- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Cybersecurity has gained a lot of attention in the last
couple of years, no thanks to the increasing number of high profile
cyberattacks across the globe. As more and more nations embark on smart city
projects such as India’s Smart Cities
Mission, reliance on data and connectivity will continue to rise
dramatically across geographies and industries, giving cyber criminals even
more avenues to carry out malicious activities.
Today, cyber criminals are as sophisticated as ever and
both governments and organizations are finding it hard to keep up. Cyberattacks
are increasing in scale, just think of the Equifax
breach which affected millions of Americans and more recently, the attacks on
the Pyeongchang
Winter Olympics. These attacks are possible because cyber criminals are
becoming more strategic at targeting vital data across the healthcare, finance,
and public sector verticals, raising the costs and stakes involved. In fact, according
to the World Economic Forum (WEF), the cost of cybercrime to the global economy
is currently estimated at $445 billion a year [1].
In this turbulent landscape, technology companies not only
need to make cybersecurity a priority in the development of their solutions, but
they also need to re-instill confidence in the market so that the progress of
economies and smart cities or nations are not curtailed by the fear of cyberattacks.
To do this, a multi-pronged strategy and concerted effort across governments
and organizations is required.
Outsmart the enemy
The dearth of cybersecurity professionals will continue to
plague the industry as the cybersecurity sector’s global workforce shortage is
projected to reach 1.8 million by 2022 [2],
while the amount of data collected, analyzed, and stored will continue to
increase exponentially. This means that there are simply not enough humans to
process the data for cybersecurity detection and prevention.
The good news is, cybersecurity vendors are accelerating
their research and ramping up solutions to meet today’s challenges. One major
trend we are seeing is the implementation of Machine Learning (ML) and Artificial
Intelligence (AI) to detect and respond to cyberattacks.
One example is Apache
Spot, an open source cybersecurity
project that uses ML as a filter for separating bad traffic from benign and to
characterize the unique behavior of network traffic, giving organizations the
ability to analyze large data sets quickly, leading to better and faster threat
detection.
The revival of AI and ML is a rosy
development for Chief Security Officers (CSOs) as it can help address several
of their common pain points. If we can offload tasks to ML and AI, while
harnessing the scarce human expertise for decision-making, our cybersecurity
infrastructure can become more robust and cost-efficient.
The bottom line is, all solution
providers, be it Internet of Things (IoT), fintech, biotech, or data analytics,
must make innovation in cybersecurity a priority in the development of their
solutions to stay one step ahead of cyber criminals and meet customer
expectations.
All together now
There is also an urgent need for public and private stakeholders
to carry out diplomatic dialogues and share threat intelligence as cybercrime
is not something that can be dealt with in silo. Unlike physical crimes, it is
not bound by geography or jurisdiction and cyber criminals will have no qualms with
exploiting the weakest link to launch regional or even global attacks.
Recognizing that cybercrime cannot be
tackled unilaterally, information-sharing platforms have sprung up around the
world, such as the Cyber-security Information Sharing
Partnership (CiSP) in the United Kingdom and the National
Cybersecurity and Communications Integration Center (NCCIC) in the
United States. Closer to home, the recent Cyber Security Summit 2018
held in Mumbai served as a platform for the public and private sectors to discuss
the scale and nature of cyber threat and how stakeholders can work together to
develop effective counter measures. These are all positive developments that
require the critical support of all stakeholders to prevail and governments
should take the lead in promoting a landscape of collaboration and transparency
to catalyze action and change.
Today, the odds are not in our favor and
we need to move away from the reactive approach to cybersecurity that we are
long accustomed to. Instead, we should adopt a proactive approach encompassing
robust cybersecurity infrastructures built on the latest technology, coupled
with the collective efforts of all stakeholders in contributing to an open and
cohesive environment that this region’s smart city building efforts can rely on
as a backdrop for progress.
[1] World
Economic Forum, Cybercrime, 2017
[2] Center for
Cyber Safety and Education, Meet the Millennials,
2017
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The International Telecommunication Union (ITU), in collaboration with the Food and Agriculture Organisation (FAO) of the United Nations, recently organised a Workshop on “Cultivating Tomorrow: Advancing Digital Agriculture through IoT and AI.”
Held at the Telecommunication Engineering Centre (TEC) of the Department of Telecommunications (DoT) and the Indian Council of Agricultural Research (ICAR), Department of Agricultural Research and Education (DARE), Ministry of Agriculture and Farmers’ Welfare, Government of India, this event aimed to explore the transformative potential of emerging technologies in agriculture.
Participation was open to ITU Member States, Sector Members, Associates, ITU Academia, and individuals from countries that are members of the ITU, as well as members of international, regional, and national organisations in hybrid mode. The event drew around 200 delegates, including international participants, who shared their experiences in the emerging field of Agriculture 4.0.
In light of the challenges posed by a growing world population and climate change to traditional farming practices, the workshop underscored the importance of leveraging technology for sustainable food production. It delved into the application of the Internet of Things (IoT), Artificial Intelligence/Machine Learning (AI/ML), Unmanned Aerial Vehicles (UAVs), and other cutting-edge technologies across the agricultural value chain, from production to consumption, including post-harvest management and marketing.
