Hewlett Packard Enterprise bundles hardware/software to create an all-in-one cloud package

| June 7, 2016

article image
It’s been a tumultuous past year for Hewlett Packard Enterprise but this week the company is unveiling a series of new offerings intended to solidify its standing in the private and hybrid cloud computing market.

Spotlight

Nexus - A Dimension Data Company

Nexus was acquired by Dimension Data in 2014. Nexus, a Dimension Data Company, is passionate about our belief in the power of advanced technologies to transform business. We have over 30 years of experience helping organizations Connect to their customers, Collaborate to achieve their vision, and Create innovative ways to solve business problems using advanced technology. We do this by providing expertise in end-to-end technology solutions based on our distinct, yet complementary practices: Collaboration, Data Center, Cloud, Enterprise Networks, Business Video, and Consulting and Managed Services.

OTHER ARTICLES

Marketing Technology Trends You Must Adopt in 2021

Article | June 16, 2021

With the world changing so drastically around us, every trend seems to be optimizing itself to adapt to the changes. To leverage your business, it is essential to stay up to date with the market trends. From increasing productivity to updating yourself with the latest marketing technology trends, every minute thing counts to keep the business going forward in 2021. Even if your present business marketing ideas are working sufficiently for you, they may not in the future. And this is because the marketing technology trends change exorbitantly with time. Over 68% of businesses have increased their investments for increased productivity. Why should your business care about being updated about the latest marketing technology trends? ● To create competitive advantages ● Build ever-lasting relationships with consumers ● Cater to multiple services on demand. ● Deliver profitable business outcomes. The outcomes of staying up to date with the latest marketing technology trends are exceptional. According to experts, businesses can see their profits rise at 20 to 30 percent if they incorporate the newest marketing trends. Now that we know the benefits that businesses can reap by staying updated on marketing technologies. Here are some of them that you must adopt in 2021. Latest Marketing Technology Trends Artificial Intelligence (AI) Implementing, analyzing, and utilizing real-time intelligence to create artificial intelligence is a wonder created by scientists. From the assistance of robots in wars to medical fields, AI has come a long way from just solving mathematical algorithms. So imagine how impressive it will be when AI is implemented in marketing. It has been estimated that the AI in marketing technology trends will reach a whopping $190 billion industry by 2025. When consumers get what they want with minimal effort, the AI has delivered what it has promised. And this is precisely why you should incorporate AI in your marketing business. The best example of AI marketing success is the FashionAI store by Alibaba in Hong Kong. By utilizing intelligent garment tags, smart mirrors, and omnichannel integration, the FashionAI store gave the customers a ‘never like before’ experience. 44% of the customers gave positive feedback. AR, VR, XR Augmented reality, Virtual Reality, and Extended reality play vital roles in the latest marketing technology trends. Stimulators are known to provide an exhilarating experience to users in the gaming world. So imagine what a memorable experience they will provide to the consumers when implemented in marketing. The pandemic has made people shop maximum with their fingertips, but there is still reluctance when buying the bigger things. For example, buying furniture or buying a house still needs a physical check. Well, this is where AR, VR, and XR have played significant roles. Ikea has been exemplary in implementing these latest market technology trends. Ikea allows customers to scan the space and place the chosen piece of furniture there. The spacing and dimensions are said to be 98% accurate. Thus, customers can buy the product post total satisfaction. Implementing such interactive features in the marketing departments assures total customer satisfaction. And a satisfied customer has proven to be a 99% recurring customer. Voice Search Voice search is one of the latest marketing technology trends that marketing giants have already implemented. The voice assistants of Google, Apple, Amazon, and Windows account for their 50% marketing success. Not only does this provide a personalized approach, but it also assists in maintaining sustainability. For example, suppose, a person shops a specific item through Alexa. In that case, the entire process of placing the product in the cart, making payment, and tracking the shipment till it is delivered is notified by Alexa. Even after delivering the item, Alexa is trained