Unlocking Efficiency: How Stablecoins Can Drive Cost Reductions for Telcos and Other Consortia

There are perpetual challenges in the ever-evolving landscape of telecommunications. To achieve increased efficiency and continue to reduce costs, it becomes necessary for the industry to grapple with the ongoing issue of complex and costly financial transactions. Emerging technologies, such as stablecoins, could become a potential pathway toward offering streamlined and cost-effective solutions that advance how business is conducted. Built on similar digital infrastructure to cryptocurrencies, stablecoins differ from other digital assets in that they are pegged to a stable reserve, usually a real-world fiat currency or a basket thereof (e.g., SDR). This brings a level of predictability and stability to financial transactions that traditional cryptocurrencies, such as Bitcoin, lack. For telcos and other similar consortia, this stability offers a myriad of benefits, creating a ripple effect across operations.

Instantaneous and low-cost

Traditional financial transactions, especially those involving cross-border payments are hindered by fees, delays, and the exchange rate fluctuations of differing fiat currencies. One of the primary advantages of stablecoins for settlements in telecommunications is the reduction in transaction costs.

With the benefits of crypto and additional stability, stablecoins act as a bridge between the old and new financial systems, enabling seamless, rapid and low-cost transactions. E.g., A transaction of $200 transferred via stablecoin remittance can cost a few cents (Blockchain “gas fees”), versus the global average charge of $12, (or even up to $30 in some jurisdictions) for transferring traditional cash. With stablecoins, telcos can avoid the complexities associated with multiple currency conversions and international wire transfers. Telcos can mitigate currency risk by conducting transactions using stablecoins, ensuring that the value of assets remains consistent. This stability not only protects against potential losses but also provides a foundation for better financial planning and budgeting.

The instantaneous and low-cost nature of stablecoin transactions significantly reduces the time and resources required for financial settlements, providing an attractive and effective alternative to traditional banking systems. The infrastructure underpinning stablecoin transactions streamlines payroll, vendor payments, and other financial transactions. It eliminates the need for intermediaries in cross-border transactions. The associated fees can result in substantial cost savings, allowing telcos to allocate resources more strategically to vital projects. Overall, the speed and resource-saving capabilities foster smoother collaboration and quicker decision-making internationally.

Innovative financial solutions

Across industries, it’s clear that the versatility of stablecoins extends beyond the realm of financial transactions for telcos. These digital assets can be utilized for a variety of purposes including loyalty programs, incentive schemes, and even customer rewards. For example, there is potential to use stablecoins to enable automated payments with concepts such as non-fungible tokens (NFTs) or in the metaverse. As the market share for digital assets continues to grow, forecast to reach $56.4 million in annual revenue in 2023 and 994 million users by 2027, it makes sense for telcos to explore creative ways to integrate stablecoins into their business models. This further fosters customer engagement and loyalty while reducing the operational costs associated with similar customer loyalty and digital asset products utilizing mainstream technology.

As of 2021, the World Bank still classifies 1.4 billion people globally as ‘unbanked’, but recognizes that digital financial services signal a reduction in this figure. Around 18% of the global population have limited or no access to financial infrastructure to facilitate easy payments or other financial services. Blockchain and stablecoins represent financial inclusion for this segment of the world’s population, providing access to digital financial services for individuals and entities excluded from traditional banking systems. The only barrier to entry is the need for access to a smartphone. In regions with limited access to banking infrastructure, telcos can use stablecoins to think innovatively regarding the financial solutions they are providing. In turn, we can reach a broader market share than was previously possible, fostering economic growth globally.

Maximizing the benefits

The adoption of stablecoins in the telecommunications sector is not without its challenges. Regulatory uncertainty is an ongoing problem, especially in the United States where the slow pace of policy development leaves the U.S. falling behind in the global race to lead in the field of digital assets. The importance of regulatory clarity is seen especially in regions such as the European Union which is developing more in-depth guidance, strengthening its position in the future of digital assets.

Security concerns, such as the potential for smart contract code vulnerability which can lead to potential stablecoin theft, also stymies large-scale adoption. Overcoming these concerns is crucial for stablecoins to achieve the adoption needed in the telco industry. At the same time, security issues can be overcome with sufficient funding for security research, community engagement, and industry-wide collaboration. This is true even as new security issues inevitably will arise. All of the above must be addressed to ensure a smooth transition to this new structural paradigm for settlements.

Stablecoins offer immense promise for the industry. From cutting transaction fees and mitigating currency risk to enabling faster, more transparent financial processes, stablecoins offer a transformative solution for many industries, particularly telecommunications. As these digital assets continue to gain traction, the telecommunications sector has a unique opportunity to embrace innovation and push the world towards a more international, financially accessible, efficient, and cost-effective future.

Who is Responsible for Gen AI? The Matter of Accountability

Gen AI is one of the hottest technological trends of the past few years, with the number of people who regularly use it for their work steadily on the rise. However, the benefits of Gen AI also come with many risk factors, from its potential to spread misinformation to the ways criminals can use it as a tool of cyber warfare. As such, organizations need to be ready to reckon with these ethical considerations before they adopt AI-powered technologies, placing accountability at the heart of their digital transformation plan. But what does accountability really mean and how much do we understand about Gen AI to hold it accountable?

Generally speaking, accountability means being held responsible for decisions made and actions taken, with the understanding that you’re being held to some ethical standards. This also means that if you fall short of meeting these standards, actions will be taken to address the issue. It is all about taking ownership of what you do and accepting the consequences of those actions. A failure to show accountability can badly hurt one’s reputation, while those who hold themselves accountable are more highly regarded and generally seen as more trustworthy.

The concept of accountability is a bit more complicated when it comes to AI because of the technology’s ability to generate content and make decisions independently from direct human orders which can come with serious ethical considerations. Yet no matter how “intelligent” AI might be, it has no autonomy or intent, meaning it cannot be held accountable in any meaningful sense. You cannot punish an algorithm for not staying true to its word. This begs the question then: who is accountable for what an AI does: the company that made it, the individuals who use it, or the government that regulates its use?

With so much uncertainty around Gen AI and its usage, we don’t really have any hard answers yet. So at this point, everyone who could be responsible for what AI does needs to take action. We’ve already seen widespread regulatory responses globally: the UK held the AI Safety Summit at Bletchley Park in November 2023, and while British Prime Minister Rishi Sunak said his country’s approach wasn’t to “rush to regulate”, he still stressed that only governments can keep people safe from AI’s risks. Last year also saw the President’s Council of Advisors on Science and Technology (PCAST) launch a working group on Gen AI to determine how to ensure that the tech is developed and deployed as equitably, responsibly, and safely as possible. Meanwhile, the National Institute of Standards and Technology (NIST) introduced an AI Risk Management Framework, while the Health Information Trust Alliance (HITRUST) launched its AI Assurance Program focused on supporting organizations seeking security assurances for AI applications and systems.

As for companies, steps need to be taken to ensure that Gen AI lives up to its fullest potential, delivering the greatest value while keeping possible risk factors in check. To make this a reality, it is important to have an AI story in mind. Before you adopt, ask yourself: what will AI help you accomplish, what are the positives of using it, and what are the potential dangers? Many companies are eager to monetize Gen AI, but they cannot afford to ignore the risks to their organization or their people. This is Gen AI without any accountability and it’s an approach that is bound to fail.

Any cutting-edge technology will inevitably come with its share of risks, but that doesn’t mean that we can’t do anything about them. Companies can overcome many of the most common risks associated with Gen AI by establishing clear frameworks and guidelines for their usage. Whether they are topical guardrails that prevent AI models from answering unrelated questions to security measures that only allow models to connect to safe external third-party applications, guardrails add a layer of security that makes it easier to prevent problems down the road.

As Gen AI grows more advanced and widespread, guaranteeing the safety and responsible use of AI models becomes increasingly paramount. Since an AI cannot be held accountable, it is pertinent that organizations take steps to hold themselves accountable for what their AI tools might do. Not only will this extra degree of rigor drive better results overall, but it will also shield organizations from backlash if something goes wrong. So remember, if you don’t know who will be held accountable for the actions of your AI investments, it might be you. Plan accordingly!

