting in the pound seats. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The first is that Whatsapp are technically not doing anything wrong. Whatsapp is owned by Facebook and until the US has privacy laws which governs what companies can do with private data, companies will do what they like because they are not breaking any laws. Further, Whatsapp is telling you that this is happening and that you have to agree to these new updates (opt in), failure to do so will see you deleted from Whatsapp (forcibly opted out). This is taking compliance to a new level. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The second problem is that almost half of the world’s population uses Whatsapp. Teleporting all of your contacts to a single platform is going to be a mission. The strength of Whatsapp – and they know this – is that the public has proven that Whatsapp is the best messaging software in the market, and until another platform can make same claim, the userbase will be fragmented in terms of multiplatform as opposed to the current single platform we see now. People also do not like having to communicate with half of their contacts on platform and half on another, so we will probably see a lot of people accepting the new terms come February 8. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>What is the fuss about? </span></b></p><p style="text-align:left;"><span>What is Facebook going to try and do with this information? Sell you stuff? Put more adverts on your timeline for stuff that you never told Facebook you were looking for? I have been doing some research for my wife on my birthday present for this year and guess what, Facebook placed adverts for those items on my timeline. So, Facebook does not need Whatsapp to spy on people. People would also like to think that their data is not being used in advertising. The spoiler alert here is that Facebook and Google are using your data for targeted ads. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>People are also waiting in anticipation for smart devices that help you live your life. Run out of milk, your fridge will send you a message about this and will inform you about all of the specials that grocery stores are having regarding milk. Will these devices not be using your data for targeted advertising purposes? Will it be ok for these advertisements to be targeted but others not? MMMMM…</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;"><span>Data is running the world. It is what is making technology smarter, more convenient and life changing. Yes, companies will be chomping at the bit to get hold of this kind of data, and that may not be a bad thing. Would you rather see 100 worthless advertisements on your Facebook timeline of items that you do not actually want, or would you rather see 10 advertisements about things that you want and will make a difference in your life? And if you have such an issue with how Facebook uses your data, delete Facebook. Whatsapp is just doing what its owner is telling it to do.&nbsp;</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 12 Jan 2021 11:11:23 +0000</pubDate></item><item><title><![CDATA[Optimism is the key to 2021]]></title><link>https://www.gtconsult.com/blogs/post/optimism-is-the-key-to-2021</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.comhttps://images.unsplash.com/photo-1581090464777-f3220bbe1b8b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXw0NTc5N3wwfDF8c2VhcmNofDR8fHRlY2hub2xvZ3l8ZW58MHx8fA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>While there is a lot of optimism about 2021, managing expectations and looking towards specific areas of innovation will be the key to surviving the year.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_LhRSfD07Rni45DnymQ-3qQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Wi-c5j1YSBuOq8cfn-7p0A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_7V7SUVggTl-r7iV_sr0TEQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_l9rHhhI1Qc-MEP7fR8DbWw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">This year may not be as challenging as we think!</h2></div>
<div data-element-id="elm_PumakUXlSDCYo7-EhxS_Fg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p><img src="https://images.unsplash.com/photo-1485827404703-89b55fcc595e?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=MXw0NTc5N3wwfDF8c2VhcmNofDExfHx0ZWNobm9sb2d5fGVufDB8fHw&ixlib=rb-1.2.1&q=80&w=1080"></p><p><br></p><p style="text-align:left;"><span>Welcome back from the Festive Season break. GTconsult would like to take this opportunity to wish all of its employees, clients, and business partners all the best for 2021. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>I have no doubt in my mind that there not one single person who can comfortably say that Covid-19 <i>did not</i> impact their lives in some way or another. From remote work to self isolation and the loss of many family members and loved ones, 2020 is a year that most people will want to forget. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are a lot of people who are very optimistic about 2021. While optimism is goo, there is a fine line between being optimistic and unrealistically so. Most if the world is dealing with a second wave of Covid-19 infections, and until a viable vaccine is produced, the first half of 2021 may just be the third episode of 2020. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Fortunately, tech is changing the world and is making it easier to do your job. With the South African governments plans to increase access to spectrum, we are positioning ourselves as a country that could find itself at the epicentre of the explosion of the Gig Economy in Africa. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Tech will obviously play an important part in this and I read a few interesting articles about the tech that will shape the world in 2021. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>A massive step</span></b></p><p style="text-align:left;"><span>We will start in India which has long been a country that has been at the forefront of digital innovation. The Indian Express <a href="https://indianexpress.com/article/explained/covid-19-pandemic-technology-2021-7128180/">points out that</a> some of the tech that will shape the future will be a massive step for mankind. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that We will be pushing the envelope in optimism if we expect to be back in office soon. Even with a vaccine, work from home has got acceptance across the world and businesses have not really seen a drop in productivity. So if last year #WFH was an act of desperation, in the new year you will see more technologies that act as enablers for remote employment at scale. We already have a host of companies that help collaboration among colleagues in real time, but we could see startups emerge with out-of-the-box ideas on creating virtual offices that take away the requirement for being in a physical space.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There is already lot of talk about extended reality, or XR, being extended to fill the gaps in our work environment. XR is a mix of augmented reality (AR), virtual reality (VR) and mixed reality (MR) that combine the realms of the real and virtual. In a few months, you could be back sitting next to your colleagues in office, though they are spread all over the country, thanks to a 5G-powered XR headset you are wearing to work from home. Or explaining a new project to customers in a virtual boardroom as they walk around scaled-down models, moving them with virtual swipes. Companies like Qualcomm are already close to this rather confusing reality, which is already used to train people before they get to work on high-value assets.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that then a lot of bells and whistles that are impacting the very experience of work from home could get polished. For instance, laptop makers might finally start making a Full HD camera a standard feature because it has suddenly become the most important feature in the device. You could also see laptops with wireless connectivity become more common as these try to unfetter from Wi-Fi and offer a connectivity backup to those working remotely. This is where 5G could become an important part of enterprises in the coming year.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Better homes</span></b></p><p style="text-align:left;"><span>The article points out that as people the world over spend more time at home, there is a huge opportunity to offer them indoors what they are missing outside. This is why you could see a boost in how home entertainment technologies improve in the coming months. Television screens could become larger, offering immersive experiences and theatre-quality sound. We have already seen a bit of this with projectors that can create cinematic sound. This push will also come with increased affordability of better technologies. While this would mean curtains on many cinemas, new streaming services will try and cater to all kinds of content demands to cash in on the urge to be entertained.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>A lot of the smart home technology so far has been worked around scenarios where the residents would want to control gadgets from their places of work. Now with all these users stuck inside the homes, smart home software will have to improvise and improve the experiences of people who have nowhere to go, keeping them entertained, informed and healthy.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Also, expect gaming to enter our homes like never before. And no, it will not be limited to the younger ones. The segment is already in the midst of a boom thanks to the pandemic and now there will be new consoles and services that make gaming the vent for all your indoor frustrations, irrespective of age.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Health for all</span></b></p><p style="text-align:left;"><span>The article points out that your doctor is now more accessible than before, often just a tap away on an app. But these virtual consultations hit a hurdle as soon as there is a need to look at data. While smart watches and other gadgets now offer more data on different aspects of the user’s health and wellness, the quantified self is going to get more attention now. In early 2020, for instance, the Consumer Electronics Show had a lot on show around sleep technology. These products are now becoming available to people, tracking their vitals as they sleep and alerting them of anomalies as they wake up.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Expect more wearables and smart gadgets near your body keeping a tab in not just the vitals, but also alerting you of what could be the early symptom on an underlying condition. There will also be a lot more assistance in the wellness space, especially with stress management.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Boutique tech</span></b></p><p style="text-align:left;"><span>The article adds that, as our dependence on technologies increases, at least those who can afford it will start pulling out of the mainstream to subscription-based services that are niche, but offer a better quality and experience because of this. Companies are already working on products that offer a different experience from what the Internet offers for free. So you will see companies like Neeva that offer an ad-free search service and more publishers and production houses offer premium content behind a paywall.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The movement towards niches will also be a reaction to big tech, which is slowly losing user trust. While governments try to regulate how big and powerful these companies can be, the lack of trust is already moving users to scaled down environments where they are more confident of not being exploited as just a data binary.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Intelligent data</span></b></p><p style="text-align:left;"><span>The article points out that, while we have been hearing about artificial intelligence for decades, the pandemic has presented these models with use cases at unprecedented scale. As countries try to figure out how to vaccinate sizeable chunks of their populations, intelligent systems like IBM’s Watson will come into play in helping figure out the rollout of the vaccines. Since we are literally talking about everyone in the world, these are not figures that are easily manageable without help of AI-driven models. And it is not just about the vaccines: AI is already being used to alert about new Covid-18 hotspots based on early trends that are plotted against patterns seen elsewhere. Also, when there will be the question of how to tackle the surge in information demand from people as vaccinations starts, here too it could be computers that answer queries because of the sheer scale.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>A new set of gadgets</span></b></p><p style="text-align:left;"><span>the Indian Express article ends off by predicting what may change when it comes to gadgets. 2020 has been a weird year of makers of smartphones and other technologies. After a few weeks when sales dried up, most experienced a surge because of the pent-up demand. There was also the new opportunity created by online education. At the same time, a lot of the product thinking went out the window at least for a couple of years as it went down in the priority list.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>In 2021, expect smartphones and all other devices to pack more computing power because that will be what they need to focus on, more than cameras and battery life — which are not such big pain points if you are not stepping out. With Apple entering the silicon space with its M1 processor, you will see the personal computing segment undergo some revolutionary changes with rivals trying their best to catch on the processing power and battery life this new entrant can offer. So by end of the year, expect more laptops to offer all-day battery life.