Business with a Heart

Balaji Uppili

People and technology are converging like never before, as the world is gripped by COVID – 19. Just a few months ago, nobody could have predicted or foreseen the way businesses are having to work today.  As we were strategizing on corporate governance, digital transformation and the best of resiliency plans to ensure business continuity, no one ever anticipated the scale and enormity of COVID 19.

Today, it has become obvious that COVID 19 has brought about the convergence of technology and humanity and how it can change the way businesses work and function.  While we as leaders have been thinking largely about business outcomes, this pandemic has triggered a more humane approach, and the approach is here to stay.  The humane approach will be the differentiator and will prove the winner.

There is no doubt that this pandemic has brought an urgent need to accelerate our digital capabilities. With the focus on strong IT infrastructure and remote working, workforces were able to transition to working from home, meeting through video conferencing, and surprisingly, this has turned to increase the humane aspect of business relations – it has now become alright for both parties to be seeing children, spouses or pets in meeting backgrounds, and that in itself has broken down huge barriers and formalities.  It is refreshing to see the emerging empathy that is getting stronger with every meeting, and increasing collaboration and communication. It is becoming increasingly clear that we have overlooked the important factor of how it is that people have been showing up to work.  Suddenly it is now more visible that people have equally strong roles within the family – when we see parents having to home-school their children, or having other care obligations, we are viewing their personal lives and are able to empathize with them more.  We are seeing the impact that business can have on people and their personal lives and this is a never like before opportunity for leaders to put our people first.

And with customers being the center of every business, the situation of not being able to do in-person meetings has now warranted newer ways to collaborate and further strengthen the customer-centricity initiatives even more.  It has become evident that no matter how much we as leaders are thinking of automating operations, it is human connections that run businesses successfully. Lots of things have been unraveled – Important business imperatives like criticality of clean workspace compliance, the fact that offshoring thousands of miles away is not factually a compromise, but a very cost-effective and efficient way of getting things done. Productivity has also increased, and work done this far by, has a positive impact of at least 20% or even more in certain situations. As boundaries and barriers are broken, the rigidities of who should work on something and when they should work on it have all become less rigid.  Employees are less regimental about time.  Virtual crowd outsourcing has become the norm – you throw an idea at a bunch of people and whoever has the ability and the bandwidth to handle the task takes care of it, instead of a formal task assignment, and this highlights the fungibility of people.

All in all, the reset in the execution processes and introducing much more of a humane approach is here to stay and make the new norm even more exciting.

About the Author –

Balaji has over 25 years of experience in the IT industry, across multiple verticals. His enthusiasm, energy, and client focus is a rare gift, and he plays a key role in bringing new clients into GAVS. Balaji heads the Delivery department and passionately works on Customer delight. He says work is worship for him and enjoys watching cricket, listening to classical music, and visiting temples.

JAVA – Cache Management

Sivaprakash Krishnan

This article explores the offering of the various Java caching technologies that can play critical roles in improving application performance.

What is Cache Management?

A cache is a hot or a temporary memory buffer which stores most frequently used data like the live transactions, logical datasets, etc. This intensely improves the performance of an application, as read/write happens in the memory buffer thus reducing retrieval time and load on the primary source. Implementing and maintaining a cache in any Java enterprise application is important.

  • The client-side cache is used to temporarily store the static data transmitted over the network from the server to avoid unnecessarily calling to the server.
  • The server-side cache could be a query cache, CDN cache or a proxy cache where the data is stored in the respective servers instead of temporarily storing it on the browser.

Adoption of the right caching technique and tools allows the programmer to focus on the implementation of business logic; leaving the backend complexities like cache expiration, mutual exclusion, spooling, cache consistency to the frameworks and tools.

Caching should be designed specifically for the environment considering a single/multiple JVM and clusters. Given below multiple scenarios where caching can be used to improve performance.

