Telstra and Microsoft Partner to Enhance and Enable the Built Environment

5/5 (1)

5/5 (1)

Telstra and Microsoft have extended their partnership to jointly build solutions harnessing the capabilities of AI, IoT, and Digital Twin technologies in Australia. The partnership will also enable both companies to work on sustainability, emission reduction, and digital transformation initiatives.

The adoption of cloud and 5G technology is already on the rise and creating opportunities across the globe. The Microsoft-Telstra partnership is set to bring together the capabilities of both providers for businesses in Australia and globally. Their focus on AI, IoT, cloud and 5G will enable Australia’s developers and independent software vendors (ISVs) to leverage AI with low latency 5G access to drive efficiency, and enhance decision making. This will also see practical applications and new solutions in areas like asset tracking, supply chain management, and smart spaces to enhance customer experience.

Technology Enhancing the Built Environment

Microsoft Azure and Telstra’s 5G capabilities will come together to develop new industry solutions – the combination of cloud computing power and telecom infrastructure will enable businesses and industries to leverage a unified IoT platform where they can get information through sensors, and perform real-time compute and data operations. Telstra and Microsoft will also build digital twins for Telstra’s customers and Telstra’s own commercial buildings which will be initially deployed at five buildings. Upon completion, the digital twin will enable Telstra to form a digital nerve centre and map physical environments in a virtual space based on real-world models and plot what-if scenarios.

Telstra CEO, Andy Penn says, “If you think about the physical world – manufacturing, cities, buildings, mining, logistics – the physical world hasn’t really been digitised yet. So, how do you digitise the physical world? Well, what you do is put sensors into physical assets. Those sensors can draw information around that physical asset, which you can then capture and then understand.”

Ecosystm Principal Advisor, Mike Zamora finds the comment interesting and says, “It isn’t so much that the physical world is digitized – it is more about how digital tools enhance and enable the physical world to be more effective to help the occupier of the space. This has been the history of the physical space.  There have been many ‘tools’ over time to help the physical world – the elevator in the late 1880s enabled office buildings to be taller; the use of steel improved structural support, allowing structural walls to be thinner and buildings taller. These two ‘tools’ enabled the modern skyscraper to be born.  The HVAC system developed in the early 1900s, enabled occupants to be more comfortable inside a building year-round in any climate.” 

“Digital tools (sensors, etc) are just the latest to be used to enhance the physical space for the occupant. Digital twins enable an idea to be replicated in 3D – prior to having to spend millions of dollars and hundreds of man hours to see if a new idea is viable. Its advent and use enable more experimentation at a lower cost and faster set up. This equates into a lower risk. It is a welcomed tool which will propel the experimentation in the physical world.” 

Talking about emerging technologies, Zamora says, “Digital twins along with other digital tools, such as 3D printing, AI, drones with 4K cameras and others will enable the built environment to develop at a very quick pace. It is the pace that will be welcomed, as the built environment is typically a slow-moving asset (pardon the pun).”

“Expect the Built Environment developers, designers, investors, and occupiers to welcome the concept. It will allow them to dream of the possible.”

Telstra and Microsoft – Joint Goals

Telstra and Microsoft have partnered over the years over multiple projects. Last year, the companies partnered to bring Telstra’s eSIM functionality to Windows devices for data and wireless connectivity; they have also worked on Telstra Data Hub for secured data sharing between data producers, businesses and government agencies; and most recently collaborated on Telstra’s exclusive access to Xbox All Access subscription service to Australian gamers with the announcement of Microsoft’s Xbox Series X and Xbox Series S gaming consoles expected to release in November.

This announcement also sees them work jointly towards their sustainability goals. Both companies are committed to sustainability and addressing climate change. Earlier this year, Microsoft announced its plans to be carbon negative by 2030, while Telstra has also set a target to generate 100% renewable energy by 2025 and reducing its absolute carbon emissions by 50% by the same time. To enable sustainability, Telstra and Microsoft are exploring technology to reduce carbon emissions. This includes further adoption of cloud for operations and services, remote working, and piloting on real-time data reporting solutions.

Telstra also aims to leverage Microsoft technology for its ongoing internal digital transformation, adopting Microsoft Azure as its cloud platform to streamline operations, and infrastructure modernisation, including transition from legacy and on-premise infrastructure to cloud based applications.


AI Research and Reports

2
Smarter Buildings: Consortia for Intelligent Use of Big Data

5/5 (1)

5/5 (1)

Smarter buildings and public facilities have long been of interest to architects and developers. Innovators can see that the promise of intelligent data used for spatial design can transform how we work, live and play.

How can Big Data be used for intelligent building design? There are a consortia of companies trying to figure this out together. I will discuss the Building 4.0 Co-operative Research Centre (CRC) in Australia.

I have already been examining the new approaches to using big data in facilities management. This is done by developing smarter office spaces, embedded with devices employing Ambient Intelligence (AmI). Research looked at how the intelligent use of big data contributed to building an environment with greater energy efficiency, optimised space utilisation, enhanced workplace experience and occupants’ comfort. This includes sound masking, the use of lighting for enhance environments, and sensors for occupancy for hygiene controls.