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>You will see folding, rolling, swivelling smartphones in the new year too, but they will stay well within the fringes and the consumers will be more bothered about the devices that will work long hours without tiring, offering good screen clarity and front cameras for video calls. There will also be a spate of affordable computing devices that try and offer a viable alternative to the budget smartphone that is now being used for online education in many households. Clearly the focus will be on the functional and not the gimmicky.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>An <a href="https://www.livemint.com/">article on livemint.com</a> has pointed to the fact that the Covid-19 pandemic has inspired tech innovation. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article pointed out that one key area, better webcams for our constant video calling, was significant. Samsung has already announced that its forthcoming Galaxy smartphone, expected in early 2021, will improve video recording and calling. We anticipate laptop makers will do the same and finally ditch their crappy, low-resolution webcams.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Portable versions of UV sanitizers for cleaning your phones and gadgets are on the way to keep in your car or your pocket. Another thing we may eventually never leave home without? High-tech masks. Expect a range of built-in features: Bluetooth and microphones (see Maskfone), a fan-powered wearable air purifier (see LG PuriCare), a mask with a UV LED (see the UV Mask). Look for air-quality sensors, contact-tracing assistance and more.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Laptops Arm Up</span></b></p><p style="text-align:left;"><span>The article pointed out that, suddenly, laptops aren’t the most boring gadget in the world. Our reliance on them for at-home work and school spurred demand the category hadn’t seen in years. (“Children, let me tell you about the Great Chromebook Shortage of 2020.&quot;) Then, in November, Apple released a MacBook Air and MacBook Pro that ditched Intel inside for Apple’s own M1 chips. The result? Machines that have never been so quiet and cool, and lasted so long on one charge.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The move from chips based on Intel’s x86 architecture to ones based on lower-powered Arm technology, like the ones inside phones, is setting the entire computing industry on a new course. Lenovo, Acer and Microsoft have begun releasing Windows or Chrome OS laptops with chips from Qualcomm, whose processors power the most popular Android phones. This will only accelerate in the coming year, with nearly every major Windows PC maker working with Qualcomm on laptops and some models even gaining 5G, said Qualcomm President Cristiano Amon.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article added that Apple, which plans to transition its entire Mac lineup to its own processors by 2022, is also expected to release a long-anticipated new iMac, among other things. And it won’t come as a surprise when more tech giants, including Amazon and Microsoft, embrace their own custom chips in everything from laptops to servers to wearables.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Reality: Assisted, Not Augmented</span></b></p><p style="text-align:left;"><span>Remember the ambitious Google Glass concept. The world was either so excited for it that they were prepared to invest heavily in a pair, or the world was bemoaning how tech was becoming massively intrusive. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ultimately, the Google Glass project failed, but that didn’t mean the end for artificial intelligence (AI). The Live Mint article rightly points out that AI will only get better over the years. When will Apple release a pair of smart glasses? Probably not 2021. And while Google made a big step in this category this summer by acquiring North, a pioneer in projection glasses, it canceled the second version of North’s glasses as it plots its future. It’s actually Facebook that declared it will launch smart glasses in 2021—and they’ll be Ray Bans.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Facebook Chief Executive Mark Zuckerbergsaid in September these glasses will be “the next step on the road to augmented reality.&quot; They won’t feature virtual objects that appear to interact with the real world. AR headsets like Microsoft’s HoloLens might deliver an immersive experience, but they’re still expensive and cumbersome.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that <i>assisted reality</i> glasses—which project text, images and even video feeds into a person’s field of view—are of more value now, says Brian Ballard, CEO of remote-expertise company Upskill. Businesses have found utility in remote video conferencing that hovers in workers’ field of view, or turn-by-turn directions they don’t have to look down to follow.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>E-commerce ≠ Amazon</span></b></p><p style="text-align:left;"><span>The article pointed out that the pandemic packed 10 years of consumer e-commerce adoption into a single quarter, and forced every company that wasn’t Amazon—especially those with large retail footprints—to scramble to offer consumers new and better ways to shop from home.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Target saw an explosion in curbside pickup from online orders, while warehouse retailer Costco reported unprecedented growth in e-commerce. Walmart launched a Prime-like membership program called Walmart+, and rapidly added features to keep up the competition. (Walmart recently eliminated order minimums and shipping fees on Walmart.com orders, and provides no-fee delivery on grocery carts totaling $35 or more.) Shopify, which powers payments for many small businesses online, expanded its own network of fulfillment centers so those businesses could get goods to customers more quickly and efficiently, without turning to Amazon.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article added that, now that fast, free shipping is table stakes and retailers recognize they won’t see the foot traffic they counted on pre-pandemic, consumers finally get an online version of an old retail staple: comparison shopping. In 2021, Amazon’s value proposition—that if it isn’t always the least expensive way to shop, it’s at least the most convenient—will be tested. Meanwhile, its market power—along with Google’s, Facebook’s and Apple’s—will continue to be the focus of regulatory scrutiny.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Return of the Trust Fall</span></b></p><p style="text-align:left;"><span>Remember doing these exercises at work team building outings. You would spend a significant amount of time praying that you didn’t have to do this exercise with the creepy man/woman four desks down from you. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The Live Mint article points out that while remote work has many advantages, building trust between employees isn’t one of them. Online, there is no water cooler, no nearby coffee shop for informal brainstorms, no place to grab a drink after work. But companies whose employees worked remotely long before the pandemic already had a solution: the off-site retreat.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Buffer, a fully remote company, gets its entire, globe-spanning team together at least once a year. Dozens of other companies whose employees work mostly or entirely at home do the same thing, which has led to a cottage industry of firms that will plan these retreats for you.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that one reason companies have embraced remote work is that it makes employees happier, but another is that it saves companies money on office space. In 2021, expect to see many of the millions of employees who have permanently shifted to remote or hybrid work piling into party buses, doing group yoga and seeking inner peace in the presence of their bosses—for far less than the cost of the rent on the offices they left behind.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>The platform contributor</span></b></p><p style="text-align:left;"><span>We have given significant focus to the gadgets what with shape 2021, and the innovation that certain companies are planning, but we cannot forget the role that technology based platforms played in 2020 and the <a href="https://www.thedrum.com/opinion/2020/12/21/the-four-technology-trends-you-need-know-about-2021-and-one-miss">influence that they will have in 2021</a>. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Blockchain</span></b></p><p style="text-align:left;"><span>The article points out that it has taken a long time for blockchain to shift centre stage, but as people increasingly trust algorithms, which it’s based on, its time has come. Decentralised finance will continue to grow over the next few years because of the increased demand for online financial products, but it will need to continually address the balance between decentralisation, security and scalability.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Increasingly, government bodies are leveraging blockchain for their activities, moving from incredulity to embracing the technology. With this, we’re going to see regulation surrounding blockchain become ever more pronounced. Our client Block.one reported this year that Google Cloud is taking steps to become a network block producer, a sign that the world’s largest companies are committed to ensuring that information on public blockchains is secure. In five years time, using blockchain could feel about as edgy as banking with HSBC.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Customer learning experience</span></b></p><p style="text-align:left;"><span>The article adds that consumer sales have seen major disruptions in 2020 due to Covid-19 and new restrictions the pandemic has brought to in-person interactions. Businesses have been pushed to accelerate adoption of digital solutions as replacements for traditional aspects of the sales cycle. Attracting and educating customers on the benefits of specific products and features has required a digital-first approach, with e-commerce solutions integrating video, webchat and even augmented reality. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>For complex products that require training, including consumer electronics, automotives and software, companies are investing in Learning Management Systems - or tailored equivalents designed to meet the goals of their specific learning experience- to provide customers with instructive content. These LMS solutions allow businesses to create custom branded courseware, training programs, documentation and video guides to deliver complete digital learning experiences. The article adds that, with big data and analytics, companies can implement in-depth tracking of customers on their learning journeys to rapidly gain insights and improve their offerings.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>As restrictions on in-person shopping and in-person learning begin to relax in the post-pandemic future, digital learning experiences for customers will continue to grow in popularity, with new opportunities to enhance e-commerce and post-purchase experiences.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Cloud-based tech</span></b></p><p style="text-align:left;"><span>The article points out that the world shifted irreversibly in 2020 as so many of us migrated from our old workspaces to predominantly work from home. Beyonders scattered far and wide; I now head up technology from our Lisbon hub. That, of, course, is only possible with greater use of cloud-based technology, including workplace applications.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>With the rise in ecommerce we’re seeing cloud-based platforms pushed and we’ll see their full potential through 2021 and beyond. Cloud native technology will continue to power digital transformation: by the end of 2021 60 per cent of companies will leverage containers on public cloud platforms and 25 per cent of developers will leverage serverless, according to predictions from ForresterNow Predictions 2021: Cloud Computing report.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that technology design is evolving in tandem and we’re building modular, composable architectures that can shift and transform in an agile way, not dissimilar to how we build multi platform, multi stack software. As Google Cloud Partners, we design our composable architectures with plenty of flexibility, but primarily with people in mind.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Cautious optimism</span></b></p><p style="text-align:left;"><span>We mentioned at the beginning of the blog post that most people will need to manage their expectations of 2021. And this is not a bad thing as it is likely going to be a challenging year. However, there are <a href="https://www.geekwire.com/2021/2021-predictions-leaders-tech-life-sciences-investing-government-look-year-ahead/">some global tech leaders</a> who feel that 2021 will be a good year for tech innovation. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Magdalena Balazinska, professor and director of the Paul G. Allen School of Computer Science &amp; Engineering at the University of Washington</span></b></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><i><span>How will this year’s events — the pandemic, social justice movements, economic recession — affect the technology industry in 2021? While the COVID-19 vaccines are rolling out and providing us with hope that 2021 will be a better year than 2020, we are not out of the woods yet and we should plan for 2021 being fundamentally a highly disrupted year.</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><i><span>That said, if we consider 2021 and perhaps a little beyond, I would say that:</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>2020 really demonstrated that working from home can be effective in many industries. I expect that the tech industry will be rethinking their long-term policies regarding working from home and hiring remote employees;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>Diversity, equity, and inclusion will remain high priorities for the technology industry, and for academia;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>The tech industry has contributed to polarization through the various social media platforms that we developed. Our next step in 2021 needs to be on developing tools to help bring people together;</span></i></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span></span><i><span>The tech backlash is real. The industry needs to take this challenge seriously — to become a rising tide that lifts all boats, not just the captain’s barge.