Category Archives: Contributed

Accelerating AI-driven outcomes with Powerful Super Computing Solutions

This article is contributed by Mak Chin Wah, Country Manager, Malaysia and General Manager, Telecoms Systems Business, South Asia, Dell Technologies

As artificial intelligence (AI) technology continues to evolve and grows in capability, it’s becoming a growing presence in every aspect of our lives. One needs to look no further than voice assistants, navigation like Waze, or rideshare apps such as Grab, which Malaysians are familiar with.

robot pointing on a wall
Photo by Tara Winstead on Pexels.com

From machine learning and deep learning algorithms that automate manufacturing, natural language processing, video analytics and more, to the use of digital twins that virtually simulate, predict and inform decisions based on real-world conditions, AI helps solve critical modern-life challenges to benefit humanity. In fact, we have digital twin technology to thank for assisting in the bioengineering of vaccines to fight COVID-19.

AI is changing not only what we do but also how we do it — faster and more efficiently.

Advancing Human Progress

For companies like Dell Technologies who are committed to advancing human progress, AI will play a big part in developing solutions to the pressing issues of the 21st century. The 2020s, in particular, are ushering in a fully data-driven period in which AI will assist organisations and industries of all sizes to accelerate intelligent outcomes.

woman holding tablet computer
Photo by Roberto Nickson on Pexels.com

Organisations can harness their AI endeavours through high-performance computing (HPC) infrastructure solutions that reduce risk, improve processing speed and deliver deeper insights. By extracting value through AI from the massive amounts of data generated across the entire IT landscape — from the core to the cloud —businesses can better tackle challenges and make discoveries to advance large-scale, global progress.

Continuing to Innovate

Through transformative innovation, customers can derive the insights needed to change the course of discovery. For example,  Dell Technologies equipped Monash University Malaysia with top-of-the-line HPC and AI solutions[i] to help accelerate the university’s research and development computing capabilities at its Sunway City campus in Selangor. The solution aims to enhance and accelerate the university’s computation capabilities in solving complex problems across its significant research portfolio.

Financial services, life sciences and oil and gas exploration are just a few of the other computation-intensive applications where enhanced servers will make a difference in achieving meaningful results, for humankind and the planet.

At the heart of AI technology are essential building blocks and solutions that power these activities. For example, Dell’s existing line of PowerEdge servers has already contributed to transformational, life‑changing projects, and will continue to power human progress in this generation and the next.

image

The most demanding AI projects require servers that offer distinct advantages – specifically built to deliver higher performance and even more powerful supercomputing results, and yet engineered for the coming generation to support the real-time processing requirements and challenges of AI applications with ease.

In addition to helping deploy more secure and better-managed infrastructure for complex AI operations at mind-boggling modelling speeds, these transformative servers will help meet organisations’ biggest concerns in productivity, efficiency and sustainability, while cutting costs and conserving energy.

Transforming Business and Life

While organisations are in different stages with respect to their adoption of AI, the transformational impact on business and life itself can no longer be ignored. Human progress will depend on the ability of AI to make communication easier, personalise content delivery, advance medical research/diagnosis/treatments, track potential pandemics, revolutionise education and implement digital manufacturing. In Malaysia, while AI is progressively being recognised as the new general-purpose technology that will bring about revolutionary economic transformation similar to the Industrial Revolution, adoption of Industry 4.0 remains sluggish with only 15% to 20% of businesses having really embraced it. On the other hand, the government is taking this emerging technology seriously, having set out frameworks for the incorporation of AI by numerous sectors of the economy. These comprise the Malaysia Artificial Intelligence Roadmap 2021-2025 (AI-Rmap) and the Malaysian Digital Economy Blueprint (MDEB), spearheaded by the MyDIGITAL Corporation and the Economic Planning Unit.

Moving Forward

With servers and HPC at the heart of AI, modern infrastructure needs to match the unique requirements of increasingly complex and widely distributed workloads. Regardless of where a business is on the AI journey, the key to optimising outcomes is having the right infrastructure in place, ready to seamlessly scale as the business grows and positioned to take on the unexpected, unknown challenges of the future. To do that requires having the expertise – or a trusted partner that does – to help at any and every stage, from planning through to implementation, to make smart server decisions that will unlock the organisation’s data capital and support AI efforts to move human progress forward.


[i] Based on Dell Technologies helps Monash University Malaysia enhance its R&D capabilities with HPC and AI solutions Media Alert, November 2022

Concept Nyx and Explorations for the Future of Connection

How will we connect with colleagues in five to ten years’ time? Will we all be interacting with holograms? Fully immersed in virtual worlds? Or will the reality be much closer to how most of us work from our laptops today?

Virtual worlds and immersive experiences could offer exciting new ways to connect with others – and our content. And with people more dispersed and working patterns more personalised than before, how we collaborate and get things done has never been more important.

Dell Concept Nyx Ecosystem 4

It’s my team’s role to dig into future trends and technologies, experiment with solutions and reimagine experiences. Though immersive environments will play a role in the future of work, face-to-face meetings, instant messages, collaboration tools, and video calls aren’t going anywhere. That’s why we’re focusing on the user experience and honing in on everyday micro-moments that could be disruptive as we potentially bounce between physical, digital and virtual worlds in the future.

We’re asking questions like: How will people interact at the intersections of these worlds? What tools will people need to move between these locations seamlessly? What if people don’t want to wear a headset and dive into a virtual world for 8 hours a day – would they be excluded from future projects or collaboration opportunities?

Intelligent, familiar tools for future interactions

Using Concept Nyx’s ability to deliver compute all around, powered at the edge, we have been exploring how familiar devices and peripherals could be paired with Artificial Intelligence (AI) to work together as an ecosystem to deliver easily accessible and immersive experiences beyond gaming.