The discussions focused on how these technologies can empower farmers with real-time data, predictive analytics, and actionable insights to optimise their operations and enhance productivity.
A highlight of the workshop was the release of the Technical Report on “Revolutionising Agriculture: The Digital Transformation of Farming.” This report serves as a valuable resource for stakeholders in the agricultural sector, providing guidance on harnessing the power of technology to drive sustainability, efficiency, and resilience in food production. Overall, the event emphasised the critical role of digital innovations in shaping the future of agriculture and fostering global food security.
The Ministry of Agriculture & Farmers Welfare in India is pioneering the integration of cutting-edge AI technologies to enhance farmers’ productivity and well-being. Championing the India Digital Ecosystem Architecture (InDEA) 2.0’s network approach, the Ministry has achieved significant milestones.
According to Union Minister of Agriculture and Farmers’ Welfare, Shri Arjun Munda, in a written reply in Rajya Sabha, the Ministry of Agriculture and Farmers Welfare in India has leveraged AI to tackle various challenges in the agricultural sector, aiming to support farmers.
Key initiatives include the implementation of ‘Kisan e-Mitra,’ an AI-powered chatbot designed to assist farmers with inquiries regarding the PM Kisan Samman Nidhi scheme, which supports multiple languages and is expanding to cover other government programmes.
The National Pest Surveillance System employs AI and Machine Learning to detect crop issues caused by climate change, enabling timely interventions for healthier crops. Furthermore, AI-based analytics are utilised for crop health assessment using field photographs, along with crop health monitoring through the integration of Satellite, weather, and soil moisture datasets for rice and wheat crops.
A tripartite Memorandum of Understanding was signed, paving the way for collaborative efforts between the National Farmers’ Welfare Programme Implementation Society, IndiaAI, and a foundation to establish India as a global leader in AI-driven digital agriculture transformation. This partnership signifies a crucial step forward in leveraging AI to revolutionise digital agriculture, ensuring a prosperous and food-secure future for India.
Following the workshop, the 9th meeting of the ITU/FAO Focus Group on “Artificial Intelligence (AI) and Internet of Things (IoT) for Digital Agriculture” (FG-AI4A) will take place on March 19, 2024, at the same venue.
The Focus Group on Artificial Intelligence and the Internet of Things for Digital Agriculture (FG-AI4A) has extensively explored the potential of emerging technologies such as AI and IoT. These technologies offer promising avenues for data management, model enhancement, and effective communication, thereby optimising agricultural production processes.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Artificial Intelligence (AI) has permeated all aspects of human life, including its crucial role in defence and security, which has become a focal point, particularly in the Asia-Pacific region. The integration of AI in defence has sparked extensive debates on its implications for national security, military strategies, and ethical considerations, indicating the depth of its impact and the need for careful evaluation.
One of the primary concerns revolves around how AI could revolutionise military, security, and defence operations. This revolution introduces concepts like autonomous weapons systems, unmanned vehicles, and cyber warfare capabilities, marking a significant shift in how AI is adopted in these fields.
Moreover, there is a growing interest in understanding how AI will shape defence strategies and operations by 2035, potentially altering the balance of power in the region and leading to new alliances and strategic rivalries.
While AI advancements promise strategic advantages, they also raise ethical dilemmas, especially regarding the use of AI in making life-or-death decisions, highlighting the need for robust ethical frameworks and guidelines. The evolving nature of AI and its rapid advancements necessitate continuous monitoring and evaluation to ensure its responsible and ethical use in defence and security contexts.
Anto Satriyo Nugroho, former Head of the Research Centre for Artificial Intelligence and Cyber Security (PRKAKS) at the Indonesian Agency for Research and Innovation (BRIN), emphasised the pivotal role of various AI technologies in advancing research in defence and security. He highlighted technologies like Computer Vision, Machine Learning (ML), Cyber Security, Natural Language Processing (NLP), and others, underlining their importance in enhancing defence and security systems’ capabilities.
Further, Achmad Farid Wadjdi, an Associate Expert Engineer at PRKAKS-BRIN, discussed the importance of understanding the concept of national defence, particularly in the context of the Internet of Battlefield Things (IoT) and its applications in modern combat operations and smart warfare. He emphasised the need to ensure security in military operations when deploying IoT technologies, indicating the complexity and critical nature of AI integration in defence systems.
Conversely, Eddy Maruli Tua Sianturi explained the conceptualisation of measuring the State Defence Index (IBN) to understand better citizens’ sense of pride, patriotism, nationalism, and willingness to defend the country. The IBN measurement provides a nuanced approach to grasping current socio-political dynamics. Still, it also requires addressing challenges such as data bias, privacy concerns, and security issues, highlighting the multidimensional nature of AI’s impact on defence and security.
PRKAKS-BRIN Associate Engineer Jemie Muliadi introduced the Intelligent Control System method for law enforcement and state sovereignty applications in a related context. This method effectively manages complex systems that are challenging to simplify, those with cross-coupling that are difficult to separate, and systems with significant parameter changes over time. Jemie emphasised that this method ensures precise control in fast-moving and uncertain situations, particularly in law enforcement and state sovereignty contexts, showcasing the versatility and potential of AI in enhancing national defence and security operations.