1. In-process Cache – The In-process/local cache is the simplest cache, where the cache-store is effectively an object which is accessed inside the application process. It is much faster than any other cache accessed over a network and is strictly available only to the process that hosted it.

Data Center Consolidation Initiative Services

  • If the application is deployed only in one node, then in-process caching is the right candidate to store frequently accessed data with fast data access.
  • If the in-process cache is to be deployed in multiple instances of the application, then keeping data in-sync across all instances could be a challenge and cause data inconsistency.
  • An in-process cache can bring down the performance of any application where the server memory is limited and shared. In such cases, a garbage collector will be invoked often to clean up objects that may lead to performance overhead.

In-Memory Distributed Cache

Distributed caches can be built externally to an application that supports read/write to/from data repositories, keeps frequently accessed data in RAM, and avoid continuous fetching data from the data source. Such caches can be deployed on a cluster of multiple nodes, forming a single logical view.

  • In-memory distributed cache is suitable for applications running on multiple clusters where performance is key. Data inconsistency and shared memory aren’t matters of concern, as a distributed cache is deployed in the cluster as a single logical state.
  • As inter-process is required to access caches over a network, latency, failure, and object serialization are some overheads that could degrade performance.

2. In-memory database

In-memory database (IMDB) stores data in the main memory instead of a disk to produce quicker response times. The query is executed directly on the dataset stored in memory, thereby avoiding frequent read/writes to disk which provides better throughput and faster response times. It provides a configurable data persistence mechanism to avoid data loss.

Redis is an open-source in-memory data structure store used as a database, cache, and message broker. It offers data replication, different levels of persistence, HA, automatic partitioning that improves read/write.

Replacing the RDBMS with an in-memory database will improve the performance of an application without changing the application layer.

3. In-Memory Data Grid

An in-memory data grid (IMDG) is a data structure that resides entirely in RAM and is distributed among multiple servers.

Key features

  • Parallel computation of the data in memory
  • Search, aggregation, and sorting of the data in memory
  • Transactions management in memory
  • Event-handling

Cache Use Cases

There are use cases where a specific caching should be adapted to improve the performance of the application.

1. Application Cache

Application cache caches web content that can be accessed offline. Application owners/developers have the flexibility to configure what to cache and make it available for offline users. It has the following advantages:

  • Offline browsing
  • Quicker retrieval of data
  • Reduced load on servers

2. Level 1 (L1) Cache

This is the default transactional cache per session. It can be managed by any Java persistence framework (JPA) or object-relational mapping (ORM) tool.

The L1 cache stores entities that fall under a specific session and are cleared once a session is closed. If there are multiple transactions inside one session, all entities will be stored from all these transactions.

3. Level 2 (L2) Cache

The L2 cache can be configured to provide custom caches that can hold onto the data for all entities to be cached. It’s configured at the session factory-level and exists as long as the session factory is available.

  • Sessions in an application.
  • Applications on the same servers with the same database.
  • Application clusters running on multiple nodes but pointing to the same database.

4. Proxy / Load balancer cache

Enabling this reduces the load on application servers. When similar content is queried/requested frequently, proxy takes care of serving the content from the cache rather than routing the request back to application servers.

When a dataset is requested for the first time, proxy saves the response from the application server to a disk cache and uses them to respond to subsequent client requests without having to route the request back to the application server. Apache, NGINX, and F5 support proxy cache.

Desktop-as-a-Service (DaaS) Solution

5. Hybrid Cache

A hybrid cache is a combination of JPA/ORM frameworks and open source services. It is used in applications where response time is a key factor.

Caching Design Considerations

  • Data loading/updating
  • Performance/memory size
  • Eviction policy
  • Concurrency
  • Cache statistics.

1. Data Loading/Updating

Data loading into a cache is an important design decision to maintain consistency across all cached content. The following approaches can be considered to load data:

  • Using default function/configuration provided by JPA and ORM frameworks to load/update data.
  • Implementing key-value maps using open-source cache APIs.
  • Programmatically loading entities through automatic or explicit insertion.
  • External application through synchronous or asynchronous communication.