</span></i></p><p style="text-align:left;"><i><span>Software engineers will increasingly question the technology they are developing and the business models of the companies they are working for. Graduates will consider not just the salary but also the type of product that a company is creating, their DEI statement, and more when they choose their employment.</span></i></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Leslie Alexandre, president and CEO of Life Science Washington</span></b></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><i><span>What will be the most pressing issue facing the tech industry in 2021? Again, speaking from a biotech/life science perspective … we are witnessing breathtaking innovation in new treatments — and even some cures — for horrible diseases and conditions thanks to a new generation of platform technologies, such as gene editing and other cell therapies. These treatments are improving the quality of life for thousands of Americans every day, but come at a very high price tag, commensurate with the costs of their development.</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><i><span>As a society, if we want broad access to these life-saving treatments, we must figure out how to pay for them. And as an industry, we must come to the table with sound policy options that facilitate continued investment in innovation and a resolution to drug pricing issues that are becoming barriers to that investment.</span></i></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Peter Lee, CVP of Research and Incubations at Microsoft</span></b></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><i><span>The most overhyped technology of 2021: I guess three of the technologies that are always mentioned on these “most overhyped” lists are blockchain, virtual reality, and self-driving cars. Blockchain and VR are getting a lot of new hype, with blockchain mentioned in areas like vaccine credentials, and VR to make home isolation more fun. But as great as they are, both probably need more time to flip from hype to hot. And self-driving cars, well, while we may actually see some really interesting products hit the market in 2021, there is a lot less driving going on nowadays. We’ll want to revisit all three in 2022…</span></i></p><p style="text-align:left;"><i><span>&nbsp;</span></i></p><p style="text-align:left;"><i><span>Advice to startups and entrepreneurs for 2021: Think of the three phases of a global crisis: Response – Recovery – Resilience. If 2020 was about Response, 2021 will be about Recovery. Your company/investment needs to be relevant to that. But even more important is to think about the technologies you are developing for the next long phase, which is about Resilience for the future.</span></i></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>GTconsults view</span></b></p><p style="text-align:left;"><span>From a GTconsult perspective, we are convinced that Cloud Computing and AI will be big innovators during the year. With this comes the need to increasingly trust technology and see it as innovative and enabling rather than intrusive and overbearing. We applaud Governments view on spectrum and hope that this project can gain significant momentum. This will see new tech startups and entrepreneurs who can not only grow our economy, but provide a future for their families.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>We also hope that technology will improve access to healthcare as well as innovative ways to diagnose and treat diseases. We are seeing how tech is playing a role in the Covid-19 vaccine, but we need to see these advancements take place more rapidly. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;"><span>Finally, technology <i>must</i> play a role in education. We have already seen the beginning of it in remote teaching and many students have adapted well to the new normal that has been placed on them. We now need to advance this. Coding needs to be taught at school and students need to be given the skills to prosper in the Gig Economy. If we can get this right, 2021 will be a good year.&nbsp;</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 03 Jan 2021 08:16:51 +0000</pubDate></item><item><title><![CDATA[Is cyber security still just a fad?]]></title><link>https://www.gtconsult.com/blogs/post/Is-cyber-security-still-just-a-fad</link><description><![CDATA[g&nbsp; This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident. &nbsp; Risk management plays an i ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_2L32EXdTQgKydpDzmAbWXQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yHK4fP1qQByOjroTd4VAOg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ZUzXvOZmTbu3Zx-ua0bNag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_yhBEDDFMRVGUm-3UIJM1yA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"></h2></div>
<div data-element-id="elm_2VXzld2qSxOhHxpeUScgSQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1586772002345-339f8042a777?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ">g&nbsp;</p><p style="text-align:left;">This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident.<br></p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management plays an important role in the financial services industry. Insurers and credit providers take a serious look at risk and invest a lot of time and capital in developing models that will address the identified risk. It gives them an idea of where they are and where they need to be. Its true benefit can be seen in achieving identified deliverables. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management also plays a significant role in the technology industry. However, because of the nature of the evolution of this risk, models need to be fluid and have to be extremely adaptable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Serious complexity </b></p><p style="text-align:left;">Let’s revisit the financial services industry for a second. The reason why risk management plays an important role in this industry is that it is an effective way to address risk. This is only true because the risks that the industry faces haven’t changed much over the past ten years. The reason why risk management in the technology space becomes a challenge is because cyber security is <a href="https://www.forbes.com/sites/elenakvochko/2020/10/25/why-cyber-security-is-still-so-complex/#4bffb47ef974">seriously complex</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that consumers, businesses, and entire systems all over the world are under threat on a daily basis. Valuable personal and financial information is exposed and ready for the taking. Simple tasks like using a credit card, a phone, or a computer provide an opportunity to take our money, our identities, and your ways of life. Data breaches are capable of rendering large, powerful companies vulnerable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As the world evolved and became more technological, attacks evolved along with the new developments. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>A new window to climb through</b></p><p style="text-align:left;">The article points out that when humans learned to domesticate animals and grow food, larger settlements were established and societies started to flourish in multiple locations across the world. </p><p style="text-align:left;">Sedentary societies then placed value not only in food and clothing, but in things such as cattle, crops, land, houses, and machinery. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Commerce was created, value was placed on a new concept - money. Goods were then exchanged for precious metals such as gold, silver, and bronze in the form of coins and paper money years later. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that the value of money prompted societies to create impenetrable fortresses and sophisticated vaults to keep valuables away from the hands of criminals.&nbsp; As societies became more complex, both crime and remediation efforts evolved along with them. Before the rise of computers, trespasses were much easier to prevent. All we had to do was keep a door locked. The internet has given a new window to climb through for digital assets.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This tells us that security has also evolved alongside attacks to give rise to holistic security. Today, digital assets have the highest value. Our neighbourhood is now the entire globe. In response to this new type of cyber criminal, organizations have developed an equally evolved security system. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be prepared!</b></p><p style="text-align:left;">The article points out that, because of our daily interaction with connected devices, computers, smartphones, and tablets, it’s important that everyone - from the CEO and software developers to suppliers and employees - to be aware. Everyone can play an important part in keeping information safe. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that ransomware has become a headache for businesses and individuals alike. This type of attack can hold data hostage via encryption, which is the process of converting data into unreadable code to prevent access, until the victim pays a large amount of money to get the description keys. Organizations can fall victim to ransomware through drive-by downloads and phishing emails. Millions of people around the world reported encounters with ransomware.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While attackers are finding new, innovative ways to threaten the security of an organization, holistic and complete security will give enterprises a chance to fight against any attack and protect their data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that everyone in the company should have the following questions in mind:</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>CEOs; how secure is your company? What risks are you exposed to?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Technical Teams; how can you make data easy and accessible to your team without compromising security?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Product Owners; at what stage do you integrate security? And </p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Employees; what is your role in cybersecurity? What can you do to protect your company’s data?</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that it is important for cybersecurity to be a company-wide approach - a combination of people, processes and tools. Organizations should develop security operation centres, which are intelligence-led and are focused on creating high-level defence, cyber hygiene, education, and awareness.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The goal? To stress-test your systems, identify, contain and remediate the negative impact fast.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber literacy</b></p><p style="text-align:left;">When my parents were at school, my mom had to do typing lessons as a school subject. It was the same for me when I was at school where a module of Computer Literacy Classes focused on typing. Spoiler alert, I still type with a single finger on each hand looking at the keyboard the whole time. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">We digress. There is a significant push for subject matter such as coding and cyber security to be included in computer literacy classes in classrooms around the world. Cyber risk literacy should be <a href="https://www.helpnetsecurity.com/2020/10/27/cyber-risk-literacy/">part of every defensive strategy</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that while almost 95% of cybersecurity issues can be traced back to human error, such as accidentally clicking on a malicious link, most governments have not invested enough to educate their citizens about the risks, according to a report from the Oliver Wyman Forum.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber risk literacy of the population</b></p><p style="text-align:left;">The article adds that cyber literacy, along with financial literacy, is a new 21<sup>st </sup>century priority for governments, educational institutions, and businesses.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Cyberattacks are now one of the fastest growing crimes globally and are expected to cost organizations more than $600 billion dollars a year by 2021,” Paul Mee of the Oliver Wyman Forum told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“The situation has become even more pressing during the pandemic as our reliance on the internet has grown. Yet many citizens still lack the basic skills to keep themselves, their communities, and their employers safe.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Fifty geographies were assessed, including the European Union, on the present cyber risk literacy of its population, and the nature of related education and training available to promote and enable future cyber risk literacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that the index measures five key drivers of cyber risk literacy and education: the public’s motivation to practice good cybersecurity hygiene; government policies to improve cyber literacy; how well cyber risks are addressed by education systems; how well businesses are raising their employees cyber skills, and the degree to which digital access and skills are shared broadly within the population.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>How are assessed countries doing?</b></p><p style="text-align:left;">The article added that Switzerland, Singapore and the UK topped the list because of their strong government policies, education systems and training, practical follow through and metrics as well as population motivation to reduce risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Switzerland, the number one ranked country, has a comprehensive implementation document that lays out specific responsibilities along with what national or provincial legislation is required. Specific milestones are set, and timelines are assigned to ensure accountability regardless of who oversees the government.