Governments across the globe are realising the true potential of emerging technologies to provide better citizen services and to ensure transparency and accountability. Blockchain is one of the emerging technologies that is helping and will continue to help governments to achieve transformation. Government departments and agencies are being increasingly pushed to be collaborative and share data across agencies, while at the same time maintain the security of the data in their care. A distributed ledger that can share information based on agreed-upon protocols helps governments immensely in collaborating without losing accountability.
What are the key priorities of public sector organisations? The global Ecosystm CX study finds that citizens and employees are the top priorities for government agencies and departments.
Blockchain can help the public sector achieve many of its goals –
Improving Citizen Services
As more countries aim to be eGovernments, there is a need for real-time data access, information management, and fraud prevention. Blockchain is enabling governments to provide innovative services to citizens. It is possible now to decentralise the citizen database, reducing the time and cost of fetching records. Moreover, Blockchain enhances transparency and makes the highly regulated public sector audit-ready by creating a single source of truth for all connected devices and stakeholders.
One of the earliest use cases we see is in records management. Population records are useful for several agencies from healthcare to civil services to welfare departments. In Myanmar, UNICEF has collaborated with the industry to introduce a mobile birth and death registration system based on Blockchain. This digital mobile recording system is maintained on an integrated platform controlled by several parties who maintain birth and death records of Myanmar’s citizens and is a step towards achieving universal registration.
Citizen services such as notarisation, recording and time-stamping events, transactional real-estate contracts, online storing and verification of academic degrees, identity management and so on are benefiting from Blockchain deployment.
In Georgia, the government department of Land, Property and Housing Management is using Blockchain to maintain land and property records. The blockchain-based land registry allows speedier approvals with no involvement of paperwork or multi-party signatures on physical documents. This is enhancing service quality while offering better security measures as the data is digitally stored in the National Agency of Public Registry’s land title database.
Improving Employee Experience
Maintaining massive records about individuals, organisations, assets, activities, location and national information by the government department employees is a time-consuming process. In addition to this, managing and updating the ever-growing records is made more difficult by data silos and information management protocols and of course errors creep in.
Blockchain is streamlining the workflow and information management system at an individual as well as at a departmental level. In government departments, Blockchain can redefine processes by including events and agents in a block-based system where each activity can be easily managed and accounted for. This prevents issues such as miscounts, delayed processes and slipped deadlines.
The Chilean National Energy Commission has piloted a Blockchain platform to regulate the energy sector such as installed capacity, average market price, marginal costs, hydrocarbons and more. To implement this, first the energy data was stored on an Open Energy database which was then distributed across hundreds of secure servers countrywide. Later the employees verified anomalies which minimised their workload and made it convenient to edit the central database. The information added to open ledger is readily available to employees and citizens.
Compliance with Regulations
One of the primary benefits of Blockchain technology in the public sector is compliance. The transactions recorded on distributed ledgers are documented in a central ledger providing a comprehensive, precise, irreversible, permanent and secure trail. For instance, Blockchain is used to streamline cross-border compliance adherence by matching the data with the actual trade transactions. This creates an efficient and secure system ensuring real-time compliance, significant reduction of transaction costs, elimination of customs evasion and fraud from the outset.
In June, the Chinese Customs deployed its cross-border Blockchain compliance solution. The platform aims to increase efficiency by monitoring the flow of imports and exports and helping with risk assessments and document management. As transaction information can be stored safely and transparently on a Blockchain, the platform enables easy identification of documents to be checked, making compliance easier.
Data Management and Privacy
Blockchain acts as a default record keeper for society and governments and prevents the data from being misused by criminals and hackers. Through the responsible deployment of Blockchain data structures, governments can strengthen network security by reducing risks of single points-of-failure and preventing data breaches.
Democracy Earth – a Blockchain-based community has established a decentralised online governance platform, entirely built on open source technologies. The website helps users to cast votes on various policies based on tokens assigned to the users. This also minimises expenses and creates a secure information flow in a Blockchain-based voting system.
Government agencies, such as the U.S. Department of Homeland Security (DHS), are also getting serious about Blockchain applications in data management and privacy. DHS is funding R&D in Blockchain start-ups to explore new approaches to cybersecurity. The U.S. military is also utilising Blockchain (SIMBA Chain) to secure its military communication, messaging and applications. Blockchain is used for communication between ground troops and their headquarters. In addition to securing communications, the US Airforce is using Blockchain to track 3D printed components throughout their life cycle. With SIMBA, the top-secret printing blueprints are shared without much surveillance – this has enabled the Department of Defense to maintain a digital library of parts.
Cost Reductions
The government has clear citizen responsibilities and fulfilling them with a limited set of resources is one of the prime challenges for public departments. Reconciling expenditure with the budget is a time-consuming, and expensive procedure. Blockchain-based payment and accounting systems can help governments to reduce process costs by removing redundancies, streamlining processes, decreasing audit burden and ensuring systems integrity. By removing the requirement for third-party agencies to handle operations and maintain records, Blockchain technology is helping governments to reduce costs.
Blockchain is still an emerging concept with significant benefits. The Ecosystm IoT study finds that only 20% of public sector IT decision-makers are fully aware of the capabilities and limitations of Blockchain. Adopters and developers are still resolving the challenges. On the technology side, there are concerns on platform scalability, integration, standardisation and validation methods. On the management side, there are concerns about business models, transaction scale, maturity, and structure. However, government agencies will benefit immensely from the technology in the near future.
