NTT Communications recorded strong top-line performance in FY 2018, with revenue and income growth of 4.4% and 11.5%, respectively.
In FY 2019, the provider will focus on brand integration across NTT Communications, Dimension Data and NTT Security, as well as a vertical strategy through its ‘Smart World’ initiatives.
Earlier this month (May 10, 2019), NTT Communications released its FY 2018 results (ended in March 2019). The provider recorded strong top-line performance, with growth in revenue and income by 4.4% to 1,392 billion yen (~US$12.7 billion) and 11.5% to 132 billion yen (US$1.21 billion), respectively. This growth may not be so high in general, but it is impressive considering the slowdown in the telecom and ICT market. For example, compared with its regional peers, both Singtel and Telstra saw flat revenue in their latest financial year, with changes of only 0.6% and 0%, respectively. NTT Communications’ FY 2018 revenue also exceeded its target set a year prior, by 12 billion yen (US$110 million). The increase was mainly driven by the double-digit growth in cloud (12.0%), solution services (11.9%) and global business (11.2%). Continue reading “NTT Recorded a Strong FY 2018 and Revealed Its 2019 Plan”→
Due to their privileged access to high-value corporate assets, executives are in the crosshairs of cyber attackers, according to the latest Verizon Data Breach Investigations Report.
The Verizon report found that the combination of access and the need to make quick decisions made C-level executives more vulnerable to social engineering attacks.
Enterprising cyber attackers driven by a money motive are setting their sights on objects that will deliver the highest returns. Thanks to their access to high-value systems and data, C-level executives are a prime target for social engineering hacks. This year’s Verizon Data Breach Investigation Report (DBIR) found social attacks, including business e-mail compromises (BECs) against enterprise executives, are on the rise. Speculating that the combination of proximity to high-value assets and the intensive pressure of their roles, which limits executive time to scrutinize messages, makes them more vulnerable than most employees with less critical roles, the Verizon DBIR claimed that staffers in leadership are 12 times more likely to be the victims of credential theft or other social incidents, such as being tricked into transferring money to an adversary’s bank account. Continue reading “New Research Reveals C-Level Execs Are Prime Targets for Cyber Attackers”→
• Cost sharing between vendors/SPs and customers can strengthen relationships in a difficult time.
• Calm and deliberate planning by vendors/SPs and customers is key to minimizing impacts to business.
The new tariffs on imported goods in China and the U.S. will have a significant impact on pending and future deals, both for service providers, vendors, and customers. The technology industry has a complex and deeply international supply chain, with U.S. and Chinese companies both utilizing components and intellectual property. Component price increases will lead to sharp increases in product costs. These increases will slow or stall deals as customers may wait and see if the issues can be resolved in a short time frame. Continue reading “Geopolitical Issues Roil IT Sector”→
San Francisco’s ban on the use of facial recognition technology by municipal agencies is noteworthy given the city’s high-tech affiliation and AI’s potential applications in public safety.
The safety-enhancing benefits of facial recognition are not resonating; instead, the technology has become a lightning rod for societal concerns related to privacy and inequality.
San Francisco is set to become the first major U.S. city to ban the use the facial recognition technology by municipal agencies. On Tuesday, the San Francisco Board of Supervisors voted in favor of the ‘Stop Secret Surveillance Ordinance,’ outlawing the use of the AI-based technology by city departments. The move is particularly noteworthy because it originates in a part of the U.S. otherwise known for embracing high tech and because it restricts the use of artificial intelligence for public safety, widely considered a top use case for facial recognition technology. However, San Francisco isn’t the only city evaluating restrictions on facial recognition; the issue is top of mind among lawmakers in many regions. Continue reading “Facial Recognition: A Lightning Rod for Societal Concerns in San Francisco”→
Red Hat OpenShift 4 reflects a reengineered platform service shored up by CoreOS management technology and integrated with RHEL, targeting operations’ need for ALM automation.
Red Hat and Microsoft deepen their partnership to offer enterprise-grade Kubernetes under a one-click service and include Azure services such as ML, IoT, and serverless computing.
Red Hat is strengthening its OpenShift strategy and competitive standing by leveraging its recognition in the Linux world through Red Hat Enterprise Linux (RHEL) and integrating, for the first time, its two flagship technologies. The move serves to tackle enterprise operations’ need for improved application lifecycle management (ALM) as customers move into complex projects that modernize app development and deployment. Continue reading “Red Hat’s Reengineered Cloud Platform Addresses Ops Automation, Hybrid Management”→
• An agreement between Apple and AT&T allows the operator to simplify customer enrollment, device configuration, activation, and MDM software integration
• An expanded agreement with Apple and SAP uses on-device machine learning to help customers create custom, intelligent iOS apps that use augmented reality (AR), and enhance business tasks
While Apple has been successfully courting enterprise buyers for many years with the iPhone and iPad, recent alliances suggest new ways for it to penetrate business accounts. Many businesses already appreciate Apple’s built-in security, while Android devices and laptops provide more variety and less of a vendor lock-in. MDM software for first-line device management and security is about the same on either platform today. So what are the kinds of agreements that Apple is making lately to fortify its position? Continue reading “Apple Still Courting the Enterprise with New Alliances”→
• Many organizations need help navigating ethical issues related to artificial intelligence (AI), such as privacy laws, unintentional bias, and lack of model transparency, but don’t know where to begin.
• Enterprises can benefit from working with a partner that helps them consider the ethical implications of their AI deployments, but they should keep in mind that issues aren’t static and can evolve over time.
Organizations are eager to enjoy the benefits that AI can bring to them – whether enhanced productivity, or new revenue-generating or enhanced customer experience opportunities. But many are unclear about how to navigate the murky waters of AI and ethics. Changing regulations and privacy laws, concerns over unintentional bias in training data, lack of transparency in AI models, and the dearth of experience with new use cases are difficult challenges to address. Enterprises want to ensure that their adoption of the technology doesn’t cross ethical boundaries, but often don’t know where to begin. Thankfully, the topic is being increasingly addressed by IT services providers. Many organizations, from IBM to Capgemini to Atos are touting that they help their customers implement AI while also considering the ethical implications of their deployment. Continue reading “AI and Ethics: The Waters are Murky, but Help is Available”→
Middle East telcos are taking a proactive approach in their 5G deployments, and Huawei is an active player in the region.
While standards are shaping up and roadmaps evolving, partner selection is happening now.
5G is an emerging technology that transforms underlying architecture in core networks and promotes virtualization, AI and automation. It changes the possibilities of networks, applications and underlying IT systems. It introduces several new technologies that are different from any previous technology, some of which include:
Ultra-low latency – opens up new possibilities to converge the performance of network and apps, as well as entirely new use cases for cloud-based AR/VR. The health sector, for example, highlights possibilities in areas such as remote surgery.
Network slicing – allows users to set their own QoS/CoS parameters around virtual networks; advances SD-WAN; addresses security differently and opens new possibilities in IT/OT security.
Massive bandwidth – an ability to support 10 Gbps potentially, offering a lot of capacity to the last mile and resolving many bottlenecks we have today.