As we celebrate 59 years of nationhood, I am reminded of the latest achievement we had 2 weeks ago in KL, where commitment to target IoT as a new national economic source was reiterated by the Minister of Technology, Science and Innovation himself.
Malaysia is one of only nine countries in the world to have developed a working roadmap on IoT.
We’re currently in the midst of implementing the National IoT Strategic Roadmap, in which interoperability has been identified to spur IoT in the country, and the market potential is set to generate a GNI of RM9.5 billion by 2020 and achieve RM42.5 billion by 2025.
Within one year, several IoT-based projects have been piloted and launched in Malaysia, including the following areas:
- For Safety – IoT has been employed in Smart Lock-Up to monitor safety in the police lock-up (implemented by the Royal Malaysian Police.
- For Community – A community social innovation platform called I-Comm has been deployed to develop applications like flood monitoring. Its scope will be expanded to cover tourism application as well.
- For Agriculture – IoT plays a key role to assist the export of premium durian to China and other premium product.
- For Transportation – Taxi booking applications have been enabled, e.g. iTeksi, GrabCar.
At the 10th edition of Asia IoT Business Platform two weeks ago, YB Datuk Seri Panglima Madius Tangau, Minister of Science, Technology and Innovation mentioned that following the maturing of IoT technologies in the country, they hope to expand local services to ASEAN markets and ultimately introduce top 5 Malaysian companies to the international stage.
In developing the industry ecosystem, we need all players to work together and demonstrate the value of these solutions in order to convince the end users and investors to adopt IoT technologies.
Over the two days conference, conversations with speakers, public sectors, companies from both solution providers and local end users, etc. led me to the 4 focus markets that have been identified for Malaysia:
- Transportation – to improve efficiency and service level of transport operations. Companies like Prasarana Malaysia will gladly welcome solutions that can help improve public transportation and passenger info.
- Manufacturing – to enhance supply chain efficiency and reduce the gap between SMEs and MNCs. With manufacturing taking up 30% of the whole IoT market potential in Malaysia, we’re seeing increasing number of services from ERPs, supply chain integration, Digital/Connected Factories to Industrial Automation and IIoT, etc.
- Healthcare – to improve healthcare service delivery. Strongly encouraged by the government, solutions like predictive health analytics for hospitals and doctors to deliver better patient care; modernising healthcare with Artificial Intelligence, etc. are currently driven by local startups like AIME, Vital Synapse.
- Agriculture – to boost income of the B40 community by enhancing sectorial productivity while preserving national food security. This is particularly seen to be a strategic segment.
(follow my interviews here)
With collaboration efforts between vendors and across industries being supervised by the government, it is without a doubt that IoT would play a big part in achieving our next stage of nation’s growth.
I am happy to facilitate further IoT initiatives and relationships in and across countries, and support MOSTI’s goal to help Malaysian companies expand into the whole of ASEAN region.
Feel free to drop me a note if you’re interested in the ASEAN IoT markets.
Last Friday, a group of hackers in China allegedly took down the announcement systems in major airports in Vietnam, including Hanoi’s Noi Bai International Airport and Ho Chi Minh’s Tan Son Nhat Airport – the two biggest in the country. The screens and speakers at the airports then started broadcasting messages insulting Vietnam and the Philippines, claiming China’s sovereignty over the so-called “nine-dash line”.
The incident sparked outrage among Vietnamese, whose relationship with China is already tense due to the South China/East Vietnam Sea conflicts. It also highlights the importance of enhancing cybersecurity in the increasingly connected world.
Airports are one of the most vulnerable sites for cyber attacks due to its visibility and the large impact of any disruption to the system. The recent hacks forced operators in Noi Bai and Tan Son Nhat to switch off their networks and check in passengers manually, creating long lines and flight delays. Vietnam Airlines’ website was also hacked, resulting in the personal information of more than 400,000 Vietnam Airlines’ frequent flyers being leaked online.
Vietnam’s state of cybersecurity is low – it is the third most-attacked country in the world, according to Kaspersky’s cyberthreat real-time map (updated at the time of post). Many computer and Internet users, even in government organisations, use little to no protection service, and unlicensed softwares that are more vulnerable. 85 percent of computers have virus infected from USB drives, while 30 percent of banking websites have vulnerabilities – two-third of which are high-level vulnerabilities. In the wake of the hacking incidents, at least 2 commercial banks have temporarily disabled their online banking services, with the rest closely monitoring the system for any unusual transactions.