2. Performance/Memory Size

Resource configuration is an important factor in achieving the performance SLA. Available memory and CPU architecture play a vital role in application performance. Available memory has a direct impact on garbage collection performance. More GC cycles can bring down the performance.

3. Eviction Policy

An eviction policy enables a cache to ensure that the size of the cache doesn’t exceed the maximum limit. The eviction algorithm decides what elements can be removed from the cache depending on the configured eviction policy thereby creating space for the new datasets.

There are various popular eviction algorithms used in cache solution:

  • Least Recently Used (LRU)
  • Least Frequently Used (LFU)
  • First In, First Out (FIFO)

4. Concurrency

Concurrency is a common issue in enterprise applications. It creates conflict and leaves the system in an inconsistent state. It can occur when multiple clients try to update the same data object at the same time during cache refresh. A common solution is to use a lock, but this may affect performance. Hence, optimization techniques should be considered.

5. Cache Statistics

Cache statistics are used to identify the health of cache and provide insights about its behavior and performance. Following attributes can be used:

  • Hit Count: Indicates the number of times the cache lookup has returned a cached value.
  • Miss Count: Indicates number of times cache lookup has returned a null or newly loaded or uncached value
  • Load success count: Indicates the number of times the cache lookup has successfully loaded a new value.
  • Total load time: Indicates time spent (nanoseconds) in loading new values.
  • Load exception count: Number of exceptions thrown while loading an entry
  • Eviction count: Number of entries evicted from the cache

Various Caching Solutions

There are various Java caching solutions available — the right choice depends on the use case.

Software Test Automation Platform

At GAVS, we focus on building a strong foundation of coding practices. We encourage and implement the “Design First, Code Later” principle and “Design Oriented Coding Practices” to bring in design thinking and engineering mindset to build stronger solutions.

We have been training and mentoring our talent on cutting-edge JAVA technologies, building reusable frameworks, templates, and solutions on the major areas like Security, DevOps, Migration, Performance, etc. Our objective is to “Partner with customers to realize business benefits through effective adoption of cutting-edge JAVA technologies thereby enabling customer success”.

About the Author –

Sivaprakash is a solutions architect with strong solutions and design skills. He is a seasoned expert in JAVA, Big Data, DevOps, Cloud, Containers, and Micro Services. He has successfully designed and implemented a stable monitoring platform for ZIF. He has also designed and driven Cloud assessment/migration, enterprise BRMS, and IoT-based solutions for many of our customers. At present, his focus is on building ‘ZIF Business’ a new-generation AIOps platform aligned to business outcomes.

IoT Adoption during the Pandemic

Artificial Intelligence for IT Operations

Naveen KT

From lightbulbs to cities, IoT is adding a level of digital intelligence to various things around us. Internet of Things or IoT is physical devices connected to the internet, all collecting and sharing data, which can then be used for various purposes. The arrival of super-cheap computers and the ubiquity of wireless networks are behind the widespread adoption of IoT. It is possible to turn any object, from a pill to an airplane, into an IoT-enabled device. It is making devices smarter by letting them ‘sense’ and communicate, without any human involvement.

Let us look at the developments that enabled the commercialization of IoT.

History

The idea of integrating sensors and intelligence to basic objects dates to the 1980s and 1990s. But the progress was slow because the technology was not ready. Chips were too big and bulky and there was no way for an object to communicate effectively.

Processors had to be cheap and power-frugal enough to be disposed of before it finally becomes cost-effective to connect to billions of devices. The adoption of RFID tags and IPV6 was a necessary step for IoT to scale.

Kevin Ashton penned the phrase ‘Internet of Things’ in 1999. Although it took a decade for this technology to catch up with his vision. According to Ashton “The IoT integrates the interconnectedness of human culture (our things) with our digital information system(internet). That’s the IoT”.

