SOGETI UK BLOG

Click on the cover to download

The fourth stage of the Industrial Revolution is upon us due to the far-reaching integration, accelerated by the Internet of Things, of Operational Technology (OT) and Information Technology (IT). This creates completely new opportunities as a result of new combinations of mental, physical and mechanical work by integrating the internet, sensors and embedded systems.

The Internet of Things enabled IT/OT convergence leads to cost reduction as a consequence of predictive maintenance, speed and intelligence, thanks to Machine-to-Machine communication and improved forms of Human-Machine Interaction. M2M interaction between and within machines and systems is the cyber-physical heart of the Fourth Industrial Revolution.

End-to-end ecosystems – from design and production to client interaction and advanced Maintenance, Repair & Overhaul (MRO) – should be focused on a future in which appliances, devices, things and machines for professionals and private people will communicate with central systems, with one another, and with users for the purpose of providing the best possible facilities to makers, service providers, legislators and customers.

Organizations should put IT-OT integration on their digital transformation roadmap, focusing their attention and knowledge from various disciplines, ranging from connectivity, infrastructure, standardization, work processes and risk management to human resources and marketing.

The new VINT report, written together with Sogeti High Tech,  provides insights into the IT-OT fusion and presents three recommendations to speed up this integration.

Download the report in English (The report in Dutch will be available next week):

button-pdf1

 

Menno van Doorn AUTHOR:
Menno van Doorn is Director of the Research Institute for the Analysis of New Technology (VINT) in the Netherlands. He mixes personal life experiences with the findings of the 17 years of research done at the VINT Research Institute. Menno has co-authored five books on the impact of new technology on business and society. Awards: IT Researcher of the Year in the Netherlands.

Posted in: Digital, Digital strategy, High Tech, Infrastructure, Internet of Things, IT strategy, SogetiLabs, Technology Outlook      
Comments: 0
Tags: , , , , , , , , , , , , , , , , , , , , , , ,

 

Mike Thompson: Obama and cyber-spying www.freep.com

On 19th May 2014,  the US department of Justice announced charges against China for cyberspying on American major companies. In October 2011, US representative Mike Rogers, Head of the House Intelligence Committee, had already made an appeal to Europe and Asia to confront the Chinese with their economic espionage by saying:

 “China’s economic espionage has reached an intolerable level and I believe that the United States and our allies in Europe and Asia have an obligation to confront Bejing and demand that they put a stop to this piracy”.

China1Last year, security company Mandiant published their report on a special Chinese Cyber Crime unit which they called APT1 (Advanced Persistent Threat). Twenty of these organizations were spotted by Mandiant. Their analysis has led to their conclusion that “APT1 is likely government-sponsored” and “It’s believed to be the 2nd bureau of the People’s Liberation Army – commonly known as its Military Unit Cover Designator (MUCD) unit 61398″.

Reading the report it becomes clear that the ties between hacker organizations and the Chinese government are very close. After a cyber attack on the Washington Post in February 2013, the Newspaper published an article suggesting that the Chinese were behind the attack (“Chinese hackers suspected in attack on The Post’s computers“). The response of the Chinese Defense Ministry was that it is unprofessional and groundless to accuse the Chinese military of launching cyber attacks without any conclusive evidence.”

“Proof” of collaboration between nation states and these kind of organizations are seldom published, but the Mandiant report looks quite convincing. If your interested in how APT1 worked see this video or read the report yourself.

Mandiant expected reprisals from China, as well as an onslaught of criticism. That criticism would be related to the fact that unit 61398 would change their techniques after publishing about it, making it harder to continue to track them. After publishing the activities, APT1 paused for a long time. The blue line shows the activities of the year before while the red line shows what happened just before and after the publication.

China2

What are they after?

Mandiant is warning us of the risks of the Chinese government stealing intellectual property “and beyond”: executive emails, negotiation plans, meeting minutes, HR records etc. In 2014 they released an update in their trend report, out of which we quote:

“Across numerous industries, we’ve increasingly observed the Chinese government conduct expansive intrusion campaigns to obtain information to support state-owned enterprises. This translates into data theft that goes far beyond the core intellectual property of a company, to include information about how these businesses work and how executives and key figures make decisions”

But what makes the headlines is stealing information about weapon systems, while companies in manufacturing, energy, media and entertainment and NGO’s are being spied upon for different reasons.

China3

No place to hide

Ironically, this month the Guardian published on how the NSA tampers with US-made internet routers. The NSA has been covertly implanting interception tools in US servers heading oversees – even though the US government has warned against using Chinese technology for the same reasons. According to the Guardian “It is quite possible that Chinese firms are implanting surveillance mechanisms in their network devices. But the US is certainly doing the same”. The source behind the Guardian article is Pulitzer prize winner Glenn Greenwald, who just published his book on the Snowden affair “No place to hide” (an interesting title, considering that our recent book on Big Data is called “No More Secrets”).

So indeed, after reading the Mandiant reports and the articles in the Guardian and Washington Post, the question is: is there a place to hide? I don’t think so. This is “The New Normal”. I can’t wait until the Chinese Snowden makes himself heard.

Source:

Mike Thompson: Obama and cyber-spying www.freep.com

Unit 61938 located in Shanghai and houses offices for approximately 2,000 people

Menno van Doorn AUTHOR:
Menno van Doorn is Director of the Research Institute for the Analysis of New Technology (VINT) in the Netherlands. He mixes personal life experiences with the findings of the 17 years of research done at the VINT Research Institute. Menno has co-authored five books on the impact of new technology on business and society. Awards: IT Researcher of the Year in the Netherlands.

Posted in: communication, Publications, Security, SogetiLabs      
Comments: 0
Tags: , , , , , , , , , , , , ,

 

SMACTThe building blocks for smarter objects, smarter planet, smarter business are called SMACT: Social, Mobile, Analytics, Cloud and Things. The Third platform (IDC) or Nexus of Forces (Gartner) is known as SMAC – without the Thing in it. The basic idea behind the acronyms is that we should focus on the joined forces of the components and not so much on the isolated terms.

Our plead is to add “Things” to SMAC. The smartening of the economy, business and our personal life takes place by interacting with stuff. New Cyber-Physical systems, like sensors in engines and other “Things that Spin”, can create enormous efficiencies. Homes become smarter with a smart meter (a thing), smart grids include cars (things) in their architecture, and wearable computing (things) enable new forms of health care. There is no such thing as getting smarter without including things.

Kevin Ashton coined the term Internet of Things in 1999 and look where we stand now: We’ve realized an Internet of People through mobile devices, we’ve connected socially, through cloud people and things can be connected easily, and IBM’s Watson showed how intelligent computers have become. A growing number of organizations are into SMAC, building new strategies based on the combined strength of four pillars. Real smart organizations are getting SMACT. They understand that the computerization of society takes place in a cyber-physical reality, which includes stuff.

Menno van Doorn AUTHOR:
Menno van Doorn is Director of the Research Institute for the Analysis of New Technology (VINT) in the Netherlands. He mixes personal life experiences with the findings of the 17 years of research done at the VINT Research Institute. Menno has co-authored five books on the impact of new technology on business and society. Awards: IT Researcher of the Year in the Netherlands.

Posted in: Cloud, Collaboration, IBM, mobile testing, Mobility, Opinion, Publications      
Comments: 0
Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,