The inter-connectivity of devices and reliance over technologies for everyday operations expose their users to various threats. A recent study shows that 70 percent of current IoT devices contain serious vulnerabilities. Even your wireless keyboards may not only be sending data to your computer, but also to a hacker tapping on the unencrypted data transmission.
As the ICT sector continues to develop in Vietnam, with ‘smart’ projects sprouting up in various areas and verticals like smart cities, traffic management and smart agriculture, this cyber attack serves as a reminder to prioritise security at the top of any implementation of connected technology – over convenience and novelty – so the damages of cyber attacks can be reduced and/or mitigated.
How do you keep your organisation secured against potential cyber threats? Leave your suggestions/experience down in the comments section below.
Cybersecurity will be discussed at the upcoming 11th edition of Asia IoT Business Platform, taking place in Hanoi, Vietnam at the end of November 2016. For more information, drop me an email at email@example.com.
The adoption of the Internet of Things has seen increasingly rapid growth in recent years, with the number of connected devices expected to exceed 20.8 billion by 2020, a rise from the expected 6.4 billion in 2016. As a result of this, the army of devices that make up the Internet of Things will generate an exponential increase in data volumes. The IDC Digital Universe Study anticipates that the accumulated digital universe of data will increase from an estimated 4.4 trillion gigabytes today to 44 trillion gigabytes by the year 2020.
In Asia Pacific, government initiatives are driving IoT technology adoption, with the number of connected devices expected to increase from 3.1 billion to 8.6 billion by 2020 in APAC alone (excluding Japan). For instance, Malaysia’s Ministry of Science, Technology and Innovation (MOSTI) along with the National R&D centre in ICT (MIMOS) launched the National IoT Strategic Roadmap to transform the country’s digital economy. Singapore has a Smart Nation initiative while Jakarta has Smart City programs in place. Smarter Philippines was also launched by the Department of Science and Technology (DOST) in 2013 to enhance economic growth through technology. Additionally, India has declared its 100 Smart Cities vision while the Thai government is working with Japanese companies and researchers to implement smart city technology to the country’s cities, primarily to combat traffic congestion.
With this massive influx of data, comes the need to store, process and analyse it. Proper utilization of big data can give rise to data-driven business models, which bring increased revenues, better efficiency, lower costs and customer satisfaction. This is where cloud-based services have and will continue to be increasingly prevalent with the increase in amounts of connected devices. The cloud makes it possible for companies to collate data resources in its entirety and provides ease of access, in real-time.
However, while the cloud has its positive attributes that go hand-in-hand with the adoption of the IoT, business leaders express concerns with regards to the threat of data breaches. Given the vast amounts of available data in the case of a security breach, the cloud may also be the most vulnerable link. Security risks continue to be the biggest hindrance to IoT adoption, which is why enterprises are hesitant to exploit the full benefits of IoT. These concerns hold true in the Asia Pacific region. According to FireEye’s report, Asia Pacific is 35% more likely to be targeted by advanced cyber-attacks as compared to the rest of the world.
Nonetheless, with IoT growth, comes greater security risks, and therein lies greater opportunities for security providers. The IoT security market will thus see rapid developments, with worldwide spending anticipated to reach $348 million in 2016, a 23.7 percent increase from 2015 (according to Gartner, Inc.).
Greater emphasis needs to be placed on dealing with issues in cyber-security in relation to IoT. More has to be done to educate enterprises on IoT in order to exploit the vast APAC market potential.
The underlying question that therefore remains is “how do we ensure security in the age of the cloud?” The onus is on the solution providers to provide security solutions for the respective technology, and also on the enterprises to ensure movement of data is controlled and accounted for across the entire data movement chain.
Join us at Asia IoT Business Platform should you have ideas or solutions to share in relation to the Internet of Things.
Last Tuesday, two coordinated explosions in Brussels left at least 34 people dead and over 200 injured. The fact that the attackers were able to hit high-profile targets in the country’s capital – which happens to also host the European Union’s top institutions – serves as a reminder that keeping cities safe is critical.
Cities and urban centers are hothouses for economic growth, innovation and cultural development. In Asia itself, most cities are developing rapidly, and safety plays a major part in attracting and securing investments, businesses, and skilled labor necessary for economic growth and development.