Ambient Intelligence (AmI)

AmI refers to electronic environments that are sensitive and responsive to the presence of employees, residents or visitors. These environments can have ecosystems (pun intended) of different IoT devices communicating with each other.

There is a real emphasis here on edge computing, sensors and other IoT devices, and building intelligence into the edge for near real-time decision making closer to where the problem may sit. Ecosystm research finds that construction firms focus a significant amount of IoT investment for building management and energy management (Figure 1).

IoT Solutions in Construction

For example, if an HVAC system is on the verge of malfunction, the system could send a message for a repair intervention. When it comes to AI, predictive maintenance and surveillance are two of the leading use cases in the construction industry (Figure 2).

AI Adoption in Construction

Building 4.0 Co-operative Research Centre (CRC)

In Australia, this push for sustainable and smarter building development is being driven by a consortium of companies looking at Big Data and infrastructure development for buildings. This year, the Building 4.0 Co-operative Research Centre (CRC) has been awarded a USD 19.5 million grant to focus on medium to long-term industry-led collaborations that can assist in driving the growth of new industries. The Australian building and construction industry is a major economic engine that contributes 13% of GDP and employs over 1.4 million Australians. Development of the Building 4.0 CRC makes sense and is timely given the current pandemic and economic conditions.

Part of its research program focus on develop new building processes and techniques through leveraging the latest technologies, data science and AI to ultimately improve all aspects of the key building phases. Their overall ecosystem is designed for enablement of several use cases (Figure 3).

Building 4.0

The Building 4.0 CRC’s principle aims are “to decrease waste; create buildings that are faster, cheaper, and smarter; and capture new opportunities by facilitating collaborative work between stakeholders across the whole value chain in cooperation with government and research organisations.”

Green Star, the rating system which was created by Green Building Council of Australia (GBCA) in 2003, rates the sustainability of buildings, fit outs and communities through Australia’s largest national, voluntary, holistic rating system. The GBCA is a partner organisation in the Building 4.0 CRC – as are many other major organisations in construction and trade, all pulling together here, for innovative efforts for the industry.

Where might the Building 4.0 CRC effort make an impact? Its collaborative structure of industry, academia, vocational trade organisation and governmental bodies harness innovative ideas to transmit them to transformative practices of industry and construction partners.

To be smarter, one must work smarter and more efficiently.  A consortia such as this pulls the best minds together to try to accelerate industry efforts for intelligent design with data.


Ecosystm IoT Market Insights

2
NVIDIA to Acquire Arm: An Analysis of the Biggest Tech Deal of 2020

5/5 (10)

5/5 (10)

Last week, NVIDIA announced that it had agreed to acquire UK-based chip company Arm from Japanese conglomerate SoftBank in a deal estimated to be worth USD 40 billion. In 2016, SoftBank had acquired Arm for USD 32 billion. The deal is set to unite two major chip companies; power data centres and mobile devices for the age of AI and high-performance computing; and accelerate innovation in the enterprise and consumer market.

Rationale for the Deal

NVIDIA has long been the industry leader in graphics chips (GPUs), and a smaller but significantly profitable player in the chip stakes. With graphic processing being a key component in AI applications like facial recognition, NVIDIA was quick to capitalise. This allowed it to move into data centres – an area long dominated by Intel who still holds the lion’s share of this market. NVIDIA’s data centre business has grown tremendously – from near zero less than ten years ago to nearly USD 3 billion in the first two quarters of this fiscal year. It contributes 42% of the company’s total sales.

The gaming PC market has been the fastest-growing segment in the PC market. The rare shining light in an otherwise stagnant-to-slightly declining market. NVIDIA has benefited greatly from this with a huge jump in their graphics revenues. Its GeForce brand is one of the most desired in the industry. However, with their success in AI, NVIDIA’s ambition has now grown well beyond the graphics market. Last year NVIDIA acquired Mellanox – who makes specialised networking products especially in the area of high-performance computing, data centres, cloud computing – for almost USD 7 billion. There is clearly a desire to expand the company’s footprint and position itself as a broad-based player in the data centre and cloud space focused on AI computing needs.

The acquisition of Arm though adds a whole new dimension. Arm is the leading technology provider in the mobile chip market. A staggering 90% of smartphones are estimated to use Arm technology. Arm is the colossus of the small chip industry – having crossed 20 billion in unit shipments in 2019.

Acquiring Arm is likely to result in NVIDIA now having a play in the effervescent smartphone market. But the company is possibly eyeing a different prize. Jensen Huang, Founder and CEO of NVIDIA said “AI is the most powerful technology force of our time and has launched a new wave of computing. In the years ahead, trillions of computers running AI will create a new internet-of-things that is thousands of times larger than today’s internet-of-people. Our combination will create a company fabulously positioned for the age of AI.”

With thoughts of self-driving cars, connected homes, smartphones, IoT, edge computing – all seamlessly working with each other, the acquisition of Arm provides NVIDIA a unique position in this market. As the number of connected devices explodes, as many billions of sensors become an ubiquitous part of 21st century living, there is going to be a huge demand for low power processing everywhere. Having that market may turn out to be a larger prize than the smartphone market. The possibilities are endless.