Integrating AI in defence and security represents a significant advancement with far-reaching implications. While AI offers numerous benefits in enhancing defence capabilities, it also poses ethical, legal, and security challenges that must be addressed through collaborative efforts between governments, researchers, and industry stakeholders.
By fostering responsible AI development and deployment practices, the Asia-Pacific region can harness AI’s transformative power while ensuring its citizens’ safety, security, and well-being. This approach involves developing robust AI governance frameworks, ensuring transparency and accountability in AI systems, and promoting international cooperation to address common AI-related challenges.
“In advancing the defence and security with AI, Indonesia’s security will benefit from the strategic integration of AI technologies. These advancements can enhance Indonesia’s military capabilities, improve situational awareness, and strengthen its ability to respond to security threats effectively,” Jemie concluded.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have teamed up to release a comprehensive guide aimed at bolstering cloud security measures for organisations. Titled “Top Ten Cloud Security Mitigation Strategies,” this initiative aims to equip cloud customers with essential practices to enhance the security of their data as they migrate to cloud environments.
In an era where digital transformation is accelerating, the migration of data and operations to cloud platforms has become commonplace. However, this transition brings with it a myriad of security concerns, as evidenced by the increasing frequency of cyberattacks targeting cloud infrastructure. Recognising the critical need to address these challenges, the NSA and CISA have collaborated to compile a set of ten cybersecurity information sheets (CSIs), each focusing on a different aspect of cloud security.
One of the primary themes emphasised in the report is the importance of upholding the cloud-shared responsibility model. This model delineates the responsibilities between cloud service providers and their customers regarding security measures. By understanding and adhering to this model, organisations can ensure that they are taking appropriate steps to safeguard their data within the cloud environment.
Another key area highlighted in the report is the implementation of secure identity and access management practices. Proper management of user identities and access controls is essential for preventing unauthorised access to sensitive data stored in the cloud. Through robust authentication mechanisms and access policies, organisations can fortify their defences against potential security breaches.
In addition, the report emphasises the critical importance of implementing secure key management practices, robust encryption mechanisms, and effective network segmentation strategies within cloud environments. These measures play a pivotal role in protecting data both when it is stored and when it is being transferred, thereby reducing the likelihood of data breaches and unauthorised interception.
Furthermore, the report highlights the significance of securing data throughout its entire lifecycle in the cloud. This includes implementing stringent security measures for data storage, processing, transmission, and disposal. By doing so, organisations can effectively protect their data against a wide range of evolving threats.
Another critical aspect covered in the report is the defence of continuous integration/continuous delivery (CI/CD) environments. As organisations increasingly adopt DevOps practices and automate their software development processes, securing CI/CD pipelines becomes paramount to prevent the introduction of vulnerabilities and malicious code into production environments.
Moreover, the report emphasises the enforcement of secure automated deployment practices through infrastructure as code (IaC). By treating infrastructure as code and automating deployment processes, organisations can ensure consistency, repeatability, and security in their cloud environments.
The complexities introduced by hybrid cloud and multi-cloud environments are also addressed in the report. As organisations adopt hybrid and multi-cloud strategies to meet their diverse needs, they must navigate the unique security challenges posed by these environments effectively.
Additionally, the report highlights the risks associated with managed service providers (MSPs) in cloud environments. While MSPs offer valuable services and expertise, organisations must be vigilant in vetting and managing their relationships with MSPs to mitigate potential security risks.
The report stresses the importance of managing cloud logs for effective threat hunting. By aggregating and analysing logs generated by cloud services, organisations can proactively identify and respond to security incidents before they escalate.
The “Top Ten Cloud Security Mitigation Strategies” initiative by the NSA and CISA provides invaluable guidance to organisations seeking to enhance the security of their data in cloud environments. The NSA and CISA envision these strategies as foundational advice that every cloud customer should follow to mitigate the risks associated with cloud services. By implementing these strategies effectively, organisations anywhere can mitigate risks and bolster their defences against cyber threats in an increasingly digital landscape nowadays.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Dr Sylwia Kolenderska, a Senior Research Investigator in Physics at the University of Canterbury, spearheads a pioneering project to transform the ophthalmology landscape. Her innovative work harnesses the power of artificial intelligence (AI) to revolutionise the accessibility and affordability of optical coherence tomography (OCT), a pivotal imaging technique in assessing eye health. This endeavour holds immense promise for advancing ophthalmic care and underscores AI’s profound impact in pushing the boundaries of medical innovation.
OCT is often described as a light-based counterpart to ultrasound imaging and generates three-dimensional internal images of the eyes. These images are invaluable for ophthalmologists in diagnosing and monitoring various eye conditions. However, the high cost of traditional OCT equipment has limited its accessibility, particularly for researchers and clinicians in resource-constrained environments.
Dr Kolenderska’s research addresses this issue by leveraging AI to improve the data processing capabilities of OCT machines. She identified a key bottleneck in current expensive machines: the time-consuming process of calculating high-resolution images from raw signals. She aims to enhance the image quality of cheaper, lower-resolution OCT machines to match or surpass that of expensive models by developing a neural network algorithm akin to a sophisticated software update.