Unfortunately, their very success attracts wrongdoers, from petty crime to lethal terrorist attacks. As cities continue to grow in number, size, and complexity, their infrastructure and services come under increasing stress. Civic resources are under pressure and crime is harder than ever to police.
As it stands, most video surveillance technology is inefficient. Police investigations are often hampered by blind spots in video networks and low-quality imagery. Issues with data storage and retrieval mean incident data can be slow to reach command staff, and data loss can derail investigations altogether.
Recently we saw many ICT solution providers focusing on ‘smart city’ solutions, which make use of a web of inter-connected devices, software and cloud storage systems – namely IoT – to enable public and private services to work together more efficiently.
Are smart cities safe cities as well? In concept, I believe this same network of connected devices are also new tools for governments to improve public services such as crime-fighting. It can help law enforcement monitor public areas, analyze patterns, and track incidents and suspects, enabling quicker response. By combining information from video surveillance cameras, social media, citizen reports, and other sensors, the solution provides a richer view of urban safety.
Through my interviews with public sectors attending the Asia IoT Business Platform, governments are taking public safety very seriously.
To protect cities against crime, terrorism, and civil unrest, they are on the lookout for new technology that involves:
- Location monitoring – View live feeds of any surveillance camera to assess conditions; collect data on crime type and location; and monitor social media for possible threats.
- Incident detection and management – Use video feeds and analytics to verify and detect threats and incidents; alert operators to potential incidents; create incident records; and collect all data regarding the incident lifecycles.
- Administration and communications network – Easily configure and manage sensors, video infrastructure, and policy; deploy sensors in designated areas, set up regional and central intelligent command and control centers.
- Analytics – Report distribution of crime by frequency, location, etc., to aid in planning and to help predict crime patterns; identify areas with recurring issues.
We hope to urgently drive the message that public safety should not be taken for granted. Collaboration between all stakeholders are required to ensure that prevention measures are taken strictly to minimise further attacks on innocent cities. Please drop me a note if you think you have the right solution to enable safer cities – lets make the world a better place with the use of right technology.
My heart goes out to the victims of this terrible tragedy.
The Jakarta bomb blasts last Thursday was a reminder that no one should ever take a city’s safety for granted. Public safety is an important function for governments and with Asia Pacific expecting to see the highest number of smart cities by 2025, can smarter cities also mean safer cities? What role does the advancement of technology and IoT have to play in delivering public safety?
Hitachi Data Systems (HDS) conducted a survey of delegates at the Safe Cities Asia conference in May 2015 and found nearly 90% of respondents had already been involved in a safety project. More importantly, 69% of respondents are planning to invest in public safety projects in their countries over the next two years, with 44% to invest more than US$100 million.
However even with such budgets, governments may be unaware of how to utilize the funds wisely and a common challenge is the lack of alignment between government agencies and a failure to adopt an integrated approach. With the issue of privacy increasingly under the spotlight, this makes it even harder to for governments to implement an integrated approach without bringing to mind the “pre-crime” scenario featured in the 2002 science fiction film Minority Report.
In smart cities implementation, big data analytics and network technology are two important factors. In Singapore, AGT and Cisco’s City Safety Solution fuses data from multiple sources to identify events and reduce false alarms in order to effectively monitor public areas, detect incidents and accelerate response times.
Predictive policing is the use of data analytics to determine potential locations of future crime. By combining and analyzing data from a variety of sources, such as video cameras on trains, in department stores and scattered throughout the city, as well as other data on social platforms such as Twitter, crime and perhaps acts of terrorism can be prevented before it happens.
Experiments conducted in response to a ‘predictive policing algorithm’ based on crime data in Santa Cruz, California, enabled police officers to identify the most likely time and place within a certain locality for a particular crime to be committed. This allowed for targeted patrols to be made and resulted in a 4 percent decline in burglaries and 13 additional arrests being recorded within the first 6 months.
Will results like this justify the privacy issues that these technologies raise? With the increasing threat of terrorist activities in the world, what are the guidelines for the exchange of information between government and citizen to ensure a safer city?
This article was written by Yue Yeng Fong for more articles visit her on Linkedin[:]
Through conversations with IT executives from enterprises in the region since 2014, we saw great interest in cloud, data and the corresponding data analytics that can unlock most potential in businesses.
