<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/Technololgy/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #Technololgy</title><description>GTconsult - Blog #Technololgy</description><link>https://www.gtconsult.com/blogs/tag/Technololgy</link><lastBuildDate>Tue, 31 Mar 2026 17:55:31 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Sujata Excels in MS 900 Exam!]]></title><link>https://www.gtconsult.com/blogs/post/sujata-excels-in-ms-900-exam</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Sujata Thumbnail.jpg"/>With six years of experience in testing and quality control, Sujata has become highly skilled and knowledgeable in her field. Her tenure at GT for nea ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0qtso2nASkeaKV11QKiimQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PGlbe2GHRq-8MdioXn_yAg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BUoaXPGuT6a4wQoivZ2KhQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qLtAQfTvTyW_qfPP8SQXMw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qLtAQfTvTyW_qfPP8SQXMw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p align="center"><span style="font-size:22.5pt;">Sujata&nbsp;Excels in MS 900 Exam!&nbsp;</span></p></div></div></h2></div>
<div data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width: 435px !important ; height: 613.5px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width:435px ; height:613.5px ; } } @media (max-width: 767px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width:435px ; height:613.5px ; } } [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/The%20Team/sujata-gtconsult.com.jpg" width="435" height="613.5" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="font-size:12px;"><p><span style="font-size:11pt;">With six years of experience in testing and quality control, Sujata has become highly skilled and knowledgeable in her field. Her tenure at GT for nearly two years has demonstrated her immense value as an asset to the team.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">Driven by her desire to enhance her skills, Sujata recently embarked on a journey to improve herself further by taking the MS 900 Microsoft Fundamentals exam.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">The MS 900 exam is specifically designed for individuals seeking to demonstrate their foundational understanding of cloud-based solutions that enhance productivity and collaboration in various settings, including on-site, at home, or a combination of both.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><a href="https://learn.microsoft.com/en-us/certifications/exams/ms-900/" target="_blank" rel="noreferrer noopener"><span style="font-size:11pt;">https://learn.microsoft.com/en-us/certifications/exams/ms-900/</span></a><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:11pt;"><br></span></p><div style="color:inherit;"><div><p><span style="font-size:11pt;">You might be wondering how Sujata fared in this exam. Well, it would be rather awkward if we were to write about an exam she didn't pass, wouldn't it? Fortunately, not only did she pass, but she did so with flying colors!&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">When asked about her motivation to pursue this certification, Sujata expressed her belief that it would enable her to better serve clients.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“If a client asks me anything about SharePoint, I can answer them smartly and confidently. Previously, I was a little bit confused when it came to the differences and the functionalities under SharePoint. Now, I know it better.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">She also emphasized how the certification has benefited her testing process, particularly in understanding requirements and finding improved ways to optimize SharePoint.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><div style="color:inherit;"><div><p><span style="font-size:11pt;">Sujata's commitment to achieving her goal was evident in her rigorous exam preparation. She attributed her success to the comprehensive 500-page book &quot;Microsoft 365 Fundamentals&quot; by Craig Zacker, noting that studying this resource helped her gain a deeper understanding and ultimately pass the exam.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“Because I’m a tester, I don’t work in the back end, so I don’t know the coding and other stuff. That’s why this book was really helpful.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata also expressed gratitude towards her colleagues for their contributions to her success, including recommending study materials, offering study strategies, and providing encouragement.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Upon learning of her results, Sujata described her elation, admitting to feeling a bit nervous before the exam, unsure of what to expect.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“When I finished, I closed my eyes, opened them a little and saw, OK, I passed. I was literally dancing. And then I realized, OK, the camera is still on, they are still recording.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata's unwavering dedication to her work and constant pursuit of self-improvement are truly commendable. It is no surprise that she already has her sights set on the next certification, which we will undoubtedly be eager to share here.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata, your hard work, and commitment to excellence are truly inspiring. Keep shining brightly! We eagerly anticipate witnessing your future accomplishments.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div></div></div></div></div></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 01 Jun 2023 09:06:48 +0000</pubDate></item><item><title><![CDATA[Sthe believes in excellence]]></title><link>https://www.gtconsult.com/blogs/post/sthe-believes-in-excellence</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Sthe Thumbnail.jpg"/>A write up on Sthe's recent achievement- passing his Microsoft PL 400 exam! Ever heard of the Microsoft PL-400 exam? It’s an exam that focuses on the de ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_sdZamA1_S3WHNs0CPynYeg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_LjM_7heXTAmx-zWK8P5_FA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ZoSh4eNnRTOjRa5ZxgZvBw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_y1RXjmxITQqWjA4bGdUaFw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_y1RXjmxITQqWjA4bGdUaFw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>A write up on Sthe's recent achievement- passing his Microsoft PL 400 exam!</p><p><br></p></div>
</div><div data-element-id="elm_BIxj7JoIhHnAyZWI47F28g" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_BIxj7JoIhHnAyZWI47F28g"] .zpimagetext-container figure img { width: 384px !important ; height: 405.54px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_BIxj7JoIhHnAyZWI47F28g"] .zpimagetext-container figure img { width:384px ; height:405.54px ; } } @media (max-width: 767px) { [data-element-id="elm_BIxj7JoIhHnAyZWI47F28g"] .zpimagetext-container figure img { width:384px ; height:405.54px ; } } [data-element-id="elm_BIxj7JoIhHnAyZWI47F28g"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/The%20Team/sthe-gtconsult.com.jpg" width="384" height="405.54" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div>Ever heard of the Microsoft PL-400 exam?</div><div><br></div><div>It’s an exam that focuses on the designing, development, testing, security, and troubleshooting of Microsoft Power Platform solutions. Candidates are expected to implement components of a solution that include application enhancements, custom user experiences, system integrations, data conversions, and custom process automation.</div><div><br></div><div>https://learn.microsoft.com/en-us/certifications/exams/pl-400</div><div><br></div><div>While the exam requirements may seem daunting at first glance, it is less challenging for experienced developers who work with the content regularly.</div><div><span style="color:inherit;"><br></span></div><div><span style="color:inherit;">One such developer who recently passed the PL-400 exam is Sthe, a talented senior SharePoint creator who has been with GTconsult for over five years. Despite his lengthy tenure, Sthe has not become complacent in his work. On the contrary, he remains committed to getting things done well and becoming the go-to person in his field.</span><br></div></div><p></p><p class="MsoNormal"><span style="font-size:12pt;line-height:107%;font-family:&quot;DIN 2014 Extra Light&quot;, sans-serif;color:rgb(83, 86, 90);">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p class="MsoNormal"><span style="font-size:12pt;line-height:107%;font-family:&quot;DIN 2014 Extra Light&quot;, sans-serif;color:rgb(83, 86, 90);"><br></span></p><p class="MsoNormal"><br></p><p class="MsoNormal"><span style="font-size:12pt;line-height:107%;font-family:&quot;DIN 2014 Extra Light&quot;, sans-serif;color:rgb(83, 86, 90);"></span></p><div style="color:inherit;"><p align="center" style="text-align:left;"><span style="font-size:12pt;">“In the area that you're in, if you become the best, you become the go to person and that's how you become valuable.”</span></p><p><span style="font-size:12pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:12pt;">Sthe's commitment to excellence and his determination to succeed drove him to prepare rigorously for the exam. Despite the pressure and limited time, he managed to pass the exam with flying colors. </span></p><p><span style="font-size:12pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:12pt;">When asked about his feelings on his achievement, Sthe was quick to point out how his faith, His relationship with God, plays a critical role in all he does. He pointed out that even in moments of panic during the exam, he experienced little miracles. He is unapologetic about this conviction.</span></p><p><span style="font-size:12pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:12pt;">“When I passed, I was over the moon and really grateful to Jesus for helping me.”</span></p><p><span style="font-size:12pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:12pt;">Although the PL-400 exam qualified Sthe as an associate, his end goal is to become a specialist. He is already setting his sights on the next step towards his goal and GTconsult is committed to supporting him in his aspirations and helping him achieve his full potential.</span></p><p><span style="font-size:12pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:12pt;">Sthe's success story is a testament to the importance of hard work, dedication, and commitment in achieving one's goals. As he continues to reach new milestones, we are honoured to be a part of his journey and to celebrate his achievements with him.</span></p><p><span style="font-size:12pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:12pt;">Keep soaring, Sthe!</span></p></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 28 Apr 2023 08:24:32 +0000</pubDate></item><item><title><![CDATA[Top 5 announcements from Microsoft Build we Love]]></title><link>https://www.gtconsult.com/blogs/post/Top-5-announcements-from-Microsoft-Build-we-Love</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Build 2022/GTBuild2022.png"/>Our top 5 announcements that took place at Microsoft Build 2022]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_fUu_MwjDTgKxVbpllU_Hqg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_zw50PT2ySi-vy6g5Hzzfvw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_aYKlEg4qTlKnLfCCa1VgnA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_aYKlEg4qTlKnLfCCa1VgnA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_IZbYkdphR7a4v03i-fIPcg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IZbYkdphR7a4v03i-fIPcg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;font-size:30px;">Microsoft Build is an event that here at GT we look forward to every year.&nbsp;</span><br></h2></div>
<div data-element-id="elm_nl01qzhoTO2dDbCJZQaghQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nl01qzhoTO2dDbCJZQaghQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;">Microsoft Build is an event that here at GT we look forward to every year.&nbsp; Our team are always hungry to see what new features, tools and technologies we can leverage to help our customers do more to enable productivity.&nbsp; </p><p style="text-align:left;"><br></p><p style="text-align:left;">We will be hosting our Roadshow in June this year where we will cover these topics indepth with our clients, however, if there is space you might be able to join.&nbsp; Request an invite <a href="https://forms.office.com/r/kgudMGEMK2" title="here" target="_blank" rel="" style="font-weight:bold;">here</a>.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Satya Nadella the CEO of Microsoft got us super hyped with the <span style="text-decoration-line:underline;"><a href="https://www.linkedin.com/pulse/10-technologies-coming-together-help-you-build-whats-next-nadella/" title="announcements" target="_blank" rel="">a</a><a href="https://www.linkedin.com/pulse/10-technologies-coming-together-help-you-build-whats-next-nadella/" title="announcements" target="_blank" rel="">nnouncements</a></span> this year, and while there are so many phenomenal topics to dig into we are going to share the top 5 announcements we love.</p></div>