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Singapore, which is ranked second, has prioritized cybersecurity education efforts from early childhood to retirees. It established the Cyber Security Agency of Singapore to keep its cyberspace safe and secure. Its cyber wellness courses occur over multiple grades and focus on social and practical safety tips such as understanding cyber bullying.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that The UK ranked third, has the most integrated cyber system because it incorporates cyber risk into both primary and secondary education. The UK’s National Cyber Security Strategy of 2016-2021 is also one of the strongest plans globally. The US ranked 10th.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Countries that rank lower lack an overall national strategy and fail to emphasize cyber risk in schools. Some countries in emerging markets are only beginning to identify cybersecurity as a national concern.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Governments that want to improve the cyber risk literacy of their citizens can use the index to strengthen their strategy by way of adopting new mindsets, trainings, messaging, accessibility and best practices,” Mee told helpnetsecurity.com. “With most children using the internet by the age of four, it is never too early to start teaching your citizens to protect themselves.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Problematic issues</b></p><p style="text-align:left;">Another article by helpnetsecurity.com pointed out that cybersecurity <a href="https://www.helpnetsecurity.com/2020/10/23/cybersecurity-is-failing-due-to-ineffective-technology/">is failing due to ineffective technology</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">A failing cybersecurity market is contributing to ineffective performance of cybersecurity technology, a Debate Security research reveals.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that, based on over 100 comprehensive interviews with business and cybersecurity leaders from large enterprises, together with vendors, assessment organizations, government agencies, industry associations and regulators, the research shines a light on why technology vendors are not incentivized to deliver products that are more effective at reducing cyber risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The report supports the view that efficacy problems in the cybersecurity market are primarily due to economic issues, not technological ones. The research addresses three key themes and ultimately arrives at a consensus for how to approach a new model.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cybersecurity technology is not as effective as it should be</b></p><p style="text-align:left;">The article pointed out that 90% of participants reported that cybersecurity technology is not as effective as it should be when it comes to protecting organizations from cyber risk. Trust in technology to deliver on its promises is low, and yet when asked how organizations evaluate cybersecurity technology efficacy and performance, there was not a single common definition.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Pressure has been placed on improving people and process related issues, but ineffective technology has become accepted as normal – and shamefully – inevitable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>The underlying problem is one of economics, not technology</b></p><p style="text-align:left;">The article added that 92% of participants reported that there is a breakdown in the market relationship between buyers and vendors, with many seeing deep-seated information asymmetries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Outside government, few buyers today use detailed, independent cybersecurity efficacy assessment as part of their cybersecurity procurement process, and not even the largest organizations reported having the resources to conduct all the assessments themselves.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As a result, vendors are incentivized to focus on other product features, and on marketing, deprioritizing cybersecurity technology efficacy – one of several classic signs of a “market for lemons”.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Coordinated action between stakeholders only achieved through regulation</b></p><p style="text-align:left;">The article pointed out that, unless buyers demand greater efficacy, regulation may be the only way to address the issue. Overcoming first-mover disadvantages will be critical to fixing the broken cybersecurity technology market.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Many research participants believe that coordinated action between all stakeholders can only be achieved through regulation – though some hold out hope that coordination could be achieved through sectoral associations.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article added that, in either case, 70% of respondents feel that independent, transparent assessment of technology would help solve the market breakdown. Setting standards on technology assessment rather than on technology itself could prevent stifling innovation.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Defining cybersecurity technology efficacy</b></p><p style="text-align:left;">The article pointed out that participants in this research broadly agree that four characteristics are required to comprehensively define cybersecurity technology efficacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">To be effective, cybersecurity solutions need to have the capability to deliver the stated security mission (be fit-for-purpose), have the practicality that enterprises need to implement, integrate, operate and maintain them (be fit-for-use), have the quality in design and build to avoid vulnerabilities and negative impact, and the provenance in the vendor company, its people and supply chain such that these do not introduce additional security risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“In cybersecurity right now, trust doesn’t always sell, and good security doesn’t always sell and isn’t always easy to buy. That’s a real problem,” Ciaran Martin, Advisory Board Member at Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Why we’re in this position is a bit of a mystery. This report helps us understand it. Fixing the problem is harder. But our species has fixed harder problems and we badly need the debate this report calls for, and industry-led action to follow it up.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Company boards are well aware that cybersecurity poses potentially existential risk, but are generally not well equipped to provide oversight on matters of technical detail,” John Cryan, Chairman Man Group told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Boards are much better equipped when it comes to the issues of incentives and market dynamics revealed by this research. Even if government regulation proves inevitable, I would encourage business leaders to consider these findings and to determine how, as buyers, corporates can best ensure that cybersecurity solutions offered by the market are fit for purpose.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“As a technologist and developer of cybersecurity products, I really feel for cybersecurity professionals who are faced with significant challenges when trying to select effective technologies,” said Henry Harrison, CSO of Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“We see two noticeable differences when selling to our two classes of prospects. For security-sensitive government customers, technology efficacy assessment is central to buying behaviour – but we rarely see anything similar when dealing with even the most security-sensitive commercial customers. We take from this study that in many cases this has less to do with differing risk appetites and more to do with structural market issues.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be cyber smart</b></p><p style="text-align:left;">Cyber security is advancing at a rapid rate. Companies are no longer able to keep a constant eye on their employees and offer the protection that they need. a measure of this responsibility rests on the shoulders of <a href="https://www.dqindia.com/5-cybersecurity-tips-secure-data-become-cybersmart/">those below board level</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Use a strong password</b></p><p style="text-align:left;">The article points out that having to manage a large number of applications and software, the easiest option for most users would be to pick a password that is easy to remember, and then apply it across the board. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While this might be a convenient option, it is definitely not the safest. Cybercriminals these days use tools that sniff out passwords reused on other sites to make their work easier and to make the stolen passwords and data more lucrative on the dark web. Hence, it is recommended that you choose strong passwords, using different alpha-numerical combinations, as well as change them periodically.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Opt for two factor authentication</b></p><p style="text-align:left;">The article adds that the rule of thumb should be when creating any digital account, always set up two-factor authentication (2FA). </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">It’s a common practice to login to accounts using multiple devices, most often of colleagues, or people we trust. Just trusting the person is never enough. It is their machines that you must trust. In case, you have logged into a network on a PC with malware, you are essentially letting cybercriminals access your data. In such cases, having 2FA, helps to prevent egregious attacks where a cybercriminal tries to login to your account and steal your data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Safeguard your entry points</b></p><p style="text-align:left;">The article points out that all it takes is one weak entry point, to allow a cybercriminal access to your entire network. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">By forgetting to close down the access points that are not being used, this can be an open door for hackers to enter, and place malware on to your network.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Lookout for signs of a scam</b></p><p style="text-align:left;">The article points out that phishing attacks have become increasingly common these days, and are using several tactics to target vulnerable users. At the same time, there are often several tell-tale signs of a scam in the making, which you can easily spot, if you keep a sharp lookout for them. For example, emails with improper grammar, and spelling mistakes are one of the biggest giveaways. Additionally, links that promise freebies and then request you to enter card details too are illegitimate.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Frequently update your system</b></p><p style="text-align:left;">The article adds that inexpensive home internet devices are prime targets for hackers. A best practice is to update these frequently, and apply all security patches quickly. In the case of older devices, which no longer receive firmware updates, they should be immediately switched out for newer models, to prevent hackers from controlling traffic through routers, and implementing various attacks.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Cybercrime is advancing at a rate which we can no longer afford to take lightly, or ignore. No organization or user today can be considered too small to be a potential victim, hence there is a strong need to create awareness on phishing or targeted attacks. Furthermore, the increased dependence on technology to stay connected, and ensure business continuity, has opened the floodgates to a whole new set of potential cybersecurity vulnerabilities that users must be conscious of. By practising these simple tips and maintaining good IT hygiene, we can be cybersmart, and safe on the internet.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">There are other helpful, yet simple, <a href="https://whnt.com/news/online-safety-tips-for-national-cyber-security-awareness-month/">tips to follow</a>: </p><p style="text-align:left;">- increase your online privacy. Protect your online accounts by implementing multifactor authentication and using strong passwords, which consist of letters, numbers and special characters. Individuals should also refrain from accessing banking information or making online purchases when connected to an unsecured public network;</p><p style="text-align:left;">- stay secure while you work. As more employees work virtually during the COVID-19 crisis, they should be more vigilant about internet scams and online fraud. Business and personal information should be treated with the same care; avoid sharing it with unfamiliar parties or over unsecured networks. It is important to keep the security software on your business devices up to date, because only one employee needs to be compromised for an entire organization to experience a data breach;</p><p style="text-align:left;">- use social media responsibly. Social media is a great way to connect with friends and family, but it can also allow scammers and cybercriminals to target you. Only accept friend requests from people you trust, avoid clicking links in messages from strangers, and refrain from posting your personal information online. Remember to be careful about what you share. Remember, there is no “delete” button online.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:11pt;">“The responsibility to fight cyber crime is upon all of us. We cannot stand back and say that it should be an issue that needs to be tackled at board level. We are all exposed and we can all take a stand against this. Simple interventions, and being aware, can definitely go a long way to address this. Are you going to play an active role?” asks Craig Tarr, CEO of GTconsult.&nbsp;</span></span><br></p></div>
