Connect with us


Where Significance and Security Meet



Where Significance and Security Meet

We’ve all attended big events where security was tight. Maybe not White House level; but people scanned your ticket or personal invitation, another person checked your ID and a cadre of bystanders with headsets and dark glasses stood along the edge making sure the event went smoothly.

You stood in a sea of thousands trading great conversation and creating experiences. Your motivation was an unforgettable time to network, meet old friends and make a few new ones. This was the event of the year.

Welcome to edge computing. It is truly the next big “mega event” for CXOs and their teams leading them into the future.

Use cases will rise dramatically with more interaction, more people, more IoT devices, more data collection and more processing and analytics coming together at the edge. 


In its report entitled “Predicts 2022: The Distributed Enterprise Drives Computing to the Edge,” Gartner forecasts that IoT units will grow with an 11% CAGR through 2030 – when there will be 500 billion connected devices. Data-heavy verticals like manufacturing, healthcare, oil and gas, transportation, public sector organization, and smart agriculture will grow even faster. 

The significance of edge computing is about context 

What I mean by context is a shift toward technology becoming agile, operating where and when the action is. Gartner’s report states: “The volume of data at the edge is massive and growing, requiring organizations to address it where it lives rather than send it all back to the core data center or cloud.”

The evolution toward edge computing is not just technology for technology’s sake. Distributed intelligence pushed to the edge solves critical problems like minimizing latency, improving bandwidth, and optimizing bandwidth usage and cost.

The significance of edge varies because edge is defined differently for each market sector. For example, edge for insurance might involve an IoT device alerting a policyholder of a water leak. The data (and I mean a lot of data) then originates from the device. While it’s cost prohibitive to send that data to the cloud, edge computing solves the problem because the location of the processing is in the device. For retail banking or healthcare, however, edge is completely different. 

Here’s the list of priorities to consider from most important to least important: environment, understanding the role of cloud and edge computing, the computing infrastructure, data and transport of that data, security, and, finally, scalability.

Security at the edge puts you on the offense 

Edge implementation for any organization will only be successful if a strategic cybersecurity approach is in place. To unpack this complex issue, AT&T has published the 42-page AT&T Cybersecurity Insights™ Report. A third in AT&T’s series on the topic, you’ll find questions to explore as you add edge to your technology stack and read about real use cases (the most helpful part of all). 

Here are a few thought starters: 

●     How do you define edge in your market sector?

●     What’s your approach to securing the edge?

●     What framework will you use to assess your risk? 

●     What is the security maturity of your organization?

●     Have you noticed other enterprises in your space adopting edge?

AT&T’s report found that perceived risk at the edge differs in each industry. Retail and energy and utilities are most concerned. Healthcare has the lowest perceived risk, although the report points out they are still above the midline. Finance and manufacturing cluster in the center with finance companies having the most experience, and thus maturity, with cybersecurity risk. 

Exploring edge-to-edge solutions for specific industries is the key to delivering breakthrough customer experiences while keeping your business ahead of the digital curve. If you’re not sure where to start, AT&T has a helpful playbook talking about the “cyber scaries” .

While emerging technologies come with benefits, consider security first and foremost. Otherwise, your organization steps into reactionary mode. In fact, according to TechRepublic, 66% of IT teams view edge computing as a threat to organizations. Playing offense is your best strategy.

You’re invited.


From Gartner’s report entitled “Tech Providers 2025: The Future of AI is on the Edge,”  We see this prediction: “An ability to create AI-enabled outcomes across constrained compute ‘edges’ is the most impactful refactoring of value in technology markets since cloud computing. Product leaders must redistribute their products from the cloud to be closer to acquired event data to add value to customer processes.” Edge computing, and making sure you have the right security around it, is fast becoming top of mind for every organization. 

Think of edge computing as an invitation to the biggest event of the century. Everyone will be there. It’s where the action is. How will you ensure your data, customers, employees, devices, interactions and reputation are protected?

You don’t have to have all the answers. None of us do. Companies like AT&T are leading the way to filling the gaps. Because technology will never live up to its purpose if it doesn’t serve the greater needs of humankind. That’s the foundational principle for securing your world – and employing the right technology that moves people forward.

Source link


Daasity builds ELT+ for Commerce on the Snowflake Data Cloud



Cloud Computing News

Modular data platform Daasity has launched ELT+ for Commerce, Powered by Snowflake.

It is thought ELT+ for Commerce will benefit customers by enabling consumer brands selling via eCommerce, Amazon, retail, and/or wholesale to implement a full or partial data and analytics stack. 