</div></div><div data-element-id="elm_e6EoSn3njEDhrPuh1fB_tA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_e6EoSn3njEDhrPuh1fB_tA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:30px;font-family:Raleway, sans-serif;"><span style="font-weight:bold;">1.&nbsp; </span><a href="https://powerpages.microsoft.com/en-us/blog/announcing-microsoft-power-pages-build-secure-low-code-websites/" title="Power Pages" target="_blank" rel="" style="font-weight:bold;text-decoration-line:underline;">Power Pages</a></span></p><p><br></p><div style="color:inherit;"><p>The Power Pages site was down right now, probably due to the entire internet checking it out.&nbsp;</p><p><br></p><p style="text-align:center;"><img src="/Build%202022/PowerPages.gif"><br></p><p style="text-align:center;"><br></p><div style="color:inherit;"><p>The fact that anyone with an idea without coding knowledge can design a fully functional web page with drag and drop actions is simply incredible. A true WYSIWYG for my old school peeps out there.&nbsp; This will completely lower the barrier to entry for most ideas, which means faster go to market and bigger impact for business.</p></div></div></div>
</div><div data-element-id="elm_fXevsoeK4kiZBavmDrwrqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fXevsoeK4kiZBavmDrwrqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-family:Raleway, sans-serif;font-weight:bold;font-size:30px;">2.&nbsp;<span style="color:inherit;">&nbsp;</span><span style="text-decoration-line:underline;"><a href="https://powerapps.microsoft.com/en-us/blog/new-express-design-in-power-apps-converts-images-and-designs-to-apps-in-seconds/" target="_blank" rel="">Express Design in Power Apps</a></span></span></p><p><br></p><div style="color:inherit;"><p>Draw an idea on a napkin, take a pic of it, and transform that into a Power App in minutes.&nbsp; That’s right, you can do it with Express Design.&nbsp;</p><p><br></p><p><img src="/Build%202022/powerapp.png"><br></p><p><br></p><div style="color:inherit;"><p>Mock-ups now have real value which lowers time in design, increases flexibility and finally allows for quick turn around.&nbsp;</p></div></div></div>
</div><div data-element-id="elm_DcfKSczFuYKoLDrll5Z9fQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DcfKSczFuYKoLDrll5Z9fQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:bold;font-size:30px;"><span style="font-family:Raleway, sans-serif;">3.</span><span>&nbsp;&nbsp;</span></span><span style="font-weight:bold;text-decoration-line:underline;font-size:30px;font-family:Raleway, sans-serif;"><a href="https://blogs.windows.com/windowsdeveloper/2022/05/24/create-next-generation-experiences-at-scale-with-windows/" title="Project Volterra" target="_blank" rel="">Project Volterra</a></span></p><p><img src="/Build%202022/volterra.png"><br></p><div style="color:inherit;"><p>Now I know this might sound strange to most, why would GT be interested in a powerful, stackable dev PC.&nbsp; Well being able to quickly get new dev’s started on creating solutions this little beast is exactly what is needed.&nbsp; We will be able to get our dev’s up and running in minutes, and productive creating solutions fast.&nbsp; And if they need more power, we stack them up with another machine, how amazing is that?!</p></div></div></div>
</div><div data-element-id="elm_Dpy8yszkzKljbBiXesx7Xw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Dpy8yszkzKljbBiXesx7Xw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-family:Raleway, sans-serif;font-size:30px;font-weight:bold;">4.&nbsp; <a href="https://www.microsoft.com/en-us/mesh#office-TriToggle-5xzxmej" target="_blank" rel="">Live Share in Microsoft Teams</a></span></p><div style="color:inherit;"><p>We love the idea of being able to collaborate with anyone and anywhere, but there has always been a missing link.&nbsp; Now being able to share a screen with the room, not just have the presenter doodle away, is simply the future.&nbsp; We cant wait to work on client projects, with clients and get their feedback in real-time with our dev’s and designers on the same call.&nbsp;</p><p><br></p><p style="text-align:center;"><img src="/Build%202022/liveshare.gif"><br></p></div></div></div>
</div><div data-element-id="elm_0V4C2hCek_GPYsKSY0uqXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0V4C2hCek_GPYsKSY0uqXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="color:inherit;"><span style="font-size:30px;font-family:Raleway, sans-serif;font-weight:bold;">5.&nbsp; <span style="text-decoration-line:underline;"><a href="https://www.microsoft.com/en-us/mesh#office-TriToggle-5xzxmej" target="_blank" rel="">Mesh for Teams</a></span></span></p><p style="color:inherit;"><span style="font-size:30px;font-family:Raleway, sans-serif;font-weight:bold;"></span></p><div style="color:inherit;"><p style="margin-left:18pt;">I am a big fan of Ready Player One, I have an Oculus rift and now I can live it, every day, all the time.&nbsp; I will totally be that guy jumping on the couch, eating pizza while giving a presentation on Mesh</p><p style="margin-left:18pt;"><br></p></div>
</div></div></div><div data-element-id="elm_JJprLH6pADd6TZDE0DWEvw" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_JJprLH6pADd6TZDE0DWEvw"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="315" src="//www.youtube.com/embed/Jd2GK0qDtRg" frameborder="0" allowfullscreen></iframe></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 26 May 2022 07:10:35 +0000</pubDate></item><item><title><![CDATA[GTconsult innovates the basics]]></title><link>https://www.gtconsult.com/blogs/post/gtconsult-innovates-the-basics</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.comhttps://images.unsplash.com/photo-1600880292203-757bb62b4baf?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXw0NTc5N3wwfDF8c2VhcmNofDJ8fGFncmVlbWVudHxlbnwwfHx8&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Admin can be a pain for any business. GTconsult has found a way to make this simple, which places the power back into your hands!]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Ihv1BgjBQMWktpGPIh7x9A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_tkq3Dv_ITNuqdew-uPpdiQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_UV1TnRQmQ6-rPIeUBXxEfQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6E5RumsBTMGRud3NeSv4nQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Admin can be very challenging for any business. if done right, innovation comes naturally.&nbsp;</h2></div>
<div data-element-id="elm_SHHQa369SASbmuVpyci20w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SHHQa369SASbmuVpyci20w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1434626881859-194d67b2b86f?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=MXw0NTc5N3wwfDF8c2VhcmNofDJ8fGFkbWlufGVufDB8fHw&ixlib=rb-1.2.1&q=80&w=1080" style="text-align:center;"></p><p style="text-align:left;"><span><br></span></p><p style="text-align:left;"><span>Covid-19 has changed the global narrative to such an extent that many companies are feeling distressed and do not know where to turn. It is hard to appreciate this if you do not take a step back and look at the full scale of the problem. For retail companies, sales are down and the prospects of another shut down loom large as the country’s Covid-19 cases continue to grow. For service-based companies, hard decisions need to be made between the continuation of a service and paying rent or school fees. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are products and services that cannot be cast aside. The challenge of these product and services then becomes the task of trying to innovate so that the product or service does not become a grudge purchase. This was felt in many industries long before Covid-19, and business leader realized&nbsp;that the natural place to focus their innovation was in improving the customer journey. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“GTconsult has always been at the forefront of innovation and we have worked tirelessly to bring our clients the best products and services in the market. But we are also aware that more is needed when it comes to client innovation, and we take the client journey very seriously. We have come up with an important solution which will help clients service their contracts in a convenient and hassle-free manner,” says Craig Tarr, CEO GTconsult who added that this will be a specific focus for 2021. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Growing demand</span></b></p><p style="text-align:left;"><span>The motivation behind designing this product came from a growing demand amongst users who approached GTconsult expressing a problem about how they manage contracts as well as the approval of these contacts and then extending this to how they manage their customers and vendors. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“A lot of clients have indicated that they don’t want to use a conventional customer relationship management (CRM) system. The reasons for this are varied and very valid. It may not suit some of our client’s purposes or the licensing&nbsp;of the CRM system is proving to be a challenge. What most of our clients do not realize&nbsp;is that they most probably already have Office 365, so they have already taken the biggest step in taking a different approach,” says Tarr.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Servicing a need</span></b></p><p style="text-align:left;"><span>So how do users pull all of their demands together into a system which will enable them to manage their contracts, run through approvals, have more than one relationship that they need to manage and the documents that are associated with that without using a conventional CRM system? Even a small company may find that they have to manage multiple vendors at the same time. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>This can be built in Office 365 by using a SharePoint extension and PowerAutomate. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“We first need to establish what the problem that we want to sole is. It is essentially an onboarding problem whether it be contracts, customers, or vendors. At some point, you will want to onboard these parties and all of the documentation that is associated with them. Once this happens, you then have the task of dealing with contracts and service level agreements (SLAs) and documents which you will need to keep up-to-date and compliant with differing legal requirements. The major problem with this is that each of these contracts of SLAs have different workflows that have to be run simultaneously. Approval processes are often a challenge and documents that relate to a customer or vendor may need certifications and will most probably have some form of legal requirement that will need to be managed. Finally, there will also be performance reviews that will need to be conducted at various times,” says Tarr. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Users may also find that they are in a situation where one company has to manage many contacts. This may mean that they have different project managers and stakeholders that all belong to the same organization&nbsp;that they will have to deal with at different times. This is typically something that will be put into a CRM, but it is also something that can be managed by SharePoint using a contacts list. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Making a list and checking it twice</span></b></p><p style="text-align:left;"><span>“Speaking of lists. Once a user has gone through the onboarding process, or even during the process, they will typically need to go through a checklist to ensure that they are dealing with the right vendor and that the vendor checks all of the boxes. GTconsult uses a checklist that is dynamic enough that users can go through the process and modify these lists in real time should the needs of the project – or checklist – change,” says Tarr. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Once you have uploaded the customer/vendor, and have approved them, users could run into systemic issues (operational)which are risks that need to be managed and mitigated. Users will also occasionally have performance reviews (depending on the type of contract) that they would need to run on either a quarterly or yearly basis. These are processes that you will need to work through and ensure that they are done properly. Good governance is key. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Innovative solution</span></b></p><p style="text-align:left;"><span>“So, how has GTconsult solved the above challenges? We have used Office 365 and the SharePoint extension – along with PowerAutomate – to build a solution that allows GTconsult to manage all of the different aspects that were highlighted above in one go. This is done though the use of a single page app. By using the SharePoint app extension, we have a hosting capability in terms of JavaScript. So, whether you need to fast-track a project by using something that is already tried and tested (and built), or whether you need specific functionality that is difficult to building the first place, JavaScript is the best place to turn to because most of these requirements are inherent in the system,” says Tarr. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>He adds that, once you deliver all of this functionality, you will obviously need a workflow functionality that operates behind the scenes.&nbsp; “Whether it is approvals, or permission structures, or whether you need to reach information that is hard to source, you will always need some form of framework for that workflow. PowerAutomate does this with ease due to its integration capabilities as well as its timing capabilities which is often found to be a specific problem in SharePoint. We now have the capability to set a timer to kick off on a daily or weekly basis,” says Tarr. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Underpinning all of this is SharePoint and GTconsult utilizes&nbsp;SharePoint and several different lists to enable this capability through a single page form using it as a relationship type database. Previously, this functionality would have been provided through lookup lists in SharePoint. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“What we are finding with the SharePoint extension is that it really enables users to take this to another level in terms of relationships and how you store &amp; retrieve data. Yes, there is a lot of learning around specific shortcomings, in terms of the number of items (for example indexing) to make sure that you do not run into problems after you hit a specific number (typically 5&nbsp;000 items). This is a learning curve that needs to be worked through,” says Tarr. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;">A step-by-step video walking you through the process is available on our Facebook (<a href="https://bit.ly/3ixwZtA">https://bit.ly/3ixwZtA</a>) page and LinkedIn page (<a href="https://www.linkedin.com/company/2350799/admin/">https://www.linkedin.com/company/2350799/admin/</a>).&nbsp;</p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Simplifying workflows</span></b></p><p style="text-align:left;"><span>Admin is often a stumbling block for most companies. It can become troublesome and complicated if it not managed properly. The other side to poor administration, particularly when it comes to contracts and SLAs is that compliance becomes a problem. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“What we have shown you today is not just the ability to use charting libraries, but also the frameworks that you could have around navigations and easy list manipulation with data tables. In addition, behind the scenes, all of this is getting mapped using Rest API which makes single page apps viable in terms of performance moving through the application. As you can see, migration between pages using the GTconsult solution (which makes use of Rest API) was swifter as opposed to a page refresh. There is a lot of benefit in all data being managed in a single location,” said Tarr. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Simplification of workflows, particularly when it comes to admin, allows companies to focus their strengths in other areas. Doing the basics well means that you will have a solid foundation to build business plans around that will benefit your company in the long run, particularly in a world that is being defined by the Fourth Industrial Revolution where almost every aspect of everyday life is being driven by technology. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p><span style="color:inherit;"></span></p><p style="text-align:left;"><span>“GTconsult is committed to enabling productivity and helping its clients grow by simplifying workflows and taking stress away from its clients. Contact us today to find the solution that will benefit your company,” concludes Tarr.&nbsp;</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 20 Jan 2021 10:27:04 +0000</pubDate></item><item><title><![CDATA[Made in China 2025: where to now? ]]></title><link>https://www.gtconsult.com/blogs/post/made-in-china-2025-where-to-now</link><description><![CDATA[China's influence on the world is growing daily. What has happened to their Made in China 2025 programme?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_B4K16ISvRzmzCwSMQqH2gw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2ygB0y3lRxCwsUvCwCI6bg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Rk8Lepp3TQqqGHAzJqJ40g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZePq_aBhSuC-lFUQLfYgdg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">China's influence on the world is growing daily</h2></div>
<div data-element-id="elm__a_2v0qmSjK2GGKOX6C2CQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1591189309340-323e78efaee0?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"><span><br></span></p><p style="text-align:left;"><span><br></span></p><p style="text-align:left;"><span>About a year in Donald Trumps Presidency, he found himself embroiled in a major war of attrition with China. While no violence was committed, relations between the two countries was precariously balanced on a knife edge with major allegations (from Trump) that China was embarking on a major espionage campaign that was being driven by Huawei. Later, there were allegations of coordinated cyber attacks from Beijing that affected high level US targets. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Chinese President, Xi Jinping, denied all of Trumps accusations saying that the reason behind the war of attrition is vastly different from the presented facts. Xi pointed out that the war of attrition was over China’s <i>Made in China 2025 </i>programme. At this stage, China had become the worlds second biggest economy and the country laid out a growth plan that would sustain the economy’s growth. Part of this plan was that 80% of the worlds technology would be produced and distributed by Chinese companies by 2025. This obviously has major ramifications for Silicon Valley which is a significant driver of the US economy. Xi went on to add that Huawei was being targeted because it was pioneering tech that Apple and Samsung were not; the fact that the company faced opposition in Australia and New Zealand over its 5G expansion plans suggests that Xi was not far off the mark. Would Apple or Samsung have faced similar opposition had they been the pioneers? </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>US sanctions aside, the Chinese economic beast is large enough to be self sustaining and Chinese companies have the whole of Asia as a possible market to drive its ambitions. Where to now for the Made in China 2025 programme?</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Shadow games</span></b></p><p style="text-align:left;"><span>One of the ways that China is approaching its world domination is through subliminal influencing. Changing behaviours and making it acceptable is almost a passive way of asserting your dominance and not drawing attention to the fact that you are influencing the global market. I recently <a href="https://www.bbc.com/future/article/20201117-how-china-social-media-apps-are-changing-technology">read an article</a> by the BBC which showed how this is taking place. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that for more than 30 years, a small parcel of land covering about 45 square miles (116sqkm) has had an outsized impact on the way we work, live and play.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>California’s Silicon Valley shapes our lives. From the websites where we do our household shopping to the video-streaming services we watch to the companies which provide our email, almost all are based in this corner of the United States.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds, until recently, that is. The rise of TikTok, an app whose parent company is the Chinese firm ByteDance, has struck at the heart of Silicon Valley’s supremacy. Along with other digital products coming out of China, TikTok has the potential to reshape the future of technology – a future in which the culture, and the interests, of Shanghai or Beijing could mould the industry more than that of San Francisco Bay.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>It’s hard to overstate just how much of a switch this is.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“The narrative previously was about China coming up with its own versions of [Western] digital products,” Elaine Jing Zhao, Senior Lecturer in the School of the Arts and Media at the University of New South Wales in Australia told the BBC.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“Nowadays, you see the narrative shift towards how Western social media platforms are learning from Chinese social media platforms.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>And Chinese apps, platforms and services currently look quite different from those in the West.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>The rise of Chinese tech</span></b></p><p style="text-align:left;"><span>The BBC article points out that the most famous, of course, is TikTok – which has 690 million monthly active users worldwide, 100 million of whom are in the United States and a further 100 million in Europe.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Like other apps of Chinese origin, TikTok’s owners have tried to downplay the app’s background. “They want to give international users the impression they are not Chinese platforms, but global platforms,”&nbsp; Jian Lin, Assistant Professor at&nbsp; the University of Groningen in the Netherlands told the BBC, an author of multiple books on the Chinese influencer industry and technology platforms. “They really want to transmit this impression to the public that they’re not necessarily Chinese. They’re just like others, a global platform.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that their fear of backlash has been borne out by the hard stance US President Donald Trump has taken against the app, who claimed without significant evidence it’s a national security risk. Other countries to oppose TikTok include India, where the app was banned in June 2020, and Pakistan, which banned it for 10 days in October.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>But these challenges seem unlikely to dissuade other Chinese tech companies from following TikTok’s lead, Lin told the BBC. “I do believe Chinese companies will become even more ambitious and stronger in the coming years,” he says.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that he also expects these companies to increase their global ambitions: since the Chinese domestic tech market is highly saturated, with strong levels of competition, they may see more opportunities coming from the overseas market.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Changing Western tech</span></b></p><p style="text-align:left;"><span>The article points out that, already, the way Chinese-launched apps interact with users, and the services they offer within the apps, are influencing Western platforms. One example: the “superapp”.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“In China it’s very common to become a superapp, where you do a lot of different things within the same app,” Fabian Ouwehand, Founder of Many, a Dutch social marketing agency that advises companies and influencers on how to use TikTok and its Chinese version, Douyin told the BBC.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Perhaps the most popular combination? Social media and commerce. “In China people are used to the commercialised version of social media entertainment, and do a lot of ecommerce and business through their apps,” says Lin.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that, on Douyin, for example, users can buy products directly from the app as they watch the shortform videos that creators post onto the platform – something TikTok in the West is mimicking through the introduction of integration with online shopping platform Shopify, launched in October 2020. WeChat, which is often described solely as a chat app, is far more: it’s also a payment platform and a way to keep up to date with friends.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The reason superapps have become so popular in China is simple, says Zhao. “People feel it’s really convenient to have every part of their life organised by social media platforms and superapps,” she says. “From shopping online to hailing taxis, socialising with friends and meeting up with strangers, everything you can do within one app.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>This kind of approach requires handing over more data to link up disparate systems into a single, convenient place for users – something that not everyone might be comfortable with. But experts believe that the demographics are on the side of app developers. “Younger users will accept it quicker than the older generations, who are a little bit wary,” says Ouwehand. “They value convenience over privacy.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that western companies are taking note. Platforms like Facebook have begun to bring various features and services under a single umbrella: in recent years, Facebook has integrated online video (Facebook Watch) and shopping (Facebook Marketplace) into its core social network. Instagram, owned by Facebook, has added TikTok-like shortform repeating videos, called Instagram Reels, in recent months, and also has a connection with Shopify so fans of influencers can buy products their favourites wear directly in the app..</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“I’m seeing more and more companies trying to add more features into their apps,” Rui Ma, a Chinese Tech Expert based in Silicon Valley told the BBC. “That’s probably the biggest overt move that looks a little bit more like Chinese tech.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Enhanced moderation</span></b></p><p style="text-align:left;"><span>The article points out that, behind the scenes, there are other differences that could also make meaningful change.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>TikTok has been criticised for its approaches to disabled and overweight creators, whose videos it has been alleged to de-prioritise – a legacy of moderation policies drawn up by staff in China. The app says it has since redrawn its policies on moderation to accommodate a more open, less censorious Western taste and culture. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that, despite localising its content moderation policies, TikTok remains much more proactive than Western social platforms in intervening where it sees potentially troubling content. The company’s September 2020 transparency report shows that, of the 104 million videos removed from TikTok in the first half of 2020, 90.3% were removed before they received any views – and 96.4% were taken down by the app itself, before being alerted to infringing content by another user.