Artificial Intelligence & Ethics: Addressing the Weaponization of AI

Over the last few years, we’ve seen a wave of digital innovation, with several new and emerging technologies seeing wider adoption. There is perhaps no better example than AI technology, which has advanced profoundly in recent years, with innovations spanning many industries. Generative AI in particular has seen an impressive level of adoption, with 79% of respondents to a recent McKinsey survey saying they had at least some exposure to gen AI, while 22% said they used it regularly in their work

As we continue to innovate and utilize this technology, it’s important that we start thinking about the ethics involved in its usage and how we can establish those ethics within the tech world. The concept of AI ethics is a multidisciplinary practice that aims to determine how to optimize the technology’s beneficial impact while reducing potential risks and adverse outcomes. It encompasses a wide range of issues, from data privacy and value alignment to transparency and explainability. 

Given the sheer number of ethical conversations surrounding AI technologies at the moment, businesses cannot afford to adopt AI technology without also considering the possible ethical considerations. There are a number of different ways AI can be harmful if ethics aren’t at the forefront of its design, from instances of bias and discrimination across various intelligent systems to the way AI could disrupt certain industries and render some jobs obsolete. Yet perhaps the biggest immediate concern surrounding AI is the way it could be used as a tool for cyberwarfare. 

Cybercriminals are already weaponizing generative AI to bolster social engineering attacks, using them to hack passwords, leak confidential information, and scam users across a number of platforms. Gen AI can automate these attack options and substantially lower the barrier of entry to attempt fraud and social engineering schemes. We’re even seeing gen AI tools being used for entirely new breaching techniques: a recent report highlighted how hackers can use ChatGPT to generate URLs, references, code libraries, and functions that do not exist within a dev’s system, spreading malicious packages without having to rely on more familiar techniques

There are also concerns regarding how AI can be used toward political ends: AI-generated video, still images, and fundraising emails designed to influence voters are already being spread well ahead of the next presidential election, and many experts are predicting that AI technology will transform warfare in ways that places decision making outside of the hands of human leadership. Many experts in intelligence and technology have pointed out several ways in which AI could drive up the possibility of nuclear war, from potential algorithmic errors to outside interference from false-flag operations. U.S. military officials have noted the importance of establishing restraints on the use of AI technology and the Intelligence Community has made commitments to ethical AI design and development, but this only scratches the surface when it comes to AI risk mitigation.

This only covers some of the major points surrounding AI, its potential weaponization, and the need for ethical considerations to ensure it’s used responsibly. Yet there is still a lot more to know about the topic. I will be starting a new video series on AI and Ethics, where I will cover current regulations around the technology and how we can better weave ethics into AI going forward.

With a commitment to ethical principles and responsible utilization, AI has the ability to enhance our lives and make a positive difference in our communities. Together, let's continue to create a future where privacy, equity, and human values are prioritized and progress is achieved in perfect harmony with the needs of people.

Sources to reference:

Advancing Women in Tech: A Look into How Far We’ve Come

While we still have a lot of work ahead of us to completely diminish the gender gap in STEM and increase the amount of women in the field, it’s important to notate the progress and celebrate the great strides forward in the past year so we can carry this momentum into 2022, and beyond.

As a woman who has devoted her professional career to STEM, I have seen firsthand the need for creating more opportunities, representation, and incentives to encourage more women and young girls to enter the field. This past year, we’ve taken important steps in the right direction. By building upon the framework of these forward-thinking initiatives and continuing to take tangible action to elicit change within our communities, we can continue to close the gender gap in STEM.

Increased Representation

The media plays a huge role in how people, especially young people, see themselves and the world around them. For years, young women have seen depictions of other women in the media that shape their dreams and possibilities. Recently, we’ve seen a push to include more representation of women in STEM in the media for young girls to look up to.

In June of 2021, 3M released Not the Science Type, a documentary series showing four women’s different experiences facing stereotyping, gender inequality, and racial and age discrimination while rising to the top of their careers in biology, engineering and science and technology-based applications. All four women shared one common theme: they felt underrepresented in the STEM field and wanted to change that for the next generation of females. As a woman who faced similar experiences working in the sciences, I applaud the strength and courage these women have for sharing their journeys and becoming four role models for girls to look up to. The importance of representation, specifically for girls to see that a career in the sciences is possible, cannot be overlooked.

British Foreign Secretary and equalities minister, Liz Truss, is also making important strides to get more women into STEM jobs. She recently announced her plan to create two government led task forces to examine ways to boost the representation of women in STEM jobs and at the helm of start-ups, with “equality of opportunity” as the main goal. It’s amazing to see these initiatives being taken at the government level, and I am looking forward to seeing the progress that is made from these panels. I hope that other countries follow suit.

Education

It’s important for women in STEM to be represented in the media as an example for the generations to come, but it’s equally important to actually provide educational and learning communities for young women who want to grow in STEM.

An example of an organization that has done a great job closing the gender gap in tech over the past years is girls who code. Extending from 3rd grade to college-aged students, the organization has programs that foster young girls’ interests in math and science. Not only showing girls how fun a career in tech can be but also showing them that there’s a community of people who want to see them succeed. I love the message behind the organization’s recent campaign, #MakeThatChange, where they share: “when you learn to code, you can not only make the change you want to see in the world, but you can change the trajectory of your own life, too. And when women in tech come together, they don’t just make change — they #MakeThatChange.”

Other educational opportunities on the horizon for women interested in entering the field are college scholarships. After researching, I found numerous scholarships for women who want to study STEM. The Young Women in STEM Scholarship encourages the future generation of women in STEM fields, by offering scholarships to female high school seniors and undergraduate students that are from low-income households and are pursuing a degree in STEM. Other scholarships include: Latinas in STEM Scholarship, Connie Konatsotis Scholarship, Elevate Women in Technology Scholarship, and more.

With varying backgrounds and financial situations, college scholarships are a great way to attract more young women to enter the field and strive for success. This is an area I hope to see expand in opportunity over the next year.

By bringing different perspectives to the table, changing the status quo, and providing learning and growth opportunities, we can work to continue changing STEM’s male-dominated institutions. With over 35 initiatives aiming to close the gender gap in cybersecurity by attracting more women into the field, we have a bright future ahead and I’m excited to see these young women change cybersecurity for the better.

And for the young women who are interested in pursuing a career in STEM, we believe in you.

Privacy Isn’t Dead

For most organizations, data is at the center of business. This information helps drive strategy, allowing companies to meet consumer needs, respond to shifts in the market/consumer behavior, and react to unforeseen events effectively. As businesses continue collecting, storing, and sharing personal information, online privacy is a growing concern. According to a 2020 Consumer Privacy Survey conducted by CISCO, 89% of consumers say they care about data privacy. Even more, 29% of consumers said they have abandoned companies due to bad data practices.

These numbers don’t lie! It is apparent that privacy isn’t dead. In fact, it’s very much alive, and organizations must take the necessary steps to prioritize and protect consumers' data.

So, how can organizations proactively prioritize privacy? The answer: Privacy by Design (PbD.) This method outlines a framework that businesses can use to proactively embed privacy into the design and operation of IT systems, networked infrastructure, and business practices. The purpose of PbD is to enable companies to successfully adhere to data protection by implementing data processing procedures when the technology is created versus trying to fix the problem after the fact. AKA, taking a proactive approach rather than a reactive approach. While the PbD framework has been around since the late 1900s, it has never been made a top priority by businesses.

Unfortunately, cybercriminals are only becoming more sophisticated. Your privacy is being co-opted, and cybercrime can do immeasurable (and sometimes irreversible) damage to not only your reputation but your business’ reputation as well. It’s so important that our data privacy protection efforts evolve to combat these growing threats. As a champion for PbD, I’d love to tell you why businesses should start incorporating it into their processes from an ethical/ safety perspective, as well as explore the (many) benefits this adjustment can have to business success.

Proactive over Reactive

Citing Ann Cavoukian’s Privacy by Design Principles, PbD anticipates and prevents privacy attacks before they happen, not after the fact, emphasizing an organization’s commitment to enforcing high standards of privacy. In order for this principle to be successful, company leaders must understand the importance of PbD, share the company’s commitment to internal staff and stakeholders, and engrain the design into the company’s IT systems. The more organizations that adopt these safe practices will also help expedite industry-wide privacy regulations that are frankly inevitable.

So how would proactive data protection benefit business success? Simple. Privacy by design can prevent organizations from failing customer, employee, regulatory, and societal expectations. This preventative approach can also reduce spending and complexity on the front end, as intrusive data events can be extremely costly and difficult to resolve. In fact, INTRUSION, Inc. predicts Cybercrime is expected to cost companies worldwide an estimated $10.5 trillion annually by 2025, up from $3 trillion in 2015. A cost we simply cannot ignore and must work to combat.

