An eventful week
There has been a lot of security news in the couple of weeks between the RSA Conference in San Francisco and Mobile World Congress in Barcelona. First, Google Security revealed a practical approach for generating collisions for the hashing algorithm SHA-1. While long considered vulnerable, SHA-1 has now been rendered all but useless. Second, security vulnerabilities reportedly cost Super Micro Computer to lose Apple as a client, leading to an 8% drop in the company’s market value. And third, the disclosure of a bug in CloudFlare’s services rendered consumers of web-based services from Uber, OkCupid and other companies potentially vulnerable.
Hola! It is that time of the year again when the who’s who of the Communications world and allied ecosystem converge on the mobile world capital Barcelona. With 2,200 companies exhibiting and 100,000+ attendees, MWC 2017 promises to be a significant trade show event. Most companies, including Aricent, invest time and energy to plan their annual presence at MWC. Apart from ensuring you are visible to the people who matter, MWC provides a great platform to grow existing business and generate new opportunities.
Everything we touch will be intelligent. Everything will be interconnected in a seamless manner. Everything will be invisible. Technology will understand, predict and will take care of what needs to be done. Aricent CEO Frank Kern spoke about the Three Pillars of Future Technology as Intelligent, Interconnected and Invisible two years ago and we already see these predictions in reality!
Next big thing for the Technology Industry is Internet of Everything. The concept is to bring people, process, data and things together to make networking more relevant. This is a great economic opportunity for the businesses to use the information and provide new capabilities and richer experience to their customers.
The advent of hyper-connected endpoints via heterogeneous, unconventional means and rise of cloud-based virtualization economies demand a digital business model capable of combatting increasingly-sophisticated cyberattacks, and navigating a complex, rapidly-evolving threat landscape. Today’s network security products - which are the building blocks for establishing secure device-to-cloud connectivity, and maintaining data confidentiality and integrity - are challenged by emerging threats and more frequent attacks. Being at an inflection point, they must evolve to adapt to cloud-based, virtualized environments to protect against emerging cyber threats.
Augmented Reality (AR) is a preferred topic of discussion at various forums today due to its immense potential to recreate real world scenarios into operative visual experiences. There are many sectors where this technology can do wonders. Augmented Reality is a field of computer science where “a live direct or indirect view of a physical, real-world environment whose elements are augmented (or supplemented) by computer-generated sensory input such as sound, video, graphics or GPS data.