Early suggestions for IoT include ‘Blogjects’ (object that blog and record data about themselves to the internet), Ubiquitous computing (or ‘ubicomp’), invisible computing, and pervasive computing.

How big is IoT?

AIOps in Infrastructure Management

IDC predicts that there will be 41.6 billion connected IoT devices by 2025. It also suggests industrial and automotive equipment represent the largest opportunity of connected ‘things’.

Gartner predicts that the enterprise and automotive sectors will account for 5.8 billion devices this year.

However, the COVID-19 pandemic has further enhanced the need for IoT-enabled devices to help the nations tackle the crisis.

IoT for the Government

Information about the movement of citizens is urgently required by governments to track the spread of the virus and potentially monitor their quarantine measures. Some IoT operators have solutions that could serve these purposes.

AIOps platform
  • Telia’s Division X has developed Crowd Insights which provides aggregated smartphone data to city and transport authorities of Nordic Countries. It is using the tool which will track the movement of citizens during the quarantine.
  • Vodafone provides insights on traffic congestion.
  • Telefonica developed Smart steps, which aggregates data on footfall and movement for the transport, tourism, and retail sectors.

Personal data of people will also help in tracking clusters of infection by changing the privacy regulations. For example, in Taiwan, high-risk quarantined patients were being monitored through their mobile phones to ensure compliance with quarantine rules. In South Korea, the officials track infected citizens and alert others if they come into contact with them. The government of Israel went as far as passing an emergency law to monitor the movement of infected citizens via their phones.

China is already using mass temperature scanning devices in public areas like airports. A team of researchers at UMass Amherst is testing a device that can analyze coughing sounds to identify the presence of flu-like symptoms among crowds.

IoT in Health care

COVID-19 could be the trigger to explore new solutions and be prepared for any such future pandemics, just as the SARS epidemic in 2003 which spurred the governments in South Korea and Taiwan to prepare for today’s problems.

IT operations analytics

Remote patient monitoring (RPM) and telemedicine could be helpful in managing a future pandemic. For example, patients with chronic diseases who are required to self-isolate to reduce their exposure to COVID-19 but need continuous care would benefit from RPM. Operators like Orange, Telefónica, and Vodafone already have some experience in RPM.

Connected thermometers are being used in hospitals to collect data while maintaining a social distance. Smart wearables are also helpful in preventing the spread of the virus and responding to those who might be at risk by monitoring their vital signs.

Connected thermometers are being used in hospitals to collect data while maintaining a social distance. Smart wearables are also helpful in preventing the spread of the virus and responding to those who might be at risk by monitoring their vital signs.

Telehealth is widely adopted in the US, and the authorities there are relaxing reimbursement rules and regulations to encourage the extension of specific services. These include the following.

  • Medicare, the US healthcare program for senior citizens, has temporarily expanded its telehealth service to enable remote consultations.
  • The FCC has made changes to the Rural Health Care (RHC) and E-Rate programs to support telemedicine and remote learning. Network operators will be able to provide incentives or free network upgrades that were previously not permitted, for example, for hospitals that are looking to expand their telemedicine programs.

IoT for Consumers

The IoT promises to make our environment smarter, measurable, and interactive.COVID-19 is highly contagious, and it can be transmitted from one to another even by touching the objects used by the affected person. The WHO has instructed us to disinfect and sanitize high touch objects. IoT presents us with an ingenious solution to avoid touching these surfaces altogether. Hands-free and sensor-enabled devices and solutions like smart lightbulbs, door openers, smart sinks, and others help prevent the spread of the virus.

Security aspects of IoT

Security is one of the biggest issues with the IoT. These sensors collect extremely sensitive data like what we say and do in our own homes and where we travel. Many IoT devices lack security patches, which means they are permanently at risk. Hackers are now actively targeting IoT devices such as routers and webcams because of their inherent lack of security makes them easy to compromise and pave the way to giant botnets.