Dell Concept Nyx Ecosystem 1

Our labs are packed with curated immersive demonstrations and concepts to help us test and explore how Dell could help people move between various spaces and tasks intuitively in the future. From fully immersive Virtual Reality (VR) builds to Mixed Reality (XR) experiences featuring displays and other tools that remove the need for a VR headset, these environments have helped us evolve concepts like the Concept Nyx Companion. As a lightweight tablet-style device that could be viewed and accessed in VR and XR environments, the concept could be a consistent tool throughout all these spaces and could ensure a user’s content is in one place as they move between spaces and tasks. No more taking photos of whiteboards or copying notes to be uploaded to a different space – users could just screenshot their project space and/or easily copy content for sharing across screens.

Together with the Concept Nyx Stylus, you could input notes by voice or via pen, and drag + drop them into digital and virtual collaboration spaces, and even use the voice activation for AI image creation – perfect for non-aspiring artists! All these tools could also seamlessly be used alongside the Concept Nyx Spatial Input in a future desktop environment with a keyboard and mouse, and possibly 3D displays too. We’ve been looking at creative ways to connect these traditional tools for a clutter-free space, and we’ve also been thinking about intuitive gestures for interacting with content – for example, using the tip of the Stylus for writing and the top of the Stylus for interacting with onscreen content or using the Spatial Input as a dial for a 360 view or for zooming in on details.

Dell Concept Nyx Ecosystem 2

We’ve even been thinking through how people might show up in future digital and virtual spaces. We’ve all been on video calls where we need to step away for a moment to answer the door or tend to a pet or child off-camera. Instead of leaving a blank screen, empty seat, or static 2015 headshot, imagine with a wave of your hand, you could stay present as an intelligent avatar while you step away or stay off camera completely. To explore this, we’ve been experimenting with gestures and movement tracking and building on our imaging technology and video conferencing expertise to create the Concept Nyx Spatial camera, which when paired with AI software, could learn a user’s expressions and mannerisms to deliver a more authentic representation of them for future interactions.

Advancing the Concept Nyx Ecosystem

From infrastructure to devices, Dell is at the centre of present and future workplaces and is focused on developing the tools that will be needed to navigate these spaces. Right now, this means bringing tools to market like a new generation of UltraSharp conferencing monitors and intelligent webcams with motion-activated controls and presence detection, and building on technologies like storage, 5G, multi-cloud and edge that provide the advanced connectivity and infrastructure to allow organisations to shape how they work. In the future, productivity tools will be connected and intelligent enough to seamlessly move from experience to experience and task to task, helping to break down barriers and redefine how colleagues connect with one another.  

Dell Concept Nyx Ecosystem 3

My team continues to explore the future of compelling, immersive experiences in both work and play. Concepts play a huge role in allowing our designers, engineers, and strategists to test and tweak devices and solutions to inform future experience roadmaps. We’re excited to keep you updated on our journey!

Advancing Gender Equality with Online Learning: 5 Ways it’s Making a Difference

Earlier this week, the United Nations warned that progress in women’s rights is “vanishing” and based on the current trajectory it will take another 300 years to achieve complete gender equality. They stated that women worldwide face greater challenges in securing employment than previously believed. Despite this bleak outlook, it is crucial that we remain persistent in our efforts to combat this inequality.

By aligning efforts, governments, businesses, and academic institutions across the globe can increase women’s participation in education and employment to not only address gender inequality but also unlock sustained economic benefits, including an increase in annual GDP. Malaysia’s 2023 re-tabled budget includes commendable efforts to bring back 130,000 women, including new mothers, to the workforce.

person writing on notebook
Photo by Julia M Cameron on Pexels.com

The proliferation of technology can also be a key contributor to closing this gap, with online education being a good place to start. Equitable access to learning opportunities and flexible work not only helps address the growing skills challenge but also promotes positive career outcomes for women.

Online learning is narrowing gender education gaps and preparing women for in-demand jobs in the digital economy by removing barriers, improving gender inclusion in science, technology, engineering and mathematics (STEM) fields, connecting them to rising skills and job opportunities, and motivating them to explore interests without limits. Here’s how.

  1. Breaking down barriers: Women who struggle to access traditional educational institutions – often because of caregiving responsibilities – can achieve the education required to upskill themselves and enter high-demand, high-paying careers through online learning. The flexibility, affordability, and safety that online education provides have the potential to break down barriers that have historically disadvantaged women.
  1. Promoting gender inclusivity in STEM fields: Despite an increase in women enrolling and graduating from tertiary education programs worldwide, they still face disadvantages, especially in ICT and engineering. They are underrepresented in STEM fields crucial for the growing technology and digital job sectors. However, it is encouraging to see women in Malaysia embrace online learning to develop these in-demand digital skills that are crucial to realize the country’s digital economy vision. The share of enrollments in STEM courses from Malaysian female learners on Coursera has risen from 29% in 2019 to 38% in 2022. 
woman in gray formal coat sitting near black full glass panel window
Photo by Christina Morillo on Pexels.com
  1. Supporting women’s access to jobs of the future: Online learning is opening up new avenues to connect women to the jobs of the future through flexible, affordable, and fast-tracked learning and career pathways. Entry-level professional certificates on Coursera are curated by industry leaders like Google, IBM and Meta to prepare learners for a wide range of high-growth entry-level careers like Data Analyst, UX Designer, Application Developer, and Social Media Marketer, among others. Each certificate is designed for learners without prior industry experience to complete in 6 to 8 months on average (3-10 hours per week), fully online. Popular courses among women learners in Malaysia include Foundations: Data, Data Everywhere, Foundations of User Experience (UX) Design, Ask Questions to Make Data-Driven Decisions and Foundations of Digital Marketing and E-commerce, which all stack up to these industry micro-credentials.
  1. Helping women expand horizons: This freedom to explore various interests is a valued benefit of online education, motivating learners to complete the courses they finally choose. Flexibility is a top priority for women learners specifically and is critical to keeping them in the education system. The range, cost, and accessibility of online courses also encourage more women to try new fields without a long-time commitment and heavy financial burden.
  1. Improving gender equality in leadership positions: Raising a family gives women many of the professional skills employers are looking for like problem-solving, critical thinking, collaboration, teamwork and project management. By building technical skills online that complement professional skills, women will be well-positioned to take on new and expanded roles in the modern workforce.