Provide Structure

Privacy by Design offers an effective system across an entire organization. Jessica Wilburn explains how to, “Instill an organization-wide commitment to privacy as a first principle, in any organizational decision,” through PbD. Embedding privacy into your IT systems acts as a safety net for your organization, but also sets the tone for company values. It shows that your company leadership takes user privacy seriously and wants their employees to do the same. Of course, creating policies and having workshops on the topic is important, but creating a foundation on privacy is the most important step for company adoption.

Strategic Advantage + Building Trust

There’s no question that establishing privacy programs gives your company a competitive advantage. As we discussed above, consumers consider their privacy to be extremely valuable, and that sentiment is only increasing. Exhibiting respect for your customers’ privacy and taking the necessary steps to protect their data will help cultivate brand loyalty and trust. Companies like Apple have leveraged this by promoting numerous ways in which their products and services are designed with individual privacy protection in mind. Furthermore, showing dedication and transparency with these efforts will extend to company stakeholders as well, creating a culture of continuous improvement.

We’re entering an era where digital is king. Opportunities to engage with your customers online will continue to grow, as will your data collection. Moreover, as your organization continues to advance its digital transformation efforts, established data protection efforts will enable uninterrupted innovations in your products or services and mitigate losses related to data breaches. Basically, PbD’s stability allows for companies to take risks and grow.

Data privacy is complex and often nuanced, and protection efforts/ strategies don’t happen overnight. Organizations must confront this factor and instill an organization-wide commitment to privacy. Utilizing Privacy by Design within a company's privacy infrastructure is a necessary first step to building a foundation for a more sustainable company in the long run. Privacy is everyone’s responsibility. So let’s do our part!

Supporting Articles:

https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cisco-consumer-privacy-infographic-2020.pdf

https://www2.deloitte.com/content/dam/Deloitte/ca/Documents/risk/ca-en-ers-privacy-by-design-brochure.PDF

https://iapp.org/media/pdf/resource_center/pbd_implement_7found_principles.pdf

https://www.globenewswire.com/news-release/2020/11/18/2129432/0/en/Cybercrime-To-Cost-The-World-10-5-Trillion-Annually-By-2025.html#:~:text=Every%20U.S.%20business%20is%20under%20cyberattack&text=18%2C%202020%20(GLOBE%20NEWSWIRE),%243%20trillion%20USD%20in%202015

https://www.navexglobal.com/blog/article/privacy-by-design-why-compliance-should-lead-the-data-privacy-charge/

https://www.jdsupra.com/legalnews/privacy-by-design-establishing-robust-8269008/

The Gender Dilemma in Cyber Security

According to a 2019 study from an ISC(2) report, women make up only 24% of the cybersecurity workforce. Unfortunately, this staggering statistic isn’t news to anyone. Cyber has had a gender problem for years now, but this figure has become especially problematic due to the severe skills deficit the industry is currently facing. As hackers become more sophisticated, the risk of cyber-attacks has grown exponentially, causing the demand for cyber-security experts to increase at an equivalent rate. 

The sad truth is that we saw this surge coming, but yet did very little to prepare. In 2018, Cybersecurity Ventures predicted that there would be 3.5 million unfilled cybersecurity jobs globally by 2021. As we approach the end of 2021, that prediction has come true, and we are facing the consequences of this lack of preparation. 

These statistics tell a very important story about the opportunity. We as an industry have the opportunity to not only help fill these essential positions but fill them with women. It’s a win-win really. Decrease the gender gap by supporting and hiring women in stem while curing an industry that is bleeding for talent.

In order to make our digital world a safe and secure place for all, we must adopt more inclusive approaches to cybersecurity. A good start here is to hire talent with diverse backgrounds and perspectives. Moreover, utilizing the talents and expertise that women in cyber bring can play a key role in developing more effective approaches for solving complex cyber security challenges. 

As a woman who has dedicated her career to the STEM field, and more specifically to cyber security and tech for good, I believe this ongoing issue is the most destructive downfall our field is facing. Why? Because, unlike some problems we encounter, there are tangible steps we (meaning everyone) can take to help close the gender gap.  Thus, I am dedicated to continuing the conversation around gender disparity in STEM industries in order to create the change that we desperately need.

In order to address this issue, it is important to understand why it is happening. The lack of women in cybersecurity is a result of a few things: 

Gender Bias:

The stereotype that men are better at managing such a technical subject (gender bias) has created a very masculine/ male perception of cyber security. Think about times you have seen a STEM/ cyber professional in the media. How are they depicted? Typically, they are illustrated as a loner male, maybe in a dark hoodie, who spends most of their time alone in the dark frantically typing on their keyboard. The media/ pop culture has also given the impression that cybersecurity jobs are all about hacking and dealing with data breaches. As someone who has many peers and close friends in this space, trust me, that is not the case. 

Lack of Awareness:

The general lack of awareness about the cyber profession and the opportunities, the opportunities it holds, and the lack of encouragement to take the career path is another factor contributing to the lack of women in the industry. According to a study done by Girls Who Code, 74% of middle school girls express interest in STEM subjects, but only 0.4% of high school girls are choosing to major in computer science. 

Shocking, right? Psychologists have attributed the disconnect that happens to girls and STEM between middle and high school to gender bias. Oftentimes, female abilities in math and science topics are downplayed compared to males. This can be a huge deterrent (not to mention extremely discouraging) for girls who were planning on entering STEM programs. Who would want to pursue a career that they “struggle” in? 

Lack of Encouragement:

On top of all of this, women who show interest in pursuing tech-related careers are met with a general lack of encouragement and enthusiasm. Some are pushed towards other subjects while others are given little information about potential career paths in this field. Especially in young women and girls, these conversations and touchpoints are extremely impactful to decision-making. And we must not take this responsibility lightly! It is imperative that our education systems support young women by showing them their potential in tech and cyber. It only takes one person to shine a light and help them realize they have a seat at the table, and that they can excel in this field. Be that person.

To conclude, we are obviously not where we want to be when it comes to defeating the gender dilemma in cyber. But yet, there is light at the end of our path to success. Creating real, tangible change to reduce the gender gap starts with all of us in the industry. By doing our part within our communities, we are laying the foundation and groundwork for a brighter future. 

Women in cyber rule! Now let’s go tell the world!

The Circular Economy and What it Could Mean for Our Future

The human race is facing a harsh reality: Earth’s resources are not infinite, and the ability to handle the amount of waste and pollution we generate is decreasing year after year at an alarming rate. If business-as-usual continues, global demand for resources could almost triple by 2050, exhausting Earth’s resources by more than 400%

Recognizing and understanding this decline can be discouraging, but acceptance is a positive first step to create change and shift our trajectory to a brighter and more sustainable future.

The question is, how do we conquer such a large task and work to reverse the damage already done? Simply consuming less will not get the job done because that only buys us some time and does not eliminate the root causes. 

The answer? To move away from the wasteful “take-make-dispose” linear economy model we currently operate from and build an economy that uses things rather than uses them up. This concept is called a circular economy, which focuses on eliminating waste (wasted resources, wasted life cycles, wasted capabilities), and adding to resource production instead of only consuming resources. There are three fundamental principles to this approach:

  1. Eliminate waste and pollution from the original design

  2. Prioritizing durability, reuse, and recycling by keeping products and materials in use

  3. Regenerate natural systems to improve the environment

These three principles make up a feasible and powerful solution to both climate change and economic challenges. Investing in a system that uses environmental and societal improvements as essential measures of success and growth can play a key role in accelerating the implementation of sustainable solutions in businesses. 

What Does This Mean for Businesses?

The circular economy is more than just recycling. While recycling should be encouraged, the focus on these outer loops often misses the more considerable opportunities. Companies who are serious about adopting this approach must first understand that they need to go further than doing “less bad” and work towards doing “more good.”

Unfortunately, proactively doing “more good” is not typically baked into a business model. But it’s time to throw away the rulebook and reimage how we deliver services and products. The environmental benefit of this approach is clear, but what about the economic benefits? Rubicon reports that widespread adoption of the circular economy results in increased Gross Domestic Product (GDP)—with a reported $4.5 trillion in economic benefits until 2030. Not convinced yet? Let’s take a look at some of the specific benefits for individual businesses:

Sounds too good to be true, right? Unfortunately, this approach is not all rainbows and butterflies. There are also some obvious disadvantages that cannot be ignored: Industries or businesses that produce cheap goods and high waste with built-in, planned obsolescence would be unable to transition to this approach. 

The world is still focused on the profits and pleasures of today and failing to plan for tomorrow. A circular world may seem complex or difficult to achieve in a world of competing interests and would take time and a global effort to elicit effective results. But whatever the challenges, they are far simpler to deal with than the environmental catastrophe being delivered by our current economic model. 