Dan LeBlanc, Daasity co-founder and CEO, said: “Brands using Daasity and Snowflake can rapidly implement a customisable data stack that benefits from Snowflake’s dynamic workload scaling and Secure Data Sharing features.

“Additionally, customers can leverage Daasity features such as the Test Warehouse, which enables merchants to create a duplicate warehouse in one click and test code in a non-production environment. Our goal is to make brands, particularly those at the enterprise level, truly data-driven organisations.”

Building its solution on Snowflake has allowed Daasity to leverage Snowflake’s single, integrated platform to help joint customers extract, load, transform, analyse, and operationalise their data. With Daasity, brands only need one platform that includes Snowflake to manage their entire data environment.

Scott Schilling, senior director of global partner development at Snowflake, said: “Daasity’s ELT+ for Commerce, Powered by Snowflake, will offer our joint customers a way to build a single source of truth around their data, which is transformative for businesses pursuing innovation.

“As Snowflake continues to make strides in mobilising the world’s data, partners like Daasity give our customers flexibility around how they build data solutions and leverage data across the organisation.” 

Daasity enables omnichannel consumer brands to be data-driven. Built by analysts and engineers, the Daasity platform supports the varied data architecture, analytics, and reporting needs of consumer brands selling via eCommerce, Amazon, retail, and wholesale. Using Daasity, teams across the organisation get a centralised and normalised view of all their data, regardless of the tools in their tech stack and how their future data needs may change. 

ELT stands for Extract, Load, Transform, meaning customers can extract data from various sources, load the data into Snowflake, and transform the data into actions that marketers can pursue. For more information about Daasity, our 60+ integrations, and how the platform drives more profitable growth for 1600+ brands, visit us at

Tags: ,

Source link

Continue Reading


4 Activities that Automakers Can Digitize Now



4 Activities that Automakers Can Digitize Now

Digital automaking is supported by technology-driven trends, consumer needs and new developments in artificial intelligence.

Manufacturing, procurement of raw materials, marketing and sales are factors involved in this change.

Digital automaking is a process that combines simulation, three-dimensional visualizations, analytics and several tool partnerships to make automotive manufacturing easier. Since the automotive industry has been undergoing a digital transformation primarily driven by intelligent mobility, it has encouraged the market to adopt new technology and software for modern vehicles. There has also been a growing need to increase industrial processes’ sustainability, environmental friendliness and adaptability. All of this has made automotive digitalization extremely important.

Automotive digitization helps to keep precise control over business operations, which is made possible using modern technologies like ML (machine learning) and AI (artificial intelligence) to improve short- and long-term performance. 

Automotive digitization has also increased the capacity to monitor each component of the supply chain while lowering costs and risks. Digital automaking can offer automotive solutions in terms of better design, time efficiency, and many other industry solutions.

4 Activities that Can Be Digitized by Automakers Now


1. Manufacturing

Customers desire tailored goods, but they don’t want to pay more than they would for items that are mass-produced. As a result, manufacturing must be more adaptable than ever, leading to mass customization. Thus, the design, fabrication, use and maintenance of products are changing as a result of the digitalization of manufacturing. It is also changing the operations, procedures and energy footprint of supply chains and more. Digital manufacturing enables firms to provide additional options that are tailored to individual customers. Businesses can better understand supply-chain challenges, including inventory levels, delivery status and demand cycles, thanks to digital manufacturing. 

The factories of the future will move from automation to autonomy, strengthening real-time communication between equipment, physical systems, and people. These factories are referred to as smart factories. The most notable advantages of a smart factory are its shop floor connectivity, advanced robotics, flexible automation, augmented and virtual reality systems, and efficient energy management. The general manufacturing sector’s global standards are established by the automotive industry.

Over the past two decades, the automotive sector has expanded tremendously. However, the main elements that will affect whether digitalization is successfully implemented are the significance of realizing a return on investment (RoI) and the willingness of employees at both the top-most and lowest levels of an organization.

2. Supply Chain

By removing the functional barriers that divide different areas, the digitization of the supply chain is a cross-functional process that spans the entire lifecycle of a vehicle or product and involves all company divisions. It allows for an ecosystem that connects all stakeholders, from raw material and component suppliers to logistics companies, dealers and customers.

Utilizing digital technology throughout the entire supply chain allows for real-time monitoring of all supply-chain stages, be it either procurement of raw materials or finished products ready to be delivered or purchased. The evaluation and management of each event’s impacts on the supply chain can help the automation of procedures and the avoidance of potential interruption.