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Compare that to the content moderation policies of, say, YouTube. Until the coronavirus crisis compelled YouTube to rely far more on automated moderation rather than human intervention, the app lagged a little behind TikTok on its proactive takedowns of videos. In the three months between April and June 2020, the most recent data available, 95% of videos were taken down by “automated flagging”, though only 42% had no views before they were removed.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Algorithmic recommendations</span></b></p><p style="text-align:left;"><span>The article points out that another way in which Chinese social media platforms are influencing Western ones is in how they present and filter information.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>While Facebook and Twitter recommend posts based on what your friends are posting and sharing on your news feed, TikTok and other Chinese apps like it try to learn as much as it can about you, and then direct content to you they think you’ll like. “In China you see a lot of different platforms coming up that are way more focused on exploration, and here it’s a lot on your social circle,” says Ouwehand.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that this model understands our preferences based on prior behaviour with videos we’ve already seen, rather than assuming our interests based on those we interact with or via our past search terms. It’s a meaningful difference that is shaping the way we consume information, and changes the economics of those creating the content.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Under the Chinese model of algorithmic exploration and recommendation, users are less beholden to the individual content creators they follow. On YouTube, for examples, big personalities have become celebrities because of their ability to build a loyal fanbase. But on TikTok, anyone can become a star overnight because of a single video that proves popular with the app’s algorithm – and that fame can disappear almost as quickly when the next big video is surfaced through the app’s code.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that, given how popular that strategy has been, it could signal a broader change among other social media platforms, as well.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>The future of tech</span></b></p><p style="text-align:left;"><span>The article adds that if Chinese companies continue to play an increasingly influential role in tech, our online world could look very different by, say, 2030.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>For one, it could be much more diversified than the Silicon Valley standard we still, largely, see now. And while Chinese apps are best-known right now, that could change. “It’s not just Chinese companies, but other companies in Asia,” says Zhao. “These regional giants might want to have a slice of the global market pie as well. We’re seeing Facebook and Google competing for a slice of the Asian market, but at the same time local giants are entering the US market as well.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that we might also see apps having an increased emphasis on localisation, something we already see with TikTok. “If you want to be a global company, you’re serving different consumers with different cultural tastes,” Zhao told the BBC.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>And we may see Western products taking more of a lead from successful strategies or services out of China, and the rest of Asia. “That’s where the West is going to copy a lot,” says Ouwehand. “In terms of functionalities and the expansion of their own apps to do more.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that the future of technology in the next decade will certainly look a lot less like the Silicon Valley-designed ideal we’ve been used to in the last 20 years. But it seems likely it will evolve through small steps and minor influences – as evidenced through the way TikTok differs from Douyin, and the lag in changes in the Chinese version of the app making their way to the Western one.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>This is, after all, how a globalised world works, Zhao told thew BBC. “It’s an example of cross pollination. Doing business is always about drawing inspiration from each other,” she says.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>More insight</span></b></p><p style="text-align:left;"><span>What more can we expect form this plan? An <a href="https://www.aljazeera.com/economy/2020/10/30/five-questions-about-chinas-latest-five-year-plan">article by Al Jazeera</a> provided some additional insight. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Dual circulation; the Al Jazeera article pointed out that this is a concept Xi first mentioned in May, and has now become part of the plan for the next five years.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>In essence, Beijing is saying it wants its future growth to be based mostly on internal cycles of production, consumption and distribution of goods and services.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article added that, faced with a punishing trade war with the US and a government that wants to contain the rise of Chinese technology giants like Huawei – the global leader in the latest generation mobile telecommunications equipment – it is little surprise that China is turning inwards for its economic progress. With a middle class of about 400 million people, it can afford to do so.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article pointed out that it acknowledged that China now faces a “complicated international situation”, something that is unlikely to change whoever wins the US presidential election on November 3.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>But China is also keen to stress that it is not turning its back on the outside world and that it wants to continue to engage in international trade, the now de-emphasised, less well-defined second part of the dual-circulation strategy.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Technology</span></b></p><p style="text-align:left;"><span>The article added that a cornerstone of the current 13th plan has been “Made in China 2025”, a push to nurture and develop high-tech industries.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The new plan calls for a continuation of that strategy, putting innovation at the heart of China’s modernisation drive.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“Making major breakthroughs in core technologies in key areas, China will become a global leader in innovation,” Xinhua said.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article pointed out that developing homegrown technologies such as robotics and artificial intelligence is at the heart of China’s shift towards greater self-reliance [File: Aly Song/Reuters]According to analysts at global banking giant HSBC, the 14th plan will aim to strengthen industrial supply chains that were disrupted during the early stages of the pandemic, using technology to become more self-reliant in this respect.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“In our view, this means there will be more of a policy push for higher [research and development] spending in the coming years, especially in strategically emerging sectors such as biotechnology, semiconductors and new energy vehicles,” Qu Hongbin, chief China economist at HSBC, said in a research note sent to Al Jazeera.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>A new frontier</span></b></p><p style="text-align:left;"><span>If we are being honest, Chinese tech has already taken over the majority of the world and is having a major influence on the way that we do things and live our lives. In this space, China has achieved its goal and we will use Chinese tech if it is safe, well made and comparable to tech that is produced elsewhere in the world. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>So where does China go next? I recently <a href="https://www.caixinglobal.com/2020-11-12/china-wants-self-driving-tech-in-half-of-new-cars-by-2025-101626619.html">read an article</a> which points out that Beijing is targeting the automotive sector.&nbsp; </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that China aims to have vehicles with partial self-driving technology account for 50% of all new-auto sales by 2025, double its previous goal, as the country encourages local companies to pull ahead of the U.S. in the field.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Under a plan released Wednesday, new vehicles with &quot;level 2&quot; or &quot;level 3&quot; automation are to make up 70% of sales by 2030. Level 2 assists the driver with steering, acceleration and braking, while level 3 means vehicles drive themselves under certain conditions such as on highways.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that China in 2017 called for level 2 and 3 vehicles to make up 25% of new-car sales in the world's largest auto market by 2025. Beijing considered raising the target to 30% last year, but is hitting the gas pedal now as China positions autonomous and &quot;new energy&quot; vehicles as a strategic emerging industry.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>About 10% of new vehicles sold in China during the first half of 2020 carry level 2 automation, local media report.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The new plan also seeks to have level 4 autonomous vehicles, which require no human input except in emergencies, on the market by 2025 and account for 20% of sales in 2030. China looks to expand use of high-level self-driving technology nationwide by 2035 and integrate such vehicles into so-called smart cities.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that China will enact policies and legislation based on this road map, released by the National Innovation Center of Intelligent and Connected Vehicles at the direction of the Ministry of Industry and Information Technology.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Beijing is counting on Chinese tech companies to make this vision a reality.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Search engine company Baidu has received state support for its Apollo self-driving technology project, launched in 2017. Trials of an autonomous taxi service are underway in Hunan and Hebei provinces and parts of Beijing. Didi Chuxing, China's largest ride-hailing company, is testing a similar service in Shanghai.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Tech names ranging from startups like Pony.ai to giants such as Alibaba Group Holding and Tencent Holdings are increasing development in the field.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that though Tesla and Toyota Motor have led the way among automakers, Chinese players such as Geely Automobile Holdings, part of the group that owns Sweden-based Volvo Cars, are pushing into the fray as well. Nearly 100 new models with level 2 technology reportedly were rolled out in the first nine months of 2020, according to Chinese media.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>On the regulatory side, with the commercialization of level 3 vehicles on the horizon, China is considering easing rules as early as next year to allow self-driving vehicles on public roads.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p><span style="color:inherit;"></span></p><p style="text-align:left;"><span>The reason why the US went to war in Vietnam, and the reason that it engaged in the Cold War, was that it was vehemently opposed to communism. For that, the US was seen by many as a beacon of hope and freedom. Is this not influence?&nbsp; Throughout history, there have been international influencers that have shaped the way that we live. Perhaps it is China’s turn.&nbsp;</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 24 Nov 2020 08:52:11 +0000</pubDate></item><item><title><![CDATA[Accelerated change in the way we work]]></title><link>https://www.gtconsult.com/blogs/post/Accelerated-change-in-the-way-we-work</link><description><![CDATA[Work, as we know it, is set for major disruption. We can either fight it or we can embrace it.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rBX6IKTXSYKtzpndGemY8A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_rE32yKjHRHCPzj09sOzaqA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__3VCw9JrSbaVfLpJ15A5OQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Tivdds0OSsWStgh0cDyvRw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Work, as we know it, is set for major disruption.&nbsp;</h2></div>