Authored by attending Ecosystm analysts, Sash Mukherjee (Principal Analyst, Government & Healthcare) and Sid Bhandari (Director, Consulting & Advisory Services)
The recently held AWS Public Sector Summit in Singapore showcased some of the regional AWS implementations, and how organisations are leveraging the Public Cloud differently.
In her keynote address, Teresa Carlson, Vice President, Worldwide Public Sector set the tone for the industry show cases by saying that a successful Digital Transformation (DX) starts from a radical rethinking of how an organisation uses cloud computing technology, people, and processes to fundamentally change business performance.
AWS Empowering the Public Sector
Carlson is clear on what Public Sector organisations must do and where AWS can help them:
- Define what Cloud refers to in the organisation. The first step in bringing about a Cloud First transformation is to be clear on the true definition of cloud computing.
- Create a “Cloud First” policy. To adopt a Cloud First policy, it is imperative to have leaders with a clear vision who really drive technology initiatives forward for all the right reasons like security, cost reduction, scalability, privacy and rapid acceleration of citizen services.
- Focus on Security & Compliance. AWS has global compliance certifications with 200+ services and key features focused on security, compliance and governance. New services such as the use of AI for threat detection have been implemented and are quickly evolving into a mainstream feature.
- Modify your Procurement vehicle. A formal cloud procurement model must be adopted instead of creating ad-hoc processes and a rush to adopt cloud to meet the specific needs of individual departments. AWS has the expertise to assist government IT leaders in selecting the right acquisition approach for their agency.
- Do not ignore Skills Development. Investing in cloud skills development – whether at the central IT level or in the individual business units in the Public Sector – is imperative, as roles evolve and new roles emerge. AWS has over the years offered free courses and industry certifications to Public Sector employees interested in learning the foundations of cloud computing, storage, and networking on AWS to advanced skills courses in emerging technologies such as AI.
Ecosystm Comment:
While cloud may have started off as a means of offsetting CapEx, its role has since evolved into being a major vehicle for DX. Several governments across the world have adopted Cloud First policies to spearhead innovation, increase agility, and improve citizen services. Cloud is increasingly seen as a foundation for many emerging technologies that governments are experimenting with and implementing such as AI, automation, Big Data analytics and Smart Nation initiatives.
The skepticism around Public Cloud security seems to have diminished over the years, with the perception that cloud providers use state-of-the-art technologies to protect their environment and continue to upgrade their security features in the face of new and evolving threats. However, the Ecosystm Cybersecurity study finds that nearly 53% of Public Sector and allied organisations that use Public Cloud feel that the security measures offered are sufficient. Leading cloud providers such as AWS should make it clear that essentially it is a shared responsibility and impress on organisations that the responsibility to secure their own applications and the interface with the Public Cloud ultimately lies with the deploying organisations.
Industry Use Cases
There were several industry use cases presented over the 2 days and it was heartening to see so many Asia Pacific examples of transformation. Tan Kok Yam, Deputy Secretary, Smart Nation & Digital Government Office shared that the key to a successful Smart Nation initiative is to build user-centric services rather than having an agency-centric approach, in his presentation on Singapore’s “The Moments of Life” app. Edwin H. Chaidir, IT Manager at WWF Indonesia presented on how AWS’s machine learning capabilities has helped the organisation to automate identification of specific orangutans in the wild, freeing up resources (money and time) to reinvest in other wildlife protection initiatives.
One of the implementation stories that impressed the Ecosystm analysts was the one shared by Rookie Nagtalon, Consultant for Digital Transformation at the Chinese General Hospital and Medical Center (CGHMC) in the Philippines, where he spoke about how they were able to bring about transformation in their patient life-cycle management. Healthcare in Asia Pacific is a diverse and disparate market with organisations at different levels of IT and business maturity – against a backdrop of different country-level goals and healthcare policies. It was encouraging to hear about a transformation project in a not-for-profit organisation from an emerging economy.
The challenges that healthcare organisations face are unique in many ways:
- Legacy systems that still work and hence there is no business case for replacing them
- Approximately 2/3rd of the IT budget going into running the basics, leaving limited resources for emerging technology adoption and transformation projects
- The shift to value-based healthcare and the need for data-driven insights to support it
- The unpredictability of the workload and the need for an agile IT infrastructure
- Security and compliance mandates that protect patient data and require storage of records over extended periods
Working with these challenges, how does a healthcare organisation bring about Digital Transformation?
Nagtalon’s team was assigned the task to bring about this transformation within a 10-month timeframe.
- The key challenge. An awareness that no one vendor can provide the entire gamut of functionalities required for patient lifecycle management. In spite of recent trends of multi-capability vendors, hospitals need multiple vendors for the hospital information system (HIS), ERP, HR system, document management systems, auxiliary department systems and so on. Each of these vendors have their own development team and infrastructure requirement, which stresses the internal IT resources. DX involving multiple legacy systems requires a step-by-step approach. The challenge is to identify the right systems to start the journey with.
- Vendor selection criteria. The need to find one solution that would enable seamless data sharing across the disparate systems. The vendor selection criteria that were used focused on ease of use and speed especially when working with multiple data sources. In keeping with the industry, the ability of the vendor to support mission-critical applications was put through the filter of what was referred to as ‘Code Blue’.