While this deal is supposed to be worth around USD 40 billion, somewhere between USD 23-28 billion is going to be paid in the form of NVIDIA stock. This brings us to an extremely interesting dynamic. At the beginning of 2016 NVIDIA’s market cap was less than USD 20 billion. Mighty Intel was at USD 150 billion. AMD the other player in the market for chips who also sell graphics was at a mere USD 2 billion. In July this year, NVIDIA’s value passed Intel’s and today it is sitting at around USD 300 billion! Intel with a recent dip is now close to USD 200 billion. AMD too with all the tech-fueled growth in recent years has grown to just shy of USD 100 billion market cap.

NVIDIA Growth 2014-2021

What this tells us is that the stock portion of the deal is cheaper for NVIDIA today by around 55% compared to if this deal was consummated on 1st January 2020. If there was a right time for NVIDIA to buy – it is now. This also shows the way the company has grown revenue at a massive clip powered by Gaming PCs and AI. The deal to buy Arm appears to be a very good idea, which would establish NVIDIA as a leader in the chip industry moving forward.

Ecosystm Comments

While there appears to be some good reasons for this deal and there are some very exciting possibilities for both NVIDIA and Arm, there are some challenges.

The tech industry is littered with examples of large mergers and splits that did not pan out. Given that this is a large deal between two businesses without a large overlap, this partnership needs to be handled with a great deal of care and thought. The right people need to be retained. Customer trust needs to be retained.

Arm so far has been successful as a neutral provider of IP and design. It does not make chips, far less any downstream products. It therefore does not compete with any of the vendors licensing its technology. NVIDIA competes with Arm’s customers. The deal might create significant misgivings in the minds of many customers about sharing of information like roadmaps and pricing. Both companies have been making repeated statements that they will ensure separation of the businesses to avoid conflicts.

However, it might prove to be difficult for NVIDIA and Arm to do the delicate dance of staying at arm’s length (pun intended) while at the same time obtaining synergies. Collaborating on technology development might prove to be difficult as well, if customer roadmaps cannot be discussed.

Business today also cannot escape the gravitational force of geo-politics. Given the current US-China spat, the Chinese media and various other agencies are already opposing this deal. Chinese companies are going to be very wary of using Arm technology if there is a chance the tap can be suddenly shut down by the US government. China accounts for about 25% of Arm’s market in units. One of the unintended consequences which could emerge from this is the empowerment of a new competitor in this space.

NVIDIA and Arm will need to take a very strategic long-term view, get communication out well ahead of the market and reassure their customers, ensuring they retain their trust. If they manage this well then they can reap huge benefits from their merger.


Access More Insights Here

2
Fusion: Leading the Digital Innovation Era

5/5 (2)

5/5 (2)

“Innovation is seeing what everybody has seen and thinking what nobody has thought”- Dr. Albert Szent-Györgyi (Discovered Vitamin C)

Innovation over the last 200 years has catapulted the human race into a world that is quite different from where it was 2 million years ago. So, what is the next wave in innovation? The answer seems to be in the interspace between industries, technologies, countries, domains and more.

Fusion innovation is a lateral innovation technique involving fruitful collision and fusion of different industries, fields, markets/countries, organisational silos, technologies, personalities, experiences, and skillsets towards creating radical, high-value outputs – newer ideas, products, and even industries. This is groundbreaking when it comes to digital innovation and its application in new ways.

Results have been big. Here are some examples:

  • Crafting the world’s first digital music deal with Nokia ringtones to spawn the USD 2 billion ringtone industry
  • Fusing satellite technology in radio is now a $24 billion enterprise – SiriusXM
  • Ted Saad and team fusing art and business, technology and teams, and cultures and lifestyles – to win multiple Emmy awards
  • Quantum chemistry, mathematical modeling, anthropology and management, fusing to create a new field – social network analysis

The Success Factor of Fusion Innovation

One secret of success of such radical innovation is a fundamental of design thinking – empathy. A lot of digital innovations either fail at the drawing board due to lack of purpose or at the budget approval stage due to lack of a business case and scalability. Successful digital innovations that have seen large scale adoption are pretty good at addressing end-user pain points, are scalable, and have a strong return on investment.

Examining the breeding grounds of digital innovations driving todays’ world – especially Artificial Intelligence (AI), automation, big data, blockchain and Internet of Things (IoT), we realise that the human potential to co-create stands out as the ultimate game changer.

Dr. C J Meadows, a pioneer in studying Fusion Innovation notes the following traits in “fusioney” people:

  • Outward openness. This involves scanning broadly (including outside your industry) for ideas and technologies, engaging with an eclectic variety of people inside and outside the organisation. This is important especially in identifying unique opportunities for collaboration with cross-industry thought leaders. An excellent example of this would be the many emerging use cases in resource management using IoT in smart cities.
  • Inward openness. This relates to people in an organisation exhibiting curiosity, depth and play and discovering their own inner design. The transformation story of graphics group to Pixar animations is an example of innovation driven by inward openness.
  • Collecting. This involves ideating, curating, indexing and sharing ideas within and across functional divisions in a group or organisation. This not only enables lateral innovation, it also triggers “fusioneers” to see patterns and connections which others might have missed. Team wiki is an example of knowledge sharing within and across teams in an organisation that has revolutionised the art of problem solving in the technology industry.
  • Sensing. This involves a great deal of empathy as well as having a deep appreciation of ideas that can propel the human race forward. Most automation use cases in contact centre operations that address repetitive and mundane tasks are a result of design thinking workshops that focus on the human pain points.
  • Fusing. This involves absorbing many things around us and combining it in new ways. Hackathons conducted by many technology corporations have brought many interesting cross-functional solutions in the digital space that have been unique yet amazingly effective.