<div data-element-id="elm_aLWeTNFJT7SDTl-tjjMZFA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p><img src="https://images.unsplash.com/photo-1574689049340-bedc8373daa3?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"><br></p><p><br></p><p style="text-align:left;">If we go back over the centuries, the biggest impact of the various industrial revolutions that the world has been through is that there has been a significant change in the workplace. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Technology enables productivity but also creates various opportunities that were not present in the past. This has been at the heart of the Fourth Industrial Revolution (4IR) and its impact has only been enhanced by the Covid-19 Pandemic. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Changing landscape</b></p><p style="text-align:left;">If we go back to the industrial revolution, many skeptics were unconvinced that inventions such as the car and the printing press would replace horse drawn carriages and conventional forms of media. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Industrialization saw the mass printing of newspapers and books and the mass production of motor vehicles. This caused unemployment for many who filled these rolls in the past. While technology enables productivity, it also is a catalyst for social change. Many of the jobs that exist today will not exist 20 years from now. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While there will be significant social change, the role of humans will never totally disappear. While technology is becoming more self-governing, it will not be independent. Humans still need to govern the process. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">So, what does the future of the workplace hold? </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Accelerated change</b></p><p style="text-align:left;">I recently <a href="https://www.businesslive.co.za/fm/features/2020-10-29-the-future-of-work/">read an article</a> which pointed out that the automation and digitization of the workforce has accelerated, partly due to Covid-19, but new jobs are coming and may be more accessible than you think.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that workers around the world are facing &quot;double disruption&quot;: not only is the global workforce automating faster than expected, but the Covid-induced global recession has reversed employment gains, making it even harder for workers, especially those already disadvantaged, to make the transition to new types of jobs.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This is the core message of the World Economic Forum’s (WEF) 2020 Future of Jobs report, a survey of mostly big, white-collar companies across 26 countries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Hitting the breaks</b></p><p style="text-align:left;">According to the report, the bad news is that, in contrast with previous years, job creation is slowing while job destruction is accelerating.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">By 2025, the so-called robot revolution is set to disrupt 85-million jobs globally, according to the report. By then the average employer expects to divide tasks roughly equally between humans and machines.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Referencing the report, the article points out that, astonishingly, even half of the lucky ones who retain their jobs will need reskilling. Fortunately, the report finds that 73% of South African firms would look to retrain current staff to meet their changing requirements.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;Of course, it depends on the choices we make today,&quot; notes WEF MD Saadia Zahidi. &quot;It depends on the kinds of investments governments make today and the investments workers make in terms of their own time. And it depends on the choices that business leaders make when it comes to retaining and protecting jobs vs shorter-term decisions that are more focused on quarterly results.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that the report warns that in the absence of support from governments and employers, inequality is likely to worsen because of the double whammy of technology and the pandemic, which has disproportionately affected millions of low-skilled workers.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Key investment</b></p><p style="text-align:left;">The article points out that improving access to online learning is an investment all countries should be making. According to US online learning provider Coursera, there has been a fivefold increase since the start of the pandemic in employers offering online learning to their workers, and a nine fold increase in people accessing it through government programmes, including in developing countries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">In Costa Rica, for example, the government has worked with employers to identify the skills in demand, partnered with Coursera to build the required online learning programmes, and helped match graduates of these programmes to available jobs.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;No matter what prediction you believe about jobs and skills, what is bound to be true is [a] heightened intensity and frequency of career transitions, especially for those already most vulnerable and marginalised,&quot; says Hamoon Ekhtiari, CEO of FutureFit AI, a Canadian reskilling firm that contributed to the report.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>New roles</b></p><p style="text-align:left;">Refencing the report, the article points out that the good news is that 97-million new roles are expected to emerge over the next five years in existing fields such as the care sector, as well as in newer industries such as those involving big data, artificial intelligence, the green economy, cloud computing and product development.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;We think the future of work is digital, but it’s also human,&quot; said LinkedIn chief economist Karin Kimbrough at the report’s launch. Kimbrough believes the world will increasingly value tasks that involve collaboration, managing and caring. In fact, the pandemic has taught society to revalue in-person, frontline services such as nursing.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Moreover, getting into new digital fields isn’t as difficult as people may think. According to LinkedIn data, about half of all people making career shifts into these new industries come from unrelated fields.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;So, you can come from just about anywhere and manage the transition,&quot; says Kimbrough.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Advanced skills not necessary</b></p><p style="text-align:left;">The article points out that you also don’t need advanced levels of digital literacy to make the jump, which is important for a country such as SA where, according to the report, less than 30% of the population has digital skills.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Coursera’s head of data science, Emily Glassberg Sands, points out that, for those without university degrees, there are still lots of opportunities in administering technology, including, for instance, as Google IT support specialists (who are employed by thousands of firms to help debug Google every day).</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article added that it takes just six to eight months to train online as one, she says, and is a useful stepping-stone to unlocking more formal IT qualifications over time. &quot;It’s difficult and requires support, but it’s less the exception than we think.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Kimbrough says if policymakers could identify the small clusters of skills with an outsized effect on opening more sustainable career paths, it could make a real difference to reducing global unemployment.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">But the window of opportunity for managing this change is closing fast, Zahidi warns. &quot;In the future, we will see the most competitive businesses are the ones that have invested heavily in their human capital — the skills and competencies of their employees.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Enhanced thinking</b></p><p style="text-align:left;">When James Cameron brought us <i>The Terminator</i> in 1984, we thought that giving machines the power of enhanced thinking was a bad idea. It really was not a good portrayal of the benefits of technology. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">However, <a href="https://www.techrepublic.com/article/forrester-ai-and-automation-will-help-organizations-rethink-the-future-of-work/">a recent article</a>, referencing a report by Forrester, points out that its not all bad news though. I read an article which points out that artificial intelligence (AI) and automation will help organizations rethink the future of work.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Automation, not surprisingly, is aimed at the employee experience. In 2021, digital transformation initiatives in more than three-quarters of enterprises will focus on automation, the firm said.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;The 'great lockdown' of 2020 will make the drive for automation in 2021 both inevitable and irreversible,'' according to Forrester's Predictions 2021. &quot;Remote work, new digital muscles, and pandemic constraints will create millions of pragmatic automations in 2021; document extraction, RPA (robotic process automation) from anywhere, drones, and various employee robots will proliferate; and, as expected, the mad dash to automate will bring trouble.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Driving efficiency and elasticity</b></p><p style="text-align:left;">The article points out that, while AI didn't predict the pandemic, it will help businesses rethink the future of work; drive more efficiency, elasticity, and scale in operations; and reimagine customer and employee experiences, Forrester said. AI is driving the growth of automated processes, helping them become smarter. Companies that adopt machine learning, a subset of AI, &quot;will massively multiply their number of AI use cases, including for employee augmentation and automation,'' the firm said.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Forrester expects &quot;hypergrowth in AI, along with the proliferation of artificial data and the beginnings of a Blockchain-based approach to data trust.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">AI adoption grew 15 percentage points in the past year, and maturity is rising as firms move past small, incremental deployments, according to Forrester. &quot;In 2021, the grittiest of companies will push AI to new frontiers, such as holographic meetings for remote work and on-demand personalized manufacturing. They will gamify strategic planning, build simulations in the boardroom, and move into intelligent edge experiences.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that Forrester also believes there are many deterrents to AI success: A lack of trust, poor data quality, data paucity, a lack of imagination, and a dearth of the right power tools to scale.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;But 2021 will see companies tackle these head on, not because they want to or suddenly have the wherewithal to overcome these in this unprecedented year--but because they have to,'' Forrester maintained. &quot;They have to rebuild their businesses not for today or even next year but to prepare to compete in an AI-driven future. 2020 has given leaders the impetus, born out of necessity, and coincidence to embrace AI, with all its blemishes.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Don’t shy away</b></p><p style="text-align:left;">The article points out that Forrester advises firms not to shy away from AI. &quot;Plan to quadruple your investment next year. Build your internal AI team, engage consultancies to implement domain-specific solutions, and upgrade your data, analytics, and machine learning platforms to rethink how you use AI.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Automation is also a top priority now, and thanks to the pandemic, it is aimed at the employee experience, Forrester said. In 2021, digital transformation initiatives in more than three-quarters of enterprises will focus on automation—whether for core records, customer operations, or engagement, the firm said. Advances in AI, changes to work patterns as a result of the pandemic, and a fierce global recession have made this drive for automation inevitable—and irreversible, according to Forrester.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that other predictions Forrester is making in AI and automation in 2021:</p><p style="text-align:left;">- No-code automated machine learning (AutoML) will be used to implement more use cases. AutoML can dramatically accelerate ML model development versus the traditional coding approach. In 2021, lucky laggards will use AutoML to implement 5, 50, or 500 AI use cases faster, leapfrogging their competitors. AutoML lets data scientists configure parameters and run hundreds or even thousands of experiments in one go. With AutoML, Forrester estimates that these teams can implement eight times the number of use cases aimed at operational efficiency or personalized customer experience—and greatly amplify the impact of digital transformation;</p><p style="text-align:left;">- A fifth of enterprises will expand investment in intelligent document extraction. Even before the pandemic, there was strong investment in intelligent document extraction platforms (IDEP) as firms wanted to use it to classify many types of documents. Combining computer vision with advances in machine learning has made platforms more valuable and easier to build and maintain;</p><p style="text-align:left;">- A notable failure will occur as a result of the rush to automation. The pandemic accelerated investment in various forms of business process and IT automation. Two-thirds of enterprise organizations that encountered broken processes during the pandemic were pressured to patch in automation solutions. But rushed and haphazard automation exposes systems and the business to serious risk. This can lead to monumental failures that not only damage a company's reputation and customer trust but also limit broader public trust in automation (specifically AI) as a result of media scrutiny. In 2021, up to 30% of organizations will ramp up their focus on quality by better planning and testing automation before deploying it to production or exposing it to employees;</p><p style="text-align:left;">- Intelligent automation suites will provide a quarter of all RPA solutions. Commoditization, major enterprise software acquisitions, new entrants, specialization, and public market ambitions are resulting in a diverse RPA market. Like machine learning, RPA will become an embedded feature of many platforms by the end of 2021;</p><p style="text-align:left;">- A fifth of enterprises will use commercial drones to automate business operations. Recent rapid growth in the consumer drones industry has sparked momentum in the commercial drone market. While social distancing is a factor in drone usage, two forces will accelerate adoption in 2021. First, governments are crafting better regulations to facilitate drone adoption and commercialization. Second, the rapid evolution of computer vision and 5G will enable real-time drone intelligence over ultra-reliable, low-latency communications; and</p><p style="text-align:left;">- Intelligent automation will advance to support one in four home workers. Three times as many information workers will work from home all or most of the time, while many companies will institute hybrid models. As a result of the pandemic, new forms of automation will support one in four remote workers either directly or indirectly by 2022. Direct support in the form of giving a bot to individual workers to support their daily journey will be rare. But indirect support will blossom, with intelligent automation handling employee benefits, questions, and supporting documents, customer service, and line-of-business tasks that are often invisible to the home worker.