Theme No. 2: New frontiers of computing prompt organizations to reconsider how they compute
Trend 4: Post-quantum cryptography (PQC): Data protection that is resistant to quantum computing (QC) decryption risks.
Business benefits: Protects data from the security risks that will come with the advent of quantum computing.
Challenges: PQC algorithms are not drop-in replacements for existing asymmetric algorithms. Current applications may have performance issues, will require testing and may need to be rewritten.
Trend 5: Ambient invisible intelligence: Technology unobtrusively integrated into the environment to enable a more natural, intuitive experiences
Business benefits: Enables low-cost, real-time tracking and sensing of items, improving visibility and efficiency; potential for unforgeable provenance and new ways for objects to report identity, history and properties.
Challenges: Providers will have to address privacy concerns and obtain consent for some types of data use. Users may opt to disable tags to preserve privacy.
Trend 6: Energy-efficient computing: An approach to increasing sustainability through more efficient architecture, code and algorithms; hardware optimized for efficiency; and the use of renewable energy to run systems.
Business benefits: Address legal, commercial and social pressures to improve sustainability by reducing carbon footprint.
Challenges: New hardware, cloud services, skills, tools, algorithms and applications will be required; migrating to new computing platforms will be complex and expensive; energy prices may rise in the short term as green energy demand increases.
Trend 7: Hybrid computing: Combines different compute, storage and network mechanisms to solve computational problems.
Business benefits: Highly efficient, high-speed, transformative innovation environments; AI that performs beyond current technological limits; autonomous businesses powered by higher levels of automation; augmented human capability allowing real-time personalization at scale and use of the human body as a computing platform.
Challenges: Nascent, highly complex technologies require specialized skills; a system of autonomous modules introduces security risks; involves experimental technologies and high costs; need for orchestration and integration.
Trend 4: Post-quantum cryptography (PQC): Data protection that is resistant to quantum computing (QC) decryption risks.
Business benefits: Protects data from the security risks that will come with the advent of quantum computing.
Challenges: PQC algorithms are not drop-in replacements for existing asymmetric algorithms. Current applications may have performance issues, will require testing and may need to be rewritten.
Trend 5: Ambient invisible intelligence: Technology unobtrusively integrated into the environment to enable a more natural, intuitive experiences
Business benefits: Enables low-cost, real-time tracking and sensing of items, improving visibility and efficiency; potential for unforgeable provenance and new ways for objects to report identity, history and properties.
Challenges: Providers will have to address privacy concerns and obtain consent for some types of data use. Users may opt to disable tags to preserve privacy.
Trend 6: Energy-efficient computing: An approach to increasing sustainability through more efficient architecture, code and algorithms; hardware optimized for efficiency; and the use of renewable energy to run systems.
Business benefits: Address legal, commercial and social pressures to improve sustainability by reducing carbon footprint.
Challenges: New hardware, cloud services, skills, tools, algorithms and applications will be required; migrating to new computing platforms will be complex and expensive; energy prices may rise in the short term as green energy demand increases.
Trend 7: Hybrid computing: Combines different compute, storage and network mechanisms to solve computational problems.
Business benefits: Highly efficient, high-speed, transformative innovation environments; AI that performs beyond current technological limits; autonomous businesses powered by higher levels of automation; augmented human capability allowing real-time personalization at scale and use of the human body as a computing platform.
Challenges: Nascent, highly complex technologies require specialized skills; a system of autonomous modules introduces security risks; involves experimental technologies and high costs; need for orchestration and integration.
Theme No. 3: Human-machine synergy brings together the physical and digital worlds
Trend 8: Spatial computing: Digitally enhances the physical world using technologies like augmented and virtual reality to offer immersive experiences.
Business benefits: Addresses consumer demand for immersive and interactive experiences in gaming, education and e-commerce; satisfies demand for sophisticated visualization tools for decision making and efficiency in healthcare, retail and manufacturing.
Challenges: Head-mounted displays are expensive and unwieldy, require frequent charging, isolate users and may increase the potential for accidents; user interfaces are complex; data privacy and security are major concerns.
Trend 9: Polyfunctional robots: Robots capable of performing multiple tasks and seamlessly switching between them as required.
Business benefits: Improved efficiency; faster ROI; no need for architectural changes or bolt-down infrastructure means fast deployment, low risk and scalability; can substitute for or work with humans.
Challenges: The industry hasn’t yet standardized on price or minimum functionality required.
Trend 10: Neurological enhancement: Improving cognitive abilities with technologies that read and decode brain activity.
Business benefits: Human upskilling, safety improvements, personalized education, allowing older people to work longer, next-generation marketing..