Online learning is levelling the playing field for women by connecting them to fast-growing opportunities and better prospects. Such access can empower more women to reclaim lost ground in the labour market, and gain critical skills that prepare them for the careers of tomorrow.

Cybercriminals are Ready to Crash Your Holiday Party

During the holiday season, businesses tend to lose some of their focus on cybersecurity. Employees tend to take time off during this time of year, leaving just a skeleton crew on hand to address high-priority issues.

Threat actors understand this and use it to their advantage. In 2016, cybercriminals took advantage of the mismatched weekend between Bangladesh and the United States and Chinese New Year, which was being celebrated in the Philippines, resulting in a US$101 million bank heist.

The operation began by sneaking malware into the Bangladeshi bank sometime in January 2016. The criminals waited until the weekend of February 4. They began their financial transactions on Thursday night in Bangladesh, knowing that the weekend there was Friday-Saturday. Transfers arrived at the Federal Bank of New York on Thursday morning, New York time.

door handle key keyhole
Photo by Pixabay on Pexels.com

Five transfers were processed as a matter of course, and funds were sent to accounts in Sri Lanka and the Philippines (a spelling mistake on $US850 million in transfers raised a red flag in New York, and the funds were placed on hold). On Sunday, when the Bangladesh bank realised the fund transfers were unauthorised, they sent a SWIFT message to the bank in the Philippines requesting a hold on the funds. However, due to the Chinese New Year and the resulting bank holiday in the Philippines, the money had already been transferred out of the account by the time Philippine bank officials saw the message. 

The criminals engineered a situation where there would be less oversight for a full 3-day weekend.

Unfortunately, there isn’t much that an organisation can do to prevent employees from taking well-deserved time off to spend the holidays with their families. However, there are a wealth of tools they can use to ensure constant security even while employees are away.

Improving Your Security Posture during the Holiday Season

Automation is the first step in maintaining a high standard of security even while employees are away. Automation helps teams do more with limited resources, a common occurrence every holiday season.

Automated workflows create a higher degree of visibility throughout every hidden corner of a network. It should autonomously ingest, connect, and query massive amounts of data in real-time. 

turned on flat screen monitor
Photo by Lewis Kang’ethe Ngugi on Pexels.com

Once breaches or suspicious activity are detected, these systems automatically repel cyberattacks in real-time, performing at a higher speed and accuracy than most human teams.

This visibility never stops. The autonomous nature of leading XDR solutions means 24/7 visibility. Even while employees are off enjoying the holidays, XDR solutions continue to respond to any cybersecurity threat, at machine speed.

Improving ID Management

Upgrading identity management is another tool security teams can use over the holidays when there aren’t enough team members to review employee activity logs for suspicious behaviour. Identity Threat Detection and Response (ITDR) helps ensure that only authorised employees can access sensitive company information.

Without an identity management solution in place, organisations are vulnerable to phishing attacks, where employees are tricked into sharing their username and password credentials with criminals. Even adding a two-factor authenticator (2FA) can limit the risk involved, as cybercriminals would require both the user’s credentials and their phone or email address to access the one-time password. Again, this is a valuable defence tool during the holiday season, when understaffed teams can’t review logs to find suspicious behaviour.

Threat Hunting after the Holidays

When the holidays are over, and the full team is back in place, it’s always a good idea to conduct a thorough threat-hunting exercise. Dormant malware, like that which was inserted in the month before the Bangladeshi bank heist, can be found during a threat-hunting sweep, and protect an organisation from future attacks.

Stay Vigilant this Holiday Season

The sad truth is that threat actors take advantage of weaknesses. For businesses and government agencies, that means taking extra care during the holidays.

We’ve observed a sharp increase in the number of cyberattacks taking place across the Asia Pacific and Japan. Organisations need to act proactively by deploying automated cybersecurity tools that continue to monitor even when the offices are closed.

pexels-photo-96612.jpeg
Photo by PhotoMIX Company on Pexels.com

In addition to threat hunting, he recommended organisations upgrade all operating systems and software, scan for vulnerabilities, use multi-factor authentication, and enforce a strong password policy.

With the right automated tools in place, supported by artificial intelligence and machine learning, and following recommended guidelines, cybersecurity teams should be able to enjoy a few well-deserved days off this holiday season.

5G Edge & Security Deployment Evolution, Trends & Insights

The Heavy Reading 2022 5G Network Strategies Operator Survey provides insight into how 5G networks may evolve as operators and the wider mobile ecosystem continue to invest in 5G technology. The article will discuss some of the findings for 5G and edge computing, and conclude with a perspective centred around 5G security.

Drivers for 5G edge deployments

Current edge deployments are being driven by the healthcare, financial services and manufacturing industries. Heavy Reading says the next largest growth segment will be the media and entertainment sector, with 66% of respondents indicating they would deploy 5G edge services to these verticals in the next two years.

As the compiled data illustrates, the initial edge focus for service providers is to lower costs and increase performance. From a financial perspective, the main driver cited by 63% of those surveyed was to reduce bandwidth use and cost, followed by better support for vertical industry applications (46%) and differentiated services versus the competition (43%). 

high angle photography of buildings and road
Photo by Ibrahim Boran on Pexels.com

Two key criteria for edge deployments by smaller operators (less than $5bn in annual revenue) were improved resilience and application performance. Respondents cited that both these criteria had the effect of lowering costs and increasing customer satisfaction as service level agreements (SLAs) would be easier to fulfil. 

Larger operators bring focus to differentiated services and applications that would create new revenues. The reason higher significance was communicated compared to smaller operators (68% versus 28%) might be centered in the need to compete not only with other telco service providers, but also hyperscalers. This presents an interesting observation considering that some service providers are looking to partner with hyperscalers to overcome challenges with edge deployment.