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Another <a href="https://www.citrix.com/content/dam/citrix/en_us/documents/analyst-report/work-2035.pdf">report</a>, which was the result of a joint study by Citrix, futurist consultancy Oxford Analytica, and business research specialist Coleman Parkes, &nbsp;revealed the expectations of over 500 C-Suite leaders and 1,000 employees.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The report pointed out that:</p><p style="text-align:left;">- Three-quarters (74 per cent) believe that in fifteen years, artificial intelligence (AI) will significantly speed up the decision-making process and make workers more productive;</p><p style="text-align:left;">- New jobs will be created, including roles such as: Robot / AI Trainer, Virtual Reality Manager, and Advanced Data Scientist;</p><p style="text-align:left;">- Work will be more flexible and fuelled by technology. 75% of the study’s respondents believe that tech platforms will provide instant access to highly specialized, on-demand talent;</p><p style="text-align:left;">- 57% of respondents believe AI has the potential to make the majority of business decisions by 2035 and potentially eliminate the need for traditional senior management teams; and</p><p style="text-align:left;">- “AI-ngels” – digital assistants driven by AI – will draw on personal and workplace data to help employees prioritize their tasks and time and ensure mental and physical wellness.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Efficiency is key</b></p><p style="text-align:left;">One of the advantages of technology replacing human skills (according to employers) is efficiency. Robots are programmed to carry out a task and can do so without error, provided that the inputs are correct. Further, these tasks are carried out more efficiently and technology does not take leave days. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">However, as pointed out at numerous points in this article, human skills will never be fully replaced. This was reinforced in a recent article by the World Economic Forum. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that, to do this, we must mobilize the best of human capabilities, technologies, innovative policies, and market forces in service of a new vision.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Moral and economic imperatives</b></p><p style="text-align:left;">The article points out that, to imagine the future of work, we must start with defining how human beings can adapt and grow.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Every person has the right to a productive life. Every person has the right not just to work, but to realize their purpose so they can participate fully in society. Every business has the moral and economic responsibility to help protect people’s livelihoods, even when they cannot always protect the jobs they do.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that you cannot have a healthy business in a sick world. For businesses to thrive, society must also thrive: from employees, to consumers, to suppliers, shareholders and other stakeholders. When you leave some people to fall through the cracks, you lose all the benefits they bring to society, from their skills and talents, to their experience and unique understanding. And yes, their buying power too.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">It isn’t just a moral imperative, it’s also an economic one. Take gender equality. McKinsey estimates that if no action is taken, global GDP growth could be $1 trillion lower in 2030. Conversely, immediate action to advance gender equality could add $13 trillion to global GDP in 2030.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Re-imagining work</b></p><p style="text-align:left;">The article points out that, to reimagine the working landscape we need to attempt something that seems almost impossible: we must imagine not just what the world of work is going to look like in 10, 15, 20 years, but what we want it to look like. We must imagine what it will look like if human beings are thriving.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This means involving people as part of the solution rather than as a problem to be solved. Only by doing all this can we continue to build a better business and a better world - for everyone.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Actionable change</b></p><p style="text-align:left;">The article points out that there are three actions that businesses can take to facilitate this change. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">- Support people to find their own sense of purpose and realize their full potential by working with them to develop a purpose-led, future-fit development plan. This is more than just running reskilling programmes. This is &nbsp;about equipping people to lead the change, rather than having change done to them;</p><p style="text-align:left;">- Pioneer new forms of employment to provide flexibility with security. This is about enabling people to choose how they want to work depending on their life stage. A socially responsible alternative to the gig economy; and </p><p style="text-align:left;">- Putting mental health and wellbeing at the forefront of preparing for the <i>Future of Work</i> with meaningful action (not just ‘raising awareness’ campaigns’). This is about providing practical support and coaching to people as they figure out their future options.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that, while the jobs of tomorrow may be resetting, people are not. People are not widgets; they are the soul of any successful business. Businesses can help people to follow reskilling and other career pathways by: putting them at the heart of the future of work; ensuring they understand their own personal purpose; providing the support they need to feel happy and healthy; and giving them a sense of belonging.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This will ensure that people are able to thrive, adapt and grow as they are empowered to proactively shape the future of work.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Where does GTconsult fit in? </b></p><p style="text-align:left;">“GTconsult has been at the forefront of innovation and embracing enhancing productivity through technology. GTconsult started off as a small company with a big heart and grew because we knew where the future of tech was heading, and the impact that it would have on society. We continuously strive to drive change and focus on how trends impact our journey,” says Craig Tarr, Co-Founder of GTconsult and newly appointed CEO. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;">GTconsult has always focused on how technology can drive change and is involved in a number of projects which are helping clients improve efficiency and productivity. Stay tuned to find out more about these exciting projects.&nbsp;</p></div>
</div><div data-element-id="elm_-6Xcen-oT2y6Jhdtz-Bplw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 10 Nov 2020 09:38:42 +0000</pubDate></item><item><title><![CDATA[Is cyber security still just a fad?]]></title><link>https://www.gtconsult.com/blogs/post/Is-cyber-security-still-just-a-fad</link><description><![CDATA[g&nbsp; This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident. &nbsp; Risk management plays an i ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_2L32EXdTQgKydpDzmAbWXQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yHK4fP1qQByOjroTd4VAOg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ZUzXvOZmTbu3Zx-ua0bNag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_yhBEDDFMRVGUm-3UIJM1yA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"></h2></div>
<div data-element-id="elm_2VXzld2qSxOhHxpeUScgSQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1586772002345-339f8042a777?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ">g&nbsp;</p><p style="text-align:left;">This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident.<br></p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management plays an important role in the financial services industry. Insurers and credit providers take a serious look at risk and invest a lot of time and capital in developing models that will address the identified risk. It gives them an idea of where they are and where they need to be. Its true benefit can be seen in achieving identified deliverables. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management also plays a significant role in the technology industry. However, because of the nature of the evolution of this risk, models need to be fluid and have to be extremely adaptable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Serious complexity </b></p><p style="text-align:left;">Let’s revisit the financial services industry for a second. The reason why risk management plays an important role in this industry is that it is an effective way to address risk. This is only true because the risks that the industry faces haven’t changed much over the past ten years. The reason why risk management in the technology space becomes a challenge is because cyber security is <a href="https://www.forbes.com/sites/elenakvochko/2020/10/25/why-cyber-security-is-still-so-complex/#4bffb47ef974">seriously complex</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that consumers, businesses, and entire systems all over the world are under threat on a daily basis. Valuable personal and financial information is exposed and ready for the taking. Simple tasks like using a credit card, a phone, or a computer provide an opportunity to take our money, our identities, and your ways of life. Data breaches are capable of rendering large, powerful companies vulnerable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As the world evolved and became more technological, attacks evolved along with the new developments. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>A new window to climb through</b></p><p style="text-align:left;">The article points out that when humans learned to domesticate animals and grow food, larger settlements were established and societies started to flourish in multiple locations across the world. </p><p style="text-align:left;">Sedentary societies then placed value not only in food and clothing, but in things such as cattle, crops, land, houses, and machinery. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Commerce was created, value was placed on a new concept - money. Goods were then exchanged for precious metals such as gold, silver, and bronze in the form of coins and paper money years later. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that the value of money prompted societies to create impenetrable fortresses and sophisticated vaults to keep valuables away from the hands of criminals.&nbsp; As societies became more complex, both crime and remediation efforts evolved along with them. Before the rise of computers, trespasses were much easier to prevent. All we had to do was keep a door locked. The internet has given a new window to climb through for digital assets.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This tells us that security has also evolved alongside attacks to give rise to holistic security. Today, digital assets have the highest value. Our neighbourhood is now the entire globe. In response to this new type of cyber criminal, organizations have developed an equally evolved security system. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be prepared!</b></p><p style="text-align:left;">The article points out that, because of our daily interaction with connected devices, computers, smartphones, and tablets, it’s important that everyone - from the CEO and software developers to suppliers and employees - to be aware. Everyone can play an important part in keeping information safe. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that ransomware has become a headache for businesses and individuals alike. This type of attack can hold data hostage via encryption, which is the process of converting data into unreadable code to prevent access, until the victim pays a large amount of money to get the description keys. Organizations can fall victim to ransomware through drive-by downloads and phishing emails. Millions of people around the world reported encounters with ransomware.