to ask about the product after a while. Thus, even if the buyer was not satisfied with the product, he could tell Alexa about it. This enhances the shopping experience. This implies that even if the customer was unsatisfied with a particular product, he would return to shop with Alexa again. The popularity of Voice Search has defined the term that your sales graph will see decline if you do not introduce this as one of your marketing strategies. Chatbots With the increase in the demand and supply chain of products/ services, customers need solutions to their queries in a minimum time window. Technically, a human can't be present all the time and answer error-free. Also, it leads to a generous amount of investment in the staffing department. All this can be avoided, and customers can invariably be satisfied if you introduce chatbots - one of the most successful marketing technology trends to provide solutions to queries. Chatbots have also proved to enhance the shopping experience. Chatbots can be implemented with the suitable algorithms of AI and ML. The chatbots are designed to generate quick responses to the issues raised, thus saving time and making a satisfied customer. According to a Salesforce survey, 69% of US customers prefer to get assistance and their questions answered via a chatbot. Improved Data Analytics When your business has enormous customer data ranging from personal front to behavioral patterns, you must make the proper use of it for marketing campaigns. Appropriate use of data should be the most implemented marketing technology trend in 2021. A business has access to personal information, choices, geographical locations, and customer data. This information can be used for email marketing campaigns, virtual assistants, and everything else to provide a personalized experience to the user. Gift vouchers for birthdays and reminders for anniversary gifts are perfect examples of making the correct use of data for marketing. Netflix is the best example for usage for data analytics in the right direction. The personal recommendations based on the viewing of the user is a hit strategy. 80% of the viewers watch the recommendations given by Netflix. 5G The emerging-marketing technology trends are going to require speed and reliability. For example, the website pages need to load faster, videos should not buffer but play seamlessly, and chatbots and AI features should work effortlessly for a flawless customer experience. And this all is possible if 5G technology is implemented in the services. The European countries have major goals in implementing the 5G in all possible domains. They have a plan to cover rails and roads to give people uninterrupted coverage while traveling. Once the fifth generation of mobile technology is in action, Google plans to remove all the sites that are not mobile-friendly. Billions of dollars have already been spent to build the 5G infrastructure; thus the implementation can happen in no time. However, the internet experience that 5G is promising is sure to gain momentum in businesses. To conclude Businesses need to implement these marketing technology trends to keep the graph of profits and sales soaring high. Even if your current marketing techniques prove profitable, there are high chances that times may turn, and you will have to implement the latest marketing technology trends. There will be various emerging marketing trends that will keep on making businesses attain and retain their customers. What matters is, you should know which one of them or a combination, fits your business the best. Frequently Asked Questions What are the latest technologies in the market? Artificial Intelligence (AI), Virtual Reality (VR), Augmented Reality (AR), Machine Learning (ML), 5G, and Blockchain are some of the latest technologies available in the market. How will technology help your business? Technology will ensure that you are updated with the latest marketing trends. It also helps in making profitable investments with the assurance of maintaining quality. In addition, using the newest technology reduces costs, expands the business, and increases productivity at the same time. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "What are the latest technologies in the market?", "acceptedAnswer": { "@type": "Answer", "text": "Artificial Intelligence (AI), Virtual Reality (VR), Augmented Reality (AR), Machine Learning (ML), 5G, and Blockchain are some of the latest technologies available in the market." } },{ "@type": "Question", "name": "How will technology help your business?", "acceptedAnswer": { "@type": "Answer", "text": "Technology will ensure that you are updated with the latest marketing trends. It also helps in making profitable investments with the assurance of maintaining quality. In addition, using the newest technology reduces costs, expands the business, and increases productivity at the same time." } }] }

Read More

How safe is our quantum future?