Edge deployment options

Even though a variety of different deployment options for the edge can be utilized, the most favored one is a hybrid public/private telco cloud infrastructure, with 33% of respondents preferring this choice. This finding is not surprising, as it allows service providers a good mix between ownership and control, and also reach. 

As Heavy Reading points out, the cultural reluctance service providers retained when partnering with hyperscalers is now diminishing, primarily due to the speed at which hyperscalers can roll-out edge deployments.

a cell tower
Photo by Barnabas Davoti on Pexels.com

Deployments at the edge of the network, actually on-premises, is also an option chosen by some service providers, and seems to be targeted at private 5G opportunities. Multi-access edge computing (MEC) is seen as a key enabler for private 5G, with private 5G for mining being a key segment for US tier 1 service providers.

The use of container-based technology at the edge

Linux containers allow the packaging of software with the files necessary to run it, while sharing access to the operating system and other infrastructure resources. This configuration makes it easier for service providers to move the containerized component between environments (development, test, production), and even between clouds, while retaining full functionality. Containers offer the potential for increased efficiency, resiliency and agility that can boost innovation and help create differentiation. 

However, utilization of container-based technology remains a challenge for many service providers in the context of edge deployments. The survey confirms this complexity in the relatively slow pace of transition to containers, with almost half of respondents claiming less than 25% of their edge workloads are containerized today. This trend is forecasted to display greater adoption in the coming years, as over 50% of respondents expect 51% or more of their workloads to be containerized by 2025.

Other complexities with edge deployments

Cost and complexity of infrastructure is cited as the main barrier to current edge deployments (55% of respondents). Integration and compatibility between ecosystem components also scores high (49%). To address the integration and compatibility challenge, Red Hat has retained strong collaboration with partners focused on innovation for service provider networks. 

female engineer controlling flight simulator
Photo by ThisIsEngineering on Pexels.com

Through our testbed facilities we can enable the development, testing and deployment of partner network functions (virtual network function and cloud-native network function) for accelerated adoption and mitigation of risk. We continuously validate network functions to ensure they’ll work reliably with our product offerings. 

Additionally, Red Hat has developed numerous partner blueprints and reference architectures to allow service providers to deploy pre-integrated components from different vendors. Through our extensive portfolio, we provide a common and consistent cloud-native platform, accompanied by necessary functional components, orchestration and integration services from our partners for full operational readiness.

5G security concerns and strategy

Security of 5G networks has even great importance, primarily due to a more distributed network architecture, more capable devices, and a larger quantity of attack surfaces. The survey indicates a number of infrastructure capabilities that are important to service providers in a security context, including the use of trusted hardware and identity, and access management. In terms of securing the 5G edge, trusted hardware is considered a critical component for device endpoints.

As reinforcement to earlier points around container-based technology — container orchestration security and continuous image security scan and vulnerability analysis — also score highly. Trusted hardware and continuous image security scan and vulnerability are also the top two priorities for service providers’ 5G edge security strategies. They are also ranked highly as important capabilities for securing endpoints.

close up view of system hacking
Photo by Tima Miroshnichenko on Pexels.com

Zero-trust deployment and provisioning is also called out as an important factor. Zero-trust scores relatively highly in terms of consistent infrastructure provisioning for physical and virtual network functions (48%) and encryption of data in motion (46%). 

While the majority of service providers say they are confident their 5G security strategy is robust, there is concern outside of the US related to maturity and the ability to scale. These concerns are centered around the internal resources and related skill sets needed to effectively implement a security strategy that includes ever-changing risks, compliance requirements, tools and architectural modifications. 

Closing remarks

The edge expands opportunities and migrating toward it to capture new service and revenue opportunities, as well as network efficiencies, is a critical direction for service providers. With increasing demand and application use cases difficult to predict, technologies must be able to continually adapt to avoid inflexibility. 

Service providers must implement security strategies and processes using different capabilities to effectively mitigate security risks. And these strategies and processes must be adapted over time as technologies, threats and needs evolve. Centralized identity management and access control is key for cloud-centric security approaches, using the principle of least privilege to provide users with only the access they need.

Service Providers: The Digital Link Between Industries, Society & Enterprise IT

Last year, Red Hat shared our plan to evolve our global Telecommunications, Media and Entertainment (TME) organization to better suit the needs of our partners and customers. Since then, we’ve been connecting and building within our ecosystem to deliver solutions that answer our customer’s biggest needs, one of which is helping navigate the global shift in the way services are delivered across both the TME industry and society as a whole. 

Industry-leading partners and connected organizations are working together with the telco ecosystem to build on each other’s innovations in new ways, working together to accelerate the pace of industry change, with a focus on building frictionless customer journeys. For example, service providers are helping banks meet the demands of customers for real-time digital services like hyper-personalization, real-time fraud detection and next-gen connectivity – while also giving the unbanked access to financial services. From mobile banking and payments, connected vehicles, public safety monitors, private 5G and more, service providers are fundamental in providing the many technologies that are driving a completely new landscape for improved societies and global transformation. 

How Cloud Independence Can Drive Change

However, this does not happen overnight. Service providers are rethinking their cloud approach by transitioning to a hybrid and multi-cloud environment to help them become more flexible, agile, scalable and competitive in a constantly evolving market. In a TM Forum Themes Report, sponsored by Red Hat, we found that this pivot can lead a service provider to decide which hyper-scale cloud provider meets their needs best.

close up photo of mining rig
Photo by panumas nikhomkhai on Pexels.com

This leads to future-looking questions, such as:

  • Which workloads fit which clouds? 
  • Which cloud-native solutions have the flexibility and functionality at the scale my organization requires? 
  • Can I balance these benefits against customer choice, disparate cloud silos, increased costs and limited flexibility? 

