Posts

Showing posts from March 1, 2017

Here is what the fifth generation (5G) of cellular networks is poised to transform

Image
R&D efforts from major infrastructure providers are very exciting like the benefits of ultra-low latency unlocked by the fifth generation (5G) of cellular networks. In effect, the fifth generation (5G) of cellular networks is poised to transform communications, applications, digital content and commerce. Leading applications that will realize the benefits of ultra-low latency include industrial automation, robotics, and virtual reality. According to Research and Markets, these apps and services are considered next generation as they will embody a completely different QoE for end-users, leading to new feature/functionality and monetization through enhanced capabilities such as Haptic Internet.

Barr Group’s 2017 Embedded Systems Safety & Security Survey

Image

Secure Embedded systems: Simple-to-perform, well-known software development best practices

Image
For those who are unfamiliar, there are a number of simple-to-perform, well-known software development best practices, such as version control, code reviews, static analysis, and coding standards that have been proven to result in safer and more secure embedded systems for all devices, including IoT applications. These techniques are essential to minimizing the risk of tampering or malfunction of any embedded system.

Design trends for Internet of Things (IoT) devices

I have a pleasure to recall that, the Embedded Systems Experts®, has released preliminary results from its 2017 Embedded Systems Safety & Security Surveyhighlighting concerning statistics regarding design trends for Internet of Things (IoT) devices. This year’s survey has exposed that many development teams for IoT applications are not following industry best practices for designing safe and secure embedded systems, putting all mobile applications and the entire IoT infrastructure at risk.

The new virtualized network functions (VNFs) Onboarding Wizard developed by Cloudify

Image
For those who are unfamiliar, Cloudify is a business unit of GigaSpaces, providing open source orchestration software for cloud applications and VNFs used by carriers and enterprises.
Its new tool wizard provides an easy to use, web-based interface for onboarding a VNF. The VNF Onboarding Wizard generates a template adhering to the TOSCA specification (Topology and Orchestration Specification for Cloud Applications), abstracting away from the VNF provider the need to understand the inner workings of the emerging open standard used by telecoms for VNFs. Based on the reality that, there is no industry standard for deploying a VNF onto a particular Virtual Infrastructure Manager (VIM), the VNF Onboarding Wizard provides a simple mechanism for VNF providers to generate a TOSCA compatible template.

The healthcare sector is one of the key end-users of the blockchain technology

Image
Steadily, the healthcare sector is becoming one of the key end-users of the blockchain technology, where it streamlines the flow of health-related information and transactions in healthcare firms. The sector is projected to display impressive growth with a CAGR of close to 47% million by 2021, driven by an increasing number of players providing blockchain technology solutions and services specific to this sector.

Smart contracts or blockchain contracts

Image
Smart contracts or blockchain contracts are system generated programs used to process trade-related agreements. These contracts are being increasingly adopted to manage the supply chain of products. Blockchain Technology is streamlining the supply chain process and adding transparency in the logistics and distribution of products, thereby driving increased adoption.

Here is how the banking, financial services, and insurance firms are implementing blockchain

Image
Very exciting to note that, the banking, financial services, and insurance firms are implementing blockchain technology to manage digital transactions, manage insurance policies, and claim management. The advent of trading of cryptocurrencies in the financial services industry has further propelled the demand for blockchain technology. Blockchain is the cryptographically managed distributed ledger system, which is implemented to manage online transactions.

China’s New Cybersecurity Law has negative ramifications on international trade and market competition

Image
Although Zhao Zeliang, a director at the Cyberspace Administration of China, confirms that every article in the law complies with the rules of international trade and that, China’s businesses with foreign companies will continue, it is however clear that, China’s New Cybersecurity Law has negative ramifications on international trade and market competition.
In effect, this law has a very negative effect on the ability of foreign companies to successfully compete with Chinese companies both within China and across the globe, compelling them to re-evaluate and adjust their procurement solutions, plans, and strategies. The new cybersecurity law is anticipated to take effect this June, 2017. 
If your organization will be affected by these changes or is facing any type of procurement challenge, contact us (taatjene@gmail.com)to learn about our solutions on how we help clients tackle such business challenges by closely monitoring market conditions for improved supply chain strategies.

Here is what companies can do to combat the effects of China’s New Cybersecurity Law

Image
Unfortunately, there isn’t much that companies can do to combat the effects of this law. Companies will have to adapt to the new regulations and procedures that come with this law without a doubt, as China, unlike the stagnant markets in Europe and the US, has a great potential for future growth. The new cybersecurity law is anticipated to take effect this June, 2017. 
If your organization will be affected by these changes or is facing any type of procurement challenge, contact us (taatjene@gmail.com) to learn about our solutions on how we help clients tackle such business challenges by closely monitoring market conditions for improved supply chain strategies.

China’s new cybersecurity law will affect overseas businesses that operate within the country

Image
As of June, 2017, businesses will be force by China’s New Cybersecurity Law to reveal trade secrets and technical specifics about their products to Chinese authorities. There is too great a risk of this information being passed on to or intercepted by Chinese competitors, increasing market competition and the threat of counterfeit products and software. The law will have mostly a massive impact on smaller companies who will find it extremely tough to survive in the market. If your organization will be affected by these changes or is facing any type of procurement challenge, contact us (taatjene@gmail.com) to learn about our solutions on how we help clients tackle such business challenges by closely monitoring market conditions for improved supply chain strategies.

Very dangerous, China’s new cybersecurity

Image
It is now clear that, businesses will need to develop new strategies to work around China’s new cybersecurity law in order to avoid increased costs and exposure of sensitive data. In effect, foreign businesses are worried that they will have to share their source code or give up intellectual property to do business in China’s market.
I can observe that, this law will require the procurement of all network products, equipment, software, and services for “critical information infrastructure facilities”, including facilities in the medical/healthcare, energy, water, gas, and transportation industries, in addition to financial institutions, banking services, and social security facilities in China, to first pass a security assessment and receive government certifications. The new cybersecurity law is anticipated to take effect this June, 2017. 
If your organization will be affected by these changes or is facing any type of procurement challenge, contact us (taatjene@gmail.com) to learn abou…