“The potential impact of this technology is enormous,” said Dr Kolenderska. “Not only will it make high-quality OCT imaging more affordable and accessible, but it could also lead to significant improvements in early detection and treatment of eye conditions.”
The application of AI in OCT data processing offers several advantages. AI algorithms identify complex patterns in data, enabling them to produce sharper and more detailed images than traditional algorithms. Dr Kolenderska estimates that the images generated by AI-enhanced OCT machines could be up to six times better than current images.
Moreover, the scalability of AI technology opens up possibilities for future hardware integration. Dr Kolenderska envisions a future where AI modules could be seamlessly attached to existing OCT machines, much like a USB stick, further democratising access to high-quality imaging capabilities.
In Asia Pacific, eye healthcare technology is making significant strides globally. According to a report by OpenGov Asia, in 2022, the Hong Kong Applied Science and Technology Research Institute (ASTRI) announced a partnership with the Centre for Eye and Vision Research (CEVR) to develop at least two projects aimed at treating patients of different ages suffering from lazy eye and other eye conditions. CEVR, established under the Innovation and Technology Commission’s platform for research and innovation, InnoHK, is at the forefront of innovative research in eye health care.
Amblyopia, a common visual impairment that reduces vision and 3D perception, requires retraining the brain to use information from both eyes. This is particularly challenging in adults due to reduced neuroplasticity and the brain’s full maturation with age.
In 2023, Hong Kong continued its innovative efforts in eye health care. A partnership between CEVR and DEFTA Partners was announced to advance technology transfer and commercialise eye and vision health research. Celebrated at The Hong Kong Polytechnic University (PolyU), this partnership will leverage DEFTA’s business network and CEVR’s research achievements to translate research outcomes into globally impactful products. The collaboration is expected to drive innovation in the eye and vision health field, addressing critical issues in the industry.
Dr Sylwia Kolenderska’s work in eye health care represents a significant advancement in the intersection of AI and medical imaging.
In the future, Dr Sylwia Kolenderska’s work is poised to have an even greater impact on the field of ophthalmology in New Zealand and beyond. As AI continues to evolve in this rapid technology landscape, its integration with medical imaging technologies like OCT holds immense promise for improving diagnostic accuracy, treatment efficacy, and patient outcomes.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Institut Teknologi Sepuluh Nopember (ITS) successfully conducted a trial application of the first-generation prototype of the ITS Al-Air Battery on a motorbike at the ITS Research Centre Building. This achievement, supported by Pertamina and the ITS Kedaireka Matching Fund, marks a pivotal step towards accelerating the use of Battery-Based Electric Vehicles (KLBB) in Indonesia.
Prof Dr Ir Heru Setyawan MEng, the head of the research team, described the metal-air battery in his research as a metal fuel engine that utilises aluminium.
This technology promises to expedite Indonesia’s energy and technological independence. One of the key advantages of these metal-air batteries is their ability to prevent dendrites or lithium metal crystallisation, a common issue in batteries that can lead to critical problems. The collaboration between Prof Heru and undergraduate (S1), master (S2), and doctoral (S3) students from the ITS Chemical Engineering Department underscores the interdisciplinary nature of this research effort.
The research team’s innovative approach involved the electrodeposition of a Zn and Mn metal alloy to address dendrite formation. The specially designed air battery features a slim and three-dimensional surface, enabling the uniform extraction of aluminium ions and resulting in a longer battery life, lasting up to 140 hours. Additionally, the battery is environmentally friendly, using an aqueous electrolyte with the addition of Sodium Chloride (NaCl) salt, a common household item that poses no harm to humans. Furthermore, concerns such as leakage and thermal runaway are mitigated, making the battery a safe and sustainable choice.
Despite the substantial electrical current requirements for motorbikes, Indonesia’s abundant aluminium resources have motivated the ITS research team to adopt this battery for KLBB. Moreover, aluminium batteries are more cost-effective than lithium-ion batteries, making them a viable option for widespread adoption.
The development of the ITS Al-Air Battery has been ongoing since 2013. However, the battery still requires further development to become a viable option for KLBB. Currently, the battery is primary, meaning it can only be disposed of after use. Plans include developing a secondary battery, making it rechargeable, and reducing its size for easier integration into vehicles.
Bambang Pramujati, ST MScEng PhD, ITS Vice Rector IV for Research, Innovation, Cooperation, and Alumni, expressed his appreciation for the support from Pertamina and Kedaireka, highlighting the importance of industry collaboration in advancing KLBB development. He emphasised the potential of the ITS Al-Air Battery to contribute to Indonesia’s energy independence and expressed hope for further advancements in this field.
In conclusion, the ITS Al-Air Battery represents a significant leap forward in battery technology, with the potential to revolutionise the use of Battery-Based Electric Vehicles in Indonesia. With ongoing research and industry collaboration, ITS aims to further refine this technology, paving the way for a more sustainable and energy-independent future.
This innovative breakthrough in battery technology underscores the importance of research and development in advancing Indonesia’s digital economy. As the country strives to achieve energy independence and reduce its reliance on fossil fuels, initiatives like the ITS Al-Air Battery play a crucial role in driving technological innovation and sustainable development.