To help mitigate this risk, we found that service providers are working to maintain cloud and container independence – especially if they want to remain competitive as these new technologies begin rapidly rolling out. This TM Forum Themes Report explains this need for independence, highlighting how service providers are increasingly taking a hybrid multi-cloud approach to maintain supplier diversity while expanding their own telco cloud (operator-as-a-platform) skills and technologies.

Customers at Transformation’s Epicentre

Underpinning these efforts are 5G networks that provide innovative ways for service providers to monetize their investments. We see this in areas like enterprise multi-access edge computing (MEC), open and virtualized RAN5G core and more, with real-world successes from our customers including Bharti AirtelVerizon and VodafoneZiggo

Red Hat can help service providers successfully compete with new services and business models, boost revenues and meet rising customer expectations by providing strategic expertise and a rich portfolio of products and services for their hybrid cloud deployments. We provide the flexibility for their projects across this vast landscape, from proofs-of-concept to production environments, helping providers select what works best for their own specific needs.

laptop technology ipad tablet
Photo by Pixabay on Pexels.com

In addition to this shift, we’re excited to see service providers taking advantage of cloud services managed by third-party experts like Red Hat including Red Hat OpenShift Service on AWS (ROSA) and Microsoft Azure on Red Hat OpenShift (ARO). This helps organizations offload the underlying infrastructure work and focus on their core business, providing additional flexibility and driving tangible business benefits. 

We are also seeing Red Hat customers increase artificial intelligence (AI) deployments, or providing AI-as-a-Service, over the past year, from Turkcell AI to NTT East (in Japanese). It is clear that the practical deployments of AI – from new consumer apps and social engagements, to enterprise B2B apps and AI at the edge, are making a significant impact by enhancing customer experiences, driving greater business efficiencies and creating new revenue streams. 

The Partner Ecosystem is Expanding 

In order to deliver these customer-centric solutions, Red Hat is working with Ericsson, a leading provider of 5G software and hardware to lower the barriers to 5G adoption and build an open platform for 5G connectivity and innovation. We are doing this through active collaboration across Ericsson’s portfolio, including packet core, IP Multimedia Subsystem (IMS) and operations support system (OSS), as well as Cloud RAN in Ericsson’s Open Lab – a space for fast and interactive co-creation of innovative solutions with communications service providers and ecosystem partners. 

Things do not stop there – other software providers such as Baicells, Casa Systems, MATRIXX Software, Mavenir, Nokia, Rakuten Symphony and Samsung work closely with Red Hat to modernize 5G and RAN workloads across the open hybrid cloud. Additionally, with Dell Technologies, Hewlett Packard Enterprise, Intel and Lenovo, we are able to build full-stack hardware and software solutions on top of a reliable infrastructure to support customer deployments from the data center to the edge. 

Continuing the Pace of Government Innovation in a Post-Pandemic World

The unprecedented disruption the world faced during the past two years forced governments to rewrite the rulebook on how they serve their citizens. During the COVID-19 pandemic, public sector organizations across Asia Pacific and Japan (APJ) had to act quickly to find digital solutions to everyday challenges to keep citizens safe and productive. Enabled by cloud technology, digitized government agencies became better equipped to offer citizen, educational, and healthcare services, which helped improve and even save lives. 

As we emerge from the crisis, the experience, momentum, and lessons learned have heightened potential for leaders to drive digitization as a priority to deliver their national agendas. Public sector organizations across APJ are pivoting from the pandemic and looking ahead to how digital transformation enabled by cloud can help to seize opportunities to deliver faster, more innovative, and modernized citizen services.

Scaling Digitization for Public Sector Organizations

According to a Gartner survey in 2021, digitally advanced government organizations realize more benefits of modernization, including higher efficiency, cost reductions, greater workforce productivity, compliance, and transparency. Research by Amazon Web Services (AWS) Cloud Economics shows that AWS customers in ASEAN – across commercial and public sectors – who migrated to AWS are seeing an acceleration in innovation, with an approximate 29% reduction in time-to-market for new features and applications, about 41% increase in employee efficiency, and an improvement of about 37% in operational resiliency through less downtime of services.

laptop technology ipad tablet
Photo by Pixabay on Pexels.com

In the last year, AWS has signed six government cloud services agreements across APJ to boost digitization, supporting these governments with our network of local partners as they move their customers and themselves to the cloud, including Malaysia, and Thailand in ASEAN. These initiatives help governments save lives, provide critical citizen services, and support learner outcomes – ultimately changing the way society engages, educates, and does business for good. They also enable opportunities for local businesses on the AWS Partner Network to work closely with public sector customers to solve some of the biggest community challenges.

Enabling Security, Resilience, and Continuity through the Cloud

Aside from accelerating the speed and scale of digitization, leveraging the cloud also ensures security, resilience, and continuity. This creates a safe and reliable environment for students to learn, employees to work remotely, and citizens to access government services and healthcare.

In Indonesia, when the Bali Provincial Government launched its Smart Island initiative to transform the Indonesian island into a digital province, the Communication, Information, and Statistics Agency of Bali (Diskominfos) migrated its data to AWS cloud from an on-premises infrastructure. Launching an attendance system using machine learning technology, it enabled 19,820 public service employees to sign in to the office virtually, saving almost 69% in monthly costs for its attendance system. Many of Bali’s other critical applications are also built using AWS solutions, including a traditional village census system, a health facility oxygen monitoring system, and an asset management system.

close up photo of mining rig
Photo by panumas nikhomkhai on Pexels.com

By digitally transforming on the cloud, the public sector can rapidly scale services to meet spikes in demand, wind-down operations to reduce costs, and innovate widely using the latest cloud technology.

More Digital Skills Needed to Support Digitization

As the digitization momentum accelerates, governments across APJ will also need to prioritize digital skills training for their workforce in order to unlock the cloud’s full potential. The recent “Building Skills for the Changing Workforce” report produced by AWS and AlphaBeta shows that Australia, India, Indonesia, Japan, New Zealand, Singapore, and South Korea will need to train an estimated 86 million more workers in digital skills collectively over the next year to keep pace with technological advancements – equivalent to 14% of their current total workforce. The report also noted that three of the five most demanded digital skills by 2025 will be cloud-related.