The future of digital innovation holds exciting possibilities with advancements in computational power, fusion of technologies and ideas, advancements in digital contracts. Lateral innovation techniques like Fusion can be expected to have a significant role in fueling this space for the years to come.

This is a contributed article from Nandakumar Kumar, a DBA Scholar at SP Jain School of Global Management.

4
How Vulnerable is your Operational Technology System?

5/5 (2)

5/5 (2)

In recent times, there appears to be a shift in motive for cyber-attacks – along with common data theft, there is a proliferation of attacks aimed at the business interruption and physical incapacitation of business operations. We have witnessed an alarming increase in high-profile attacks on manufacturing businesses and critical infrastructure providers, globally.

This appears to be a global phenomenon. Honda manufacturing plants went offline in June after a cyber-attack compromised some of the Japanese automaker’s facilities. The same pattern emerged in a separate attack at the same time targeting Edesur S.A., a company belonging to the Enel Group that confirmed its internal IT network was disrupted due to a ransomware attack, which was caught by antivirus software before the malware could infect. Both companies had machines with Internet-accessible remote desktop servers, which is a favorite infection method among attackers nowadays. One of Australia’s largest brewers, Lion also faced a ransomware outbreak, last month. In Israel, it was reported that a cyber-attack very nearly poisoned the water supply with the attackers attempting to overload the water system with chlorine, and in recent days, a fire and explosion at an Iranian nuclear plant is suspected of being caused by cyber-attack.

These attacks highlight the need for appropriate investments in cybersecurity by companies and municipalities that own or operate critical infrastructure, properties (including places of public congregation, retailers and others) that are rapidly deploying a suite of operational technologies, and businesses in the manufacturing sector.

Operational Technology (OT) is the backbone of modern industrial operations and is a network of multiple computing systems that perform operations including production line management, operations control and industrial monitoring. OT can further include specific computing systems like industrial control systems (ICS) which is a collection of control systems used to operate and/or automate industrial processes. There are several types of ICSs, the most common of which are Supervisory Control and Data Acquisition (SCADA) systems, and Distributed Control Systems (DCS). With such industrial systems and smart end-user products connected by a common network, several vulnerabilities may appear.

In OT security, the focus is much less on information, but more on the industrial process that technology controls. Hence, availability and integrity are often more important than confidentiality. Any organisation employing OT should employ continual risk-based assessments of their cybersecurity posture to prioritise and tailor recommended guidelines and solutions to fit specific security, business, and operational requirements.

Why is OT More Vulnerable?

OT systems are versatile and can be found in all kinds of industrial settings and infrastructures like smart buildings, oil and gas, energy generation/distribution, mining, wastewater treatment/distribution, manufacturing, food production, consumer devices and transport. In fact, almost every business in 2020 has an element of IoT within their operations.

A big issue with OT is that a lot of the technology in place is over 20 years old and therefore was not designed to provide the security capabilities required to face cyber threats in 2020. Legacy technology often requires legacy hardware and software to support it – much of which is the end of life and unsupported by the vendors (for example, consider SCADA systems still reliant on Windows NT or older Unix based systems, which have not been supported by their vendors for many years).

OT systems have also been damaged as unintended side effects of problems starting in corporate networks that took advantage of increasing connectivity, proving clearly that the standard PCs that now form part of a typical organisation’s IT environment are in turn used to manage OT systems and become a major vector for such cyber-attacks.

When it comes to OT, safety and reliability are the primary concerns as attackers aim to disrupt the critical services industry and their customers rely upon them. Given the increasing propensity of connecting OT systems with corporate networks for ease of management and the growing use of IoT systems, the likelihood of such systems being affected by vulnerabilities exploitable over the network is increasing exponentially.

For almost every business – not just critical infrastructure providers – most technologies we deploy include connectivity to the internet. Not knowing what systems and external access to these systems that your business is introducing in its everyday technology investment create significant risks to the broader business operations.

Impact of COVID-19 on manufacturing businesses and infrastructure providers

Manufacturing businesses and critical infrastructure providers realise that there is need to re-evaluate their cybersecurity measures, in the wake of the COVID-19 crisis, according to the findings of the Ecosystm’s ongoing “Digital Priorities in the New Normal” study (Figure 1).

But these measures may not be sufficient, as indicated by the slew of cyber-attacks on these organisations.

Why are these attacks successful?

