NTT Recorded a Strong FY 2018 and Revealed Its 2019 Plan

A. Amir

Summary Bullets:

  • NTT Communications recorded strong top-line performance in FY 2018, with revenue and income growth of 4.4% and 11.5%, respectively.
  • In FY 2019, the provider will focus on brand integration across NTT Communications, Dimension Data and NTT Security, as well as a vertical strategy through its ‘Smart World’ initiatives.

Top-Line Performance

Earlier this month (May 10, 2019), NTT Communications released its FY 2018 results (ended in March 2019). The provider recorded strong top-line performance, with growth in revenue and income by 4.4% to 1,392 billion yen (~US$12.7 billion) and 11.5% to 132 billion yen (US$1.21 billion), respectively. This growth may not be so high in general, but it is impressive considering the slowdown in the telecom and ICT market. For example, compared with its regional peers, both Singtel and Telstra saw flat revenue in their latest financial year, with changes of only 0.6% and 0%, respectively. NTT Communications’ FY 2018 revenue also exceeded its target set a year prior, by 12 billion yen (US$110 million). The increase was mainly driven by the double-digit growth in cloud (12.0%), solution services (11.9%) and global business (11.2%). Continue reading “NTT Recorded a Strong FY 2018 and Revealed Its 2019 Plan”

New Research Reveals C-Level Execs Are Prime Targets for Cyber Attackers

A. DeCarlo
A. DeCarlo

Summary Bullets:

  • Due to their privileged access to high-value corporate assets, executives are in the crosshairs of cyber attackers, according to the latest Verizon Data Breach Investigations Report.
  • The Verizon report found that the combination of access and the need to make quick decisions made C-level executives more vulnerable to social engineering attacks.

Enterprising cyber attackers driven by a money motive are setting their sights on objects that will deliver the highest returns. Thanks to their access to high-value systems and data, C-level executives are a prime target for social engineering hacks. This year’s Verizon Data Breach Investigation Report (DBIR) found social attacks, including business e-mail compromises (BECs) against enterprise executives, are on the rise. Speculating that the combination of proximity to high-value assets and the intensive pressure of their roles, which limits executive time to scrutinize messages, makes them more vulnerable than most employees with less critical roles, the Verizon DBIR claimed that staffers in leadership are 12 times more likely to be the victims of credential theft or other social incidents, such as being tricked into transferring money to an adversary’s bank account. Continue reading “New Research Reveals C-Level Execs Are Prime Targets for Cyber Attackers”

Geopolitical Issues Roil IT Sector

S. Schuchart

Summary Bullets:

• Cost sharing between vendors/SPs and customers can strengthen relationships in a difficult time.

• Calm and deliberate planning by vendors/SPs and customers is key to minimizing impacts to business.

The new tariffs on imported goods in China and the U.S. will have a significant impact on pending and future deals, both for service providers, vendors, and customers. The technology industry has a complex and deeply international supply chain, with U.S. and Chinese companies both utilizing components and intellectual property. Component price increases will lead to sharp increases in product costs. These increases will slow or stall deals as customers may wait and see if the issues can be resolved in a short time frame.
Continue reading “Geopolitical Issues Roil IT Sector”

Can We Use Blockchain to Thwart Fake News?

J. Marcus

Summary Bullets:

  • Digital media faces a ‘fake news’ problem where sources may be biased or worse, and actual content may be manipulated.
  • Orange is behind Safe.press, a blockchain-based consortium for certifying news sources as legitimate – and not ‘fake.’

As investigative journalists and whistleblowers struggle to be heard in calling out the rampant abuse of social networks in propagating ‘fake news,’ one startup is trying to tackle the issue with new technology. Continue reading “Can We Use Blockchain to Thwart Fake News?”

Facial Recognition: A Lightning Rod for Societal Concerns in San Francisco

R. Bhattacharyya

Summary Bullets:

  • San Francisco’s ban on the use of facial recognition technology by municipal agencies is noteworthy given the city’s high-tech affiliation and AI’s potential applications in public safety.
  • The safety-enhancing benefits of facial recognition are not resonating; instead, the technology has become a lightning rod for societal concerns related to privacy and inequality.

San Francisco is set to become the first major U.S. city to ban the use the facial recognition technology by municipal agencies. On Tuesday, the San Francisco Board of Supervisors voted in favor of the ‘Stop Secret Surveillance Ordinance,’ outlawing the use of the AI-based technology by city departments. The move is particularly noteworthy because it originates in a part of the U.S. otherwise known for embracing high tech and because it restricts the use of artificial intelligence for public safety, widely considered a top use case for facial recognition technology. However, San Francisco isn’t the only city evaluating restrictions on facial recognition; the issue is top of mind among lawmakers in many regions. Continue reading “Facial Recognition: A Lightning Rod for Societal Concerns in San Francisco”

Red Hat’s Reengineered Cloud Platform Addresses Ops Automation, Hybrid Management

C. Dunlap

Summary Bullets:

  • Red Hat OpenShift 4 reflects a reengineered platform service shored up by CoreOS management technology and integrated with RHEL, targeting operations’ need for ALM automation.
  • Red Hat and Microsoft deepen their partnership to offer enterprise-grade Kubernetes under a one-click service and include Azure services such as ML, IoT, and serverless computing.