In Thailand, the Ministry of Digital Economy and Society is collaborating with AWS to train more than 1,200 public sector employees with cloud skills, so they can implement cloud technologies at scale, make better data-driven business decisions, and innovate new services to drive improved outcomes for citizens. In Indonesia, its Information and Communication Technology Training and Development Center (BPPTIK Kominfo) worked with AWS to get its employees up to speed on cloud knowledge, in support of Indonesia’s goal of creating a pool of about 9 million digital professionals by 2030 as part of its national digital information agenda. And in Malaysia, AWS has worked to provide cloud training for the Malaysian Administration Modernization and Management Planning Unit (MAMPU) to help accelerate their cloud use and fulfil mission-critical needs.  This is in addition to the training of over 3.5 million users across Asia Pacific since 2018.

crop unrecognizable audio engineer working on console and using laptop
Photo by Dayvison de Oliveira Silva on Pexels.com

Looking ahead, we will need to move beyond business as usual to close the skills gap and create conditions for successful digitization. Governments, educators, and industries across APJ will need to collaborate more closely than ever to give all individuals the opportunity to build and deepen their digital skills that will support digitization momentum now and in the future.

Closer Collaboration Needed to Unlock the Potential of APJ

As societies and communities across APJ continue to evolve, organizations of all kinds – from governments to industries to non-profits – will need to come together to solve some of the biggest issues we are facing, from helping marginalized communities to addressing climate change.

This is why AWS launched Cloud Innovation Centers (CIC), to serve as a platform for public and private sector organizations to collaborate, solve challenges, and test new ideas with AWS’s technology expertise. In Singapore, AWS is partnering with East Coast Town Council and Accenture on a six-month pilot to deploy cloud-powered sustainability solutions in municipal estate management, to support Singapore’s move towards its net zero carbon emissions goal by 2040.

We encourage collaborations between governments, industry, and cloud services providers to enable long-term scaling of digital programs. The momentum has been established, so let’s continue to ride the wave and work together to keep digitization at the forefront of the region’s push for progress as we pivot from pandemic to prosperity.

Edge Automation: Seven Industry Use Cases & Examples

Put simply, edge computing is computing that takes place at or near the physical location of either the user or the source of the data being processed, such as a device or sensor.

By placing computing services closer to these locations, users benefit from faster, more reliable services and organizations benefit from the flexibility and agility of the open hybrid cloud.

Challenges in Edge Computing

With the proliferation of devices and services at edge sites, however, there is an increasing amount to manage outside the sphere of traditional operations. Platforms are being extended well beyond the data- centre, devices are multiplying and spreading across vast areas, and on-demand applications and services are running in significantly different and distant locations.

woman in yellow long sleeve shirt looking at computer data
Photo by Kampus Production on Pexels.com

This evolving IT landscape is posing new challenges for organizations, including:

  • Ensuring they have the skills to address evolving edge infrastructure requirements.
  • Building capabilities that can react with minimal human interaction in a more secure and trusted way.
  • Effectively scaling at the edge with an ever-increasing number of devices and endpoints to consider.

Of course, while there are difficult challenges to overcome, many of them can be mitigated with edge automation.

Benefits of Edge Automation

Automating operations at the edge can reduce much of the complexity that comes from extending hybrid cloud infrastructure so you are better able to take advantage of the benefits edge computing provides.

Edge automation can help your organization:

  • Increase scalability by applying configurations more consistently across your infrastructure and managing edge devices more efficiently.
  • Boost agility by adapting to changing customer demands and using edge resources only as needed.
  • Focus on remote operational security and safety by running updates, patches and required maintenance automatically without sending a technician to the site.
  • Reduce downtime by simplifying network management and reducing the chance of human error.
  • Improve efficiency by increasing performance with automated analysis, monitoring and alerting.

7 Examples of Edge Automation

Here are some industry-specific use cases and examples demonstrating edge automation’s value.

1. Transportation industry

By automating complex manual device configuration processes, transportation companies can efficiently deploy software and application updates to trains, aeroplanes and other moving vehicles with significantly less human intervention. This can save time and help eliminate manual configuration errors, freeing teams to work on more strategic, innovative and valuable projects.

beige and red train
Photo by Paul IJsendoorn on Pexels.com

Compared to a manual approach, automating device installation and management is generally safer and more reliable.

2. Retail

Establishing a new retail store and getting its digital services online can be complex, involving configuration management of networked devices, configuration auditing and setting up computing resources across the retail facility. And once a store is set up and open to the public, the IT focus shifts from speed and scale to consistency and reliability.

Edge automation gives retail stores the ability to stand up and maintain new devices more quickly and consistently while reducing manual configuration and update errors.

3. Industry 4.0

From oil and gas refineries to smart factories to supply chains, Industry 4.0 is seeing the integration of technologies such as the internet of things (IoT), cloud computing, analytics and artificial intelligence/machine learning (AI/ML) into industrial production facilities and across operations.

One example of the value of edge automation in Industry 4.0 can be found on the manufacturing floor. There, supported by visualization algorithms, edge automation can help detect defects in manufactured components on the assembly line. It can also help improve the safety of factory operations by identifying and alerting hazardous conditions or unpermitted actions.

4. Telecommunications, media and entertainment

The advantages edge automation can provide to service providers are numerous and include clear improvements to customer experience.

For example, edge automation can turn the data edge devices produce into valuable insights that can be used to improve customer experience, such as automatically resolving connectivity issues.

antique broken cell phone communication
Photo by Pixabay on Pexels.com

The delivery of new services can also be streamlined with edge automation. Service providers can send a device to a customer’s home or office that they can simply plug in and run, without the need for a technician on site. Automating service delivery not only improves the customer experience, it creates a more efficient network maintenance process, with the potential of reducing costs.

5. Financial services and insurance

Customers are demanding more personalized financial services and tools that can be accessed from virtually anywhere, including from customers’ mobile devices.