- The solution choice. A cloud solution that can empower teams and remove worries about the infrastructure. The hospital chose AWS as their transformation partner, who used a system interface blueprint to integrate data from their SAP ERP system, Medcurial’s MeRx HIS, 128 HR system, Canon’s documentation system and multiple diagnostics systems.
- The future roadmap. Enabling the organisation to be a Digital Hospital. The solution was implemented in 7 months and hit the right ROI requirements, reducing billing time and impacting the bottom line in terms of both recovery and revenue. It has created the base foundation for future plans such as device integration and the provider is well set on its journey of Cloud, IoT and Robotics.
Ecosystm Comment:
Nagtalon raised an important point when he was asked the key reason for the success of the project – executive buy-in. Transformation projects work best when it is enterprise-wide and senior management sponsorship is a must to enable that. However, he also mentioned humorously that he had become extremely unpopular during the implementation. This is where a centre-of-excellence with ‘champions to the cause’ from each key department helps. Organisations should look to engaging with the stakeholders early and to get their buy-in as well as the executive’s.
AWS’s marketing message to healthcare providers includes allowing them to focus on their mission and create their differentiation, and enabling them to incorporate new and emerging technologies. This implementation certainly ticked those boxes. What was particularly positive was the big thumbs up the AWS implementation team received. Organisations will increasingly partner with platform providers in their transformation journeys and implementation capabilities and best practice guidance will be the key differentiators for vendors.
According to a recently released report from Mercer measuring resilience against ageing society and job automation among workers aged 50 and above, Asian countries were the least prepared to combat the threats, out of the 20 major economies worldwide.
Newer technologies such as artificial intelligence and robotics have given rise to the adoption of Industry 4.0, replacing traditional tools and ways of working. With the rise of automation low skilled workers, technicians, operators and maintenance roles are at high-risk, especially amongst workers aged 50 and over.
The index revealed the rankings where the top 3 spots were given to Denmark, Australia and Sweden and moving towards the second half of the list, Singapore was ranked 13, ahead of Japan (17), China (18) and South Korea (20).
Commenting on the threat of ageing population and job automation, Audrey William, Principal Advisor at Ecosystm said, “Automation is high in most of the mature markets in the Asia Pacific and older workers face the greatest threat as a result of job automation. Governments are concerned as it will not be easy to sustain living costs and grow the economy if the ageing population is unemployed. Mental health issues including depression can also set in when workers think they are no longer relevant. This further burdens the government with higher healthcare costs.”
Possible reasons for Asia falling behind in the index
While automation is on the rise, Asia is still lagging when it comes to the mitigating the risk of automation on older workers. One of the reasons for this is that “governments did not predict the full impact of Automation and AI, and hence did not create a plan in the previous 10 years and are unprepared to handle this issue. In addition to this, a lack of coordination between the government and industry to mitigate the threats through upskilling programs and new courses for workers was also missing. For several regional governments, especially Singapore, this is now a top priority for the coming years,” said William.
Singapore most resilient in Asia
According to UN data from World Population Prospects 2019, for the first time in history, in 2018 persons aged above 65 outnumbered children below 5 years of age globally. The number of people aged 80 or over is projected to triple, from 143 million in 2019 to 426 million in 2050. The elderly population is growing while at the same time the working-age population is shrinking.
It is expected that by 2030, 35% of the employees in Singapore will be above the age of 50 and the country will have to tackle the challenges of an ageing population and job automation among older workers.
Just a month ago the Singapore Government announced that it would raise the retirement and re-employment criteria in stages thus filling the gap by adding extra years before retirement and re-employment opportunities for older workers.
“The costs of redundancies and other associated social costs will mean governments will have a lot to budget for in the next 20 years. Job loss because of automation is inevitable in mature Asian countries. There will be room for older workers to be trained to work alongside machines and robots. Whilst the ageing population is a threat, it represents a huge opportunity to expand the labour pool by upskilling the baby boomers,” said William.
Preparedness to manage ageing and automation
We are seeing a trend that as automation and AI permeate every business there will be more programs developed to manage ageing and automation. “We are living in the era of the gig/freelance economy and the trend is pertinent in mature economies. Even the younger generation will have to work with different employers – which can be positive as it gives the opportunity for workers to acquire new skills,” said William. “As customer experience becomes increasingly significant there will be a need for human touch and empathy, amidst all the process automation – actually older workers are equipped to do a better job at that. So, there could be programmes in place for older workers to play an important role in customer-facing roles in the future.”
In addition to this, governments can introduce some measures and drive initiatives to manage the problems. William suggests:-
- Introducing free learning courses for older workers – short courses that come with certification
- Mentoring the older generation, introducing skills transfer programmes and make it mandatory for all companies to adhere to the programme
- Working with colleges and universities to foster shorter courses for the ageing population at a subsidised cost, discounted rates or easy instalments to help them acquire certain skills that will be relevant in the next 10 years.
The older population can continue to have a positive socio-economic impact. Government support will be a key factor in ensuring that the ageing population is equipped to handle automation and changes in job scopes.
A group of some of the world’s largest technology companies including Alibaba, ARM, Baidu, Google Cloud, IBM, Intel, Red Hat, Swisscom, and Tencent have come together to form “Confidential Computing Consortium”, an association established by the Linux Foundation to improve the security of data while in use, and hosted by them at ConfidentialComputing.io.
Confidential Computing Consortium aims to define and accelerate the adoption of Confidential Computing by bringing together a community of open-source technologies and experts.