The successful trial of the ITS Al-Air Battery on a motorcycle demonstrates the feasibility and potential of this technology for powering electric vehicles. The ability to prevent dendrite formation and ensure a longer battery life addresses key challenges in battery technology, making it a promising solution for Indonesia’s transportation sector.
Furthermore, the environmentally friendly nature of the battery, using an aqueous electrolyte and common household salt, highlights its potential for widespread adoption without posing harm to humans or the environment. This aspect aligns with global efforts to transition towards cleaner and more sustainable energy sources.
The collaboration between Prof Heru and students from the ITS Chemical Engineering Department also highlights the importance of interdisciplinary research in tackling complex challenges. By combining expertise from various fields, the research team was able to develop a novel solution that could have far-reaching impacts on Indonesia’s energy landscape.
Looking ahead, the development of a secondary battery that is rechargeable and smaller in size will further enhance the usability and practicality of the ITS Al-Air Battery for electric vehicles. This, coupled with the ongoing support from industry partners like Pertamina and Kedaireka, bodes well for the future commercialisation and implementation of this technology.
In conclusion, the trial application of the ITS Al-Air Battery represents a significant milestone in Indonesia’s quest for energy independence and technological advancement. With continued research and collaboration, innovations like this battery have the potential to reshape the country’s energy landscape and contribute to a more sustainable future.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Indonesia’s digital economy is on a path of acceleration, with projections indicating a substantial economic contribution of up to US$366 billion by 2030. This growth is intricately intertwined with the widespread adoption and effective utilisation of artificial intelligence (AI) technology across various industries. However, this rapid expansion also underscores the urgent need for more robust regulatory frameworks governing AI’s ethical and responsible use to mitigate potential societal harm.
This imperative was underscored in a Public Discussion titled “The Need to Develop Regulations for Artificial Intelligence Governance. The Faculty of Philosophy UGM organised them in collaboration with the Ministry of Communication and Information Technology (Kominfo) and the policy research and advocacy.
Key speakers such as Deputy Minister of Communication and Information Technology Nezar Patria, Dean of the Faculty of Philosophy UGM, Dr Siti Murtiningsih, Director of Government Relations Microsoft Indonesia and Brunei Darussalam Ajar Edi, Executive Director of the Policy Research and Advocacy, Wahyudi Djafar, and Head of the Artificial Intelligence Master’s Programme at the Faculty of Mathematics and Natural Sciences UGM, Afiahayati, PhD offered insights.
Deputy Minister, Nezar Patria, highlighted that the current contribution of the digital economy to the GDP still needs to be 10%. He emphasised the significant influence of AI technology adoption on the growth of the digital economy.
Consequently, Kominfo issued guidelines in December 2023 for the ethical use of AI, targeting AI developers and industrial sectors. Given AI’s impacts on society, economy, and culture, these guidelines aim to address ethical considerations.
The Ministry of Communication and Information Technology has advocated for using cutting-edge technology to enhance Indonesia’s global competitiveness. Nezar stressed the importance of aligning AI policies with international trends to ensure Indonesia’s optimal position in AI development and utilisation. This focus will directly impact the growth of domestic sectors.
Nezar acknowledged that the current AI guidelines lack legal enforceability as they need to be integrated into legislation. However, the government is actively monitoring AI’s growth in Indonesian industries. Nezar explained that they are moving towards soft regulation by observing the industry’s growth, aiming to maximise benefits while mitigating risks.
Some potential risks associated with AI use, as highlighted by Nezar, include the significant likelihood of AI misuse leading to social discrimination and the emergence of disinformation products that could disrupt social harmony.
In addition to providing ethical guidelines for AI usage in industries, Kominfo is also actively fostering digital talent development to support the digital economy’s growth over the next five to six years. “We require 9 million digital talents,” Nezar emphasised.
Dr Siti Murtiningsih emphasised that in an era of rapidly advancing information and communication technology, the emergence of AI poses ethical challenges. Consequently, AI’s development must align with moral and ethical values in society without compromising humanitarian principles.
She stressed the need for more robust legal frameworks to address societal and industrial interests related to AI usage. “We need to formulate laws that uphold the ethical principles of AI from a multidisciplinary perspective,” she asserted.
Ajar Edi noted that there are many misconceptions about AI in society. However, for executives and staff in companies, AI is primarily used to support tasks and work, enhancing efficiency and effectiveness. “Although there is potential for bias, human decision-makers are still the most appropriate to ensure sound decision-making,” he concluded.
Indonesia’s digital economy holds immense promise for growth, contingent on responsible AI governance and digital talent development. Establishing clear ethical guidelines and legal frameworks for AI usage will be pivotal in maximising its benefits while mitigating potential risks. Successfully regulated AI usage will result in organised outputs, ensuring the necessary values, ethics, and controls are observed for national interests.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
In the era of digital transformation, the hybrid cloud has become a crucial driver for organisations striving to navigate and thrive in a rapidly evolving environment. The adoption of advanced technologies such as big data analytics, machine learning, and artificial intelligence empowers businesses to leverage innovation and enhance their decision-making processes. This paradigm shift underscores the importance of hybrid cloud in enabling organisations to adapt to change, drive growth, and remain competitive in today’s dynamic business landscape.