For example, if a bank launches a self-service tool to help their customers find the right offering — such as a new insurance package, a mortgage, or a credit card — edge automation can help that bank scale the new service while also automatically meeting strict industry security standards without impacting the customer experience. 

Edge automation can help provide the speed and access that customers want, with the reliability and scalability that financial service providers need.

6. Smart cities

To improve services while increasing efficiency, many municipalities are incorporating edge technologies such as IoT and AI/ML to monitor and respond to issues affecting public safety, citizen satisfaction and environmental sustainability.

Early smart city projects were constrained by the technology of the time, but the rollout of 5G networks (and new communications technologies still to come) not only increase data speeds but also makes it possible to connect more devices. To scale capabilities more effectively, smart cities need to automate edge operations, including data collection, processing, monitoring and alerting.

7. Healthcare

Healthcare has long since started to move away from hospitals toward remote care treatment options such as outpatient centres, clinics and freestanding emergency rooms, and technologies have evolved and proliferated to support these new environments. Clinical decision-making can also be improved and personalized based on patient data generated from wearables and a variety of other medical devices.

people woman sitting technology
Photo by MART PRODUCTION on Pexels.com

Using automation, edge computing and analytics, clinicians can efficiently convert this flood of new data into valuable insights to help improve patient outcomes while delivering both financial and operational value.

Red Hat Edge

Modern compute platforms powered by Red Hat Edge can help organizations extend their open hybrid cloud to the edge. Red Hat Edge represents Red Hat’s collective drive to integrate edge computing across the open hybrid cloud. Red Hat’s large and growing ecosystem of partners and open methodologies give organizations the flexibility they need to build platforms that can respond to rapidly changing market conditions and create differentiated offerings.

How Managed Services Keep the Edge Ecosystem Afloat

As the amount of connected “things” — vehicles, devices, equipment, sensors — proliferate, organisations continue to look for ways to securely harness the data those things generate. An entire ecosystem dedicated to collecting and analysing that data has erupted, and it’s taking data infrastructures to the edge of their capabilities.

Edge computing represents a vast opportunity for IT organisations if implemented well. Unfortunately, the data centre infrastructure required to host edge computing implementations is a patchwork affair. Today, organisations must leverage centralised data warehouses, regional edge data centres and local edge micro data centres.

person in blue suit jacket holding a black smartphone
Photo by Barbara Olsen on Pexels.com

Tech Research Asia (TRA) revealed in 2020 that organisations in Malaysia who has deployed edge computing were able to lower their costs in IT and operations, resulting in an overall improvement in employee experiences. However, most local organisations still find edge computing a fairly new concept. How can local organisations effectively tap into the full potential of Edge computing?

With so many geographically dispersed locations without on-site IT staff and often limited in-house resources, many organisations are turning to managed services providers to help deploy, monitor, and maintain their edge data centres. Still others, such as existing managed service providers and IT solutions providers, are expanding their services portfolio to help clients with the edge. This represents a vast opportunity for IT solution providers.

Managed services providers enable end-users to focus on core competencies

Edge locations need the same resilience, security, and fault tolerance as centralised locations, especially as they support more and more mission-critical applications. Managed service providers with the right capabilities offer peace of mind and operational efficiencies for edge deployments.

hands on a laptop keyboard
Photo by cottonbro on Pexels.com

Ensuring the necessary resilience and availability at the edge is not a simple matter. It requires having at least two major capabilities in place:

  • Remote monitoring and management of UPS and physical infrastructure
  • Data collection and analytics from monitoring equipment. This data improves the reliability and cost-effectiveness of assets at the edge.

These highly specific capabilities are not the core competencies of most companies. They don’t even cover all the expertise and manpower necessary to maintain support infrastructure. Turning to a managed services provider places the responsibility for infrastructure uptime into the hands of experts so end users can focus on the core of their business.  

Managed services boost revenues for existing providers

An increased need for managed services also represents an opportunity for existing providers. For example, power protection at the edge is not something many end-users consider. But an unmanned edge computing deployment without power is just another cost centre. For existing services providers, adding power monitoring and protection to their portfolio of offerings invites additional recurring revenue streams.

The story is the same for monitoring and dispatch services. When physical infrastructure in remote locations goes down, those sites need immediate attention. Most organisations don’t have a full-time response staff for such incidents, opening the door to managed services providers. Solutions and services providers can earn additional business by offering remote monitoring or dispatch services.

Managed services keep the edge ecosystem running smoothly

Edge computing has come a long way despite still having challenges to overcome. There are still operational issues to be considered in order for organisations to effectively ensure edge of network availability during this proliferation. The global health crisis too played a role in the impact of data centre downtime, making the availability of data centres, at the core and at the edge, a key concern for organisations.

close up view of system hacking
Photo by Tima Miroshnichenko on Pexels.com

Maintaining availability is challenging, given edge data centres experience more frequent total facility outages than their centralised counterparts. The primary methods companies leverage to improve edge availability — investing in improved equipment and redundant equipment — are not cost-effective ways of ensuring uptime.

It’s clear that the growing edge ecosystem represents a two-pronged opportunity for managed services. End users can turn to managed services providers for cost-effective uptime of their edge deployments, and existing providers can work with partners to add new services to their portfolios.

Regardless of where companies fall in the spectrum of offered services, the first step is to cultivate true partnerships. A typical service provider contract lasts three years. Customers must feel at ease knowing that the contract brings them the latest offerings, keeps equipment in optimal condition, and prepares them for uncertainties and surprises.

The edge is the present and future of infrastructure investments. Appropriate managed services can keep the ecosystem running smoothly for all parties involved.

Why Payments Are the Key to the Gaming Industry in Asia Pacific

The gaming industry is booming, and Asia is its centre. But it’s also becoming more competitive. And with payments increasingly being baked into the player experience, getting this fundamental element right is even more critical.