There are several reasons why OT attacks are successful:

  • Unauthorised access to internet-facing systems (e.g. deploying an IoT with the default username and password)
  • Introduction of a compromised device (e.g. USB stick) to the environment that infects the network (often employee action)
  • Exploitation of zero-day vulnerabilities in control devices and software
  • Propagated malware infections within isolated computer networks (i.e. The attacker can place a receiving device to make contact over a channel that can propagate across the isolated network)
  • SQL injection via exploitation of web application vulnerabilities
  • Network scanning and probing
  • Lateral movement (i.e. inadequate segmentation which results in attackers being able to move between systems, groups of systems, network zones and even geographical locations.)

How can they be prevented?

The mitigation cannot rely solely on the organisation building security around the deployment nor can it be a reactive approach to fixing vulnerabilities in production, as they are identified. It begins with the OT vendors building security within; however, as with most IT systems and applications, this will evolve over time. For example, there is an initiative in Australia – driven by the IoT Alliance Australia (IOTAA) – to introduce a ‘Trust Mark’ for IoT devices that pass a certification process for security and privacy in product development. This is targeted to launch in September 2020 but could take many years to gain real traction. Thus, for the foreseeable future, the best operational outcomes must be planned and managed by the consumers of the technologies.

Here are the best practices to reduce exploitable IoT weaknesses and attacks occurring in your business:

  • Maintain an accurate inventory of Operational Systems and eliminate any exposure of these systems to external networks
  • Establish clear roles and responsibilities for your organisation and your vendors, to ensure cybersecurity risk is being addressed and managed throughout the OT lifecycle
  • Implement network segmentation and apply firewalls between critical networks and systems.
  • Use secure remote access methods
  • Establish Role-Based Access Controls (RBAC) and implement system logging
  • Use only strong passwords, change default passwords, and consider other access controls (especially for any elevated privileges) such as multi-factor authentication, privileged access management solutions, etc.
  • Establish threat intelligence feeds from your OT vendors and security vendors to ensure you remain abreast of new vulnerabilities, software/firmware patches and threats targeting systems you employ
  • Develop and enforce policies on mobile devices, including strict device controls for any device connecting to OT systems or network zones
  • Implement an employee cybersecurity training program
  • Establish and maintain rigorous testing and patching program including vulnerability assessment and penetration testing
  • Implement measures for detecting compromises and develop a cybersecurity incident response plan with a specific focus on responding to a disruptive attack on your OT environment
  • Maintain an up-to-date Business Continuity Plan that can be deployed rapidly in response to a significant disruption

Ecosystm Cybersecurity Research

2
SAP and Siemens Partner to Accelerate Industrial Automation

5/5 (1)

5/5 (1) Last week industry leaders, SAP and Siemens, announced a partnership to bring together their respective expertise on creating integrated and enhanced solutions for product lifecycle management (PLM), supply chain, service and asset management, in a move that is expected to accelerate Industry 4.0 globally.

The partnership between SAP and Siemens aims to develop innovative business models to break silos between manufacturing, product development and service delivery teams to establish seamless customer-centric processes. It will provide users with real-time business information, customer insights and performance data over the entire product development cycle.

As the first step of this agreement, Siemens will offer SAP’s Intelligent Asset Management solution and Project and Portfolio Management applications and SAP will offer Siemens’ PLM suite Teamcenter software for product lifecycle collaboration and data management to manufacturers and business operators across the network – complementing each other’s solutions.

Ecosystm Principal Advisor, Kaushik Ghatak says, “The convergence of the Information Technology (IT) and the Operational Technology (OT) worlds is a must for companies to operate in the cyber physical world of Industry 4.0. Historically, these two worlds have operated in silos. This is a great partnership announcement aimed towards meeting the convergence goals by integrating the capabilities of Siemens (an OT leader), and SAP (an IT leader). Together they would be able to offer an exhaustive set of very valuable offerings in the Digital Supply Chain and Digital Manufacturing domain for customers worldwide.”

Ghatak says, “This is not the first such partnership for Siemens. A strategic alliance between Siemens and Atos has been in place since 2011. In 2018 the alliance was strengthened with plans to accelerate their joint business until 2020, with a focus on building innovative solutions by combining their capabilities. However, the difference this time is that SAP has very a deep and wide set of software offerings in the supply chain and manufacturing domains, which when stitched together with Siemens’ PLM solutions can provide true end-to-end digitalisation capabilities across the ‘Design, Source, Make, Deliver and Plan’ continuum of the value chain.”

Ecosystm Comments

Ghatak, however, cautions that while this is a great partnership announcement between two giants in their respective fields, they will need to collaborate actively on three key aspects for this partnership to deliver value for the customers.

  • Product Development. Building-integrated solutions with heterogenous data models is not easy. It will require very open collaboration between their product development teams to identify the use cases and build solutions that can enable seamless information flow and actions across the different software modules owned by each.
  • Go-to-market. Going to market jointly will need strong collaboration too. In terms of the agreement on customer account ownership, pricing, sharing of pre-sales resources and so on.
  • Implementation. And, last but not the least, it will require collaboration to ramp up the implementation capabilities of the jointly developed solutions.