Executives surveyed by HPE support the idea that a hybrid cloud strategy represents the optimal blend of technologies for achieving their company’s goals. According to their findings, 91% of organisations are currently implementing this operational model to some extent. Among these organisations, 33% utilise a combination of private and public clouds, while 31% leverage a mix of private and public clouds along with on-premises infrastructure.
Global enterprise leaders emphasise that a hybrid cloud approach offers unparalleled flexibility and control, allowing organisations to tailor their operations to suit their specific needs. This approach also facilitates seamless integration, enabling businesses to develop digital products and services with agility and efficiently move data across different environments. These capabilities are instrumental in driving business growth, creating new revenue streams, and facilitating the integration of acquired companies by transitioning their existing legacy on-premises systems into existing cloud components.
Similarly, Singaporean enterprises and organisations have demonstrated a solid commitment to technological advancement by widely adopting cloud strategies. Recognising the importance of flexibility and scalability in today’s digital era, they have embraced hybrid cloud solutions to seamlessly integrate on-premises infrastructure with public and private cloud services, enabling them to optimise their operations.
The strategic objectives driving Singapore’s embrace of hybrid cloud, including enhancing operational efficiency, facilitating digital transformation, and capitalising on emerging opportunities, highlight the importance of a well-defined plan for successful implementation. Without this strategic approach, organisations may find themselves with a fragmented and inefficient hybrid data and cloud environment, failing to realise the full benefits of hybrid cloud adoption.
To avoid this scenario, organisations must adopt a more strategic approach to hybrid cloud and simplify data management. This involves shifting from a hybrid cloud implementation by accident to one by design, thereby enhancing their cloud operating model and maximising the benefits of hybrid cloud adoption.
Furthermore, security remains a paramount concern in hybrid cloud environments. Organisations and enterprises must assess their risk tolerance, as opting for an exclusive private cloud might seem like the safest choice. However, despite the common belief that private clouds offer the highest level of security, the advantages of a hybrid cloud far outweigh this assumption. It is crucial to understand that the hybrid model is not inherently insecure simply because private clouds are often perceived as more secure.
Hybrid cloud affords organisations the flexibility to implement security measures across various layers, including legacy systems, on-premise private clouds, and cloud-based data. This approach enables organisations to implement stricter security measures, outsource to specialised providers, establish secure connections through tunnels, and reduce the time spent on monitoring security subsystems and compliance risks.
Virtual Private Networks (VPNs) can mitigate data compromise risks when transmitting data between legacy systems, on-premises infrastructure, and the cloud. Additionally, a hybrid cloud setup introduces redundancy, enabling organisations to implement backup plans and minimise downtime. Overall, the hybrid cloud model helps reduce risk and allows organisations to concentrate on their core business activities.
The OpenGov Breakfast Insight on 8 March 2024 at Equarius Hotel Singapore has delved into the critical role of hybrid cloud in modern business operations, highlighting its ability to provide flexibility, scalability, and enhanced security. With a focus on practical insights and real-world examples, the event provided delegates with valuable information on how to implement and manage hybrid cloud solutions effectively.
Opening Remarks
According to Mohit Sagar, the CEO and Editor-in-Chief at OpenGov Asia, businesses increasingly turn to hybrid cloud solutions for operational optimisation and competitiveness in the digital age. This architecture combines on-premises infrastructure with public and private cloud services, offering flexibility and scalability and allowing strategic workload, application, and data transfers across environments for enhanced performance and cost-effectiveness.
“Singapore has made significant strides in digital transformation by integrating on-premises infrastructure with public and private cloud services,” Mohit acknowledges. “This strategic approach offers unparalleled flexibility, scalability, and innovation, positioning Singapore at the forefront of technological advancement.”
Adopting a hybrid cloud is both a technical change and a strategic imperative for sustainable growth in the digital era, as exemplified by Singapore’s significant strides in digital transformation.
Businesses in Singapore maximise performance, manage workloads effectively, and balance security and compliance complexities with a hybrid cloud strategy. The hybrid model enables organisations to balance security, compliance, and innovation, supporting confident digital transformation.
“In Singapore, 67% of IT teams used a combination of private and public clouds, multiple public clouds, or on-premises and hosted data centres,” Mohit reveals. “Even with data management and complexity difficulties, more than two-thirds of Singaporean firms utilise a combination of private and public cloud and on-premises and hosted data centres.”
Elaborating on the advantages of a hybrid cloud, highlighting its ability to leverage the strengths of both on-premises and cloud systems, Mohit notes that global enterprise leaders believe that a hybrid cloud gives you the flexibility to operate and better control that suits the organisation better operate and better control that suits the organisation best.
The hybrid cloud allows seamless integration for developing digital products and services with agility, enabling data movement across various environments to foster business growth and generate new revenue streams. This is particularly relevant in scenarios where a company is acquired and it is necessary to migrate its legacy on-premises systems to one of the established cloud components.
Hybrid cloud adoption is seen as a tactical advantage, offering a comprehensive solution that combines flexibility, speed, and cost efficiency for organisations undergoing digital transformation. However, despite these benefits, organisations must also address several challenges.