Machine learning service provider
Machine learning service provider

IoT bridges the gap between the digital and the physical world which means hacking into devices can have dangerous real-world consequences. Hacking into sensors and controlling the temperature in power stations might end up in catastrophic decisions and taking control of a driverless car could also end in disaster.

Overall IoT makes the world around us smarter and more responsive by merging the digital and physical universe. IoT companies should look at ways their solutions can be repurposed to help respond to the crisis.

Enterprise IT infrastructure services
Enterprise IT infrastructure services

References:

  • https://www.analysysmason.com/Research/Content/Comments/covid19-iot-role-rdme0-rma17/
  • shorturl.at/wBFGT

Naveen is a software developer at GAVS. He teaches underprivileged children and is interested in giving back to society in as many ways as he can. He is also interested in dancing, painting, playing keyboard, and is a district-level handball player.

Customer Centricity during Unprecedented Times

Cloud service for business

Balaji Uppili

“Revolve your world around the customer and more customers will revolve around you.”

Heather Williams

Customer centricity lies at the heart of GAVS. An organization’s image is largely the reflection of how well its customers are treated. And unprecedented times demand unprecedented measures to ensure that our customers are well-supported. We conversed with our Chief Customer Success Officer, Balaji Uppili, to understand the pillars/principles of maintaining and improving an organization’s customer-centricity amidst a global emergency.

Helping keep the lights on

Keeping the lights on – this forms the foundation of all organizations. It is of utmost importance to extend as much support as required by the customers to ensure their business as usual remains unaffected. Keeping a real-time pulse on the evolving requirements and expectations of our customers will go a long way. It is impossible to understate the significance of continuous communication and collaboration here. Our job doesn’t end at deploying collaboration tools, we must also measure its effectiveness and take necessary corrective actions.

The lack of a clear vision into the future may lead business leaders into making not-so-sound decisions. Hence, bringing an element of ‘proactiveness’ into the equation will go a long way in assuring the customers of having invested in the right partner.

Being Empathy-driven

While empathy has always been a major tenet of customer-centricity, it is even more important in these times. The crisis has affected everyone, some more than others, and in ways, we couldn’t have imagined. Thus, we must drive all our conversations with empathy. The way we deal with our customers in a crisis is likely to leave lasting impressions in their minds.

Like in any relationship, we shouldn’t shy away from open and honest communication. It is also important to note that all rumours should be quelled by pushing legitimate information to our customers regularly. Transparency in operations and compassion in engagements will pave the path for more profound and trusted relationships.

Innovating for necessity and beyond

It is said that “Necessity is the mother of invention”. We probably haven’t faced a situation in the recent past that necessitated invention as much as it does now!

As we strive to achieve normalcy, we should take up this opportunity to innovate solutions. Solutions that are not just going to help our customers adjust to the new reality, but arm them with a more efficient way of achieving their desired outcomes. Could the new way of working be the future standard? Is the old way worth going back to? This is the apt time to answers these questions and reimagines our strategies.

Our deep understanding of our customers holds the key to helping them in meaningful ways. This should be an impetus for us to devise ways of delivering more value to our customers.

General Principles

With rapidly evolving situations and uncertainty, it is easy to fall prey to misinformation and rumours. Hence, it is crucial to keep a channel of communication open between you and your customers and share accurate information. We should be listening to our customers and be extra perceptive to their needs, whether they are articulated or not. Staying ahead and staying positive should be our mantras to swear by. The new barometer of customer experience will be how their partners/vendors meet their new needs with care and concern.

Over-communicating is not something we should shy away from. We should be constantly communicating with our customers to reassure them of our resolve to stand by them. Again, it is an absolute must to adjust our tone and not plug in any ‘sales-ly’ messages.