Challenges: Initially expensive, limited battery and options for mobility and wireless connectivity; invasive and risky; UBMIs and BBMIs interface directly with the human brain, creating security challenges; ethical concerns (e.g., altering users’ perception of reality).
Trend 8: Spatial computing: Digitally enhances the physical world using technologies like augmented and virtual reality to offer immersive experiences.
Business benefits: Addresses consumer demand for immersive and interactive experiences in gaming, education and e-commerce; satisfies demand for sophisticated visualization tools for decision making and efficiency in healthcare, retail and manufacturing.
Challenges: Head-mounted displays are expensive and unwieldy, require frequent charging, isolate users and may increase the potential for accidents; user interfaces are complex; data privacy and security are major concerns.
Trend 9: Polyfunctional robots: Robots capable of performing multiple tasks and seamlessly switching between them as required.
Business benefits: Improved efficiency; faster ROI; no need for architectural changes or bolt-down infrastructure means fast deployment, low risk and scalability; can substitute for or work with humans.
Challenges: The industry hasn’t yet standardized on price or minimum functionality required.
Trend 10: Neurological enhancement: Improving cognitive abilities with technologies that read and decode brain activity.
Business benefits: Human upskilling, safety improvements, personalized education, allowing older people to work longer, next-generation marketing..
Challenges: Initially expensive, limited battery and options for mobility and wireless connectivity; invasive and risky; UBMIs and BBMIs interface directly with the human brain, creating security challenges; ethical concerns (e.g., altering users’ perception of reality).
document.pdf
29.4 MB
Iran MarTech2024 report, Techrasa Insight
اولین گزارش تکراسا در راستای ایجاد شفافیت و دسترسیپذیری دادهها در صنایع اقتصاد دیجیتال، با نام گزارش جامع تکنولوژیهای بازاریابی ایران روز گذشته منتشر شد. این گزارش ۳۳۴ صفحهای نتیجهی ۱۰۰ مصاحبهی ۳ تا ۷ ساعته با مدیران فعال در حوزهی بازاریابی است.
در این گزارش تلاش شده است با پوشش دیدگاه بازیگران صنعت بازاریابی کشور، بستر همافزایی و همکاری میسر شود تا راهکارهایی برای مواجهه با تحریمها و محدودیتهای بینالمللی در ارائهی سرویسهای بازاریابی دنیا به شرکتهای ایرانی پیدا شود.
#digital #transformation #data #report
اولین گزارش تکراسا در راستای ایجاد شفافیت و دسترسیپذیری دادهها در صنایع اقتصاد دیجیتال، با نام گزارش جامع تکنولوژیهای بازاریابی ایران روز گذشته منتشر شد. این گزارش ۳۳۴ صفحهای نتیجهی ۱۰۰ مصاحبهی ۳ تا ۷ ساعته با مدیران فعال در حوزهی بازاریابی است.
در این گزارش تلاش شده است با پوشش دیدگاه بازیگران صنعت بازاریابی کشور، بستر همافزایی و همکاری میسر شود تا راهکارهایی برای مواجهه با تحریمها و محدودیتهای بینالمللی در ارائهی سرویسهای بازاریابی دنیا به شرکتهای ایرانی پیدا شود.
#digital #transformation #data #report
What is Security Orchestration,
Automation and Response (SOAR)?
Gartner defines SOAR as tools that:
• Collect security threat data and alerts from different sources
• Enable incident analysis, triage and prioritization, both automatically and manually
with machine assistance
• Define and enforce a standard workflow for incident response activities
• Encode incident analysis and response procedures in a digital workflow format,
enabling automation of some or all incident responses.
#security #soar
Automation and Response (SOAR)?
Gartner defines SOAR as tools that:
• Collect security threat data and alerts from different sources
• Enable incident analysis, triage and prioritization, both automatically and manually
with machine assistance
• Define and enforce a standard workflow for incident response activities
• Encode incident analysis and response procedures in a digital workflow format,
enabling automation of some or all incident responses.
#security #soar
#Siem log sources
What is SecOps?
Security operations (SecOps) is a collaboration between security and IT operations teams,
where security and operations staff assume joint ownership and responsibility for security
concerns. It is a set of SOC processes, practices and tools which can help organizations meet
security goals more efficiently.
#secops #security
Security operations (SecOps) is a collaboration between security and IT operations teams,
where security and operations staff assume joint ownership and responsibility for security
concerns. It is a set of SOC processes, practices and tools which can help organizations meet
security goals more efficiently.
#secops #security
Who works in #SOC?