There have been huge advances in the amount of data we routinely generate and collect in pretty much everything we do, as well as our ability to use technology to analyze and understand it. The intersection of these trends, namely Big Data, is helping businesses in every industry to become more efficient and productive.
According to our interview with Dato Ng Wan Peng, COO of MDeC, Malaysia has rolled out the country’s Big Data framework. “We foresee a bright future ahead in this area. Among benefits we intend to realise for the country include talent development using public open data to produce useful applications, technology development; and creating awareness within the private and private sectors.”
Businesses that have benefited hugely from Cloud and Data include banking, insurance, smart cities, transportation and manufacturing sectors.
We are still seeing a growing number of dedicated teams led by senior management in exploring IoT and data services for their businesses.
Some examples include:
- Proton, Engineering Solution & IoT
- Petronas, Digital Innovation, Strategy & Architecture
- CEVA Logistics, GM Operations
- Provinsi DKI Jakarta, Head of Jakarta Smart City
- Bank Simpanan Nasional, Transformation Management Department
These companies were part of the 2015 Asia IoT Business Platform series in the Philippines, Thailand, Indonesia and Malaysia.
Healthcare is an increaseingly interesting sector that we foresee to benefit largely from cloud and data.
This could be seen through the heated discussions in the 6th Asia IoT Business Platform in KL. Dr. Dhesi, founder of AIME said, “There’re so many patients that it’s impossible to diagnose and analyse without data and IoT. By 2030, we’ll be using cloud brains to communicate, store and think – like an external hard disk. Smart and sustainable healthcare needs to be driven by new and disruptive IoT business models.”
As the momentum of IoT moves forward, data will be a key enabler of digital business transformation, driving tremendous value. IoT will mature from being a platform that improves enterprise efficiency and revenue streams into an entire ecosystem that changes the business model to be more digital and service centric through data analytics and algorithms.
However, security remains a challenge in business transformation.
Despite the apparent importance of IoT, widespread adoption of the technology is still slow. Our discussions with industry leaders and enterprises led us to attribute this phenomenon to security concerns: more or less everyone agrees that if data is not handled properly, the consequences could be devastating.
Connected devices are highly susceptible to penetration and infiltration by hackers. Its connected nature severely amplifies any malicious attacks on devices, and data associated with IoT devices can easily be stolen. As a result, businesses, government bodies, and consumers are wary of installing IoT devices in their cities and businesses.
According to BI Intelligence report, top security flaws of IoT devices include insecure software/firmware, insufficient authentication, lack of transport authentication, user identity, and un-encrypted network services.
Taking a leap of faith – there’s still a bright side to data and security.
While the IoT is taking flight in the Southeast Asian region, security problems should not be taken lightly, but have to be addressed and faced head-on.
Security needs to be built in as the foundation of IoT systems, with rigorous validity checks, authentication, data verification, and all the data needs to be encrypted. At the application level, software development organizations need to be better at writing code that is stable, resilient and trustworthy, with better code development standards, training, threat analysis and testing.
While local governments are starting to establish security developments e.g Indonesia’s National Cyber Agency (NCA) and Indonesia Security Incident Response Team on Internet Infrastructure (ID-RTII), the notion of addressing security vulnerabilities of the IoT creates opportunity for security solutions to be implemented.
We came across many corporations and enterprises offering security solutions that undoubtedly boost the confidence of enterprises taking a step in IoT adoption. As the educational platform for government and businesses in the region, we are exploring for more and better solutions with case studies that will benefit our end users.
Drop us a message if you have relevant projects and solutions regarding cloud, data and security to share.
If you haven’t heard by now, IoT is a growing web of connected sensors and “things” that will may dramatically improve our lives with the magnitude of data captured. From our discussions with industry end users these 2 years, the value of IoT is in this data and the corresponding data analytics that can unlock the most business potential.
As EMC and IDC pointed out in their 2014 Digital Universe report, organisations need to hone in on high-value, ‘target-rich’ data that is (1) easy to access; (2) available in real time; (3) has a large footprint (affecting major parts of the organisation or its customer base); and/or (4) can effect meaningful change, given the appropriate analysis and follow-up action.
The term “garbage in, garbage out” was first coined in the early 1960s, and in the age of Big Data, the GIGO problem may be exacerbated with the speed and volume of data being collected.