New Cross-Industry Effort
There are many government agencies, consortiums, and software and hardware vendors working on data security so a key question here is “who needs it?”
Commenting on CCC, Claus Mortensen, Principal Advisor at Ecosystm said, “whether this is really ‘needed’ is a matter of perspective though. Many would argue, that a project driven by technology giants is contrary to the grassroots approach of earlier open source projects. However, Confidential Computing is a complex area that involves both hardware and software. Also, the stakes have become high for businesses and consumers alike, as data privacy has become the focal point. Arguably, the big tech companies need this Open Source initiative more than anyone at the moment.”
How CCC would benefit enterprises and business users?
With the increasing adoption of the cloud environments, on-premise servers, the edge, IoT and other technologies, it’s crucial for enterprises to increase the security of the data. While there have been approaches to encrypt data at rest (storage) and in transit (network) it’s quite challenging to fully encrypt the data life cycle and that’s what Confidential Computing aims to solve.
Mortensen said, “when it comes to data security, the actual computing part of the data life-cycle is arguably the weakest link and with the recent increased focus on privacy among the public, this ‘weakness’ could possibly be a stumbling block in the further development and update of cloud computing.” Mortensen added, “that doing it as part of an open-source initiative makes sense, not only because the open-source approach is a good development and collaboration environment – but, crucially, it also gives the initiative an air of openness and trustworthiness.”
To drive the initiative, members have planned to make a series of open source project contributions to the Confidential Computing Consortium.
- Intel will contribute Software Guard Extensions (SGX) SDK to the project. This is hardware-based memory level data protection, where data and operations are encrypted in the memory and isolated from the rest of the system resources and software components.
- Microsoft will be sharing the Open Enclave SDK to develop broader industry collaboration and ensure a truly open development approach. The open-source framework allows developers to build a Trusted Execution Environment (TEE) applications.
- Red Hat will provide its Enarx to the consortium. – an open-source project aimed at reducing the number of layers (application, kernel, container engine, bootloader) in a running workload environment.
Mortensen said, “like other open-source initiatives, this would allow businesses to contribute and further develop Confidential Computing. This, in turn, can ensure further uptake and the development of new use cases for the technology.”
How Data Security Efforts will shape up
Confidential Computing is a part of a bigger approach to privacy and data and we may see other possible developments around AI, in distributed computing, and with Big Data analysis.
“Initiatives that can be seen as part of the same bucket include Google’s “Federated Learning” where AI learning on data is distributed privately. This allows Google to apply AI to data on the users’ devices without Google actually seeing the data. The data remains on the user’s device and all that is sent back to Google is the input or learning that the data has provided” said Mortensen.
Consequently, Confidential Computing seems to ease matters for data security at this point and the collaboration expects the results will lead to greater control and transparency of data for users.
Let us know your opinion on the Confidential Computing Consortium in the comments.
In an industrial backdrop, drones are forming a core part of automation. Drones are Unmanned Aerial Vehicles (UAV) that can be controlled remotely or can fly autonomously with defined coordinates working with onboard GPS and sensors. The basic functionality of drones is to collect specific information about an environment and relay it back to the controller.
Industry 4.0 sees several use cases for drones. UAVs are the next-generation technology for industrial sensors and IoT. Industrial drones operate under difficult conditions – in regions where humans cannot physically inspect the environment such as in hazardous or hard to reach areas. While they are primarily sensors, they are also being programmed to act of the information gathered.
So what are the industrial applications of drones?
Some industries are more enthusiastic about the application of drones. In the global Ecosystm IoT Study, organisations that have implemented or plan to implement IoT in the next 12 months were asked about the adoption of drones for asset management.
Construction
Industrial IoT is opening up opportunities for construction organisations. IoT devices have the potential to increase efficiency of construction sites and drones are one of the devices that can enhance safety and site operations. Instead of deploying heavy machinery and expensive tools, drones offer the capabilities to survey industrial sites to providing greater accuracy to building maps, QC processes, documenting project details – while reducing costs and project duration.
KIER, a construction and property group in UK is utilising drones to capture project progress, take 360 photographs and use it for photogrammetry (using photographs to model real-world objects and scenes). The benefits that the company reports include digital asset management and data insights, which in turn lead to cost reductions.
Drones will become an integral part of the Construction industry, to a large part because of safety and compliance requirements – and the industry needs to be prepared for it. UK’s Engineering Construction Industry Training Board (ECITB) has launched a training course and program for industrial drone operators to attain and develop the skill to safely fly drones and operate industrial equipment that has specific operational hazards and constraints.
Energy and Utilities
This is another industry group that can benefit in a similar way from drones. Drones can perform hazardous jobs otherwise performed by humans such as surveying transmission lines, inspecting plant boilers, monitoring the health of solar panels, assessing storm damages and even repair faster. The industry has been traditionally using helicopters but drones are a lower-cost alternative – both for procurement and maintenance.
It is easy to see why Laserpas, one of the largest Utility Asset Management Companies in the EU is using drones for their workflow automation initiatives. Laserpas surveys power grid infrastructure, including power lines, transmission towers, adjacent areas and so on, with the help of drones. The drones are gathering data for AI-driven data analysis to increase the efficacy of their high-precision monitoring solutions
Laserpas is by no means alone – AT&T is using drones to avoid service disruption through aerial monitoring of towers, replace faulty parts and create portable cell towers in mission-critical areas.