A major challenge is the complexity of operating a hybrid environment that mixes on-premises infrastructure with public and private cloud services. Integration and interoperability challenges may arise, requiring careful design and implementation.
Another significant concern is the issue of security, which requires strong measures to balance accessibility and data protection. Organisations must establish comprehensive security plans to safeguard data, applications, and communication channels.
Additionally, managing the specialised skills, tools, and complexities of data transport and storage in a hybrid environment may increase costs.
Successfully addressing these challenges is crucial for organisations to realise the full benefits of hybrid cloud adoption.
Nevertheless, Mohit recognises that the hybrid cloud is a transformative force, far more than just a technological tool. It is a catalyst for change, a compass directing enterprises through new landscapes.
“With this in mind let’s create new paths together,” Mohit exhorts the delegates, “Empowered by the revolutionary potential of hybrid cloud solutions, we have the opportunity to shape a future characterised by boundless creativity and possibilities.”
Technology Insight
Dilipkumar B. Khandelwal, Chief Technology Officer for SG/SEA at Hewlett Packard Enterprise, provided insights into the advantages and obstacles associated with hybrid cloud utilisation. He also offered his viewpoint on cloud adoption strategies, effective implementation of hybrid approaches, and methods for tackling governance issues.
Dilipkumar recognises the critical importance of a hybrid cloud in modern business operations. This approach combines the best of both worlds, allowing organisations to leverage the scalability and flexibility of cloud services while maintaining control over sensitive data and applications. By embracing a hybrid cloud, businesses can adapt quickly to changing market conditions, innovate with agility, and drive growth in a rapidly evolving digital landscape.
With a hybrid cloud, businesses can run sensitive workloads in their private cloud and transfer data between suitable public cloud data centres, adapting to regulatory changes and evolving requirements.
Business continuity, crucial for regulatory compliance, is improved with hybrid cloud support for application, data, and disaster recovery tasks, protecting against system failures, security issues, and physical disasters.
For example, a company could duplicate critical workload data from a local application to a public cloud, ensuring availability or recovery in case of data loss. In a more complex scenario, a business might scale or migrate a busy application from its private cloud to the public cloud to manage increased user traffic, preventing performance issues and improving user experience.
Enterprise applications and data resources inherently carry security, performance, and reliability risks. Hybrid clouds provide companies with the flexibility and control to strategically position applications and data according to changing business and technological needs.
Building on this idea, with a hybrid cloud, enterprises can choose the location of applications and data and determine the most effective way to allocate resources and services to achieve optimal outcomes for the business and its application users.
Dilipkumar acknowledged that deploying hybrid clouds can be challenging due to configuration and security complexities. IT staff must manage authentication and security measures for private and public cloud workloads and data, ensuring consistency and complementarity across both realms.
“It is crucial to ensure that security settings are consistent and complementary across both realms, as any change in one cloud may need to be reflected in the other,” Dilipkumar cautions.
In tackling these obstacles, Dilipkumar says that HPE provides unmatched simplicity in deploying hybrid cloud solutions. Referred to as a unified edge-to-cloud platform, HPE offers a streamlined and accessible method for building and overseeing hybrid cloud ecosystems.
It integrates critical features such as flexibility, scalability, security, visibility, and ease of management, allowing organisations to deploy traditional or cloud-native workloads across their entire IT ecosystem.
“In the dynamic digital landscape, the hybrid cloud is pivotal for businesses, offering agility and control,” concludes Dilipkumar. “By simplifying the adoption and management of hybrid cloud strategies, HPE empowers companies to leverage the latest technologies effectively and stay ahead. We support a hybrid-centric strategy.”
In Conversation With
A hybrid cloud is a sophisticated cloud computing system that integrates public and private cloud services to manage a wide range of applications effectively. This environment provides organisations with the flexibility to place their most sensitive workloads in an on-premise cloud (private cloud) while leveraging third-party cloud providers for less critical resources, thus allowing them to harness the advantages of both approaches.
For enterprises seeking greater control and security over their data while also requiring a cost-effective way to scale operations to meet fluctuating demands and support long-term growth, a hybrid cloud emerges as the optimal choice.
Sander Veraar, Vice President of Strategic Services at StarHub, underscored the critical role of cost management in companies contemplating cloud migration. While choosing a private cloud involves substantial fixed costs for owning and managing internal data centres, public cloud services offer a more adaptable cost structure with operational and variable expenses.
“A hybrid cloud environment offers companies the flexibility to store their sensitive business-critical data on their on-site servers while utilising the public cloud for less critical data and applications,” explained Sander.
This setup allows businesses to optimise their infrastructure costs by scaling resources according to demand. During periods of increased demand, companies can avoid significant capital expenditures by paying for the resources they actually use. Conversely, when demand decreases, costs are reduced accordingly.
Sander believes that organisations gain significant resource advantages with a hybrid cloud compared to traditional physical data centres. The hybrid cloud’s ability to efficiently allocate, deploy, and scale resources enables companies to respond to spikes in demand quickly. When demand exceeds the local data centre’s capacity, a company must have the capability to scale up immediately to meet the increase, a capability that a hybrid cloud environment provides effectively.