Checkout insights from the Ecosystm IoT Study.Click on the link below to Access 👇
Ecosystm IoT Market Insights


1
Microsoft Strengthening their IoT Capabilities

5/5 (4)

5/5 (4) Microsoft announced in 2018 that they were investing US$ 5 billion globally in IoT innovation and research for the next 4 years – the focus being on secure IoT, creating development tools and intelligent services for IoT and the edge, and on growing their partner ecosystem.

Last year Microsoft’s industry updates showcased several IoT implementations across industries and their edge-based solutions portfolio, customers and partner ecosystem. The tech giant revealed nearly 150% YoY growth with customers such as Starbucks, Chevron, Walmart, Walgreens, BMW and Volkswagen added to the Azure platform, leveraging IoT services to accelerate their digital transformation journey. Microsoft also announced more than 70 partnerships with some of the big names in the IoT ecosystem, such as  Universal Electronics, SAP, and Cradlepoint to extend solutions and support for the Microsoft IoT business.

Extending IoT Capabilities with Strategic Partnerships

There were several recent announcements which indicate that Microsoft is focused on strengthening their IoT and industry capabilities – and this is a timely move. Ecosystm Principal Advisor, Kaushik Ghatak says, “COVID-19 has brought to the fore the need for managing risks better. And the key to managing risks is to have better visibility and drive data-driven decisions; the sweet spot for IoT technologies. IoT is at the core of the Industry 4.0 story where deep domain expertise in industry verticals is a pre-requisite to success. It is heartening to see that Microsoft is taking the lead in building a powerful ecosystem by developing key partnerships with leading providers of Industry solutions.”

Last week, Microsoft and Hitachi announced a strategic alliance to accelerate the digital transformation of the Manufacturing and Logistics industries across Southeast Asia, Japan and North America. The first solutions are expected to be made available in Thailand as early as this month. Hitachi brings to the table their industry solutions, such as Lumada, and their IoT-ready industrial controllers HX Series. These solutions will be fully integrated with the Microsoft cloud platform, leveraging Azure, Dynamics 365 and Microsoft 365.

The three areas where the Hitachi solution is expected to bring strength to Microsoft’s industry offering are:

  • Process optimisation and increased manufacturing productivity. Hitachi Digital Supply Chain and Azure IoT leveraged to analyse 4M data collected from manufacturing sites for visualisation/ analysis of production processes
  • Logistics optimisation. Digital technologies such as Azure Maps and Hitachi Digital Solution for Logistics/Delivery Optimisation Service to analyse data on parameters such as traffic congestion, storage locations and delivery locations, to enabling smart routing
  • Predictive maintenance and remote assist. HoloLens 2, Dynamics 365 Remote Assist and other smart devices, to empower first-line workers

Ecosystm Principal Advisor, Niloy Mukherjee feels that with projections of 43 – 100 billion IoT connected devices in the next few years, IoT is obviously a hot space. “We can think of IoT as a stack with four layers – the devices/sensors, the connection layer, the cloud and computing layer and the business apps layer. With Azure, Microsoft is very well positioned in the cloud and compute layer and can grab a large chunk of this fast-growing market. Tying with players like Hitachi allows Microsoft to integrate with the business apps layer and perhaps also some devices. It is absolutely the right strategy and I would expect them to go for many more such alliances. With Microsoft’s strength in the enterprise market, IoT gives them a great opportunity to increase their share of cloud workloads with customers.”

Addressing the Challenges of IoT Adoption

Ecosystm research shows that the biggest challenges in IoT adoption are security and integration concerns (Figure 1).Key challenges of IoT Adoption

In 2018, when Microsoft started actively focusing on IoT, they also launched the Azure Certified for IoT program to maintain consistency and enhanced interoperability across their device partner ecosystem. This addresses the integration challenges that organisations face when deploying IoT. Microsoft continues to grow their IoT ecosystem, ensuring faster IoT deployments, with hardware and software that has been pre-tested and verified to work with Microsoft Azure IoT services. Last week also saw Cyient joining Microsoft Azure as a certified partner for IoT. Cyient IoT Edge Gateway 5400, their flagship IoT gateway product is now Microsoft Azure Certified for IoT. This is expected to accelerate IoT deployment for Cyient customers and enable a seamless integration of edge devices to the cloud.

Ghatak says, “To scale up their IoT business, Microsoft would need to develop a substantially large ecosystem, beyond few key players such as Hitachi, who dominate at the large enterprise segment of the market. That is where partnerships with smaller and niche industry solutions providers such as Cyient fits in. More niche providers such as Cyient will increase Microsoft’s reach into medium and smaller segments of the enterprise market.”

Addressing the Increasing Threat Landscape

Recent cyber-attack trends and security breach statistics reveal a huge increase in cybercrime activities, in the wake of the COVID-19 pandemic. As the number of IoT sensors, devices and gateways increase, so does the risk of security breaches. As shown in figure 1, cybersecurity concerns are real and can act as a barrier to IoT adoption, despite the benefits that the technology brings. Automated vulnerability management capabilities, that allow risk assessment and patch installation where necessary will see an increase in IoT adoption.