Government
Perhaps the earliest adopters of drones were a military defence in several countries. However, the use cases in Government are not restricted to that – it involves public safety and logistics in several Government agencies. They have become the means for agencies to gather data – both for situational awareness and scientific purposes – in a more efficient manner.
The ability of UAVs to cover large areas in a short time is helping emergency teams in search and rescue operations. The example from UK where a man involved in a crash was rescued from freezing temperatures by police drones, is a case in point. The emergency unit equipped a drone with a thermal camera that was able to locate the man in a six-foot deep ditch more than 500 feet from the crash site. There are examples of Public Health as well. In a municipality in Spain, mosquito control programs are using drones to conduct surveillance in likely breeding sites that are hard to reach. Once larval habitats are identified, drones are also programmed to spray pesticides to the area. Transport drones are also being used by Public Health agencies. Ghana’s government uses drones to supply blood and other critical medical supplies to remote areas. It has had a positive impact on the nation’s overall medical supply chain and the Ghana Civil Aviation Authority have plans to create an air corridor for the drones to prevent collisions with larger aircraft.
Perhaps the biggest use case for drones in Government will come from public safety measures. The Washington State Patrol has built up a fleet of 100 drones and using them for maintaining law and order in the state and for wide range of purposes including surveillance of armed and barricaded suspects and search and rescue operations. This will probably see a higher uptake than other solutions in Government.
Hospitality, Retail and Logistics
Though the adoption of drones in these industries is not yet as widespread as in others, there is tremendous potential in inventory and supply chain management. Walmart has conducted pilots on drones for warehouse management which has now been moved to implementation. Using drones reduces the need for heavy assets such as forklifts and conveyor systems.
UAVs are the best new way of tracking inventory using tracking mechanisms such as RFID and QR-codes UPS has set up a subsidiary that uses drones for delivery. Companies such as DHL, Amazon, and Google are developing and experimenting with drones to speed up delivery, especially for lightweight consumer goods. Drones not only help with inventory management but also ensures last-mile delivery.
The Hospitality industry has gone beyond logistics in their business application of drones. Examples are broad including creating marketing videos for properties, aerial site maps to help guests and staff members navigate sprawling grounds and surveillance. Drones make it possible to create a 3D virtual environment for security teams to monitor hotel perimeters, parking lots and outdoor venues effectively. This is more economical than hiring a full-time security crew for surveillance cameras and 24/7 monitoring. The Seadust Cancun Family Resort has a lifeguard drone that helps real lifeguards by supplying safety equipment and emergency floatation devices.
Agriculture
Drones are a major component of smart farming techniques and operations where farmers can benefit from real-time information about large tracts of land.
“An ‘eye in the sky’ by way of a drone, can save days for farmers and help them in checking stock, crops, and fences, battling weeds, and even mustering cattle. Simultaneously, they can provide data to help farmers make more informed decisions around applying fertilizer, disease detection, and about managing health and safety on farms,” says Jannat Maqbool, Principal Advisor Ecosystm. (Read Jannat’s Report on IoT in Agriculture: Drivers and Challenges)
Yamaha is working with farming communities in several countries to use UAVs to spray weed killers. Drones are utilised to spray the crops applying small quantities of pesticide or fertilizer to crops, orchards and forested areas. GPS coordinates create flight paths to aim for maximum coverage. This is leading to process automation in Agriculture – an essential component of smart farming.
Drone have started to prove their worth in various industries across applications and organisations across the globe are working to integrate drones into their operations. As laws mandating them to become clearer, more industries will look to leverage drones for automation.
Which are the other industries that will see a steady uptake of drones in the near future? Tell us your thoughts.
Innovation is often fuelled by the evolution of technology, which unlocks greater potential for businesses. Artificial Intelligence (AI) is often considered the trendiest of today’s emerging technologies, viewed as the real enabler of innovation. Many businesses are adopting AI and investing in AI-based solutions. However, every emerging technology faces the same stumbling block – trust. AI has been no different and despite the growing adoption, not everyone is ready to jump on the AI bandwagon yet.
The other major stumbling block for AI has been the inability of the common man to grasp the implications of the technology and differentiate it from what has been depicted in Science Fiction and dystopian novels. There is also confusion in the mind of technologists on the definition of AI. Some experts will say that only Deep Learning with non-linear algorithms is AI, while most vendors promote their automation tools like AI. A few misconceptions have hence arisen regarding AI, its uses and its impact on the workforce and society.
#1 AI is a new technology
Despite recent hype around the technology, AI is not a new technology and not a product of this century’s innovations. The beginnings of AI can be traced to the middle of the 20th century and then it gained pace. During the second world war, an English mathematician and computer scientist, Alan Turing documented his ideas on creating an intelligent machine. Turing’s test theory proposed that if a machine could engage in full conversation with no detectable variances from a human, the machine could be deemed as a thinking machine. Turing worked to crack the German military’s encryption, the ‘Enigma’ code.
Later in 1956, American computer scientist John McCarthy organised the Dartmouth Conference, where the term ‘Artificial Intelligence’ was first used.
Today, AI is a much broader term and refers to a range of technologies from Automation to Deep Learning.
#2 AI can replace the human brain – completely
Humans have evolved over millions of years from being hunter-gatherers to agricultural societies to a modern-day man who can succeed in secondary and tertiary industries. We have adapted, evolved and became good at surviving in the real world. Despite this many people hold an opinion that AI will replace the driving force of one of the most complex machines on this planet – the human brain.