Article | June 28, 2021

If you're my age, you will remember the critical premise of the 1992 classic "Sneakers" premise, starring Robert Redford and Ben Kingsley - a top-secret black box that can break the encryption of any computer system. Quantum computing is that "black box." In the next 2-7 years, quantum computers could change the face of cybersecurity. Once they can factor products of large prime numbers (the basis of current cryptography) (expected between 2024 and 2030) – existing cyber-defense mechanisms will be rendered obsolete. We need to plan for encryption in the quantum future. What is Quantum Computing? Classical computers use binary arithmetic - all numbers are a sequence of bits - either a 1 or a 0. However, a quantum bit (qubit) exists not as a 0 or 1 but as a superposition of the two (think Schrödinger's cat). Every additional qubit doubles the processing power of a quantum computer, allowing it to execute multiple computational paths simultaneously. Similarly, as per Grover’s algorithm, it is a known fact that quantum computing divides the key space of symmetric cryptography algorithms by two, meaning that their key sizes have to be doubled to keep the safety margin of today. In October 2019, Google demonstrated quantum supremacy with Sycamore. It performed a series of operations in 200 seconds that Google claimed would take a supercomputer about 10,000 years to complete. In December 2020, physicists from the University of Science and Technology of China in Shanghai performed a Gaussian boson sampling technique with their photon-based quantum computer, named Jiuzhang. They declared that Sunway TaihuLight (the fourth fastest supercomputer in the world) would require 2.5 billion years (approx. half the age of the Earth) to finish the computations done by their quantum computer in a mere 200 seconds. Cryptography: The gatekeepers of security As the wise Spider-Man said – "With great power comes great responsibility. And great risk.” Much of the world's encrypted data is protected using mathematical equations with millions of reasonable solutions. These encryption models are too complicated for even supercomputers to solve within an acceptable period, which quantum systems can quickly solve. Modern cryptography relies on symmetric and asymmetric standards. The significant difference is that symmetric cryptography is based on substitution and permutation (there is no underlying mathematical assumption) and uses a single key for encryption and decryption. In contrast, asymmetric key / public key cryptography uses two different keys for encryption and decryption. Since the mid-90s, researchers have theorized that quantum computers can break current public-key cryptographic (PKC) systems. Their ability to concurrently test multiple hypotheses (using Shor's factorization OR Grover's exhaustive search) at unprecedented speeds will make both asymmetric and symmetric cryptosystems redundant. Understanding 5G 5G is one of the most eagerly awaited technologies in the digital world, and with good reason. In the years ahead, 5G coupled with IoT, could revolutionize the integration of digital and physical worlds. What sets it apart from its predecessor? 5G speed - it is nearly 20x faster than 4G. An average-length movie takes 6 minutes to download on 4G and less than 20 seconds on 5G. 5G supports 10x more devices per sq. km. It will seamlessly handle many more devices within the same area – a boost for IoT infrastructure. 5G latency is 25x less than 4G. According to McKinsey, 5G will speed up the mainstream adoption of IoT across multiple industries: Transport, Manufacturing, Healthcare, to name a few. 5G and Quantum – the Perfect Storm While quantum systems provide the compute, 5G provides the channel to connect more than just mobile networks (self-driving cars, personal medical tech), thus expanding the 'threat surface.' In a 5G world, secured communications are a critical component of connectivity, and post-quantum cryptography will play a key role. Researchers globally are devising ways to embed quantum-safe cryptography into 5G networks without compromising QoS. I even came across a patent for a quantum-resistant 5G SIM card by a Swiss company that set an industry best practice in ITU-T X.1811 for quantum-safe 5G. Cryptocurrency Wallets: A prime candidate for Quantum hacking Imagine you forget the password of your Bitcoin wallet, which in theory had millions of dollars in the balance. With a quantum computer, you could unlock your wallet and save