</div><div data-element-id="elm_0nA7lU8VRRKuqFetk31NYQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 27 Oct 2020 08:38:59 +0000</pubDate></item><item><title><![CDATA[The Weakness We Are Ignoring]]></title><link>https://www.gtconsult.com/blogs/post/the-weakness-we-are-ignoring</link><description><![CDATA[We are living in an ever increasingly connected world. Not only are we engaging with each other in traditional methods, but we are increasingly engagi ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_p5I12zPhR-OC4CO-rS2NSw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ncckjAnEQJi4vXbKu-QgdA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gFtdrioWQMCJLPo09z3PRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_PF8ZOCc_SEy8dsI6uLossw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p></p><p>We are living in an ever increasingly connected world. Not only are we engaging with each other in traditional methods, but we are increasingly engaging with each other using technology.</p><p>This is not a bad thing, don’t get me wrong. I am not saying that we need to start creating a movement to plunge us back into the dark ages of having no technology. What I am saying though is while we are living in a world of unparalleled technological brilliance, we are opening ourselves up to new risks by adopting technology on the scale that we are at the moment.</p><h4 id="theweaklink">The weak link</h4><p>One of these new risks that technology has brought about is cyber terrorism and cyber crime. Hardened criminals no longer have to roam the streets with a gun or a knife; they can sit in a room with a laptop and cause just as much damage as the best bank robber.</p><p>What role does the internet of things (IoT) play in this? In a recent interview with enterpriseinnovation.net, Wally Lee – Principal Cyber Architect from Quann – shared his insights on the current state of IoT security today.</p><p>Because IoT devices connect to the internet, a significant risk exists. The significantly expanded threat surface has increased the vulnerability of enterprises and their networks.</p><p>“Not only are things now talking to each other, but the people are talking more and more through machines, resulting in the enormous amount of data generated. As more data is gathered, it is presumed that more security patches will become available as the number of entry points for cyber criminals only appears to be rising,” said Lee.</p><p>However, most IoT devices are highly vulnerable to cyber attacks. Lee added that right now, attackers are having a lot of success simply exploiting known credentials, such as default usernames and passwords or hard coded backdoors because they know that 70% of IoT devices contain inherent vulnerabilities, such as insufficient authorisation requirement, lack of in-transit encryption, insecure web interface, and inadequate software protection.</p><h4 id="moresophistication">More sophistication</h4><p>The article references a report from Gartner which forecasts that 8.4 billion connected things will be in use worldwide in 2017 and will reach 20.4 billion by 2020. This means that attack surfaces will be expanded dramatically. Also, the accelerated adoption of cloud-based computing, storage, processing, and even infrastructure adds complexity to the security of IoT.</p><p>The enterpriseinnovation.net article pointed out that the weakest link in cloud security is not in its architecture per se but the millions of remote devices accessing cloud resources. Given the potential for both mayhem and profit, we expect that more sophisticated attacks will be designed to exploit the weaknesses in the IoT communications and data gathering chain – endpoint devices. Gartner also predicts that by 2020, more than 25% of identified enterprise attacks will involve IoT.</p><h4 id="attackpotential">Attack potential</h4><p>Again, the purpose of this article is not to scare people away from technology, we need to be aware of the risks we face so that we know what we need to do when we are building up our defences.</p><p>Lee was asked about the potential impact an IoT based cyber attack can have, his answer was eye opening.</p><p>“In 2013, a dam in New York suffered a cyber-attack by Iranian hackers. The attackers only managed to breach the back office systems, through a cellular modem. But had they hacked into the operational systems of the somewhat small dam – just 20 foot tall – and remotely opened its sluice gate, 140 structures could have affected. A flood in 2007 caused more than $80 million in damages. Speculation was that this attack on an obscure dam was a practice run for a large-scale attack,” said Lee.</p><p>He added that in the Ukraine, three power distribution centers were hit in a coordinated attack, taking down power grids and leaving 230 000 residents in the dark for one to six hours. The attack was carefully planned and took down backup power supplies as well. These power centres were not unprotected. They were well-segmented with robust firewalls. But it was the remote access that workers use to log into the SCADA network that proved to be their undoing. During the attack, the hackers overwrote firmware on critical devices at 16 of the substation, leaving them unresponsive to remote commands, even six months after the attack.</p><p>Finally, the article pointed out that in Singapore, connected devices control critical functions as well. The patients’ real time health condition can be monitored remotely, and should there be warning signs of medical emergencies, alerts can be sent to care providers. Some IoT health equipment can also disperse medication autonomously based on real-time analysis of a patient’s health status. Should these devices be hijacked and their data tampered with, the subsequent medical intervention would be affected and incorrect, resulting in severe consequences for the patients.</p><h4 id="thefutureofsecurity">The future of security</h4><p>So, it is clear that we need to beef up security when it comes to IoT devices and risks. What is the future of this?</p><p>Lee said that fundamentally, IoT, IT and OT devices are similar in that they are now highly interconnected. Each of them can be used to deliver payloads.</p><p>“IoT devices are just beginning to be exploited. The variety of devices, OS’s and versions provide a near-term resistance to attacks because only a few companies have a large enough installed base to attract cyber thieves. Enterprises have several options available for managing security issues that IoT devices and networks introduce, such as access control and network segmentation. On the other hand, consumers have none,” said Lee.</p><p>As predicted by Gartner, through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices. We foresee that IoT devices will still remain the weakest link IoT security in the near future unless IoT manufacturers take immediate and direct action to enhance the security of their devices at the design stage.</p><p>The article ended off by saying: if IoT manufacturers fail to secure their devices, the impact on the digital economy could be devastating.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 28 Aug 2017 15:35:11 +0000</pubDate></item><item><title><![CDATA[For better or for worse, technology can make a difference]]></title><link>https://www.gtconsult.com/blogs/post/better-worse-technology-can-make-difference</link><description><![CDATA[For better or for worse, technology can make a difference A lot has been written in the past about technology and the innovation that is associated wit ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_LHkTj70tRUi6X-_qkbUXnw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SpjOzmOHSqWCzI49BCkYtQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_iLJ0ofPURoSnTrHTGkbX7A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_id7iucXxRMWZgAh1Sa90Ag" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><h3 id="forbetterorforworsetechnologycanmakeadifference">For better or for worse, technology can make a difference</h3><p>A lot has been written in the past about technology and the innovation that is associated with it. From humble beginnings, technology has enabled companies like Microsoft, Google, Apple and Toyota to become some of the biggest companies in the world.</p><p>More recently, we have seen the effects of innovation within companies such as Uber, Airbnb and Alibaba. None of these companies own stock or assets of their own, yet are trailblazers in their respective industries challenging existing business models.</p><p>Have we seen the end of technology innovation? Most certainly not. In fact, some may argue that we are in the most innovative age yet when it comes to technology. A staggering 90% of all the data in the world has been generated over the last two years. Internet-based companies are awash with data that can be grouped and utilized. Is this a good thing?</p><h3 id="techenabler"><strong>Tech enabler</strong></h3><p>South Africa is currently going through one of its worst economic slumps in recent history. After two consecutive quarters of negative growth, the country is in a technical recession which may be upgraded into an outright recession if growth figures don’t pick up over the last two quarters of the year.</p><p>Are we alone in this? Again, we are not. For many years, China was struggling to build its economy as it came to grips with being one of the only surviving communist governments in the world. After many countries changed their views on China, the country went about the hard task of building its economy, and it was very successful.</p><p>An <a href="http://www.chinadaily.com.cn/2017-06/27/content_29908882.htm">article on the China Daily website</a> showed that technology played a significant role in this and will play a major role going forward.</p><p>Premier Li Keqiang said that technologies such as artificial intelligence and intelligent robots will revolutionize workforces. This was said during his opening speech at the 11th Annual Meeting of the New Champions, also known as Summer Davos being held in the coastal city of Dalian .</p><p>Farmers in China’s remote mountainous areas now can see specialty products reach urban consumers in a matter of one or two days, with prices several times higher than if they are sold locally. This is all possible because of booming online trading platforms and express delivery networks.</p><p>The article adds that Li used this as an example to highlight how technology and innovation can accelerate a more inclusive economic growth that features meaningful job creation and sustainable development, a main theme of the three-day meeting.</p><h3 id="thesharedeconomy"><strong>The shared economy</strong></h3><p>Indeed China has a lot to share with the political and business leaders from other countries attending the meeting on how jobs can be created through promoting innovation and entrepreneurship.</p><p>The article states that over the last four to five years, more than 50 million new jobs ( 13 million annually), have been created in the country, a remarkable achievement that is also fundamental to inclusive growth that benefits all people.</p><p>All this has been made possible due to the government endeavour to drive mass entrepreneurship and innovation, which, as a result, has seen 14 000 new enterprises registered each day over the past three years, as Li said.</p><p>As part of China’s bid to upgrade and transition its economy to more sustainable growth, technology and innovation are playing a key role in helping foster a rapid development of new industries and business models such as e-commerce, mobile payment and bike sharing.</p><p>The new growth momentum has not only created 70% of all new jobs last year, but also laid a firm foundation for China to realize its annual growth target of around 6.5%.</p><p>The stellar economic performance is a boon to the world economy that is still suffering from an insufficient recovery, given that China imported $1.6 trillion of goods last year, while outbound trips reached 130 million.</p><h3 id="fromstrengthtogreaterstrength"><strong>From strength to greater strength</strong></h3><p>In the past, we have spoken about artificial intelligence and the benefits it can add to industries and economies. But what effect is it having on the profitability of specific companies? <a href="https://www.technologyreview.com/s/608082/the-business-issue/">An article</a> on the Technology Review website discusses this in detail.</p><p>Top of the list is Nvidia. Nvidia has gained expertise in AI and used it to transform itself. Once known as a maker of chips for gaming, it is now a leading player in deep learning and autonomous vehicles. Amazon, No. 3, is on the list again for its ambitions to build an AI-powered store and place the technology at the heart of the home of the future.</p><p>Companies focused on DNA analysis and developing gene therapies are a dominant group on the list—23andMe (No. 4), Spark Therapeutics (No. 10), Illumina (No. 22), and Oxford Nanopore (No. 32) among them.</p><p>Since 2010, SpaceX has been highlighted six times. It’s on again in 2017 (at No. 2) on the strength of its ability to stick rocket landings and then recycle its crafts for another go-round, potentially changing the economics of space travel. IBM has made the list every one of the past seven years; this year it’s at No. 39 for its work with block chain, cloud AI, and quantum computing.</p><h3 id="earlyadopters"><strong>Early adopters</strong></h3><p>Technology has grown so rapidly that it has fundamentally changed the way we do business and the way company’s are made up.</p><p>Companies that are slow adopters of technology will always be on the back foot in a market where business will never be able to be done in the same way again. An <a href="https://www.bloomberg.com/news/articles/2017-06-26/former-tech-copycat-china-turns-tables-on-innovation">article on bloomberg.com</a> shows how company’s business models are benefiting from technology.</p><p>Chinese companies are setting global trends in technology products or business models in areas such as supercomputers, technology-enabled transportation, digital payments and artificial intelligence. China’s technology companies and its home grown tech ideas are spreading everywhere. The world is cribbing from China now.