From Data Collection to Delivering Business Value – 5 Key Challenges
1. Accuracy and Usefulness of Data
Veracity is one of the 4 Vs of Big Data and for me, the most important one. (The other 3 Vs are Volume, Velocity and Variety.) In Solon Barocas and Andrew Selbst’s article: “Big Data’s Disparate Impact” on social discrimination, they note that an algorithm is only as good as the data it works with. Bad data not only produces inaccurate information, it also can lead to catastrophic results.
Above the accuracy of data, it is finding out the most useful data. Mckinsey recently found that only 1% of the data from an oil rig’s 30,000 sensors are examined for detecting and controlling anomalies. The other 99% are not being analysed for performance optimization or predictive maintenance. The best data is actionable and it is always useful to start with the specific problems you would like your data to solve.
“We’ll collect the data now and figure out what to do with it later” should not be relied upon as a strategy. Having too much (useless) data is not only expensive to store but also creates a legal liability. Case in point: the Ashley Madison saga.
2. The BIG data
The vast amounts of data that will be generated by IoT devices will put enormous pressure on network and data centre infrastructure.
As Gartner’s Research Director Fabrizio Biscotti points out, “Processing large quantities of IoT data in real time will increase the workloads of data centers, leaving providers facing new security, capacity and analytics challenges.”
“Data center managers will need to deploy more forward-looking capacity management platforms that can include a data center infrastructure management (DCIM) system approach of aligning IT and operational technology (OT) standards and communications protocols to be able to proacively provide the production facility to process the IoT data points based on the priorities and the business needs.”
3. Security and Privacy – Who should know What at When
A constant topic at all our conferences in the region, the topic of security and privacy is a tricky issue as different stakeholders in the IoT ecosystems have different needs. To compound the issue, the huge diversity of device types, their different capabilities and the range of deployment scenarios makes security a unique challenge.
However, the IoT can only reach its full potential if we have strong security and privacy safeguards in place, especially in industries like healthcare, finance and critical infrastructure. Security protocols should be inbuilt into the entire data chain from sensors to datacenters to applications.
With data as the new currency, it will become important to know who has ownership over what types of data. Open data sources would be important for rapid IoT development, but what sorts of information should be made available?
How should one sort the varying levels of data access at different periods of time? Does the subject of data collection have a say over what they share?
4. When diversity may not be a good thing
Gartner analyst Doug Laney in his original paper in 2001 on data management wrote that “the variety of incompatible data formats, non-aligned data structures, and inconsistent data semantics” was the principal barrier to effective data management.
The challenge of having to deal with multiple data sources with different levels of accuracy and across formats/ standards is especially prevalent for large enterprises with legacy systems and abundance of collected data serving different purposes.
These enterprises find that there is a need to harness the variety of these data from different departments and sources to maximize return from their analytics and also apply insights to as many areas of the enterprise as they can.
The diverse data also presents a security and scalability challenge that the industry is trying to solve with IoT standards. With more industry leaders trying to set their own unique standards, the final goal is still a distance away.
5. Competing for the talent
Every big new technology advancement brings the inevitable talent shortage. In IoT that key hire is often the data scientist or data architect.
“The data scientist has become the unicorn of the big data world,” said Rob Patterson, VP of corporate strategy at ColdLight, a PTC business. “It has been extremely difficult finding those people with programming skills, mathematical expertise, and business acumen.”
There just aren’t enough people with the required skills to analyze and transforming data into actionable insights and Gartner found that more than half of the business leaders they interviewed felt that their big data efforts were constrained by the ability to find the right talent.
More companies are now teaming up with universities to address this issue. In our recent 6th Asia IoT Business Platform event in KL, Prof. Dr. Sharin bin Sahib from UTeM felt that it is important to have a talent pipeline where potential candidates can be continuously nurtured and approached when vacancies arise. Towards this need, they have opened an IoT academy with Samsung.
In the meantime, take a page out of Walmart’s book. They launched an analytics competition on Kaggle, asking “armchair data scientists” to solve real world problems from given data sets, and hiring designers of the best solutions. The approach led to interesting appointments, who may not have been considered for interviews based on past experiences.
For more on market trends and outlook of IoT, join us for our series of Asia IoT Business Platform events in 2016.
This post was contributed by Yue Yeng Fong, Vice President Business Development at Industry Platform and was first published here.