The growth of gaming over the past three years has been rapid, and there are no signs that this trend will slow down any time soon. Like many digital shifts, the COVID-19 pandemic accelerated a pre-existing trend as consumers spent more leisure time at home, on smartphones or games consoles.

For gaming publishers, this has obviously been a huge boost to the industry. Globally gaming industry revenue is predicted to grow from USD$178bn in 2021 to USD$269bn in 2025, an increase of 51% in just five years. And this is especially true in Asia, which leads the world in its number of active gamers. Almost half of all gaming revenue came from Asian markets pre-COVID-19 and this percentage has been maintained despite the growth of gaming globally in the past two years.

The Role of Payments

Another major trend in gaming is a shift in the way that consumers pay for them. The old model of buying games outright in a single one-off purchase is now outdated in the majority of cases; subscriptions and in-app purchasing have become the norm for games on all platforms, from mobile games through to many of the major titles on the most popular consoles.

Source: StockVault
Source: StockVault

This trend has given publishers much greater scope when it comes to monetizing the games that they produce. But it also means that payments are now a much more integral element to the overall player experience than before, and therefore need to be considered much more carefully.

When thinking about payments in gaming, there are three primary factors that need to be considered:

  • Invisibility – Ultimately players don’t want to go through the process of making payments when it means interrupting the game they are playing. So any payment needs to be as quick and painless as possible to encourage them to do it frequently.
  • Security – But at the same time, any game’s checkout process must be safe. Games have been proven to be a target for scammers in the past who have viewed the industry as an easy target.
  • Choice – The payments landscape is becoming more diverse, and in-game payment options need to reflect that. Consumers are increasingly unprepared to spend money online if they cannot use their payment method of choice, particularly those that have developed into regional payment preferences.

Let’s look at these in more detail, particularly what they mean for gaming companies in the Asian market.

The impact of poor UX, card declines, and inefficient risk management

As we have already stated, one of the key criteria for the success of payments in gaming is that transactions such as subscriptions and in-app purchases are seamless to the point of being invisible. A clunky user experience with multiple verification steps is one way checkouts can fail in this objective.

The Legendary Gems make Diablo Immortal totally Pay2Win Heres jpg
Diablo Immortal’s Lootboxes. Source: latestgamestories.com

Multi-step authentication processes, high lag times or time-outs, or hidden costs can make a payments experience frustrating to such an extent that the consumer abandons the transaction and in extreme circumstances could stop them playing the game altogether. And research does suggest that APAC consumers have the highest rates of cart abandonment in the world generally, meaning gaming companies in the region must focus on giving players a best-in-class payment experience.

Even more significant can be the impact of payment declines. If a player cannot complete a transaction because their card payment is declined then this completely de-rails their gaming experience. A declined transaction not only has a negative effect on revenues for gaming companies that lose the individual transaction in the short term but also the frustration this causes players may render the game unplayable in the long term, costing the operator recurring payments from loyal customers.

Partnering with a payments partner that minimises abandoned transactions and their associated costs is critical. Some of the criteria gaming partners should consider include:

  1. Does the payments company connect me to local acquiring and enable smart routing to maximize acceptance rates?
  2. Does the payments company prevent mass declines of legitimate transactions and limit false positives through industry and regional expertise in risk management?
  3. If a legitimate transaction is declined due to human error or oversight e.g. a card used for a recurring transaction expires, does the payments company have capabilities in place to recover the transaction?

Fighting fraud

Unfortunately, gaming platforms have long been a target for fraudsters. This threat has increased in the past two years as bad actors were better able to hide in plain sight due to the increase in player numbers more generally. Card-not-present fraud (where a fraudster uses stolen card details to make a transaction) and friendly fraud (where a consumer uses their own card details to make a legitimate transaction and then claims a chargeback) are both frequent in gaming, including in APAC.

person holding black framed eyeglasses
Photo by Mikhail Nilov on Pexels.com

Another practice gaming publishers should be aware of is carding, where a fraudster steals credit card information and tests its usability by making one or a number of small transactions at a relatively insecure platform, before moving on to making more substantial transactions elsewhere. In-game purchases have been a traditional target of these types of fraud.

Offering seamless gameplay via in-app purchases and subscriptions without compromising the safety of the platform or players must be a priority. A risk management platform with real-time, highly configurable, fraud detection and scoring engine capabilities is the optimal solution to maximise protection.

Diversifying Checkout

The APAC region is a diverse landscape when it comes to payment preferences, with local digital wallets being particularly popular. And it isn’t only the region as a whole that has marked payment preferences; within APAC, individual countries have their own local payment methods that have proved to be popular with consumers. So for gaming companies with ambitions to expand their player base throughout the region, having more options to enable players to pay is essential.

This is particularly true because we know that there are several key payment methods that are important to consumers in many APAC countries. AliPay and WeChat are obvious examples in China, but countries such as Malaysia, Thailand and Indonesia all have diverse payment landscapes that do not rely on card transactions.

According to research conducted by Mastercard, 94% of consumers in APAC are thinking about trying an alternative payment method for the first time in 2022 and 84% said they already had access to more payment methods than they did in 2020. This includes crypto; 45% of APAC consumers are considering using crypto for payments in 2022 vs. only 12% that said they had used crypto to make a payment in 2020.

And globally younger consumers tend to be less reliant on traditional payment methods such as debit and credit cards than older generations. More tech-savvy and less loyal to financial institutions such as banks, these consumers will happily switch payment methods to ones that offer a better user experience. As gamers tend to skew towards younger demographics as well, having a diversified checkout is even more important.

It’s an Exciting Time for Gaming in Asia Pacific

And APAC continues to lead the world when it comes to the sizes of the gaming industry market. But there is a route to making the most of the opportunities a booming industry provides, and that begins with payments.

Working with a payments partner that doesn’t offer you a one-size-fits-all solution and instead can tailor a customized platform that suits your business strategy and needs is essential in today’s market. This is especially true in a region such as APAC with so many individuals, and unique markets. Gaming businesses