</p><p>The article adds that the US and other countries have seen a flurry of apps that are inspired by Meitu, the Chinese app that pretties up selfie photos. American startups are copying China’s fleets of on-demand bicycle rentals for getting around crowded cities. Apple and Facebook are trying to remold their messaging apps in the image of China’s ubiquitous WeChat. Before there was Tinder for hookups, there was similar dating app Momo in China. Every company that makes drones is following the lead of China’s SZ DJI Technology.</p><p>The article adds that the influence of Chinese tech in the world arguably started with telecommunications equipment company Huawei Technologies. It branched first into Europe and forced stodgy local rivals such as Sweden’s Ericsson and Alcatel-Lucent of France to cut prices and copy Huawei’s more advanced methods of updating older gear with fresh software. (Some European officials have said Huawei has benefited unfairly from Chinese government subsidies, a claim the company has denied.)</p><p>More recently in India, Chinese smartphone brands including Xiaomi and Vivo are among the top sellers in the rapidly growing Indian smartphone market, and China’s e-commerce king Alibaba is helping digital payments and online shopping catch on quickly there.</p><p>With the world moving to technology based solutions at a rapid pace, we need to ask ourselves two questions: Do we see value in technology: and, what kind of adapters are we, early or late?</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 06 Jul 2017 16:51:36 +0000</pubDate></item><item><title><![CDATA[Living A Smart City Life]]></title><link>https://www.gtconsult.com/blogs/post/living-a-smart-city-life</link><description><![CDATA[Living A Smart City Life Imagine a world where streetlights go brighter as activity increases on a street, yet dim when the activity subsides. Imagine ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Y0Tv4pI8TuC5prBEV9EpTg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_y0k9VLEsSu-_JDqwB-gXDQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PRMYsyuHSPCDD14jttFXQA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_aRQhCXMDScGdokehePxw3Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><h3 id="livingasmartcitylife">Living A Smart City Life</h3><p></p><p>Imagine a world where streetlights go brighter as activity increases on a street, yet dim when the activity subsides. Imagine a world where you are driving a car and are notified when there is a parking space available, and that parking space is unique to you? Gone would be the days of driving aimlessly to find a parking spot and then fighting somebody for it.</p><p>Imagine a world where vehicle ownership is a thing of the past, where your journey home from work is made using hired bicycles and communal vehicles? A world where traffic lights operate differently during peak traffic times according to traffic pressure found on the roads?</p><p>This is world of smart cities, where telematics dictates order and runs the city like a well-oiled machine. We have spoken in depth about the shared economy that we increasingly find ourselves living in. This will not only be driven by technology, but by the internet of things (IoT) and smart devices which interact with each other to personalise a unique experience for a person on a daily basis. Just think about itâ€¦no two days will ever be the same again.</p><p>The debate about this needs to go beyond whether we are ready to be living in smart cities or not, because I think that it will eventually be forced upon us. No, the debate we need to be having is whether the advantages of living in these cities outweigh the challenges/risks that will be encountered on a daily basis.</p><h4 id="thefreedomwewant"><strong>The freedom we want</strong></h4><p>I recently read an <a href="https://www.allaboutcircuits.com/news/a-tale-of-3-smart-cities-how-and-why-cities-are-offering-free-wi-fi/">insightful article</a> on allaboutcircuits.com regarding smart cities and their future. What became clear is free wifi will play an important role.</p><p>The article states that in the context of a smart city, free internet access provides more opportunities for both city administrators and citizens. Widely available Wi-Fi access will springboard an even more prevalent use of Internet of Things applications: data collection. A reliable network within a city also enables more innovative use of its services. The city can use data on how its services are used to become more efficient and streamlined.</p><p>Socially, individuals who may not otherwise have reliable access to online services will now be able to go online for free for education, job searches, or to communicate. The ability to access online resources will become increasingly important in bridging inequality gaps between socioeconomic groups as more business takes place online.</p><h4 id="thespanishtango"><strong>The Spanish tango</strong></h4><p>Barcelona was one of the first cities in the world and has benefited immeasurably from this technological focus.</p><p>The allaboutcicuits article pointed out that there are over 1 000 access points spread across the city to provide free Wi-Fi, including at outdoor facilities and on buses.</p><p>The service is provided in a private-public partnership with Aptilo Networks, which manages and distributes the access points.</p><p>Spain faced economic difficulties in the 2000s and, in response, began utilizing sensor and IoT applications to increase the efficiency of Barcelona city services.</p><p>An investment in the cityâ€™s smart capabilities has saved Barcelona millions by providing more useful data for more efficient delivery of services, providing opportunities for economic growth for citizens, and better connecting the city as a whole.</p><h4 id="thelocalsituation"><strong>The local situation</strong></h4><p>So how would South Africa benefit from a focus to work towards implementing smart cities?</p><p>A <a href="https://www.businesslive.co.za/fm/features/2017-05-20-how-smart-cities-and-the-internet-of-things-will-reshape-south-africa/">recent article</a> on the businesslive website discussed this in depth. The article pointed out that South Africaâ€™s large metros often struggle to meet citizensâ€™ needs, which drives conversations about the technology of smart cities.</p><p>These challenges are expected to grow in the years ahead due to increasing urbanisation, and in Africa this has become a significant driver of conversations focusing on smart cities.</p><p>The good news is South Africa has already made exciting progress, with IoT projects under way and the development of smart cities at the top of the agenda. These, it should be noted, work hand in hand. In fact, the IoT is essential to the success of a smart city, as it bridges the physical and digital worlds.</p><p>Doing so enables a metro to gather real-time data from millions of objects, such as water meters, electricity meters, waste bins, traffic lights and street lights. This forms the basis on which contextual data can be collected, analysed and used to manage the city in a smarter, predictive and proactive way.</p><h4 id="theagriculturalfuture"><strong>The agricultural future</strong></h4><p>South Africa has recently come off the back of one of the worst droughts it has experienced in recent history. Cape Town is still reeling in shock over water supply issues and one feels that the city will learn some valuable lessons about water management in the future.</p><p>The businesslive website pointed out that in the near future, for example, nationsâ€™ growing populations will be fed by crops that are smartly planted at the right time and in precisely the right place to produce maximum yield. Using the IoT, farmers will be informed via connected sensors of the precise dosage of water, fertiliser and nutrients that the piece of cultivated land will need to produce an optimal yield in terms of volume and quality.</p><p>As the increasing demand for food and the effects of climate change on food security become dominant concerns, smart agriculture is just one of the ways in which the IoT will prove its value.</p><h4 id="thedarkside"><strong>The dark side</strong></h4><p>This brings us to the next question, is everything about smart cities all good? what are the challenges we would face?</p><p>Privacy is one of them. This is a growing issue in a world where cyber criminals are the new threat. A <a href="https://iot-for-all.com/smart-city-privacy/">recent article</a> on iot-fo-all.com asks the questions we all have in mind.</p><p>Smart cities will enable authorities to track a personâ€™s location at all times by using video feeds across the city (in busses, outside stores, etc), facial recognition, and other sensors/technologies. Although a personâ€™s activity may take place in public, this information can nonetheless be extremely private. For instance, people may need to travel to an HIV clinic, to a psychiatrist, to an abortion clinic, etc.</p><p>So what does smart city privacy look like? Should it be illegal to collect and store a personâ€™s location information? What about when this tracking isnâ€™t explicitly enabled but can still be pieced together from a variety of other data sources? Should those other sources of data collection be made illegal too?</p><p>The debate is relevant because it is becoming a reality. As with most things, I am optimistic about the future of technology. However, this optimism comes with a caution. As we embrace this, we need to be aware of the challenges it poses.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 08 Jun 2017 15:29:00 +0000</pubDate></item><item><title><![CDATA[Breaking boundaries, good and bad]]></title><link>https://www.gtconsult.com/blogs/post/breaking-boundaries-good-and-bad</link><description><![CDATA[I have written extensively about how technology breaks boundaries, both tangible and intangible. But is there capacity for this to expand beyond our i ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0caLN4e-QeStpK600mwg3g" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_3II__-7gQMylBovGZucAsw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_U9NDhdccRSacK0FseUeDzw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_FSnsl-_cS_q53PDrdmX53A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p><strong>I have written extensively about how technology breaks boundaries, both tangible and intangible. But is there capacity for this to expand beyond our imagination? And is this for the good or for the bad?</strong></p><p><strong>Credibility breaker</strong></p><p>I read an <a href="https://www.theatlantic.com/technology/archive/2017/05/freeing-technology-from-the-pace-of-bureaucracy/524034/">interesting article</a> on theatlantic.com which provided a unique view on this debate.</p><p>The article proposes that technology can be powerful, but it isn’t inherently good or bad. Just as a hammer isn’t inherently good or bad; what matters is how it’s used. Are we using the tool to build or to destroy?</p><p>Technology can be a weapon against democracy. Fake news, fabricated for virality, spreads harmful propaganda at the speed of a share. Governments use technology to violate the privacy of law-abiding citizens. Bad actors have influenced elections and broken into the US Defence Department through email inboxes.</p><p><strong>A worker for good</strong></p><p>The article adds that if civic engagement fuels democracy, technology can be a saviour, too.</p><p>Technology helped the US to register more voters in 2016 than ever before in American history. Technology has empowered outsider candidates to raise funds, compete, and win against elite party heavyweights.</p><p>Further, open data policies and portals provide free, up-to-date access to valuable information about communities and government, and citizens are using it to build businesses and to hold government accountable.</p><p>**Sparking a revolution **</p><p>Technology held a particular political leader very accountable. Unhappy with then President Hosni Mubarak’s leadership, the people of Egypt took a stand in 2011 and organised a revolution which saw the start of the Arab Spring.</p><p>Large groups of people were mobilised using technology such as WhatsApp and Facebook to arrange gatherings or campaigns against government-held positions. When the police were making their way towards these positions, the people were against forewarned by the same messaging services and social networks.</p><p>Now Egypt is considering changing its laws regarding social media in the fear that a similar mobilisation can take place in the future.</p><p>A report on edition.cnn.com <a href="http://edition.cnn.com/2017/05/16/africa/egypt-social-media/">points out that</a>&nbsp; a draft bill circulated in Egyptian newspapers would require users to register with the government to access sites including Twitter and Facebook. Successful applicants would receive a login linked to their national ID. Unauthorised use could result in prison sentences and heavy fines.</p><p>A politician said the move would <em>facilitate state surveillance over social networks in Egypt by making users enroll in a government-run electronic system that will grant them permission to access Facebook.</em> The same politician added that the reforms were necessary to combat terrorism and incitement against the state.</p><p>A human rights activist group labelled the move as shocking. <em>This will have a big impact by controlling what people say and don’t say. Government issued IDs are linked to a plethora of activities including driving, banking, and medical services so the government will have much more information about users’ whereabouts.</em></p><p></p><p><strong>Crossing the line</strong></p><p>While technology is unquestionably a force of good; as we have seen, it can have detrimental effects as well.</p><p>The above deals with the dangers of technology at a high level, but are there dangers at a lower level? A <a href="http://www.cbc.ca/radio/thecurrent/the-current-for-may-15-2017-1.4112604/why-technology-is-addictive-and-what-to-do-about-it-1.4112606">recent article</a> on cbc.ca suggests that there is.</p><p>The article points out that a buzzing phone, glowing tablet or the sound of a favourite video game can be a powerful temptation many can’t resist.