AI has clearly come a long way. Its ability to learn vast amounts of data, recognise patterns, and produce results is improving us in countless ways. However, the problem with achieving true AI is also its greatest strength – that it does not learn like a human. The technology behind AI is scientific and complex and building a competitive AI from scratch requires expensive specialised talent. For instance, a successful image recognition solution is more accurate than most humans, but the same coding cannot address another type of problem.
AI cannot replace a complex structure of neurons and humans will continue to use their intelligence for more innovation. Humans do and will continue to, play a major role in most AI applications, especially critical ones in research and medicine. Each of our innovations has made the race more productive, and that is what AI will further add to the human race.
#3 AI poses a threat to security & privacy
While the benefits of AI and Big Data technologies are being felt, people also consider them as a threat to their anonymity and privacy.
With online social accounts, digital identities and other digital data gathering entities – both private and government – privacy has become a pertinent question. With the emergence of sophisticated AI systems, these privacy concerns have been aggravated. AI brings the ability to fetch, combine, and analyse a huge quantity of data from varied sources. The impression is that AI can perform these designated operations with no supervision and there is fear that humans will lose control of a system entirely. Instances of data and privacy breaches heighten this fear.
This fear may be unfounded. Today, AI systems can simplify user privacy policies on websites, which most of the users do not bother to read and simply click on the ‘Accept’ box. Polisis is an AI-powered automated analysis tool for privacy policies. Polisis pulls a website’s privacy policy and takes around 30 seconds to interpret it, display a summary, and present a flowchart of the policy with highlights on how the online service will handle user data. An AI-powered chatbot called PriBot, answers questions about the privacy policy of any company.
In reality, AI technologies are being utilised to create a safer and more secure society. AI brings speed, scale, and automation to computing and is changing the way we work, live, and interact. We are guiding AI capabilities for better healthcare provision, citizen safety, research accuracy, and even enhanced cybersecurity. Very often, the data used by these algorithms are aggregated and anonymised.
#4 AI will replace jobs
There is an abundance of fear, uncertainty, and doubts about the risk and opportunity of AI. Will it create jobs or destroy them?
There is no doubt that AI is poised to transform jobs and will change the face of employment. It is easier to see existing jobs disrupted by new technology than to envision what new jobs the technology will enable. AI is poised to replace tasks, not jobs. Some functions – and sometimes all the functions – of an individual or team might be automated. Employees with no plans or desire to re-skill should be concerned, but those who are continuously improving and changing their skill sets need not be too concerned that automation will put them in an unemployment queue.
“While businesses will face pain, as they adjust to new lower cost and higher productivity expectations – and employees will need to continually update their skills – the overall assessment is for jobs growth. It is just that the jobs created will be different to the jobs that exist today”, as Tim Sheedy (Principal Analyst, AI & Automation, Ecosystm) puts it in his report Automation Will Transform Jobs – Plan for Change Now
Read Report – https://www.ecosystm360.com/#/link?type=report&id=155b38c6-3764-4715-a9ad-1ec6447260ac
A few businesses today are creating Automation Teams or Centres of Excellence – banks, telecommunications providers and utilities are leading this push. With continued effort, AI will eventually become intelligent enough to understand the tasks and make them easier for the workforce. Employees need to trust, use and maximise the full potential of the technology, and see its benefits for scaled implementation.
The NAB Cloud Guild is a good example of how organisations should provide training to not just technology staff but to any interested employee, on emerging technologies to equip their business for future demands.
#5 AI is implemented only by large vendors
AI is driving many Digital Transformation (DX) projects and large vendors, especially with platform and enterprise capabilities, have had the first movers’ advantage in AI deployments. Businesses are striving to make their systems more intelligent for better process automation and customer retention. After 40 years of automating manual tasks using enterprise applications (such as ERP, SCM, and CRM), intelligent systems will make many of these systems redundant – or at the least reduce business reliance on them.
One of the big challenges for large businesses – and their IT teams – today is to customise their AI to their organisations’ DX requirements. Many companies have made their first foray into the world of AI – often starting with technologies such as RPA, IoT sensor analytics, and chatbots. They are now looking to go beyond evolving their RPA solutions into Smart Process Automation (SPA) solutions. They are also going beyond basic chatbots/ virtual assistants to implement NLG and semantic computing, as their customer focus deepens. For these large enterprises, integration of AI solutions with internal systems and other AI solutions is the key challenge, and they often prefer to partner with their existent enterprise vendor or systems integrator for their AI implementations.
However, smaller organisations and start-ups are equally leveraging AI. Several tech start-ups also exclusively focus on AI and are developing a niche, industry-specific solutions. These smaller solution providers will probably be integrated into larger vendors’ partner ecosystems, as their capabilities deepen, and their customer base grows. Organisations need not look to only larger, established vendors for their AI implementations.
AI is still an emerging technology and it might take some time for AI to be trusted. The truth, however, is that AI opens up immense possibilities for individuals, enterprises, and governments.
Do the supposed threats outweigh the benefits of AI? We would very much love to hear your suggestions, ideas, and thoughts on this subject.

Apple and Intel have signed an agreement where Apple will acquire Intel’s smartphone modem business for a deal valued at $1 billion. Apple will gain Intel’s Intellectual Property, equipment, leases, and approximately 2200 Intel employees will join Apple.