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While attackers are finding new, innovative ways to threaten the security of an organization, holistic and complete security will give enterprises a chance to fight against any attack and protect their data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that everyone in the company should have the following questions in mind:</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>CEOs; how secure is your company? What risks are you exposed to?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Technical Teams; how can you make data easy and accessible to your team without compromising security?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Product Owners; at what stage do you integrate security? And </p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Employees; what is your role in cybersecurity? What can you do to protect your company’s data?</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that it is important for cybersecurity to be a company-wide approach - a combination of people, processes and tools. Organizations should develop security operation centres, which are intelligence-led and are focused on creating high-level defence, cyber hygiene, education, and awareness.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The goal? To stress-test your systems, identify, contain and remediate the negative impact fast.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber literacy</b></p><p style="text-align:left;">When my parents were at school, my mom had to do typing lessons as a school subject. It was the same for me when I was at school where a module of Computer Literacy Classes focused on typing. Spoiler alert, I still type with a single finger on each hand looking at the keyboard the whole time. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">We digress. There is a significant push for subject matter such as coding and cyber security to be included in computer literacy classes in classrooms around the world. Cyber risk literacy should be <a href="https://www.helpnetsecurity.com/2020/10/27/cyber-risk-literacy/">part of every defensive strategy</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that while almost 95% of cybersecurity issues can be traced back to human error, such as accidentally clicking on a malicious link, most governments have not invested enough to educate their citizens about the risks, according to a report from the Oliver Wyman Forum.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber risk literacy of the population</b></p><p style="text-align:left;">The article adds that cyber literacy, along with financial literacy, is a new 21<sup>st </sup>century priority for governments, educational institutions, and businesses.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Cyberattacks are now one of the fastest growing crimes globally and are expected to cost organizations more than $600 billion dollars a year by 2021,” Paul Mee of the Oliver Wyman Forum told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“The situation has become even more pressing during the pandemic as our reliance on the internet has grown. Yet many citizens still lack the basic skills to keep themselves, their communities, and their employers safe.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Fifty geographies were assessed, including the European Union, on the present cyber risk literacy of its population, and the nature of related education and training available to promote and enable future cyber risk literacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that the index measures five key drivers of cyber risk literacy and education: the public’s motivation to practice good cybersecurity hygiene; government policies to improve cyber literacy; how well cyber risks are addressed by education systems; how well businesses are raising their employees cyber skills, and the degree to which digital access and skills are shared broadly within the population.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>How are assessed countries doing?</b></p><p style="text-align:left;">The article added that Switzerland, Singapore and the UK topped the list because of their strong government policies, education systems and training, practical follow through and metrics as well as population motivation to reduce risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Switzerland, the number one ranked country, has a comprehensive implementation document that lays out specific responsibilities along with what national or provincial legislation is required. Specific milestones are set, and timelines are assigned to ensure accountability regardless of who oversees the government.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Singapore, which is ranked second, has prioritized cybersecurity education efforts from early childhood to retirees. It established the Cyber Security Agency of Singapore to keep its cyberspace safe and secure. Its cyber wellness courses occur over multiple grades and focus on social and practical safety tips such as understanding cyber bullying.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that The UK ranked third, has the most integrated cyber system because it incorporates cyber risk into both primary and secondary education. The UK’s National Cyber Security Strategy of 2016-2021 is also one of the strongest plans globally. The US ranked 10th.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Countries that rank lower lack an overall national strategy and fail to emphasize cyber risk in schools. Some countries in emerging markets are only beginning to identify cybersecurity as a national concern.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Governments that want to improve the cyber risk literacy of their citizens can use the index to strengthen their strategy by way of adopting new mindsets, trainings, messaging, accessibility and best practices,” Mee told helpnetsecurity.com. “With most children using the internet by the age of four, it is never too early to start teaching your citizens to protect themselves.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Problematic issues</b></p><p style="text-align:left;">Another article by helpnetsecurity.com pointed out that cybersecurity <a href="https://www.helpnetsecurity.com/2020/10/23/cybersecurity-is-failing-due-to-ineffective-technology/">is failing due to ineffective technology</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">A failing cybersecurity market is contributing to ineffective performance of cybersecurity technology, a Debate Security research reveals.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that, based on over 100 comprehensive interviews with business and cybersecurity leaders from large enterprises, together with vendors, assessment organizations, government agencies, industry associations and regulators, the research shines a light on why technology vendors are not incentivized to deliver products that are more effective at reducing cyber risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The report supports the view that efficacy problems in the cybersecurity market are primarily due to economic issues, not technological ones. The research addresses three key themes and ultimately arrives at a consensus for how to approach a new model.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cybersecurity technology is not as effective as it should be</b></p><p style="text-align:left;">The article pointed out that 90% of participants reported that cybersecurity technology is not as effective as it should be when it comes to protecting organizations from cyber risk. Trust in technology to deliver on its promises is low, and yet when asked how organizations evaluate cybersecurity technology efficacy and performance, there was not a single common definition.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Pressure has been placed on improving people and process related issues, but ineffective technology has become accepted as normal – and shamefully – inevitable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>The underlying problem is one of economics, not technology</b></p><p style="text-align:left;">The article added that 92% of participants reported that there is a breakdown in the market relationship between buyers and vendors, with many seeing deep-seated information asymmetries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Outside government, few buyers today use detailed, independent cybersecurity efficacy assessment as part of their cybersecurity procurement process, and not even the largest organizations reported having the resources to conduct all the assessments themselves.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As a result, vendors are incentivized to focus on other product features, and on marketing, deprioritizing cybersecurity technology efficacy – one of several classic signs of a “market for lemons”.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Coordinated action between stakeholders only achieved through regulation</b></p><p style="text-align:left;">The article pointed out that, unless buyers demand greater efficacy, regulation may be the only way to address the issue. Overcoming first-mover disadvantages will be critical to fixing the broken cybersecurity technology market.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Many research participants believe that coordinated action between all stakeholders can only be achieved through regulation – though some hold out hope that coordination could be achieved through sectoral associations.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article added that, in either case, 70% of respondents feel that independent, transparent assessment of technology would help solve the market breakdown. Setting standards on technology assessment rather than on technology itself could prevent stifling innovation.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Defining cybersecurity technology efficacy</b></p><p style="text-align:left;">The article pointed out that participants in this research broadly agree that four characteristics are required to comprehensively define cybersecurity technology efficacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">To be effective, cybersecurity solutions need to have the capability to deliver the stated security mission (be fit-for-purpose), have the practicality that enterprises need to implement, integrate, operate and maintain them (be fit-for-use), have the quality in design and build to avoid vulnerabilities and negative impact, and the provenance in the vendor company, its people and supply chain such that these do not introduce additional security risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“In cybersecurity right now, trust doesn’t always sell, and good security doesn’t always sell and isn’t always easy to buy. That’s a real problem,” Ciaran Martin, Advisory Board Member at Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Why we’re in this position is a bit of a mystery. This report helps us understand it. Fixing the problem is harder. But our species has fixed harder problems and we badly need the debate this report calls for, and industry-led action to follow it up.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Company boards are well aware that cybersecurity poses potentially existential risk, but are generally not well equipped to provide oversight on matters of technical detail,” John Cryan, Chairman Man Group told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Boards are much better equipped when it comes to the issues of incentives and market dynamics revealed by this research. Even if government regulation proves inevitable, I would encourage business leaders to consider these findings and to determine how, as buyers, corporates can best ensure that cybersecurity solutions offered by the market are fit for purpose.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“As a technologist and developer of cybersecurity products, I really feel for cybersecurity professionals who are faced with significant challenges when trying to select effective technologies,” said Henry Harrison, CSO of Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“We see two noticeable differences when selling to our two classes of prospects. For security-sensitive government customers, technology efficacy assessment is central to buying behaviour – but we rarely see anything similar when dealing with even the most security-sensitive commercial customers. We take from this study that in many cases this has less to do with differing risk appetites and more to do with structural market issues.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be cyber smart</b></p><p style="text-align:left;">Cyber security is advancing at a rapid rate. Companies are no longer able to keep a constant eye on their employees and offer the protection that they need. a measure of this responsibility rests on the shoulders of <a href="https://www.dqindia.com/5-cybersecurity-tips-secure-data-become-cybersmart/">those below board level</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Use a strong password</b></p><p style="text-align:left;">The article points out that having to manage a large number of applications and software, the easiest option for most users would be to pick a password that is easy to remember, and then apply it across the board. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While this might be a convenient option, it is definitely not the safest. Cybercriminals these days use tools that sniff out passwords reused on other sites to make their work easier and to make the stolen passwords and data more lucrative on the dark web. Hence, it is recommended that you choose strong passwords, using different alpha-numerical combinations, as well as change them periodically.