3. Design

Design plays a significant role in the automotive industry. By digitizing design activity, design professionals can test multiple hypotheses before proceeding with the design phase. Digitalization in the designing of products has been enabled by a digital model known as Digital Twins, which represents tangible assets in 3D. Digital twins mirror the complete car or one of its components’ appearance and behavior. With great assistance from sophisticated software, businesses can collect information about configuration, sensors, inspection data, and other details to improve the product’s design.

Automobile manufacturers are among the many industrial firms that recognize digital twins’ possibilities and the potential it has to bring in the best in the business of automobiles. The design and production processes are simplified by 3D representations, improving vehicle performance and cutting costs for the manufacturers. The twin technology is quickly rising to the top of the list of software solutions used in contemporary auto manufacturing, with applications ranging from car design to predictive maintenance to boosting sales using digitally generated models.

4. Marketing

Any marketing strategy aims to tailor the right message to the right set of audiences at the right time. A marketing campaign that appeals to a 45-year-old countryside man might not affect a 23-year-old lady residing in an urban area. Therefore, the impact of marketing combined with the effectiveness of Artificial Intelligence (AI) can be the biggest boon to any business. The automotive industry can enormously benefit in how they market their brand/product by adding the power of artificial intelligence to their current data. It can lead to a strong possibility of purchasing your products early in the sales process, possibly before customers even begin looking for their new car, which is indicated by specific online activities. 

As a result of recent advancements in third-party cookies and mobile advertising identifiers, AI can now assist brands in finding new prospects much more quickly by utilizing data to identify customers with similar characteristics and behaviors. This strategy can potentially increase your prospective customer base and give you an advantage over your competitors. You can identify high-priority targets by identifying the demographic categories that overlap. These solutions don’t require cookies and are more likely to comply with escalating privacy requirements because they rely on behaviors rather than personal data.

The automotive sector has modified its strategy and is now embracing digitization. Digital transformation in the automotive industry still has a lot of gaps to be addressed, but the trend toward digitization is a sign that the stakeholders in the automotive sector will be properly supplied with digital solutions in the coming days. With intelligent technology, and operations across the entire company and all departments, including manufacturing, supply chain, marketing, and sales, digital automaking will help the automotive industry to flourish in this digital era. An increasingly digital supply chain will also dismantle established barriers and greatly enhance communication. Undoubtedly, businesses must adopt a more significant digital transformation to be ready in this competitive automotive industry.

Source link

Continue Reading


The 10 Worst Cybersecurity Strategies You Need To Know



The 10 Worst Cybersecurity Strategies You Need To Know

Employees should be trained on basic cybersecurity practices and the dangers of phishing scams.

Granting too many privileges to user accounts can lead to security breaches. Failing to update software on time can leave vulnerabilities open to attacks. 

Organizations should have a disaster recovery plan in place to ensure quick recovery in the event of a cyberattack.

Counting down to the absolutely worst cybersecurity strategies. 

Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you are…

Let’s count them down.  

10. Cyber-Insurance

No need for security, just get insurance. Transferring risk is better than mitigating it!

Famous Last Words: Sure, it should be covered

9. Audit Confidence

Conducting a comprehensive security audit. …and ignoring the results

Famous Last Words: We will close those gaps later…

8. Best Tools, Left Unmanaged

Deploying several good tools, set to autopilot. No need to manage or maintain anything 

Famous Last Words: Security is not that difficult…

7. Regulatory Compliance

Meeting the minimum requirements (defined 2 years ago)

Famous Last Words: Relax, we are compliant!

6. One Good Tool

We just need one good tool (ex. AV) and we are set. 

Famous Last Words: That should do it.

5. IT Dependence  

Cybersecurity is a tech problem, it’s IT’s responsibility. 

Famous Last Words: The IT dept has it covered.

4. Security by Marketing  

Believing the snake-oil (deceptive marketing) salesperson that will ‘solve‘ your security problems

Famous Last Words: We are totally protected now! (or similar derivative from the sales brochure)

3. Default Security Settings  

Products and services come with security built in! 

Famous Last Words: It’s new, shiny, and looks secure. Don’t worry, we should be fine!

2. Security by Obscurity

Nobody knows or cares about us. We are too small to be targeted.

Famous Last Words: We haven’t been attacked yet…

1. Hope, as a Strategy

I hope we don’t get attacked. Let’s move on with more important things.

Famous Last Words: <meek inner voice>> Just don’t think about security because it is too scary, expensive, and complex!


This is the menu that evokes anger, frustration, and pity among cybersecurity professionals around the globe. Eventually it always ends in despair, blame, and a side of tears.

A solid long-term strategic plan is a necessity for an efficient and capable cybersecurity capability. Cybersecurity fails without a proper strategy. 

Source link

Continue Reading