Red Hat is strengthening its OpenShift strategy and competitive standing by leveraging its recognition in the Linux world through Red Hat Enterprise Linux (RHEL) and integrating, for the first time, its two flagship technologies. The move serves to tackle enterprise operations’ need for improved application lifecycle management (ALM) as customers move into complex projects that modernize app development and deployment. Continue reading “Red Hat’s Reengineered Cloud Platform Addresses Ops Automation, Hybrid Management”

Apple Still Courting the Enterprise with New Alliances

Kathryn Weldon – Research Director, Business Network and IT Services – Americas

Summary Bullets:

• An agreement between Apple and AT&T allows the operator to simplify customer enrollment, device configuration, activation, and MDM software integration

• An expanded agreement with Apple and SAP uses on-device machine learning to help customers create custom, intelligent iOS apps that use augmented reality (AR), and enhance business tasks

While Apple has been successfully courting enterprise buyers for many years with the iPhone and iPad, recent alliances suggest new ways for it to penetrate business accounts. Many businesses already appreciate Apple’s built-in security, while Android devices and laptops provide more variety and less of a vendor lock-in. MDM software for first-line device management and security is about the same on either platform today. So what are the kinds of agreements that Apple is making lately to fortify its position? Continue reading “Apple Still Courting the Enterprise with New Alliances”

Open Infrastructure Summit 2019: Cloud Providers and Data Center Giants Link Arms to Achieve Multiple Cloud Management

C. Dunlap

Summary Bullets:

  • Last week’s Open Infrastructure Summit conference highlighted key cloud management partnerships between OpenStack and public cloud providers.
  • This week, during Red Hat Summit, we expect the company to focus on OpenShift’s ability to accelerate multi-cloud deployments as well.

This year’s Open Infrastructure Summit, held in Denver, reflected the culmination of the past year’s progress in important hybrid and multi-cloud management advancements, helping to clarify the role traditional infrastructure providers will play in enterprise DevOps strategies. This role is being realized through partnerships with public cloud providers where Cisco, VMware, and others are integrating their core data center technologies with the evolving cloud management platforms offered by Microsoft, Amazon, and Google, enabled through standard interconnect protocols (please see Open Infrastructure Summit 2019: Data Center Giants Cisco and VMware Hitch Their Wagons to Multiple Cloud Partners,” May 6, 2019). Continue reading “Open Infrastructure Summit 2019: Cloud Providers and Data Center Giants Link Arms to Achieve Multiple Cloud Management”

AI and Ethics: The Waters are Murky, but Help is Available

R. Bhattacharyya

Summary Bullets:

• Many organizations need help navigating ethical issues related to artificial intelligence (AI), such as privacy laws, unintentional bias, and lack of model transparency, but don’t know where to begin.

• Enterprises can benefit from working with a partner that helps them consider the ethical implications of their AI deployments, but they should keep in mind that issues aren’t static and can evolve over time.

Organizations are eager to enjoy the benefits that AI can bring to them – whether enhanced productivity, or new revenue-generating or enhanced customer experience opportunities. But many are unclear about how to navigate the murky waters of AI and ethics. Changing regulations and privacy laws, concerns over unintentional bias in training data, lack of transparency in AI models, and the dearth of experience with new use cases are difficult challenges to address. Enterprises want to ensure that their adoption of the technology doesn’t cross ethical boundaries, but often don’t know where to begin. Thankfully, the topic is being increasingly addressed by IT services providers. Many organizations, from IBM to Capgemini to Atos are touting that they help their customers implement AI while also considering the ethical implications of their deployment.
Continue reading “AI and Ethics: The Waters are Murky, but Help is Available”

Huawei Analyst Day 2019: Addressing the 5G Challenge for Middle East CSPs

D. Kehoe

Summary Bullets:

  • Middle East telcos are taking a proactive approach in their 5G deployments, and Huawei is an active player in the region.
  • While standards are shaping up and roadmaps evolving, partner selection is happening now.

5G is an emerging technology that transforms underlying architecture in core networks and promotes virtualization, AI and automation. It changes the possibilities of networks, applications and underlying IT systems. It introduces several new technologies that are different from any previous technology, some of which include:

  • Ultra-low latency – opens up new possibilities to converge the performance of network and apps, as well as entirely new use cases for cloud-based AR/VR. The health sector, for example, highlights possibilities in areas such as remote surgery.
  • Network slicing – allows users to set their own QoS/CoS parameters around virtual networks; advances SD-WAN; addresses security differently and opens new possibilities in IT/OT security.
  • Massive bandwidth – an ability to support 10 Gbps potentially, offering a lot of capacity to the last mile and resolving many bottlenecks we have today.

Continue reading “Huawei Analyst Day 2019: Addressing the 5G Challenge for Middle East CSPs”