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Opt for two factor authentication</b></p><p style="text-align:left;">The article adds that the rule of thumb should be when creating any digital account, always set up two-factor authentication (2FA). </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">It’s a common practice to login to accounts using multiple devices, most often of colleagues, or people we trust. Just trusting the person is never enough. It is their machines that you must trust. In case, you have logged into a network on a PC with malware, you are essentially letting cybercriminals access your data. In such cases, having 2FA, helps to prevent egregious attacks where a cybercriminal tries to login to your account and steal your data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Safeguard your entry points</b></p><p style="text-align:left;">The article points out that all it takes is one weak entry point, to allow a cybercriminal access to your entire network. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">By forgetting to close down the access points that are not being used, this can be an open door for hackers to enter, and place malware on to your network.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Lookout for signs of a scam</b></p><p style="text-align:left;">The article points out that phishing attacks have become increasingly common these days, and are using several tactics to target vulnerable users. At the same time, there are often several tell-tale signs of a scam in the making, which you can easily spot, if you keep a sharp lookout for them. For example, emails with improper grammar, and spelling mistakes are one of the biggest giveaways. Additionally, links that promise freebies and then request you to enter card details too are illegitimate.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Frequently update your system</b></p><p style="text-align:left;">The article adds that inexpensive home internet devices are prime targets for hackers. A best practice is to update these frequently, and apply all security patches quickly. In the case of older devices, which no longer receive firmware updates, they should be immediately switched out for newer models, to prevent hackers from controlling traffic through routers, and implementing various attacks.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Cybercrime is advancing at a rate which we can no longer afford to take lightly, or ignore. No organization or user today can be considered too small to be a potential victim, hence there is a strong need to create awareness on phishing or targeted attacks. Furthermore, the increased dependence on technology to stay connected, and ensure business continuity, has opened the floodgates to a whole new set of potential cybersecurity vulnerabilities that users must be conscious of. By practising these simple tips and maintaining good IT hygiene, we can be cybersmart, and safe on the internet.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">There are other helpful, yet simple, <a href="https://whnt.com/news/online-safety-tips-for-national-cyber-security-awareness-month/">tips to follow</a>: </p><p style="text-align:left;">- increase your online privacy. Protect your online accounts by implementing multifactor authentication and using strong passwords, which consist of letters, numbers and special characters. Individuals should also refrain from accessing banking information or making online purchases when connected to an unsecured public network;</p><p style="text-align:left;">- stay secure while you work. As more employees work virtually during the COVID-19 crisis, they should be more vigilant about internet scams and online fraud. Business and personal information should be treated with the same care; avoid sharing it with unfamiliar parties or over unsecured networks. It is important to keep the security software on your business devices up to date, because only one employee needs to be compromised for an entire organization to experience a data breach;</p><p style="text-align:left;">- use social media responsibly. Social media is a great way to connect with friends and family, but it can also allow scammers and cybercriminals to target you. Only accept friend requests from people you trust, avoid clicking links in messages from strangers, and refrain from posting your personal information online. Remember to be careful about what you share. Remember, there is no “delete” button online.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:11pt;">“The responsibility to fight cyber crime is upon all of us. We cannot stand back and say that it should be an issue that needs to be tackled at board level. We are all exposed and we can all take a stand against this. Simple interventions, and being aware, can definitely go a long way to address this. Are you going to play an active role?” asks Craig Tarr, CEO of GTconsult.&nbsp;</span></span><br></p></div>
</div><div data-element-id="elm_0nA7lU8VRRKuqFetk31NYQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 27 Oct 2020 08:38:59 +0000</pubDate></item><item><title><![CDATA[Big data: it’s more complex than you think]]></title><link>https://www.gtconsult.com/blogs/post/big-data-its-more-complex-than-you-think</link><description><![CDATA[We are currently living in the Fourth Industrial Revolution where technology is changing the way we live and interact with those around us. One of the ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_8O-74qMjQm21a73vS3tBUA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZjZX2vxrSPiEm5P-_j19XA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_TjcJwMvlRCGl5emwn9xnXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_PonfAqGgQlyNnGIqpC_stA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>We are currently living in the Fourth Industrial Revolution where technology is changing the way we live and interact with those around us.</p><p>One of the by-products of this revolution is the <em>shared economy</em>. This is the interaction over social media and data collection apps whereby a company has access to an online digital footprint of information that is created by users. This is known as Big Data, and it has the ability to change the world.</p><p>We have all heard of, or have been in contact with, Big Data in some way. But are we aware of how complex Big Data actually is?</p><p><strong>Platforms for transformation</strong></p><p>Access to this information is like gold for companies. It not only provides insight into consumer behaviour, but it also allows companies to research ways to improve their own business processes.</p><p>A <a href="http://www.crn.com/slide-shows/applications-os/300084214/15-big-data-technology-developments-you-should-know-about.htm/pgno/0/2">recent article</a> on crn.com shows that AtScale’s software provides a way for users of mainstream business analytics and visualization software, such as Tableau and QlikView, to tap into the huge volumes of data stored in big data systems like Hadoop.</p><p>AtScale 5.0 provides a new multidimensional calculation engine that supports the MDX query language for modelling complex business processes, a performance optimization engine that uses machine learning to optimize query performance, and a data abstraction layer that provides access to relational and other on premise and cloud data sources.</p><p>Compose 3.0 is the latest release of Attunity’s agile data warehouse automation software that helps businesses speed up analytics projects, optimize development and ETL (extract, transform and load) processes, and reduce risk.</p><p>The highlight of the 3.0 edition is a series of significant enhancements to the software’s ETL capabilities resulting in a&nbsp; tenfold increase in ETL processing speeds. New advanced DevOps processes (in development, testing, acceptance and production) streamline data warehouse design, development a<img src="/wp-content/uploads/2020/06/pen-idea-bulb-paper-300x201.jpg" alt="Transformation"></p><p><strong>New opportunities</strong></p><p>Big Data has not only enriched the lives of companies, who now have access to data and systems processes that can improve their business, and customers, who can now be offered tailor made products and services based on their data history, it is also enriching the lives of those looking to expand into a career in technology.</p><p>Data scientist…One part statistician and one part software engineer, a data scientist is the brains behind data interpretation.</p><p>Data scientists take massive amounts of data and whittle it down into concise statistics to use in predictive and prescriptive modelling. From there, the data scientist can generate valuable insights that improve business performance.</p><p>Big data managers…Managing data architects, scientists and a full team of technicians – not to mention managing the actual data – requires a data manager to oversee all processes and communicate day-to-day operations to company leadership. A data manager knows the intricacies of the tech world as well as the overall corporate strategy. They’re the jacks of all trades, if not the master of all.</p><p>A data manager is responsible for organizing the data being produced, ensuring quality, implementing strategy, and then reporting back to leadership. They leverage insights provided by data scientists to recommend new products, predict future roadblocks and streamline business logistics. In addition to experience in Hadoop and Hive, this high-level role requires cross-functional skills such as programming and management. As companies continue to adapt to newer systems, the demand for someone to coordinate data processes will continue to increase as well.</p><p><strong>More value</strong></p><p>The topic of Big Data is so vast that companies can find value in just about any aspect that is inherently attached to it; provided that companies realise that Big Data is more than just about analysing, it’s about execution.</p><p>An interesting article pointed out that at a recent think tank held in Singapore, Dr Andreas Weigend, Director at Social Data Lab, said that data didn’t have to be a cost to the company, but could instead be a profit and revenue generator.</p><p>Big data has been a key buzzword for businesses for some time now. While many people believe big data can be beneficial, few organizations know how to fully maximize its potential. It continues to evolve becoming a driving force behind waves of digital transformation.</p><p>Dr Weigend said that successful companies succeed by removing barriers to information rather than raising them. But, if you know all of the data you can make better decisions.</p><p>“We understand the essence and importance of big data, and saw that there is a disparity in knowing and understanding it,” said Yaron Zeidman, CTO, Agoda. “In order to better make sense of the power of the information we have on hand, we first need to understand the impact it has on various industries.”</p><p>As for the use of the data, Georges Mao, Director of Marketing Science APAC at Facebook, said it was important for businesses to reconcile the use of customers’ data along with the need of the business. “Without trust there is no business,” he said, “The duty we have is a mutually beneficial result for company and users.” He cautioned misuse by adding that if you keep delivering a message that is wrong, people will eventually tune you out.</p><p><strong>Privacy must be a priority</strong></p><p>**&nbsp;**There is a bit of an understanding by clients that if they engage in interactions over social media, or participate in programmes that rely on shared information, they are surrendering a fair bit of privacy to third parties.</p><p>This does not mean that data must not be protected. According to <a href="http://insidebigdata.com/2017/03/21/big-data-big-challenges-keeping-information-safe/">an article</a> on insidebigdata.com, protecting big data is a huge issue.</p><p>According to the article, companies wanting to secure data should follow these steps:</p><p>– Use Secure Software.&nbsp; Make certain any software you use, especially open-source software, is secure. If it wasn’t built with security in mind, reconsider using it until a secure version is available. You can also add other security programs designed to help increase protection at the application level;</p><p>– Monitor and Analyze your Audit Logs. Always look at your audit logs to see what is happening on your servers, especially your big data servers. This will give you an idea of what kinds of attacks you may be victim to on a regular basis;</p><p>– Use Real Time Monitoring Software.&nbsp; Install a real time intrusion detection software like Snort (owned by CISCO) so you can see exactly who is trying to access what at any time. This software will help you block those attacks immediately. You’ll also be able to see if any of your accounts have been hacked when they try to access data they do not have access to;</p><p>– Secure your Hardware and Software. When configuring new servers, make sure you’ve created a secure image that you can use for all of them. This will keep your server configurations the same, making it easier to protect them. Also, make certain every patch is installed and that only a few users have administrator-level privileges; and</p><p>– Monitor your Accounts and Use Account Controls. Finally, monitor your user accounts and only give access to those that need it. Require users to use very strong passwords, and deactivate the accounts of any employee who leaves the business right away. Also, lock accounts that have attempted to login using an incorrect password after several tries.</p><p>Big data can add significant value to your company, provided that you wrap your head around what big data is and the security concerns it comes with.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 30 Mar 2017 20:08:55 +0000</pubDate></item></channel></rss>