The deal is Apple’s second-largest ever after its $3.2bn purchase of Beats Electronics in 2014. The deal is expected to close at the end of the year and Intel will continue to develop modems for non-smartphone applications such as industrial equipment, autonomous vehicles and personal computers.
What Apple has really acquired from Intel?
Beyond getting 2,200 employees from Intel’s modem group along with the accompanying 17,000 patents, Apple now has the intellectual property to develop a modem that can be integrated with Apple (system-on-a-chip) or SOC.
Commenting on Apple’s acquisition of Intel modem business, Ecosystm Executive Analyst, Vernon Turner said “given its performance-driven and highly vertically integrated product line, Apple had its own ambitions to build its own modem. However, despite being capable of building chips, Apple lacked the knowledge to build a modem. To solve that issue, it would always have had to license patents from a 3rd party, unless they buy the company that has the patents instead.”
Aligning with the fifth generation
The acquisition of Intel modem business displays Apple’s ambition to ramp up on 5G technology. The foothold in the 5G modem business is also expected to reduce Apple’s reliance on Qualcomm, its modem supplier. Speaking of the competition, Apple’s global rivals in the handset business – Samsung Electronics and Huawei – already produce their own modem chips.
“Apple has a lot of catching up to Samsung and Huawei in the 5G modem market, and while it has now gained technology from Intel, there is still a significant gap and it will be a haul for Apple to suddenly catch up and overtake them,” said Turner. “Apple’s modem supplier, Qualcomm isn’t likely to be worried by this news either – it too has a lead of several years. The bottom line is that Apple didn’t have a lot of options to turn too if it wanted to be in control of as much of the phone IP stack as possible. It purchased a modem supplier that was perhaps the weakest in the market and had already thrown in the towel on their mobile modem business.”
Apple will take some time to absorb the Intel team into its business and likewise with the modem roadmap. The deal is a step in Apple’s journey to make all of its own smartphone chips and having a more self-sufficient supply chain.
7th Personal Data Protection Seminar, Minister for Communications and Information S. Iswaran announced a framework to bolster Singapore’s digital economy and to drive Singapore’s vision of turning the country into a regional data protection hub.
At theThe Personal Data Protection Commission (PDPC), which oversees the country’s Personal Data Protection Act (PDPA), has developed a new framework to better support organisations in the hiring and training requirements of Data Protection Officers.
Why the Need?
PDPA has been around for a while and the new framework is brought into practice to enable a greater focus of government and organisations on data privacy. According to Ecosystm’s expert on GDPR and Data Privacy, Claus Mortensen, “the initiative reflects the difference between ‘theory’ and ‘practice’ when it comes to data security. PDPA is not making changes to the present regulatory framework, but they are putting together a program and guidelines for how companies can apply and abide by the present regulatory framework.”
Ensuring PDPA framework compliance
The PDPC plans to collaborate with the National Trades Union Congress (NTUC), Employment and Employability Institute (e2i) and NTUC LearningHub to create a year-long pilot training program to train at least 500 data protection officers in its first intake. The Data Protection Officers would help to manage the complex and highly sensitive task of data flows.
To ensure the data flow mechanisms and to ensure security, Infocomm Media Development Authority (IMDA) has been appointed as Singapore’s Accountability Agent (AA) for the Asia-Pacific Economic Cooperation (APEC) Cross Border Privacy Rules (CBPR) and Privacy Recognition for Processors (PRP) Systems certifications. IMDA will allow Singaporean organisations to be certified in APEC CBPR and PRP Systems for accountable data transfers.
“The PDPA requires a data protection officer to be appointed in every organisation. This framework is focused on educating and certifying these officers. However, it mostly makes it easier for slightly larger companies who can afford to send employees on longer training programs or who are able to hire people, who have taken the certificates. Smaller organisations – such as start-ups – would benefit more from detailed guidelines and from on-premises guidance. Establishing a framework for such services could be the next area of focus for the PDPC.” said Mortensen.
Legislature for the data handling and exchange practices
The private data has become an increased target of hackers as well as an international commodity. Attackers always mine the cyberspace for any leaks or financial information that they can exploit to their advantage.
“Managing sensitive data is notoriously complicated – especially for ‘legacy’ companies that still have or rely on non-digitised data. Even when all data is digital, employees may have copies on their PCs, they may have partial backups on removable media, some data may need to be shared with sub-contractors, moved around between cloud providers, etc. This can make it very difficult to map out PDPA relevant data in the organisation. Even when the data has been mapped, it can be difficult to ensure that all business and data processes are compliant. This is where on-premises guidance can make a difference,” said Mortensen. “While the government clearly aim the new framework initiatives at helping SMEs, it will help further protect consumer’s sensitive data.”
Importance of Cyber Security
A business harnessing digital technology can’t afford to gamble with sensitive data and rising cyber-attacks. The government is taking initiatives by forming guidelines and regulations to prevent cyber-attacks, but it is the responsibility of businesses to have a cybersecurity strategy in place to prevent a breach. If a business becomes a victim of hacking, it is perceived as a failure to the company.
The government passed the PDPA law and compliance to ensure that businesses understand the importance of cybersecurity. Therefore, every business, organisation or academic institution must ensure compliance with the data protection act and must have security best practices to safeguard the data of its customers.