Our Earth is dying, and we must take action immediately. I look forward to continuing to learn and explore this concept and how it can be specifically applied to the technology and financial industries, and I encourage you to remain informed and educated as well! Together, we can create change. 

Cybersecurity: A Global Responsibility

Let’s talk about cybersecurity. Though this has been a familiar and important topic in the tech world for many years, it is time we expand these conversations to all areas of life, globally. 

Cyber-attacks have been steadily increasing over the years as hackers become more sophisticated and trained. However, in the past year, we have seen a large increase in attacks on critical infrastructure that have exposed and exploited vulnerabilities in several sectors of society. As we saw in the ransomware attack on the United State’s Colonial Pipeline, these disruptions have devastating effects on humanity. 

The bad guys are getting better at what they do. However, I am hopeful that we can stop these threats before they start with the proper education and game plan.

Gone are the days when cybersecurity was the sole responsibility of an organization’s IT department. Now that IT assets and online resources have become available to most people, it is everyone’s responsibility to take proactive steps to mitigate risk. Cyber attacks will continue to explore the vulnerabilities of global infrastructure as long as they remain unprotected, so let’s get to work people!

The first step to managing cybercrime is to be proactive rather than reactive. Here are some tips and offensive measures to help get everyone involved in your organizations’ cyber defense strategies:

Emphasize the Need for Teamwork and Cooperation:

An organization is only as strong as its weakest link, so getting everyone involved and emphasizing the importance of cooperation is key! Continuous communication surrounding your organization’s ransomware strategy as well as effective educational and informational sessions are crucial. It is normal for employees to feel unfamiliar and unattached to cybercrime efforts at first. Thus, educating your team on the threats and consequences is key. It’s not too much to ask for everyone’s cooperation to ensure effective cybersecurity, especially when everyone can become unwitting tools for cybercriminals to break security defenses.

Establish Strong Cyber Hygiene through Education:

Building core strategies, controls, and processes to mitigate cyber risks and remain proactive is crucial. Though cybersecurity training is rarely met with enthusiasm from participants, there are ways to make this learning engaging. Utilizing gamification, or the use of gaming mechanics and elements can help boost cyber protection learning efforts.

Incentivising and Reinforcing Good Behavior

Accenture’s Ninth Annual Cost of Cybercrime Study reveals that fewer than a majority of companies incentivize cybersecurity. Only around 4 in 10 of the companies surveyed indicated that they offer rewards or incentives to employees or business leaders who show commitment to cybersecurity. Ideally, companies would be rewarding their employees for staying engaged and active in security efforts. Though this often means additional cost, I believe it is well worth the investment considering the average cost of cyber attacks to an enterprise is around $13 million. 

Bug bounty programs, or vulnerability rewards programs (VRP), are great ways to kick start an organization’s vulnerability management strategy while encouraging participation. These crowdsourcing initiatives reward individuals for discovering and reporting software bugs and potential attacks, which incentivizes vigilance among employees

I am hopeful that through continuous education, proactive strategies, and collaborative efforts, we can mitigate cybercrime around the world. 

Building a Better Future: A Case for Reskilling and Upskilling

Industries across the globe experienced a massive shift in infrastructure in response to challenges created by the pandemic. Businesses were forced to rapidly move to a remote work setting, adopt new technologies, and, in some cases, fundamentally change their entire operations. This shift not only widened the skills gap but also further exposed the talent shortage in tech. 

To cope with these challenges, companies, and individuals have turned to two training methods: reskilling and upskilling. While upskilling focuses on updating skills of an evolving and continual job, reskilling relates to a pivot in performance needs and often occurs when a previous job no longer exists.

As a long-time champion of these initiatives, we know the need for new skills hasn’t changed, it’s just sped up. With the acceleration of digital transformation in many organizations, recent research from Randstad tells us that 40 percent of workers are struggling to learn new skills in this advanced digital age. Supporting workers in this evolving labor market is crucial.

To prevent workers from being left behind, businesses and governments must collaborate to provide workers with the skills they need to succeed in the post-pandemic landscape. Here are three reasons why you should make reskilling and upskilling a priority:

BUILD RESILIENCE & BOOST PROFIT

To create a sustainable, resilient future for businesses and industries alike, investing in reskilling and upskilling initiatives is imperative. There is a strong economic case for developing current employees, and as the authors of the influential business book, Talent Wins, notated, “You must manage human capital as wisely as financial capital.” This concept is simple: when a business requires new or advanced skills and does not provide an effective way for current or potential employees to receive the necessary training, the employees lose their competitive edge and the business loses money. Whether these initiatives occur on a micro or macro scale, it is a business’s responsibility to develop programs that provide continuous learning and training.

In the past year, we have seen several companies who have risen to the challenge and prioritized retraining programs focussed on tech and data skill development for current employees. Amazon, which has invested over $700 million into reskilling and upskilling programs, has taken great initiative and introduced three programs geared towards data and technical development. JPMorgan Chase also introduced a program called New Skills at Work, aimed to reskill members of its workforce who have been historically held back and also identify emerging skill sets that workers from all backgrounds will need to be competitive in the future.

BOOST PRODUCTIVITY

Hubstaff reports an increase in productivity for 65% of remote workers and an overall increase in productivity for 85% of businesses after the move to remote work. However, if the consistent development of new skills is not supported or encouraged by companies, those productivity gains could quickly disappear. When employees have greater capabilities to take on tasks, they are able to get things done efficiently and effectively.

Employees are experiencing unprecedented amounts of stress and strain on their mental health which can directly affect productivity and quality of work. Instead of leaving the burden on the individual, it is imperative for organizations to take responsibility and develop programs to alleviate challenges to support their team members during these difficult times.

IMPROVE TALENT RETENTION & EMPLOYEE ENGAGEMENT

There is no doubt about it: Workers who feel valued are more committed to performing well. Employees want to build skills that they can utilize at every level of their practices in work. When you take the time to invest in the continued development and learning of your employees, you can expect to see improved engagement and, consequently, retention. Not only will this boost motivation and morale, but it will also build a positive company culture and overall reputation, which will then help your organization draw in top talent in the future.

A WINNING STRATEGY FOR 2021 AND BEYOND

Invest in your people. Unlock their potential. Though the road ahead will be filled with challenges, this is not a hopeless endeavor. In times of crisis, we have the opportunity to respond with purpose and strength and create lasting changes for generations to come. 

Extended Reality and Ethics: Coexistence in the Modern Era

Extended Reality or XR is the interaction between humans and machines generated by technology in which both virtual and physical environments are combined. The XR market has seen significant growth within the last few years. Kenneth Research estimates that the increase of the global GDP will in turn allow the XR market to continue to grow well into 2026. 

Ethical Dilemmas  

Extended reality has given humans the ability to expand their identity, knowledge, environment, and agency, but, as with any advancement, it also creates problems.

These issues stem from worries about data privacy, suppression, regulation, interactions, and psychological implications. Many of these issues boil down into one, vulnerability. Extended reality and the ethical consumption of it can coexist if it is created and regulated with the vulnerable in mind.

A vulnerable group that is a concern for XR developers is children and adolescents. Their ability to distinguish between reality and what is virtual is minimal and therefore the effects of this technology on them may be unprecedented. This also applies to those who suffer from psychosis or other mental issues. The same goes for laborers and artists who have to interact in these spaces daily. This also then extends to the general public. If all of these groups are vulnerable how can XR accommodate for them?

Adaptations

To allow for XR to work in a multitude of situations and for various groups of people developers must keep adaptation in mind.

This means taking into account the research done by mental health professionals for extended reality programs that can work for those with mental health issues. Consulting mental health professionals can also be useful for the development of XRtfor the general public and adolescents. This is because information on the psyche of these groups can help drive adaptation that allows for the ethical consumption of these programs.

For laborers, research must be put into protecting them in case they are exposed to content they are uncomfortable with due to the nature of their work. This research should then lead to protection programs that will allow for these workers to be immersed into XR safely.

For artists, an algorithm may suppress their work in an XR space. This can be fixed by modifying these environments to avoid suppression. Also, this should then lead to the creation of new copyright laws to protect their work in this new environment.

For the general public, data privacy is a concern, especially in an extended reality environment. The way to adapt to this is by educating the public on how to protect themselves in this area. Informed consent is key to protect this group. All people in this environment should be educated on what entering it means and how their data is being used. 