It is easy to lose focus on long-term goals and just concentrate on near-term survival. This may not be the best strategy if we’re looking to stay afloat after all this is over. All decisions must be data-driven or outcome-driven. Reimagining and designing newer ways of delivering value and ensuring customer success will be the true test of enterprises in the near future.

We’re looking at uncertain times ahead. It is imperative to build resilience to such disruptions. One way would be customer-centricity – we should be relentless in our pursuit of understanding, connecting with, and delighting our customers. Resilience is going to be as important as cost and efficiency in a business.

About the Author:
Balaji has over 25 years of experience in the IT industry, across multiple verticals. His enthusiasm, energy and client focus is a rare gift, and he plays a key role in bringing new clients into GAVS. Balaji heads the Delivery department and passionately works on Customer delight. He says work is worship for him, and enjoys watching cricket, listening to classical music and visiting temples.

Smart Spaces Tech Trends for 2020

data center as a service providers in usa

Priyanka Pandey

These are unprecedented times. The world hadn’t witnessed such a disruption in recent history. It is times like these test the strength and resilience of our community. While we’ve been advised to maintain social distancing to flatten to curve, we must keep the wheels of the economy rolling.

In my previous article, I covered the ‘People-Centric’ Tech Trends of the year, i.e., Hyper automation, Multiexperience, Democratization, Human Augmentation and Transparency and Traceability. All of those hold more importance now in the light of current events. Per Gartner, Smart Spaces enable people to interact with people-centric technologies. Hence, the next Tech Trends in the list are about creating ‘Smart Spaces’ around us.

Smart spaces, in simple words, are interactive physical environments decked out with technology, that act as a bridge between humans and the digital world. The most common example of a smart space is a smart home, also called as a connected home. Other environments that could be a smart space are offices and communal workspaces; hotels, malls, hospitals, public places such as libraries and schools, and transportation portals such as airports and train stations. Listed below are the 5 Smart Spaces Technology Trends which, per Gartner, have great potential for disruption.

Trend 6: Empowered Edge

Edge computing is a distributed computing topology in which information processing and data storage are located closer to the sources, repositories and consumers of this information. Empowered Edge is about moving towards a smarter, faster and more flexible edge by using more adaptive processes, fog/mesh architectures, dynamic network topology and distributed cloud. This trend will be introduced across a spectrum of endpoint devices which includes simple embedded devices (e.g., appliances, industrial devices), input/output devices (e.g., speakers, screens), computing devices (e.g., smartphones, PCs) and complex embedded devices (e.g., automobiles, power generators). Per Gartner predictions, by 2022, more than 50% of enterprise-generated data will be created and processed outside the data center or cloud. This trend also includes the next-generation cellular standard after 4G Long Term Evolution (LTE), i.e., 5G. The concept of edge also percolates to the digital-twin models.

Trend 7: Distributed Cloud

Gartner defines a distributed cloud as “distribution of public cloud services to different locations outside the cloud providers’ data centers, while the originating public cloud provider assumes responsibility for the operation, governance, maintenance and updates.” Cloud computing has always been viewed as a centralized service, although, private and hybrid cloud options compliments this model. Implementing private cloud is not an easy task and hybrid cloud breaks many important cloud computing principles such as shifting the responsibility to cloud providers, exploiting the economics of cloud elasticity and using the top-class services of large cloud service providers. A distributed cloud provides services in a location which meets organization’s requirements without compromising on the features of a public cloud. This trend is still in the early stages of development and is expected to build in three phases:

Phase 1: Services will be provided from a micro-cloud which will have a subset of services from its centralized cloud.

Phase 2: An extension to phase 1, where service provider will team up with a third-party to deliver subset of services from the centralized cloud.

Phase 3: Distributed cloud substations will be setup which could be shared by different organizations. This will improve the economics associated as the installation cost can be split among the companies.