</p><p>Now new research shows the cravings we have to connect to our devices can, in fact, be a real addiction.</p><p>Talking to cbc.ca, Adam Alter, author of Irresistible: The Rise of Addictive Technology and the Business of Keeping us Hooked, said that 75% of people now say they can reach their phones 24 hours a day without having to move their feet.&nbsp; He added that the average person spends 3 hours and 42 minutes staring at screens each day, and that number is rising.</p><p>“Most people generally underestimate how long they are on their devices. I include myself in this category and I can point to several apps that can be used to track actual screen time use,” said Alter.</p><p>Alter explains the success of social media platforms are that they have many ingredients that make it irresistible — the biggest being that a reward is within reach but yet never guaranteed, much like gambling.</p><p></p><p><strong>Arrested development</strong></p><p>Fascinated by the article so far? The next part of the article really hit home and got me asking questions.</p><p>The article pointed out that while it’s too early to know the long-term impact of our technological consumption, Alter says there is evidence that children who spend a lot of time on screens early in life have language delays and are not skilled communicators.</p><p>He feels that a lot of nuances are lost when a person who would normally use precise language to communicate something funny like LOL when texting can’t factor in facial expressions or a lilt in a laugh.</p><p>“Everything is a cue. And we don’t even think about that if we’re skilled communicators who have spent a lot of time face to face. But if your early use of communication is spent LOL’ing and you don’t acquire those nuances, it’s very hard to acquire them later on,” said Alter.</p><p>When it comes to toddlers, Atler referred to the quote, <em>never get high on your own supply</em> and suggests the best way to maintain distance from the “<em>drug</em>” of screen time is to <em>keep them away from your family.</em></p><p></p><p><strong>Further investigation</strong></p><p>While the effects of technology on our children may still be a matter of debate, it is worth further investigation.</p><p>A <a href="http://www.irishexaminer.com/viewpoints/analysis/we-must-engage-with-adverse-effects-of-technology-on-children-448287.html">recent report</a> on the irishexaminer.com points out that UCD professor Mary Aiken, advisor to the Europol European Cybercrime Centre, has researched in depth the developmental impact of technology on children — from infant to teenage years.</p><p>Dr Aiken – who has advised Interpol, the FBI and the White House on cyber-criminality – believes it’s the Government’s responsibility to protect children from the harmful side effects of technology.</p><p>“The State has a duty in terms of actually reaching out, educating, informing, and ultimately protecting children,” she said, “we need structured guidelines for how parents should introduce children to technology and how they can address negative behaviours from an informed scientific perspective.”</p><p>Quoting the Canadian forensic psychologist Michael Seto, Dr Aiken added that the world is <em>living through one of largest unregulated social experiments of all time</em> with regard to technology and developmental impact.</p><p>Addiction, lack of empathy, and poor development of communication skills are just some of the side effects which children are currently at risk of due to technology overuse.</p><p></p><p><strong>What age is the right age?</strong></p><p>Dr Aiken believes the EU Government needs to invest in ongoing research and initiatives to help the current generation of children grow up safely alongside technology.</p><p>“We really need theories of stages of cyber cognitive development. If we think about child development in a real-world context, we have theoretical guidelines; what age a child should be crawling, picking up building blocks. My argument is we don’t have equivalent guidelines in an age of technology. What age is it appropriate to give a tech device to a young child? The American Academy of Paediatrics doesn’t recommend exposing an infant to any screen before the age of two — an example of something not widely known by parents,” said Dr Aiken.</p><p>I am not against technology. But we need to know the good side of the debate, as well as the bad side, to fully appreciate the challenge we face.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 25 May 2017 15:29:02 +0000</pubDate></item><item><title><![CDATA[Net-neutrality is the latest big thing in technology]]></title><link>https://www.gtconsult.com/blogs/post/net-neutrality</link><description><![CDATA[The advancement of technology, in particular, the growth of the internet and connectivity, has dramatically changed the shape of the world that we liv ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_thFVWpxDRKK76EQvlrhICg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_5hSGQ-7CTSO2mmyqmS4Kgw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mDlMOlzcS4mbmiAPLw_FRA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_hMBff9DERoS6_ZlRqgYa6g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hMBff9DERoS6_ZlRqgYa6g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p>The advancement of technology, in particular, the growth of the internet and connectivity, has dramatically changed the shape of the world that we live in.</p><p>Gone are the days of being bound to an office with specific rules and boardrooms where the air-conditioning doesn’t work. Connectivity allows a person to telecommute to an office or a boardroom meeting should they be unable to attend it.</p><p>It also creates a level playing field for companies of different shapes and sizes to compete on a level footing for the same customers. Or does it?</p><p><strong>The world of net-neutrality</strong></p><p>Those of us who have uncapped internet are all too familiar with <em>throttling</em>, a practice whereby internet service providers (ISP) throttle bandwidth during peak hours or at times when clients are not adhering to their fair usage policies.</p><p>While frustrating, the practice of throttling bandwidth has little effect in South Africa, other than it being the proverbial thorn in the side. But in the US, this is big business with significant ramifications.</p><p>ISPs are major players in the US market with significant ownership of tech companies. Hulu is partly owned by Comcast. If you are a Comcast customer, and you want to watch a video on say Netflix, preferential bandwidth is given to Hulu to the extent that the same video will be shown at a faster speed than on Netflix.</p><p>This dissuades people from using a video broadcast website that is not affiliated with the said ISP. However, this also means that advertisers are being unfairly treated by the preferential treatment.</p><p>The US is all about doing business as fairly as possible, and they have a proud reputation regarding this. so it was unsurprising when former President Barack Obama passed net-neutrality laws which prevented ISPs from their throttling ways.</p><p>However, as some would say predictably, President Donald Trump looks set to scrap this law. What will this mean for business?</p><p><strong>A case for fair business</strong></p><p>A <a href="http://economictimes.indiatimes.com/articleshow/58583542.cms">recent article on economictimes.indiatimes.com</a> pointed out that data traffic management practices employed by telecom service providers should not allow application-based restrictions and should not discriminate.</p><p>The telecom regulatory body had put out a consultation paper on net neutrality in January and had asked for submissions on the kind of traffic management practices that should be allowed. The paper said it was “important to identify core principles of net neutrality for India and the types of practices that might be regarded as being in violation of these core principles”.</p><p>“Net Neutrality regulations should ensure that traffic management practices do not impose arbitrary restrictions and discriminatory practices, including blocking, throttling, or altering of specific content, application, or services and should be strictly forbidden and any such actions should be punishable,” R Chandrasekhar, Nasscom president, told ET.</p><p>The article goes on to add that Nasscom made a joint submission to the Data Security Council of India. He added that traffic management should not directly or indirectly discriminate based on the data whether on price, the source of data or destination of the data.</p><p>“We also think that traffic management systems should be temporary and targeted at solving a problem. It should only take place in times on congestion,” said Chandrasekhar.</p><p>If we think of this, it’s only fair right? Net neutrality is the principle that all data on the internet should be treated equally by internet providers. It prevents internet service providers from privileging or punishing different kinds of data usage. It creates a free market system, a system whereby the smaller players keep the bigger players in check.</p><p>As discussed in previous articles, Millennials are the customers of today, and their loyalty is fickle at best. They spend considerable time fighting against practices that marginalize smaller companies. And once their loyalty is gone…as the Italian mobsters say…forget about it.</p><p><strong>A look into the future</strong></p><p>Let’s say that net-neutrality is scrapped. ISPs will be able to charge what they want for preferential treatment at free will.</p><p>They will tell you that it is not a big thing, but to quote George Orwell’s Animal Farm: <em>all animals are equal, but some will be more equal than others.</em></p><p>An article on networkworld.com points out what would happen in this world. The new regulations would split the Internet of Things (IoT) industry into the haves and the have-nots. Larger IoT firms would flourish, as they can pay the higher access fees to connect their sensors to the cloud.</p><p>Startups that cannot afford the higher fees will struggle to survive. Venture Capital funding to new IoT startups will dry to a trickle. Sales of the carrier’s own IoT services will soar because they didn’t have to pay the higher access fees thereby becoming <em>more equal</em>. This will be the death kneel for smaller companies; the proverbial nail in the coffin.</p><p><strong>The news gets worse</strong></p><p>The article goes on to paint an even worse picture.</p><p>IoT devices would still be able to connect to the network, but they have to be carrier-certified first. The long lead times and high costs for IoT device certification would slow down the rate of innovation. On the plus side, certification has become a lucrative profit center for the carriers.</p><p>Health-monitoring applications that produce a high volume of sensor data were the first to suffer. Their popularity declined as sensor readings became less dependable due to higher network latency and increased packet loss. IoT-based predictive maintenance and security monitoring services were the next to fade. In theory, network traffic was still treated fairly by the carriers, but in practice, traffic from profitable applications was treated more fairly.</p><p>Can we honestly say we want to live in a world such as this?</p><p>No, and it is up to us to fight for our rights as smaller or medium sized businesses before it is too late.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 18 May 2017 15:08:52 +0000</pubDate></item><item><title><![CDATA[Looking into the future]]></title><link>https://www.gtconsult.com/blogs/post/looking-into-the-future</link><description><![CDATA[We have done a lot of blog articles on the future impact that technology will have on businesses. While some people may say that this is becoming a bor ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_gRgokT1IQe6KpRAUavySwQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_I1SC9M2DTiunJUU_oHAcMQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_t2Np0ijOQO--hUhkVb0JuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Z1IT6CcQSnOq7110gcpuDQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>We have done a lot of blog articles on the future impact that technology will have on businesses.</p><p>While some people may say that this is becoming a boring topic, I disagree. Technology progresses so much on a daily basis that it becomes hard to quantify the impact that technology will have on our daily lives without revisiting this topic on a regular basis.</p><p>Last year saw some interesting developments in the IT infrastructure space, including the growth of the Internet of Things (IoT) and the launch of low range networks that enable more devices to be connected and communicable.</p><p>According to research undertaken by Gartner, 2017 will also be seeing new trends emerging such as the growth of intelligence and connectedness through the launch of new apps and many more IoT devices, while artificial intelligence, machine learning and virtual and augmented reality are expected to make significant progress.</p><p><strong>Much of the same</strong></p><p>Despite a few significant technologies, the key underlying technology trends remain the same, albeit reworded or regrouped. We are still moving towards the world that is ever more connected, meshed and customer centric.</p><p>Businesses need to pay attention to this underlying theme of transforming digitally, as it seems set to stay for the next few years and should form part of every organization’s 5-year strategy.</p><p>One of the most significant changes when comparing Gartner’s 2015 predictions for 2016, and 2016 predictions for 2017, is the expansion of the <em>mesh environment</em> to encompass Conversational Systems, Digital Technology Platforms, Meshed Applications and Service Architecture (MASA) and Adaptive Security Architecture (ASA).</p><p>Meshed devices are still important, as we all need devices that are interoperable and connected. However, the onus for this interoperability and connectivity is now on mesh applications and the underlying service architecture that is MASA rather than the hardware itself.