Syniverse Integrates Blockchain to Begin New Phase of Technology Enablement

Of all the new technologies shaping the next wave of digital transformation, it seems none is getting as much attention as blockchain. Syniverse made a major move in this space by announcing our partnership with IBM. Together we created a solution that uses blockchain to instantly validate new processes for clearing and settlement services.

 We  built on this collaboration when Syniverse Chief Technology Officer Chris Rivera and I had the opportunity to participate in an IBM Blockchain Platform Board of Advisors meeting in New York, along with a number of other industry leaders who are also collaborating with IBM as blockchain innovation partners.

 As a member of the board, Syniverse was represented on the business side by Dennis Meurs, Vice President and General Manager of Transaction and Clearing Services & Head of Blockchain Solutions and on the technology side by Chris Rivera and myself.

 Together with our customers and partners, Syniverse is creating an ecosystem where blockchain is one of many technology and service enablers. The meeting gave us the opportunity to discuss topics that are essential to progress on this front, including various issues with implementation and forthcoming technology sets specific to identity, the internet of things, and 5G.

 These topics are at the core of Syniverse’s mission and, in particular, Hyperledger Fabric, the blockchain and smart contracts mechanisms that Syniverse is now working with. This is a blockchain framework for developing applications or solutions with a modular architecture that allows components to be plug-and-play. As part of this, Hyperledger Fabric uses smart contracts called “chaincode” that provide the application logic of the system.

 For Syniverse’s mobile operator customers involved in clearing and settlement, this Hyperledger blockchain represents a single source of truth specific to contract acceptance, usage and invoicing, reconciliation, and dispute-management interactions. Critically, thanks to blockchain technology, these interactions are immutable and transparent (specific to the participants within a permissioned or private group).

 Here’s a deeper look at some of the new developments and innovations that we discussed in this area at the meeting.

 So, what’s new?

It should be stated that identity is a context-driven theme and is fundamental to blockchain, directed acyclic graphs, and, of course, the internet of things (IoT). To this end, at the meeting, there was an opportunity to explore more scaling mechanisms that could be applied to IoT applications. For instance, we discussed the use of directed acyclic graphs (DAGs), a type of graph used to model probabilities, connectivity, and causality, and their application with Hedera Hashgraph.

 Hedera can be best characterized as a “scalable path to permissionless and distributed“ architecture. There is a governing council model, including 39 organizations and enterprises, where members vote on the software direction of the public nodes and the Hedera platform code base. The Hedera performance rate is approximately 250,000 transmissions per second. Moving forward, like IBM, Syniverse, our customers, and our partners will explore the applicability of Hedera to the development of new solutions. 

 What about zero-knowledge proofs? 

Zero-knowledge proof is a method where one party can prove to another party that they know a value without conveying any information apart from the fact that they know that value. In other words, it’s a way of saying, “I cannot tell you my secret, but I can prove to you that I know the secret.” 

Fundamentally, with zero-knowledge proofs (ZKPs), we can implement a safeguard to protect against data leakage.

 Within the Hyperledger, Indy and Aries comprise the parts that are focused on peer-to-peer identity with the use of ZKPs (think privacy by design at a simple level). Hyperledger Fabric also already possesses a ZKP capability.

 Syniverse will continue  collaborating with various customers, business partners, and industry organizations to assess the development of ZKPs for solutions that will best serve our customers in today’s rapidly evolving technology landscape.

Women In Tech In Africa: Progress, Challenges, and What Comes Next

The continent of Africa has 54 countries and 1.26 billion people. It is home to major urban centers, some of the greatest natural wonders of the world, unbelievable cultural history, and devastating poverty. Though it is often depicted through stereotypes, particularly in the Western world, centering largely around these images of natural beauty and poverty with little else, all over the continent, Africa has tech leaders and innovators rising.

Much like the rest of the world, African nations struggle with gender equality, and, again, like the rest of the world, these disparities are particularly stark in the technology space. The question now is: how do we address these issues?


Challenges to Technology Growth In Africa

The first place to look is challenges to technology growth in Africa in general.

The brilliant Raissa Malu, whom I’ve had the great pleasure of working with, cites a few major issues.

One of them is having the right mentality and resources to foster technological innovation. When I asked what the biggest challenges we needed to tackle, she said: “ We need to believe in our ability to perform in tech.” Raissa, who has been organizing Science and Technology week in the Democratic Republic of Congo since 2014 (the sixth annual event, just last month, was a roaring success), described the event’s impact:

“Today, young and old, men and women, do not see science and technology as foreign or inaccessible. They become familiar to them, and they have more and more confidence that we can also perform in these areas, women and men in the Democratic Republic of the Congo. This is absolutely remarkable and so important for our country to take off.”

As progress is made, progress will quicken, not only because technology builds on itself, but because leaders create role models, and role models help guide the next generation to success.

Education is also essential. For the first time, the Democratic Republic of Congo dedicated an entire month to science and technology, and it included an initiative of Science Caravans organized in 6 cities by the Education Project for the Quality and Relevance of Teachings at the Secondary and University Levels which created STEM educational programming specifically designed with the context of the DRC in mind.

Another concern is the lack of digital connectivity and digital infrastructure. However, that might be changing. Nunu Ntshingila, Facebook’s head of Africa, said that “Facebook’s biggest aim in Africa is to bring people online.” With 145 million active users, “Fundamentally, we still have a region that is under-connected,” but extremely high in potential. Viola Llewellyn of Ovamba solutions expressed a similar sentiment: “Africa is frequently undercounted and underestimated.” With women like these actively seeking to help capitalize on the potential across the African continent, the change will come.

Challenges Facing Women in Tech Specifically

From an entrepreneurial perspective, it may surprise many to learn that sub-Saharan Africa has the highest rate of women entrepreneurs in the world at 27%. However, “most female-led enterprises are small businesses with little opportunity for growth… they are, for the most part, one-woman enterprises oriented to consumers...In the technology industry particularly, few women attempt start-ups.”

Part of the reason is cultural. Although each country in Africa has its own cultural values, many have strict notions about the role of women. In the DRC, Raissa Malu says, women are generally considered to be unable to achieve much and relegated exclusively to the home sphere. This perception is so strong that some will go so far as to think that successful women are actually just effeminate-looking men.

Odunayo Eweniyi, a successful co-founder and business leader of Piggybank.ng in Lagos, says, “Many times, women are not allowed to aspire ‘too high.’ As a result, they tend to participate in the least risky ventures.”

This phenomenon explains why women are more likely to lead businesses, but their ventures are lower risk but without expansion opportunities.

Access to capital is a major barrier for women in tech in Africa as well, although that is also inextricably intertwined with these cultural issues. Sahar Nasr, Egypt’s Minister of Investment and International Cooperation said many investors suffer from the “misguided a perception that women are high-risk customers to lend.”

Some of that perception is certainly from bias, conscious or unconscious, but women also have a harder time receiving loans because they do not have collateral to put up. While the need for collateral in and of itself is normal for the finance industry, women don’t have the necessary assets because “African tradition stands in the way of most women to own property.”


How to Support Women in Tech in Africa

The most powerful force for helping budding women in tech in Africa are the women, like those I’ve mentioned in this post, and many, many others, who are already active technology leaders in their communities, cities, or countries. Not only do these women act as role models, to plant the seed of what might be possible, but they can also establish networks and mentor one another, which is especially important to help them break through the barriers caused by the stereotypes and cultural limitations they face.

A lot of incredible organizations are running summits, creating networks, and otherwise supporting women in tech in Africa. Useful & Beautiful and Women in Tech ZA are hosting the “Women in Tech and Digital Conference,” which, while its intent is absolutely to provide role models and mentorship specifically for women, it is not just a “women in tech” conference. It’s a tech conference with an all-female lineup to counterbalance the norm of having all, or mostly, male speakers.

Other organizations include the Women in Tech Africa SummitWomen in Tech AfricaAfrican Women in Technology, and Africa Technology Business Network, which founded the #HerFutureAfrica project.

Developing Technology in the Cloud: An Informed Perspective

Part 2:


In my first post, I mentioned the developer utilizing cloud toolsets and in safe cloud landing zones and sandboxes for testing code and applications. Kubernetes containers can be pushed to legacy systems with cloud-native applications in this varied toolset. The toolset is varied as we are always moving from a previous or current state of our systems to a future state and we are in this “bridge” of technology development. The pace of innovation will continue, and we always be in this bridge technological development and various microservices, libraries are trying to bundle things easier for the developer communities.