Trend 8: Autonomous Things

Autonomous can be defined as being able to control oneself. Similarly, Autonomous Things are devices which can operate by themselves without human intervention using AI to automate all their functions. The most common among these devices are robots, drones, and aircrafts. These devices can operate across different environments and will interact more naturally with their surroundings and people. While exploring use cases of this technology, understanding the different spaces the device will interact to, is very important like the people, terrain obstacles or other autonomous things. Another aspect to consider would be the level of autonomy which can be applied. The different levels are: No automation, Human-assisted automation, Partial automation, Conditional automation, High automation and Full automation. With the proliferation of this trend, a shift is expected from stand-alone intelligent things to collaborative intelligent things in which multiple devices work together to deliver the final output. The U.S. Defense Advanced Research Projects Agency (DARPA) is studying the use of drone swarms to defend or attack military targets.

Trend 9: Practical Blockchain

Most of us have heard about Blockchain technology. It is a tamper-proof, decentralized, distributed database that stores blocks of records linked together using cryptography. It holds the power to take industries to another level by enabling trust, providing transparency, reducing transaction settlement times and improving cash flow. Blockchain also makes it easy to trail assets back to its origin, reducing the chances of substituting it with counterfeit products. Smart contracts are used as part of the blockchain which can trigger actions on encountering any change in the blockchain; such as releasing payment when goods are received. New developments are being introduced in public blockchains but over time these will be integrated with permissioned blockchains which supports membership, governance and operating model requirements. Some of the use cases of this trend that Gartner has identified are: Asset Tracking, Identity Management/Know Your Client (KYC), Internal Record Keeping, Shared Record Keeping, Smart Cities/the IoT, Trading, Blockchain-based voting, Cryptocurrency payments and remittance services. Per the 2019 Gartner CIO Survey, in the next three years 60% of CIOs expect blockchain deployment in some way.

Trend 10: AI Security

Per Gartner, over the next five years AI-based decision-making will be applied across a wide set of use cases which will result in a tremendous increase of potential attack surfaces. Gartner provides three key perspectives on how AI impacts security: protecting AI-powered systems, leveraging AI to enhance security defense and anticipating negative use of AI by attackers. ML pipelines have different phases and at each of these phases there are various kinds of risks associated. AI-based security tools can be very powerful extension to toolkits with use cases such as security monitoring, malware detection, etc. On the other hand, there are many AI-related attack techniques which include training data poisoning, adversarial inputs and model theft and per Gartner predictions, through 2022, 30% of all AI cyberattacks will leverage these attacking techniques. Every innovation in AI can be exploited by attackers for finding new vulnerabilities. Few of the AI attacks that security professionals must explore are phishing, identity theft and DeepExploit.

One of the most important things to note here is that the trends listed above cannot exist in isolation. IT leaders must analyse what combination of these trends will drive the most innovation and strategy fitting it into their business models. Soon we will have smart spaces around us in forms of factories, offices and cities with increasingly insightful digital services everywhere for an ambient experience.

Sources:

https://www.pcmag.com/news/gartners-top-10-strategic-technology-trends-for-2020

About the Author:

Priyanka is an ardent feminist and a dog-lover. She spends her free time cooking, reading poetry and exploring new ways to conserve the environment.

Discover, Monitor, Analyze & Predict COVID-19

Bargunan Somasundaram

Uber, the world’s largest taxi company, owns no vehicles. Facebook, the world’s most popular media owner, creates no content. Alibaba, the most valuable retailer, has no inventory. Netflix, the world’s largest movie house, own no cinemas. And Airbnb, the world’s largest accommodation provider, owns no real estate. Something interesting is happening.”

– Tom Goodwin, an executive at the French media group Havas.

This new breed of companies is the fastest growing in history because they own the customer interface layer. It is the platform where all the value and profit is. “Platform business” is a more wholesome term for this model for which data is the fuel; Big Data & AI/ML technologies are the harbinger of new waves of productivity growth and innovation.

With Big data and AI/ML is making a big difference in the area of public health, let’s see how it is helping us tackle the global emergency of coronavirus formally known as COVID-19.