Sander points out that a swift response not only prevents missing potential customers but also protects the organisation’s brand reputation. A hybrid cloud setup allows companies to scale up applications to the public cloud to meet demand, ensuring extra capacity and scalability.
Organisations can proactively manage evolving security challenges in a hybrid cloud environment by tackling the following critical issues and adopting recommended strategies:
- Visibility Challenges: The integration of public and private clouds can introduce complexity and elevate security risks.
- Insecure Data Transmission: Data transfer between public and private clouds poses security risks, such as eavesdropping or cyberattacks. Robust encryption, including hardware security modules and cryptographic tools, is crucial to secure data in transit.
- Compliance Challenges: Hybrid cloud complexity can challenge compliance efforts. To maintain compliance, prioritise it from the start, conduct continuous security assessments, and follow data security guidelines. Encryption and adherence to standards can also help.
- Supply Chain Vulnerabilities: Small vendors in the supply chain pose major security risks. Attackers may exploit these vulnerabilities to access larger targets. To mitigate this, use strong encryption and strict access control to secure data transfers and reduce hybrid cloud breach risks.
By effectively addressing these challenges and implementing best practices such as robust encryption, continuous security risk assessment, and stringent compliance adherence, organisations can enhance their security posture in a hybrid cloud environment and proactively mitigate emerging security concerns.
Dilipkumar B. Khandelwal, who serves as a Chief Technology Officer SG/SEA, Hewlett Packard Enterprise, explained that Hybrid cloud solutions combine on-premises and public cloud environments, enabling seamless collaboration and data integration across diverse sources. They enhance intelligence through:
Data Warehouse Integration: Combining data from AWS Redshift, Google BigQuery, and Azure Blob Storage into a centralised data warehouse for quicker insights and decision-making.
IoT Connectivity: Connecting IoT devices to a centralised data repository for improved operational efficiency and insights for predictive maintenance.
Machine Learning Model Training: Increasing accuracy and relevance by feeding machine learning models with real-time data from various sources.
Security Analytics: Strengthening security monitoring and incident detection by collecting and analysing log files and event data from multiple sources.
Customer Experience Enrichment: Improving personalisation and satisfaction by creating a comprehensive customer profile from various touchpoints.
These examples showcase how hybrid cloud solutions streamline data integration, leading to actionable insights, increased efficiency, and enhanced intelligence. They promote collaboration and innovation by connecting data sources and breaking down organisational silos.
In managing threat detection and continuous monitoring in a hybrid cloud environment, various strategies are used to mitigate security risks and promptly identify potential breaches. These include:
- Real-Time Threat Detection: Using advanced cloud security monitoring solutions to continuously scan logs and events across the hybrid environment for anomalous activities in near-real-time.
- Multi-Layer Security Approach: Implementing a combination of native cloud monitoring tools, third-party solutions, and best practices to ensure comprehensive coverage of the hybrid cloud infrastructure.
- Cloud Security Information and Event Management (SIEM): Employing an SIEM tool to collect and analyse log data from both physical and virtual servers, aiding in the identification of suspicious behaviour and reducing false positives.
Additionally, employing machine learning algorithms and AI-powered threat detection engines can significantly enhance the identification of sophisticated threats. Collaborating with other organisations and security communities to share threat intelligence can improve defence mechanisms and reduce blind spots.
Applying a zero-trust model, where no entity is implicitly trusted, can help limit the impact of compromised credentials and reduce the likelihood of successful attacks.
“These approaches, coupled with staying abreast of the latest developments in cloud security, enable organisations to defend against the unique challenges of hybrid cloud architectures proactively,” Dilipkumar says.
Closing Remarks
Dilipkumar expressed gratitude to the attendees of the OpenGov Breakfast Insight, acknowledging their dedication to sharing knowledge and fostering professional connections in the digital era.
He views these gatherings not simply as conversations, but as opportunities to exchange valuable experiences and insights essential for navigating the complexities of today’s digital landscape. Dilipkumar is optimistic that these interactions will enable participants to leverage their newfound knowledge in their respective workplaces, promoting innovation and facilitating growth.
Dilipkumar reiterated the benefits of hybrid cloud solutions, which blend public and private cloud services to enhance operational efficiency and flexibility while safeguarding sensitive data. He highlighted their importance in digital transformations to maintain competitiveness and resilience in evolving business environments.
In such circumstances, it becomes evident that businesses can generate significant value for themselves and society at large by embracing technology wisely. He emphasised the necessity of continuous learning and adapting to technological advancements, acknowledging the dynamic nature of the technology sector and the ongoing need for education and evolution.
Furthermore, Dilipkumar encouraged continued collaboration and knowledge sharing among participants to foster a robust business ecosystem. He is convinced that success in the digital era hinges on collective efforts and the sharing of insights and best practices. By working together, businesses can create an innovative and sustainable environment that benefits all stakeholders.
Dilipkumar expressed optimism about the delegates’ potential to drive technological innovation and address challenges in the digital era. He urged them to maintain their commitment to advancing technology and assisting companies and customers in navigating the evolving digital landscape.
“Given your experience and dedication, I am confident that you will continue to play a pivotal role in shaping the technology industry and fostering business sustainability,” Dilipkumar concluded.