To complement Microsoft Azure IoT security, Microsoft acquired IoT security specialist CyberX, last month. The acquisition will enable greater security for the IoT devices connected to the Microsoft network and will help their customers to gain visibility through a map of devices thus allowing them to gather information on security risks associated with thousands of sensors and connected devices. This will enhance smart grid, smart manufacturing and digital assets and profiles and reduce vulnerabilities across production and supply chain.

Mukherjee says, “The key concern for the expansion of IoT into more and more use cases in the next few years is really going to be security. New areas like VR and AR are emerging from futuristic fantasy to real-world reality. These will tempt many enterprises – but security will be the key concern to address. And so, Microsoft’s simultaneous push on security completely aligns with this. As the Ecosystm MSSP VendorScope results show Microsoft’s strategy on cybersecurity seems to be working.”

Talking about Microsoft’s go-to-market strategy, Mukherjee adds, “Microsoft is obviously spreading its net far and wide for all cloud applications including IoT, to go-to-market with partners. One of the key focus area here is the SME segment, which is forecast to be one of the hot growing segments for IoT in the next few years. The more offerings from the business apps layer that Microsoft integrates, the more they enable their partners to sell to their customers.”


Ecosystm IoT Market Insights


1
Australia Preparing Workforce for IoT

5/5 (1)

5/5 (1)

The 5G rollouts in Australia by Telstra, Optus and Vodafone will impact consumers and enterprises alike. It is expected that enterprises will see an uptick in IoT adoption, leveraging the lower latency to connect devices for real-time data transfer and insights. Industries, especially those that operate in remote and rural regions of the country such as Agriculture and Mining are expected to benefit immensely.

“However, there are challenges to leveraging digitalisation effectively, including a lack of awareness, knowledge and skills, and funding to support innovation and scale, in aligning with the growing pressure within sectors to meet increasing productivity and compliance requirements,” says Ecosystm Principal Advisor, Jannat Maqbool. “Adoption of IoT specifically is resulting in new data supply chains, that those operating in many industries cannot cater for with respect to infrastructure and also the skills necessary to process and extract valuable insights from the data.”

Ecosystm research shows that only 37% of organisations looking to adopt IoT in Australia have a strategic internal team to create the roadmap and manage the deployment. This indicates a lack of skills that organisations can utilise, depending on external resources such as consulting firms and ISVs instead. To cater to the expected growth in Australia’s IoT market, IoT Alliance Australia (IoTAA) – that represents more than 500 participating organisations and 1,000 individual participants – has come forward with the IoT Australia Skills Barometer survey.

The survey created in association with La Trobe University aims to gauge the IoT skills gap, to inform educators and adopters on the potential areas of focus for future skills development. It covers questions on IoT adoption, challenges expected, solutions being evaluated, and courses needed.

Addressing the Skills Gap

As the adoption of IoT increases, there will be added requirement for skills in data storage, infrastructure management and creating frameworks. The survey is expected to help the industry determine the skills gap, isolate training and re-skilling requirements and develop courses and hands-on sessions to address the end-to-end services requirements and better utilisation of data gathered from the devices.

There are some courses that are already available – mostly run in collaboration with industry. Last year, Rio Tinto, the Western Australia Government and South Metropolitan TAFE developed Australia’s first nationally-recognised remote operations course. Earlier this year, RMIT partnered with IBM to deliver the IoT and 5G business opportunity courses to equip business professionals with the right technology and business skills for IoT projects.

“Awareness of the potential of emerging technologies needs to target both non-technical and technical members of the organisation. This wider buy-in is needed to drive thinking around the ‘why’ from stakeholders across the business, enabling a more informed decision around the potential impact on existing resources, infrastructure, processes, products, required investment and business outcomes,” says Maqbool. “Any education and training program needs to allow for this focus on awareness, then provide opportunities to build on this for those that then want to gain the deeper knowledge and technical skills required to effectively leverage the IoT.”

“Education and training programs to support the uptake of digital technologies across the wider population and traditionally non-digital industries require a contextual learning and a flexible delivery approach.”

Government and Industry working together

“A digital divide exists in many countries – especially for those in rural communities. They are often not in a position to access the infrastructure necessary to support a real-world connection in a contextual learning environment, let alone having the digital literacy and scaffolding to get to a point where they can effectively consider leveraging emerging technologies,” says Maqbool.

This is where governments play a larger role. To accelerate innovation and make better use of technology the Australian Government is supporting clear communication and a better understanding of IoT, implementing standards and regulations, upgrading digital infrastructure, creating opportunities for economic and social benefits and collaborating with research and education institutes to deliver skills, innovation and growth in the IoT sector.

One of the key areas of focus will have to be cybersecurity. Regulatory compliance and security & privacy issues are the key barriers of IoT adoption in Australia (Figure 1).

Challenges of IoT Adoption in Australia

Last year, the Australian government released a draft code of practice to enable businesses implementing IoT solutions to follow certain principles as a voluntary measure to defend against threats.

The Government is also seeing a larger potential for IoT in some industries. To support the Agriculture industry, the Australia Government has allocated USD 90 million to the Smart Farms program to support the development and uptake of best practices and technologies in farms, fisheries and forestry, with a special focus on regional communities. In its FY2019-20 federal budget, the Government announced plans to invest USD 1.4 million for a feasibility study and assess ways on improving digital on-farm connectivity. Similarly, Australia’s National Landcare Program (NLP) delivered by the Department of Agriculture, Water and the Environment (DAWE) is receiving financial support until June 2023.