</p><p><strong>Shifting thinking</strong></p><p>Businesses no longer need to think up products and services based on what they think the market needs. There is an abundance of customer data available that businesses can leverage to predict what consumers actually need, and build solutions and services around this.</p><p>This type of customer centricity means that there is a demand for an agility in thinking that was previously not possible.</p><p>MASA weaves together web, mobile, desktop and Internet of Things (IoT) applications, exposing Application Program Interfaces (APIs) at multiple levels and across traditional boundaries. This, in turn, helps to improve the scalability of services, enhances agility and enables technology to be easily repurposed and reused.</p><p>It also helps to facilitate a seamless experience across different channels and optimizes the experience depending on the endpoint device in use.</p><p>Another emerging trend that has seen a change between 2016 and 2017 is that of IoT platforms, expanding and evolving into the more inclusive digital technology platforms, which form the foundation of the digital business.</p><p>Within this space, the platforms consisting of information systems, the customer experience, analytics and intelligence, business ecosystems and the 2016 listed trend, IoT, allow new business solutions to be agile, integrated and scalable.</p><p>Organizations need to develop the right mix across these digital technology platforms in order to meet the demands of digital transformation and satisfy their customers.</p><p><strong>What to consider</strong></p><p>The combination of MASA and new digital technology platforms create a far greater target for security threats than previously known. The more touchpoints there are in this meshed world of connected everything, the more potential access points there are for cyber criminals too.</p><p>While cyber security itself is not a new issue, the perpetrators of cyber-attacks continue to evolve and, as we add new technologies, we are faced with new security challenges. Thus, the emergence of adaptive security architecture has become a hot topic.</p><p>Adaptive security architecture goes beyond traditional IT security measures and effectively uses predictive data analysis and artificial intelligence capabilities to continuously monitor a network and automatically adapt and evolve accordingly.</p><p>It constantly analyses for any sign of infiltration, breach or security anomaly in order to react faster and more efficiently as it grows.</p><p><strong>The business impact</strong></p><p>It is no secret that the majority of business transacting takes place in the virtual sense today, and that customer approval and desire is a hot commodity.</p><p>The ease with which people can access what they want and change service providers when they are not getting what they want means that businesses who are not transforming will eventually be left behind.</p><p>However, it is important to note that transformation is a process and, with the right technology partner, there is time yet for businesses to start investigating these trends, tapping into new technologies to drive customer centricity and business success.</p><p><strong>The cyber threat</strong></p><p>With technology comes a new breed of criminals. Gone are the days of miscreants barging into a building with a balaclava and gun in hand to rob the business. The new breed of criminals are silent, unseen and brazen as they exist in relative anonymity in the digital world.</p><p>How bad is the situation? We already know that the US and the UK are spending millions trying to contain the threat. Reports from other parts of the world point the growing nature of the problem.</p><p>Reports from Germany show that the German government registered 82 649 cases of computer fraud, espionage and other cybercrimes in 2016, an increase of just over 80 percent from 2015.</p><p>According to a report on the SABC official website, cyber-attacks are increasing at an alarming rate. In 2015, more than 500 million personal records were stolen or lost due to cyber-crime, since then Phishing, a form of cyber-fraud increased to 55%.</p><p>In 2014, South Africa had the highest number of cyber-crime on the African continent. In the same year, the country lost R50 billion in cyber-attacks due to phishing messages and opening attachments.</p><p>Cybercrime in Zambia has also increased significantly (23%) in the last two years, according to a new report by PricewaterhouseCoopers (PwC). The report stated that financial loss attributed to cybercrime was at 58%, while reputational damage was measured at 57%.</p><p>Almost two-thirds (65%) of the respondents suffered a loss of below $100 000 compared to just 19% in 2014, and that the number of respondents experiencing losses of between $100 and $1million has escalated from 7% in 2014 to 11% in 2016</p><p>In 2016, .3% of cybercrime incidents resulted in losses of over $1 million, up from 1% in 2014.</p><p>PwC partner Andrew Chibuye said the increase in the use of technology platforms has brought about greater risk because of exposure to cyber criminals. And this comes as no surprise.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 11 May 2017 15:20:08 +0000</pubDate></item><item><title><![CDATA[Digital Immigrants and Digital Natives]]></title><link>https://www.gtconsult.com/blogs/post/digital-immigrants-and-digital-natives</link><description><![CDATA[At the dawn of the Millennium, the world was split into digital immigrants and digital natives. At the time, this was a novel idea as us digital immigr ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_aZNswBiLTuq8AkBRYh-ZmQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8_6LG3cuR2ykqc70vqfUaQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mhs9jeoNQf6Ocs_NEOIJeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_E0v11XhDSRiST-0XXDjLfA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_E0v11XhDSRiST-0XXDjLfA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p>At the dawn of the Millennium, the world was split into digital immigrants and digital natives.</p><p>At the time, this was a novel idea as us digital immigrants were getting used to the fact that the big box sitting on the desk in our room (a computer) had the ability to connect to the internet without blowing the house up. Now we have fridges who talk to us and have the ability to read out a step by step process on how to cook the perfect chicken parmesan with a crust – but not burnt – outer layer.</p><p>There is a whole generation, my children and your children, who are growing up in a world where technology is freely available to them, they look at computers in a completely different way to us. They don’t ask their father how to build a windmill for their school science project, they ask YouTube.</p><p><strong>Operating on a different level</strong></p><p>What does science say about digital natives? I recently read an article on pastemagazine.com that presented some interesting thoughts.</p><p>One of the important aspects of the article was news that we already knew, yet needed to hear. In 2008, Gary Small of the University of California at Los Angeles Semel Institute for Neuroscience and Human Behaviour promoted the idea that digital natives’ brains are hardwired differently since they were exposed to different digital products early.</p><p>This sparked panic when people read his thoughts as a negative association, and his work is sometimes criticized as fuelling frenzy about parents damaging today’s kids. One of the early fire starters that complicated this debate was that with the rapid adoption of technology, schools were becoming ill-equipped to cater for the needs of our children.</p><p>Since then, other studies have backed up the idea in specific ways. Data from the same University of California at Los Angeles brain institute, for example, says that digital natives’ brains were more actively engaged while scrolling through a webpage than while reading printed text.</p><p>Social interactions, friendships and civic activities may operate differently in the brain, too, researchers at the University of Minnesota say.</p><p>It therefore makes sense that education begins at home. While many may think that their children are participating in a brainless activity when playing a gamer on a tablet – I am sometimes guilty of this too – we actually are unaware of how education has been gamified and how many of these games are teaching your child educational building blocks long before they go to school and get taught their ABCs.</p><p><strong>The biggest takeaway</strong></p><p>Perhaps the biggest takeaway from the article is that while digital natives are born into a world of technology, they still need training to fully appreciate it.</p><p>The article pointed out that although younger generations use their phones and computers often for basic schoolwork or social purposes, they may not have the skills required for technology-based careers in computer science, marketing, business and health care.</p><p>Students often have high digital confidence but low digital competence, a collaboration of international researchers said in 2015. For example, a digital native may know how to use social media for social interactions but not to produce content for a media organization or branding for a company.</p><p>In a 2010 publication, Apostolos Koutropoulous said that we need to move away from the bias of insisting in naming this generation the Digital/Net/Google Generation because those terms don’t describe them accurately and have the potential of keeping this group of students from realizing personal growth by assuming that they’ve already grown in areas that they so clearly have not.</p><p><strong>Further debunking</strong></p><p>So we have now basically disproven that being a digital native based on the fact that you are born into a world of technology is not a thing. This also may suggest that digital immigrants may be able to compete with this group on an even keel.</p><p>The main factor in this is the ability to use technology as a learning tool. An <a href="http://www.irrodl.org/index.php/irrodl/article/view/2196/3337">academic paper</a> on this subject suggests that there is a growing body of academic research that questions the validity of the generational assumption included in the digital native concept: <em>contrary to the argument put forward by proponents of the digital native concept, generation alone does not adequately define if someone is a digital native or not</em>. Research conducted in Switzerland concludes that it is unrealistic to attribute behaviours and characteristics by simplistically basing them on generational <em>virtues</em>.</p><p>The age factor has a discrete impact on certain aspects, the familiarity with the new digital devices, but cannot be considered as the variable explaining how current learners face Information and Communication Technologies.</p><p><strong>Digital marketing agencies</strong></p><p>This whole debate has given birth to digital marketing agencies who have found a niche in the market whereby they are better than traditional marketing channels.</p><p>An <a href="http://www.josic.com/importance-of-a-digital-media-agency-for-global-businesses">article on josic.com</a> points out that a digital marketing agency helps businesses plan their online marketing campaigns and promote them successfully over the web. A modern digital agency is more effective for online advertisement of business rather traditional digital options like television and print media.</p><p>Nowadays, every business needs the back of online digital agencies to give a quick growth of the trade over the web. Here, the digital firm can help businesses by fulfilling their digital marketing requirements like website development, designing, SEO activities, PPC, and much more. For managing all the tasks, digital agencies outsource the work to the experts in the market and manage the client’s project smartly. Thus, a digital marketing firm takes the challenge seriously and delivers the optimum result for the businesses under the stipulated time frame.</p><p>A recent article on which-50.com explained the importance of a sound digital strategy in more detail.</p><p><strong>Data-driven marketing</strong></p><p>The first aspect that the article delved into was the best practices for building customer intelligence through data-driven marketing. These practices can help your organisation use data to gain insights into your customers and turn this knowledge into action:</p><ul><li>Use customer data to understand and personalise each individual’s journey;</li><li>Invest in predictive analytics;</li><li>Centralise your data to accelerate insights and for ease of accessibility; and</li><li>Integrate external and offline data to enhance your audience segments.</li></ul><p><strong>Customer experience</strong></p><p>The article then asked what the best practices were for igniting brand loyalty through the customer experience. These practices can help you create more meaningful experiences and move your organisation forward in digital maturity:</p><ul><li>Think of every touch point as a brand connection;</li><li>Develop content with the customer’s needs in mind;</li><li>Work to develop a rich customer profile; and</li><li>Automate the delivery of your personalised content.</li></ul><p><strong>Mobile</strong></p><p>Finally, the article asked what the best practices for breathing new life into mobile were? These strategies will help your organisation prepare for a mobile-only world:</p><ul><li>Make mobile a priority by investing in mobile channels and applications;</li><li>Create dedicated mobile sites and apps;</li><li>Use data to determine the value your mobile channels deliver; and</li><li>Use data to understand valuable mobile content and services.</li></ul><p>Embracing digital marketing is not a debate anymore. It is only the area of expertise for digital natives. It has become clear that being born into a world of technology does not make you any more of a technology expert than being born in a Mc Donald’s makes you a hamburger.</p><p>The debate in this day and age is how much value you will lose if you do not adopt these strategies. Why are companies still considering value when it is in plain sight?</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 26 Apr 2017 17:27:55 +0000</pubDate></item></channel></rss>