The nature of the workplace has changed over the years and so has the number of devices being used by today’s employees. More and more organisations are adopting a ‘Mobile First’ strategy – designing an online experience for Mobile users before designing it for the desktop/ Web. This is a paradigm shift from the past, where enterprises modified or adapted their websites, business processes and digital means of communications, to fit Mobile users.
Mobile First Drives the Adoption of UEM
Mobile First application designs take into consideration that Mobile users are constantly on the move. Information needs to be presented to them on smaller screens/displays with multi-media interfaces (voice/video), and multiple network connectivity options (Wi-Fi, cellular, and so on).
The global Ecosystm Mobility Study reveals that 73% of organisations have a Mobile First Strategy in place and are at various stages of implementation. About another 25% of organisations feel the need for a Mobile First vision and are formulating a strategy.
With Mobile First strategies, organisations are adding a wide range of devices and operating systems (OSs), regular innovative mobile-centric workload rollouts, new mobile apps across multiple functions, and IoT initiatives. As a result, organisations now have the need to support multiple devices and endpoints (including IoT sensors and wearables) multiple OSs, applications, and mobility policies such as BYOD. Organisations struggle to manage these devices, their data, apps and software updates across heterogeneous OSs and platforms. “The way companies are growing and fuelling their teams with devices now, shows the trend that these organisations will follow in the next few years, which will require a higher level of sophistication from the Unified Endpoint Management (UEM) solutions in the market,” says Amit Sharma, Principal Advisor, Ecosystm.
How does UEM Help?
An UEM solution can configure, monitor and manage multiple OSs, devices including IoT sensors, and gateways, and
- Unify application and configuration
- Manage profiles
- Monitor compliance
- Enforce Data Protection policies
- Provide a single view of multiple users
- Collate data for Analytics
It can ease the burden of management activity of internal IT teams and allow organisations to create a more streamlined lifecycle that secures mission-critical technology. It can also offer proactive threat monitoring, access control and identity, and patch management.
A good UEM solution provides IT managers with a transparent and traceable overview of all endpoints within the network as well as the power to manage all connected devices from a single platform. It maps out the network setup and structure by carrying out a complete inventory of all network devices, configurations, installed software, and the drivers for endpoint subsystems.
There are simply too many endpoints within Industrial IoT (IIoT) for IT managers to efficiently monitor manually. Mistakes will be made, and opportunities to stop breaches before they escalate will be missed. “An UEM solution not only shows the software and licensing situation but scans the IT environment for any irregularities or vulnerabilities and allows risk assessment and patch installation where it is necessary”, says Sharma. “Providing IT administrators with automated vulnerability management will enable them to filter and set search criteria by device, security vulnerability and threat level for the higher and most timely degree of protection.”
Industry Adoption of UEM
Customer-focused industries, with mobile workforces, are adopting UEM faster than other industries. The global Ecosystm Mobility study found the top industries that have implemented UEM or plan to in the near future. Most of the top industries cater to a high percentage of mobile workers. Their need to adopt UEM can come from different angles. According to the study, the Telecommunications industry leads in Mobile Content Management (MCM) adoption, and mobile apps for logistics and operations appear to be the key driver for the industry uptake of Mobile Applications Management (MAM).
Other industries to look out for in the future are Banking and Healthcare, as they lead the pack when it comes to MDM adoption. Banks are incorporating technologies, such as mobile banking, and enabling payments via smartphones to provide enhanced services to customers. We have also seen the advent of Smart Point of Sale devices which are managed remotely on cloud infrastructure and these millions of devices will also be required to be managed by the banks that issued the devices.
The healthcare industry is another vertical where we can expect a higher uptake of UEM in the coming years. Clinicians and care providers are increasingly mobile, switching from device to device, depending on the task and location. Accessing mHealth applications and patient data from any device securely enables caregivers to focus on patients and outcomes. It also allows them to complete critical tasks from any device whether they are on call or off work. UEM makes HIPAA, SOC 2 and other healthcare regulation compliance easy for the providers.
Challenges of UEM Implementation
User experience must be at the centre of any mobility initiative. If the device, app management, or content is not something users want or are able to use, then it simply will not be adopted. The success of an UEM solution lies in the ability of users to quickly authenticate and gain seamless access to corporate apps and data from their devices. Users should also have access to self-service tools that help them manage basic device features and troubleshoot problems quickly.
“We can expect most Enterprise Mobility Management (EMM) and MDM suites to migrate to complete UEM suites that manage personal computers, mobile devices and Internet of Things (IoT) and Enterprise of Things (EoT) deployments,” forecasts Sharma. “Organisations should look for a purpose-built UEM solution which is platform-neutral and which cultivates a thriving ecosystem of complimentary mobile solution providers.”
However, there are several challenges that organisations face when they are developing and deploying an UEM solution. Sharma lists the top UEM implementation challenges that can be broadly classified into the following five categories.
“As AI finds its way into mobile devices and virtual personal assistants proliferate in offices and boardrooms, IT admins will have to manage more – and more sophisticated – endpoints. AI will continue its push into mobile hardware and enterprise communication devices, challenging IT shops’ EMM capabilities while at the same time offering potential security benefits.” Sharma adds. “Also, in 2019, voice-activated assistants such as Amazon Alexa and Cisco Spark Assistant will find their way into more corporate offices and conference rooms – becoming yet one more enterprise device encouraging the adoption of an UEM strategy.”
Have you adopted an UEM strategy in your organisation yet? Share your experience with us in the comments section.