Historically, the sheer lack of Java programmers led Yahoo to create the language Pig, as “pigs eat everything” meaning it was capable of digesting various generic code from a variety of programming languages. Google’s Big Table gave rise to the distributed parallel computing in managing Big Data. Pig and R are quickly be eclipsed by Python due to open source communities and development. The Open Source world is starting to give rise to the need for standardization, trust and transparency where fellow coders can contribute, augment and customize the software code as one sees fit. Cloud enables faster deployment and scale, but it is interesting to look behind the cloud and what people are doing collectively in software with the cloud.


In my conversations with developers, they want to see what is in the code, not black box development and make changes or utilize portions of it. The open source developer community is giving rise to an “un-patent” world where true innovation is a community concern and growth and utilization of software (and hardware as well) through freemiums and value-based pricing is the new frontier of technology innovation and collaboration. This is evidenced through Microsoft buying Github. IBM is also a leader in blockchain with its hyper ledger fabric in an open source fashion where again, easy to experiment and iterate with use cases. 


It’s interesting to note the hardware space is moving to open source, as BMW opened up its patents as well as Toyota with its hybrid technologies as they are well aware this is connected software and hardware play.  The transparency in open source allows helps bolster security by allowing the community to contribute and incrementally getting more secure. You can think of both strengths and weaknesses in a black box environment are guarded, but we simply do not know. The value in an open source version with regards to security is it has more possibilities to be explored, examined and tested


IBM’s fully-certified, managed Kubernetes Service enables you to help your clients rapidly delivery their applications, while having the option of tapping into IBM’s comprehensive and intelligent cloud services, like AI, for added value and can be seen here and try thousands in free cloud credits here.Through an intuitive user interface, the IBM Cloud Kubernetes Service works by creating a cluster of compute hosts and deploys highly available containers. This cluster lets you securely manage the resources that you need to quickly deploy, update and scale applications with complete control.


Developing Technology in the Cloud: An Informed Perspective

Part 1

Cloud technologies were in the past referred to “grid computing” and were distributed parallel environments to deal with complex workloads. The various multi-cloud or hybrid cloud environments emerging for a variety of reasons. Some organizations will want to mitigate risk from a compliance perspective, others geographically and others will be on-premise and partially in the cloud. That is promise of a Federated Cloud construct.

 

This new type of real-world application has created a complicated toolbox for developers. You have legacy systems and older toolboxes; you have newer cloud applications and microservices. Open-source software is assisting in standardizing and speed to market and agility are being vital to keep up with the pace of innovation. 

 

The advantage with the cloud is to play and have a developer sandbox while experimenting with use cases. You can scale your storage and compute needs infinitely, the cloud is distributed and highly available, making the sandbox and rapid iteration, experimentation and deployment key to delivering value. We all understand that our products are becoming more data-rich and customer centric with customized nuances for each individual.

 

As we can scale in the Cloud, the developer can use toolsets with containers, analytics, AI and Kubernetes and you want to standardize and use particular dev toolboxes to make that process more streamlined. While many microservice applications are now de-coupled for design into the future, legacy systems have not been and require things like managed containers. Thus, we are learning to utilize new processes and resources on legacy environments as well as future-designed systems – and that is exactly why Red Hat has been so successful. 

 

While we are so excited by rapid developer experiences and innovation, data privacy and hacks are becoming front page news and part of daily life with our increased big data creation. We have to consider security as part of the innovation process to keep up and not create a bottleneck on deployment or advancement in things like Artificial Intelligence. Open Source Software, code and hardware, smart hybrid developments and sharing best practices will keep the industry moving forward. 

 

There can be privacy laws, like GDPR in Europe; some organizations uncomfortable of having all data in the cloud. The developer has to consider both the security and privacy aspects as a matter of course now. Privacy by design and security scaling with innovation is emerging as very important concepts. GDPR states you cannot hold customer data, thus, with Cloud tools, the developer must be very careful in their design choices. Storage is important with regards to data center locations and what is stored there and how it is stored. In the United States, there is similar issues with regards to health care privacy and HIPAA compliance.

 

IBM’s fully-certified, managed Kubernetes Service enables you to help your clients rapidly delivery their applications, while having the option of tapping into IBM’s comprehensive and intelligent cloud services, like AI, for added value and can be seen here: https://ter.li/4hrepq and try thousands in free cloud credits here: https://ter.li/nbyqh2 Through an intuitive user interface, the IBM Cloud Kubernetes Service works by creating a cluster of compute hosts and deploys highly available containers. This cluster lets you securely manage the resources that you need to quickly deploy, update and scale applications with complete control.

 


Decentralized Autonomous Organizations & Their Social Implications

With our increasingly digital world, new innovations indicate that we are in a time of change. More specifically, we are living in a world where the very systems upon which trust is based are being challenged by new and exciting paradigm shifts. Decentralized autonomous organizations (DAOs), deriving from organizational decentralization, will be a major driver of these changes and have a variety of social implications.

 

Decentralization may impact companies, governments, or any variety of organizations. No matter the societal sphere, essentially, decentralization involves the delegation of tasks from one branch (usually an authoritative position) to other branches. In business, this could mean a structure where the upper level management delegates responsibilities to others in the company.  Similarly, in government, this could involve the central government transferring some or all authority to other branches or sectors of government. While the idea of decentralized organizations is not new, the technological revolution, spurred by the advent of blockchain, has allowed for a new kind of decentralization, namely decentralized autonomous organizations. A DAO is a “vast system (or a system with the potential to become vast) that adapts to user needs, tracks spending and preferences, and disperses profits without centralized oversight.” Blockchain has given ultimate control to the code, where even those who operate the blockchain have limited power. Decentralized autonomous organizations, therefore, have the ability to “realign the interest of users, reduce friction and remove middlemen.” Put another way, blockchain eliminates hierarchies while retaining the benefits of centralization such as simplicity and convenience. This new flow of value, which decentralized autonomous organizations allow, will transform into social responsibility banks that individuals will manage and share via devices that they will develop. People will tire of “thing happening to them” and will create like-minded tribes using technology to further democratize the world around them.

 

However, before postulating the social implications of DAOs, it is important to ground the hypotheses in the current impacts of organizational decentralization. For example, in business, some advantages include giving employees more freedom and power while simultaneously lightening the load for business leaders, setting up better decision making, and allowing for growth with separate branches in different locations. Meanwhile, the impacts of organizational decentralization for governments can include giving the people more power, and economic impacts include privatization and deregulation. Essentially, as the name suggests, decentralization allows for more collaboration as the idea of one person or entity controlling everything is erased.

 

We have several key factors driving decentralization, such as blockchain, 5G technology and the Internet of Things; These innovations allow for the creation of DAOs, which, in effect, possess their own identities and data; they will be able to communicate with each other without human intervention.

 

At a social level, the development of so-called smart cities will drive the exchange of data across domains that include public-private sectors. Healthcare and tokenizing the asset of your health data such that it brings value to you will become even more pivotal, perhaps challenging the very healthcare insurance entities that we know today. Community activism will overshadow that which we know as a state; these twenty-first century communities will be independent creating and sharing their own forms of energy, developing their own micro-economies in the form of healthcare, transportation, and education among others. DAOs also offer the promise of tokenizing an asset such as the climate, the ocean, or other natural occurrences. Funding for any and all of these initiatives will be a Social Responsibility tax, which will not be a collected fee per se, but transparently executed via action like planting trees, and eradicating status such as under-employment and unemployment.

 

While these changes may not happen in the immediate future, we will eventually see people band together and use technology democratize their world. The question which remains now, is how far away are we from the creation of the like-minded tribes that will usher in this new reality of decentralized autonomous organizations?

Control and Security in an Ever Changing World

Control and Security in an Ever Changing World

In this world of 5G, Internet of Things (IoT). Things, talking to things. We are at risk more than ever before.

With the use of Artificial Intelligence (AI), Machine Learning (ML), systems learning behaviors and the use of behavioral analytics. We are mostly confused as to where to turn to for advice, support and the right technology to underpin it all.

With Artificial Intelligence and Cybersecurity, attacks are moving with a speed we haven't seen before. Or perhaps we haven't been paying attention!

We must have a human overseeing security protocols and threats.

I recommend posing the question: Should the human be in the loop? The obvious response is “yes!”

Consideration must be given to the ethical use of Artificial Intelligence and

Machine Learning Systems. It is important to declare the intentional use of a technology. Understanding the potential for abuse is foundational to this discussion.

With pervasive threats from Internet of Things (IoT) and 5G, we must understand a secure IoT architecture down to its chip level. Separation of dependencies perhaps is a start here as complexity provides even more vulnerabilities.