yourself many worries, which worries all cryptographers. If malicious players had a quantum computer, the first thing they would try and break is the Elliptic Curve digital signature algorithm, reverse-engineer your private key, forge your digital signature, and subsequently empty your wallet. Thankfully, we are still years away from that scenario, yet that is a telling tale for designing national digital currencies that are supposed to withstand the test of time. Likewise, this vital subject – including applications with legal consequences such as smart contracts enabled by blockchain technologies, which share the same technical basis and, therefore, vulnerabilities to quantum IT -, would need a dedicated article, hopefully soon as time enables it! The real question is: when will quantum computers become a threat to public-key cryptography? As of December 2020, IBM claims to have a 65 qubit quantum computer and already delivering a 53-qubit model to a client (it would take around 1500 qubits to hack Bitcoin private keys). Quantum computers could achieve the required processing power range from as soon as 2024 to as far as 2040 per estimate. How do we solve it? Public Key Cryptography enables over 4.5 billion users to securely access over 200 million websites and engage in over $3 trillion of e-commerce transactions. Further, an estimated 20% of all IT applications rely on PKC and an even higher percentage on symmetric cryptography. According to Prof. Davor Pavuna of the École Polytechnique Fédérale de Lausanne, "several quantum prototypes might already become functional in 2023 (specifically in China)," and that potentially poses a severe protection challenge much earlier!" Many companies are developing "post-quantum cryptography" (PQC) or "quantum-safe cryptography" (QSC) – algorithms whose security is not degraded by any known quantum computing algorithms. Typical ones are McEliece cryptosystem, Lattice-based cryptosystems, Code-based Cryptography, and Hash-based cryptography. While these developments promise 'quantum resistance,' they only reflect our current knowledge of quantum computing capabilities and have a relatively low benchmark set for their security. These methods aim to create mathematical problems that are too difficult for even a quantum computer to solve, with the US National Institute of Standards and Technology (NIST) planning to recommend a PQC standard by 2022-23 and already having done so specifically for hash-based signatures. Similarly, German BSI issued official guidance for using post-quantum key exchange mechanisms, somewhat differing from NIST, and the IETF standardized two hash-based signature schemes, LMS and XMSS, independently, also with differences. Last but not least, the ITU-T issued without much publicity an amended recommendation on IPTV security X.1197 Amd1 that provides comprehensive guidance on state-of-the-art standard PQC options available as of late 2019, for use in multimedia transmission, with a corrigendum issued in early 2020. Applying the Solution Post Quantum cryptography is a developing field. Although these algorithms are quantum-resistant in theory, there is an unpredictability about their efficacy. Secondly, these algorithms are heavy on memory and compute requirements, making it challenging to apply them universally. On the other hand, symmetric cryptography is more efficient and shows more resilience to quantum IT, yet needs an upgrade to accommodate larger key sizes. One such system I came across was a patent of the aforementioned Swiss company is eAES®, which enhances AES’s quantum resistance. It makes safely increasing the key size a reality (as per NIST’s IR 8105 guidance), a claim confirmed in a report by their competitor Kudelski Security on the former’s implementation for Intel® processors. The transition to PQC standards requires a staged approach. To successfully navigate the impending cryptographic change, companies and governments must embrace crypto-agility - the ability to rapidly adapt and switch between multiple cryptographic standards at varying levels. We must support algorithms from different standardization bodies such as NIST, ETSI, the ITU-T, ISO/IEC, and the IEEE in a connected world with fractured standards. Building a global quantum security alliance We are just laying the foundations of this new security ecosystem; however, more work is needed to drive broader adoption. While the academic, innovation labs, and specialist technical communities are making some progress, cha