Get your Free Copy
1
WBA OpenRoaming™ Creates a Global Wi-Fi Network

5/5 (2)

5/5 (2) The Wireless Broadband Alliance (WBA) was formed in 2003 to enable a seamless and interoperable Wi-Fi experience across the global wireless ecosystem. The key objective of the alliance was to bring together multiple stakeholders – such as telecom providers, technology vendors and enterprises – to work on areas such as industry guidelines, pilot projects, standards to promote end-to-end services and drive adoption in Wi-Fi, 5G, IoT and others.

WBA OpenRoaming™

Ecosystm Principal Advisor, Ashok Kumar says, “Wi-Fi has gained increasing popularity worldwide over the last two decades and has now become an essential network technology with ubiquitous service that it is utilitarian. However, it has been viewed as a collection of islands of heterogenous networks, requiring re-authentication each time a mobile user transits from one network and re-connects with another Wi-Fi network, with the associated hurdles of logging back in, making it cumbersome.”

“The lack of interoperability between Wi-Fi networks has been a drawback for service providers, compared to the ease of use associated with global mobile networks, such as 4G, LTE, 5G, and so on, which offer seamless roaming connectivity.”

The WBA OpenRoaming™ initiative was announced last month, to create a globally available Wi-Fi ecosystem that offers a federation of automatic and secure connections for billions of devices to millions of Wi-Fi networks. It provides a new global standards-led approach, removing public-guest Wi-Fi connectivity barriers and brings greater convenience and security to the wireless ecosystem. WBA OpenRoaming™ removes the need to search for Wi-Fi networks, to repeatedly enter or create login credentials, or to constantly reconnect or re-register to public Wi-Fi networks.

Several leading technology companies and telecom service providers have extended support to WBA OpenRoaming™ standards – Samsung, Google, Cisco, Intel, Aptilo, AT&T, Boingo Wireless, Broadcom, Comcast, Deutsche Telekom and Orange to name a few.

“Wi-Fi is arguably the most ground-breaking wireless technology of our time. From the first public Wi-Fi hotspots in the early 2000s which enabled radically increased productivity on the move, through to the role Wi-Fi has in today’s pandemic environment. With WBA OpenRoaming™ we want to revolutionise how individual users as well as businesses engage with Wi-Fi, removing the need to repeatedly log in, re-connect, share passwords or re-register for Wi-Fi networks as we travel locally, nationally or internationally”, said Tiago Rodrigues, CEO of the WBA, “Instead, no matter where we are, the new framework automates how users connect to Wi-Fi while seamlessly aligning to cellular network connectivity. It does so by bringing together a federation of trusted identity providers so that individual users are allowed to automatically join any network managed by a federation member.”

WBA OpenRoaming™ can simplify Wi-Fi, much like the cellular roaming experience. Kumar says, “ The WBA OpenRoaming™, with support from major global service providers, network solution vendors, and authentication & security firms, has the potential to address the issue of seamless interoperability in the Wi-Fi networks ecosystem with ease-of-use and security.”

WBA OpenRoaming™ Framework

The framework and standards are based on cloud federation, consisting of a global database of networks and identities, dynamic discovery and the Wireless Roaming Intermediary Exchange (WRIX); cybersecurity consisting of Public Key Infrastructure a RadSec providing the certificate policy, management and brokerage services; and network automation facilitated by an automated roaming consortium framework and policy and Wi-Fi CERTIFIED Passpoint®*.

How does Wireless Broadband Alliance OpenRoaming work?

The Impact of WBA OpenRoaming™

“Enterprises are expected to benefit enormously from the opportunity to create new commercial business models and innovative services with speed and simplicity,” says Kumar.

Maturing mobile technologies such as 5G and Wi-Fi 6 along with next generation wireless devices, could make OpenRoaming™ more seamless and extend its applications further.

Cisco in particular has been leading the charge with several pilots that showcase the benefits of OpenRoaming™. Earlier this year, it partnered with Oxbotica, an autonomous vehicle software provider, to demonstrate how OpenRoaming™ can unlock the potential of autonomous vehicle fleets, allowing a seamless and secure sharing of high-volume data while on the move.

Last year, Cisco also showcased the benefits of OpenRoaming™ in a pilot at the Mobile World Congress in Barcelona with Samsung as the identity provider. Attendees were connected to the network throughout the venue, with connectivity extended to even local train stations and the airport. This unified experience was possible despite the fact that at least three network providers were involved. Pilots such as these gives the industry a glimpse of what benefits lie ahead.

Kumar sees the impact being extended across industries. “The impact of WBA OpenRoaming™ will be in the introduction of innovative services for consumers and enterprise users in public Wi-Fi networks in industries such as Hospitality, Transportation (airport and rail), Retail outlets, Smart City solutions, and local community networks.”

 

Learn more about WBA OpenRoaming™, visit www.openroaming.org

*Wi-Fi CERTIFIED Passpoint® is a registered trademark of the Wi-Fi Alliance  

 

1