Governmental Best Practice and Regulation

We need to have discussions with policymakers to think about creating a certification program. It becoming a requirement for small to medium sized businesses at different levels and in different countries. If a certification program is perceived by those in the industry as complex, then at least it will articulate risk and governance e.g. Where is accountability at all levels of this ecosystem?

Independent testing certification groups are also fundamental perhaps at least in understanding the “known threat vectors.” Education and training needs to be offered to small and medium sized businesses and their suppliers.

Certification programs must also become a requirement for governmental policymakers, because they must be current with their tools and procedures.

Security is EVERYONE’s responsibility and perhaps penalties may be considered by government entities. However, the desired behavior has to be incentivized, encouraged, and even "Regulated" amongst our community.

Safety is Critical in this new World of Smart Homes

With Cyber Security, you're talking about safety, especially with Artificial Intelligence. I think with regard to Internet of Things (IoT) in a “Smart Home.” As an example, your attack surfaces are spread throughout your entire personal life so we need to address caution.

We have to look at understanding what it means to have a particular device that monitors your temperature in the home, and cameras and so on and so forth.

Because hackers will just hack! But then we have to think about state actors, because they've been ordered to hack they'll use all kinds of tools. Some are not as sophisticated as you think. So using Artificial Intelligence (AI) systems and the correct procedures and of course the right technology partners; we can stamp out most threats, if not all threats from attackers.

Some Important Questions when Thinking about Cyber Security

What does the architecture look like at the chip level?

How do you separate all of these services that are spread across everywhere?

How do you make sure there's some hygienic stuff that's very, very basic?

With Artificial Intelligence (AI) you have to break it down specifically to what you exactly want it to do.

Machine Learning (ML) in Cyber Security involves machines learning behaviors. But we have to be consciously cognizant of what is going on. My thesis is that you will always need a human in the loop to interpret the information that's given to you, whether it's valid or not.

Reputation Management and Securing your Critical Infrastructure

Reputation systems are very important within Cyber threat management. Making sure what is being served up to you is “Authentic.”

Because you can try and do something, but when being attacked we only have minutes and seconds, seconds and minutes.

For example with some colleagues, they had some wrong profiling. The last time I heard about it was with a lawyer!

Profiling can happen because you have an accidental record of your name, confused with something else that's negative. Maybe you are associated because of the name clip with a bad actor perhaps, but that ruins your reputation.

So we have to know what attribution looks like and then with Cyber Security because of Artificial Intelligence, and so on.

Then you get into the notion of Cyber Warfare and that is a big concern because you're talking about completely borderless attacks and not just about moving tanks.

You don't know who the people are. But attacks will happen at an economic level, potentially bringing down a critical infrastructure. 

Education is very important to make sure citizens, organizations and the government are cognizant of security and on top of education, partnering with leading organisations is key. Companies that are tried and tested are still always refining their protocols and systems and innovating in a stable environment.

Authored By Monique Morrow and Nathaniel Schooler

Are Our Current Workplaces Working?

Monique January blog.png

“The right to work is a foundation for the realization of other human rights and for life with dignity” - International Network for Economic, Social & Cultural Rights

Work is an international right and there should not be discrimination of any sort. Three common types of discrimination are discrimination based on age, gender, or because someone is differently abled. But no matter the type, the bottom line is that everyone has not only the right to work but also the right to be treated with respect at their place of work. However, as the #MeToo movement has shown us, this is not always the case. You will sometimes find that it is hard to get a job if you are under the age of twenty-five (looking young and assumed lack of experience) or if you are over fifty (considered old and assumed that older talent doesn’t add as much value to the company). We need to stop with the Generation Z, Millennial, and Baby Boomer distinctions and value all people in the workforce; this means respecting employees for their contributions and not because they fit a certain mold. The question we must confront is how do we build companies that allow everyone to contribute?


The right to work is an international right, and this is not just a saying. There are a body of laws governing the right to work. Three articles from the International Covenant on Economic, Social, and Cultural Rights are central foundations employee rights:


Article 6(1): “The States Parties to the present Covenant recognize the right to work, which includes the right of everyone to the opportunity to gain [her or his] living by work which [she or he] freely chooses or accepts, and will take appropriate steps to safeguard this right.”


Article 7: “The States Parties to the present Covenant recognize the right of everyone to the enjoyment of just and favourable conditions of work.”


Article 8: “The States Parties to the present Covenant undertake to ensure: (a) The right to everyone to form trade unions and join the trade union of [her or his] choice…(d) the right to strike…”


Besides these articles that lay out the rights, the UN Committee on Economic, Social, and Cultural Rights has agreed on three “As,” availability, accessibility, and acceptability and quality, to be interrelated features of creating the best workplace possible for all.


It would seem that since there is a governing body over worker’s rights that there would be limited issues. However, there are multiple areas that need improvement. One such area is the ability of companies and workplaces to account for the differently abled. In some countries the issues stem from lack of educational policies for those that struggle in school because of their disability. For example, in India, oftentimes an improper learning environment for those with disabilities leads to students dropping out of school. This in turn limits their choices in the workplace. Countries such as Israel, are currently attempting to create more inclusive communities for the differently abled. Daniel is a community being built with the intention of creating an environment conducive to the success of those with disabilities. Meanwhile, The Finance Ministry, Israel Innovation Authority and Foundation for the Development of Services for the Disabled at the National Insurance Institute recently gave companies money to develop products to help those with disabilities. One company created “Open Sesame,” a smartphone app that allows those who cannot use their hands to use a smartphone. A technology such as “Open Sesame,” is pertinent to the success of those with disabilities in the workplace, as oftentimes not being able to type or use one’s hands will prevent them from obtaining a job, as these are skills that many contemporary jobs require. It is encouraging to see Israel making these strides for more inclusivity for the differently abled, and other countries and companies should follow in its footsteps.


In addition to the differently abled, those of certain ages also experience discrimination in the workplace. “Two out of three workers between ages 45 and 74 say they have seen or experienced age discrimination at work.” And the United States Supreme Court may have upped this statistic when it ruled in 2009 that one must meet a “higher burden of proof” for age discrimination as opposed to other types of discrimination. And Americans are not happy about it, as eight in ten Americans desire for Congress to create stronger laws to prevent age discrimination. The Centre for Ageing Better conducted a survey and found that half of those surveyed over 50 years old believe that they would be at a disadvantage if they applied for a new job. Part of the problem surrounding age discrimination stems from recruitment policies, which often ask for birth year or graduation date, thereby aging a person. Companies can create policies to prohibit age discrimination in the workplace, and there are venues for those who have experienced age discrimination to take action. Some companies which are making the strides to do things differently include Barclays, Boots, Aviva, and the Co-Op, which are all trying to increase their number of employees over fifty years old by 2022. Companies also need to find ways to integrate Baby Boomers into workplace along with Gen Z. It is a simple fact that people are retiring later. Older generations have skills that millennials do not like understanding human side of business, and vice versa. On the employee end of the spectrum, if employees have experienced age discrimination at work they can sue their company or file a charge with the Equal Employment Opportunity Commission. However, companies should implement policies so that it does not come to this step.


The third major type of discrimination in the workplace is one that has been highly publicized as of late: gender discrimination. The following statistics from the Pew Research Foundation highlight the dire nature of this issue: 42% of American working women say that they have experienced gender discrimination at job; 25% report earning less than men; and 23% say they have been treated as less competent because of their gender. These numbers in and of themselves point to a need to address gender discrimination. Gender discrimination also subsists as an issue for transgender and gender non-conforming people. In a survey of transgender and gender non-conforming New Yorkers, of the 77% of those that reported being employed, 36% said that they saw offensive graffiti and pictures, and 33% experienced unwanted sexual comments at work. The most common experience was misgendered, where an individual was referred to by their birth name or the wrong pronouns. It should be noted that New York City Law requires employers use an individual’s “preferred name, pronouns, and title but also protects transgender and TGNC people against discrimination.”


Large companies have recently gotten in trouble for discrimination against both women and men. In terms of discrimination against women, Microsoft has been sued for gender discrimination as well as sexual harassment, as has Computer Sciences Corporation. Walmart and Quest Diagnostics and AmeriPath were also brought to court for gender discrimination. In terms of discrimination against men, Entura Capital, a beauty company, was sued for refusing to hire men as Sales Reps, and Lawry’s, a corporation operating restaurants, was sued for only hiring female servers. In addition, Yahoo was sued and the Jimmy Fallon Show, for preference toward women. As these issues come to light so has a mission to stop it. The #MeToo movement has highlighted major public figures for sexual harassment, including Harvey Weinstein, Bill Cosby, Matt Lauer, Charlie Rose, and James Levine. While stemming from a terrible source, hopefully the #MeToo movement is helping to bring some of these gender discrimination issues to light.