Read More

Build The Truth Block By Block

Article | April 12, 2021

There is nothing new about fake news. It has been in existence for centuries, albeit without the scaffolding of support from social media. From housewives’ tales to gossip magazines, the Trojan horse to the misinformation around the D-Day landing site, fake news has been a rite of passage. The Russian military made this into a fine art with “maskirovka,” the doctrine gaining superiority through deception, denial and disinformation. However, it was the 2016 U.S. presidential election that branded it with a legit identity and with such alacrity that today, I find myself questioning everything I read or hear about, no matter the veracity of the source. Fake news is a contagion that has the potency to be as disruptive as the coronavirus and must be fought with equal urgency. If you cannot solve the problem, manage it. The power behind fake news is big data — the quantum of data generated and its velocity of distribution. Big data feeds companies with interesting consumer insights on evolving trends and behaviors, which are then beautifully packaged into text, video or audio content by harnessing machine learning and deep learning algorithms. The slips happen here. If I were to personify fake news, Cersei Lannister, the manipulative, power-hungry queen in Game of Thrones, would be the perfect candidate. Cersei embellishes the truth with dramatic twists and turns to create compelling lies. We experienced a similar situation when news broke that President Trump’s grandfather owned the Arctic Restaurant and Hotel in Bennett, British Columbia, during the 1890s and 1900s, which fueled an interesting twist on the source of the family's wealth. While AI will help us identify fake news, we need a preventive measure that nips it in the bud It is almost difficult to differentiate fake news from real news. While AI will help us identify fake news, we need a preventive measure that nips it in the bud — a vaccination rather than medication. If tech helps in creating an issue, should tech help solve it too? Based on my years of experience in implementing these solutions for large enterprises and developing next-gen blockchain offerings with startups, I believe blockchain may just be the remedy we are looking for. Most technologists, however, do not consider blockchain to be a relevant or credible technology, with the primary criticisms being its lack of widespread adoption and its esotericism. But I believe the contrary. The vision of grandma-proof blockchain is becoming real — to create an inclusive global, scalable blockchain solution that can cater to every human need. Blockchain should be our weapon to effectively reduce and ultimately eradicate fake news. In blockchain, no single individual or group holds the authority, but everyone needs to approve; therefore, it enables the highest degree of integrity, privacy and security Blockchain is nothing but a distributed ledger that helps build trust in decentralized networks and that runs on the computing power of its participants. No single individual or group holds the authority, but everyone needs to approve; therefore, it enables the highest degree of integrity, privacy and security. This is accomplished by consensus algorithms. Each blockchain has adopted some form of it, and some even claim to have consensus that can prevent obfuscation of the truth even when faced with over 90% malicious intent. Blockchain technology enables a "shared single version of truth" across multiple entities based on two fundamental characteristics: immutability and traceability. Immutability Immutability is when a blockchain ledger has the capability to remain unaltered, effectively ensuring that any data on the blockchain cannot be altered — only built upon. Each block created has a unique identity and timestamp attached to it that builds a fortress around the data. Innovative upcoming blockchains use crypto-biometric identity to further buttress the fort. For example, Mediachain, a decentralized independent music library, uses blockchain to protect the originator’s authenticity by providing information about the creator, producer and lyrics to listeners. Steemit is a decentralized social media site that rewards content creators who also interact with other users. Each content piece or interaction is recorded on the immutable record by blockchain. And if news companies were to adopt blockchain — and organizations like the New York Times are already working on this — this is what we might expect: Journalists could create a block (an entry in a distributed ledger) and upload news via text, image or video. Editors would then create another new block with an edited version of the news, leaving the original block unchanged. Publishers (news agencies) would then publish the news based on their block and any changes that they might make. Each one of the participants is authenticated on the blockchain with a simple touch of their finger while protecting the fidelity of the news. Remember, entries cannot be changed, only built upon, and therefore, each change is recorded and allocated to a specific entity. For someone to “fake” the news, they would have to alter the data at each level. Infiltrating the high-security protocols would require considerable time and resource allocations. Traceability As mentioned, each block that is created has a distinct identity attached, preferably a crypto-biometric for added security and individual control. So, if fake news is generated and circulated through social media using blockchain as the base, it becomes easier to pinpoint the culprit while establishing the real source of the news. This would ascribe true content ownership to credible creators. Fake news creators are using advanced tech stacks to create deepfakes for digital deception. Generative adversarial networks (GANs) can help them to create deepfakes of images and videos that can even counteract or deceive advanced AI/ML algorithms. Of course, GANs are also being used to detect fake news now. If technology has helped fake news become compelling and believable, let’s use intelligent and available technology like blockchain to at least control it, if not eradicate it. Then again, if blockchain had existed in the medieval ages, we would have been denied the entertaining antics of Cersei Lannister and the wonderful blockbuster series that kept most of us enthralled!

Read More

What Is An AI Model?

Article | May 24, 2021

Reveal makes extensive use of AI models. Generally, an AI model is a software program that has been trained on a set of data to perform specific tasks like recognizing certain patterns. Artificial intelligence models use decision-making algorithms to learn from the training and data and apply that learning to achieve specific pre-defined objectives. Reveal offers a Model Library which consists of a collection of pre-existing models you can use straight out of the box, extend or adapt to suit your specific needs, or stack and pack to achieve a larger objective. We give you the ability to create your own AI models, which you can use for your own purposes as well as make available to others via our Model Marketplace. We also will work with you to create custom models such as the ones that drive DLA Piper's Aiscension and those used by Epiq in its new AI Model Library program.

Read More

Spotlight

Nexus - A Dimension Data Company

Nexus was acquired by Dimension Data in 2014. Nexus, a Dimension Data Company, is passionate about our belief in the power of advanced technologies to transform business. We have over 30 years of experience helping organizations Connect to their customers, Collaborate to achieve their vision, and Create innovative ways to solve business problems using advanced technology. We do this by providing expertise in end-to-end technology solutions based on our distinct, yet complementary practices: Collaboration, Data Center, Cloud, Enterprise Networks, Business Video, and Consulting and Managed Services.

Events