Any type of workplace discrimination needs to stop. While it is up to the companies to implement changes, as employees we are the foundation for change and can be brainstorming ways to create a more inclusive workplace. Perhaps mentorship, advisory, or philanthropy programs for reconciling different generations in the workplace, more apps like “Open Sesame” for the differently abled, and constant fighting back against gender discrimination, can be the impetus for change. I once wrote: let’s start the future of work now. Let’s allow the last generation and the newest generations to work and learn together. Let’s create industries of age inclusivity where everyone can continue to find their purpose and find dignity within their working lives. As we start a New Year, we need to do this now more than ever. The world will only move forward if we have everyone working toward a shared goal, and this one seems pretty simple: since everyone has the right to work, let’s make all workplaces the most inclusive they can be. It’s an old rule, but a cardinal one, especially for the workplace: treat others the way you want to be treated. And businesses will only thrive from this inclusivity. In the words of the Harvard Business Review, “diversity is the key to unlocking innovation in a business.”

The Future: Defined By Me

future-artificial-intelligence.jpg

When looking forward to a new year, many people look toward the goals they set (and probably won’t meet) and what’s literally to come, whether that’s a new iPhone, car, or digital technology. For example, In 2019, we will most likely see additional applications of blockchain to other industries, new breakthroughs with AI, and the 3D printing of metals, which will have a large impact on the manufacturing industries. These technologies will revolutionize our immediate future, but their current applications also allow us to hypothesize about what they will enable us, as human beings to do, not just in 2019, but beyond.  

Technology will certainly be a part of redefining what humans are in the future. We already know that blockchain will impact humanity, as we have seen through its work with refugees. In the future, blockchain will certify identities. This will blur the lines of nations and turn individuals into their own states. We will become autonomous creatures, certifying ourselves. Using this idea of the state dissolving, the thesis is that people will tire of “things happening to them” and will create like-minded tribes using technology to further democratize the world around them. For example, there will be Social Responsibility tax for funding, which will support the climate. And just forget about the stress of the holiday travel. Artificial Intelligence will enable teleportation.

Not only will technology essentially erase governments, but it will become one with humans. What does this mean? Our brains will become our devices, as we “read’ other people. Creeped out by this? Never fear! There will be a “do not share capability.” And, since our brains are now technology, we will be able to absorb knowledge in seconds. But, what if you are tired of being forced-fed content? Individuals will be able to co-create scenes at any time and be paid for the co-creation. Lack of privacy and the elimination of randomness from the human experience will be the downside, leading to cries for a “serendipity on or off button.” Individuals will have to be cognizant of their privacy being abused, and might want to demand payment for the use of their identities as product.

Maybe a great tradeoff for the elimination of privacy and randomness, is the possibility that we may never have to say goodbye to those individuals who have graduated to a newer dimension that we define as death. Whether we will have the ability to keep our consciousness alive via software or create an avatar of ourselves or loved ones, there is a very real possibility we will see people’s representation after what we define as death. Moreover, we will be able to protect ourselves to a greater extent with human enhancing tools at our disposal, including personalized home robots.

In my future, the technology of today will enable me to “see” or “hear” people whom I’ve met before. I may activate my “invisibility” option as to declare that I do not wish to be disturbed. My memory catalogue will be a service to me and potentially to others. In the words of Nikola Tesla “the present is theirs; the future, for which I really worked is mine.” The present is all these technologies, but this is the future for which I am working. As you look toward 2019 and beyond, what are you working for?


Data driven recruiting is here, but is it really up to the job?

download.png

Advanced tech like AI is solving problems in almost every area in business, but are some of the newest solutions brought to human led departments like HR actually bringing us farther from a diverse and innovative workplace?

New companies like HireVue  offer an AI element of recruiting that we haven’t seen before. As interviewees answer questions into a video recording the software is picking up subtle cues based off of psychological science that points to the kind of person they are and what kind of talent you will be receiving. The system allows the interviewer to watch back the session, but also to see the data that the AI picked up that the interviewer might’ve missed had it have just been them in the room. AI has also been introduced to the beginning steps of hiring, by using its software to screen possible candidates and find the best matches available, saving recruiters almost 30% of their time.  

But are these programs always the perfect solution, and can AI really be ethically neutral? The algorithms that you find in these programs use small facial cues to deduce reasoning, but are we to expect that it can truly capture all complexities? This notion that everything that we present through our emotions and reactions can be simplified down to a science may be naive. The process also puts a lot of weight on emotion, but doesn’t allow for the ability behind the interviewee to shine through, which could lead to passing up possible candidates that don’t perform well in an interview setting. It is that bit of human intuition that allows recruiters to see past small ticks in an interview that this software just can’t replicate.

These programs were also proposed to reduce bias, but could end up inviting a different kind of bias to the table. As people begin to be hired based on the way they act it could force new recruits into a homogenized behavior that they know will get them the job. This may force out-of-the-box recruits that are often some of our greatest thinkers to the bottom of the pile. Even though companies are saving time, and sifting through more talent, it may come at the cost of a different type of diversity.

We also have to remember the many different people looking for work. The needs of everyone may not be met with just a video representation of their skills. Think of a prospective employee with autism, or a similar type of ailment that doesn’t allow them to interact in a way that fits the social norms built in to these programs. We may be able to save time with new tech, but completely removing a human element may poorly serve the fringe communities or minority groups.  

Technology will, and should, continue to push every industry forward, but it is up to us to question its validity and its shortcomings. Machine learning may fix these issues at some point, but until that is obvious it is paramount that we pad our technology additions with the humanized part of hiring.

Blockchain for Healthcare

download.png

By the end of 2020, it’s predicted that there will be over 50 billion connected devices, all of which set the stage for millions of data transactions. As we move forward in this connected, digital first world, data is becoming a new kind of currency, or more so, we’re moving into a data economy. But in this new economy, privacy, which is a fundamental human right, becomes harder to maintain. Following several leak instances (think: Equifax), it has become apparent that consumers’ security and privacy is constantly at stake. Particularly in the realm of healthcare (where security-privacy is critical), it’s time for blockchain to step up to the plate.

So what’s the promise of blockchain for healthcare? The idea is simple. Centralized systems are not secure and are easily corruptible, as well as vulnerable to cyberattacks. Blockchain systems on the other hand, are decentralized and not prone to attack, because no one control system has the key to the data. This is where blockchain and health care intersect. Blockchain networks have the potential to keep data private and secure, even among billions of connected devices.

As Dr. Frances Hughes, healthcare activist and professional, states, “patients and consumers lack transparency, as well as health literacy, when it comes to some of the biggest decisions regarding their own lives and bodies.” Blockchain’s implications for reshaping health care are its abilities to provide “real time research data” when it comes to pharmaceutical safety and trials, audit and accreditation agencies, compliance processes, etc. With blockchain, the patient and consumer becomes fully in control of his/her own data, challenging the power structures of health providers and funders/insurers. No longer having healthcare services captured under others’ licenses, insurers, hospital administrators, etc. means transparency like never before, as well as security and trust.

As Entrepreneur examines, blockchain harnesses the power of encryption to assert its own immutability, and become a safer option than any physical database. Blockchain, unlike anything else, places the patient at the center of the healthcare ecosystem.

But blockchain’s value across healthcare extends to more than just security-privacy. A common database of health information for doctors, providers, and patients to access at all times can also result in more time spent on patient care, better sharing of research results for new treatments, enhanced drug development through result accessibility, and even minimization of claim and billing fraud.

Most radically, blockchain can transform medical innovation—and perhaps even the prediction and prevention of cancer. As Nasdaq reports, a person’s genomica data holds high market value, and a startup called Shivom (which utilizes blockchain technology) is partnering with leading molecular diagnostics company Genetic Technologies (GTG) to accelerate the prediction of cancer for millions of individuals.

“The low-cost management of data that it enables allows us to revolutionize how genomics is presented to the world, co-founder and COO of Shivom, Gourish Singla, says of blockchain. Shivom’s blockchain-centric healthcare platform puts ownership of data right into the hands of individuals, and integration of such a database enables GTG to better identify, and thus prevent, cancer risks. THAT’s just one example of why blockchain could be the future of healthcare.

Like other industries, blockchain has the potential to radically disrupt the industry—and healthcare is an industry long due for disruption.