DISCOVERING / DETECTING

Chinese technology giant Alibaba has developed an AI system for detecting the COVID-19 in CT scans of patients’ chests with 96% accuracy against viral pneumonia cases. It only takes 20 seconds for the AI to decide, whereas humans generally take about 15 minutes to diagnose the illness as there can be upwards of 300 images to evaluate. The system was trained on images and data from 5,000 confirmed coronavirus cases and has been tested in hospitals throughout China. Per a report, at least 100 healthcare facilities are currently employing Alibaba’s AI to detect COVID-19.

Ping An Insurance (Group) Company of China, Ltd (Ping An) aims to address the issue of lack of radiologists by introducing the COVID-19 smart image-reading system. This image-reading system can read the huge volumes of CT scans in epidemic areas.

Ping An Smart Healthcare uses clinical data to train the AI model of the COVID-19 smart image-reading system. The AI analysis engine conducts a comparative analysis of multiple CT scan images of the same patient and measures the changes in lesions. It helps in tracking the development of the disease, evaluation of the treatment and in prognosis of patients. Ultimately it assists doctors to diagnose, triage and evaluate COVID-19 patients swiftly and effectively.

Ping An Smart Healthcare’s COVID-19 smart image-reading system also supports AI image-reading remotely by medical professionals outside the epidemic areas. Since its launch, the smart image-reading system has provided services to more than 1,500 medical institutions. More than 5,000 patients have received smart image-reading services for free.

The more solutions the better. At least when it comes to helping overwhelmed doctors provide better diagnoses and, thus, better outcomes.

MONITORING

  • AI based Temperature monitoring & scanning

In Beijing, China, subway passengers are being screened for symptoms of coronavirus, but not by health authorities. Instead, artificial intelligence is in-charge.

Two Chinese AI giants, Megvii and Baidu, have introduced temperature-scanning. They have implemented scanners to detect body temperature and send alerts to company workers if a person’s body temperature is high enough to constitute a fever.

Megvii’s AI system detects body temperatures for up to 15 people per second and up to 16 feet. It monitors as many as 16 checkpoints in a single station. The system integrates body detection, face detection, and dual sensing via infrared cameras and visible light. The system can accurately detect and flag high body temperature even when people are wearing masks, hats, or covering their faces with other items. Megvii’s system also sends alerts to an on-site staff member.

Baidu, one of the largest search-engine companies in China, screens subway passengers at the Qinghe station with infrared scanners. It also uses a facial-recognition system, taking photographs of passengers’ faces. If the Baidu system detects a body temperature of at least 99-degrees Fahrenheit, it sends an alert to the staff member for another screening. The technology can scan the temperatures of more than 200 people per minute.

  • AI based Social Media Monitoring

An international team is using machine learning to scour through social media posts, news reports, data from official public health channels, and information supplied by doctors for warning signs of the virus across geographies. The program is looking for social media posts that mention specific symptoms, like respiratory problems and fever, from a geographic area where doctors have reported potential cases. Natural language processing is used to parse the text posted on social media, for example, to distinguish between someone discussing the news and someone complaining about how they feel.

The approach has proven capable of spotting a coronavirus needle in a haystack of big data. This technique could help experts learn how the virus behaves. It may be possible to determine the age, gender, and location of those most at risk quicker than using official medical sources.

PREDICTING

Data from hospitals, airports, and other public locations are being used to predict disease spread and risk. Hospitals can also use the data to plan for the impact of an outbreak on their operations.

Kalman Filter

Kalman filter was pioneered by Rudolf Emil Kalman in 1960, originally designed and developed to solve the navigation problem in the Apollo Project. Since then, it has been applied to numerous cases such as guidance, navigation, and control of vehicles, computer vision’s object tracking, trajectory optimization, time series analysis in signal processing, econometrics and more.

Kalman filter is a recursive algorithm which uses time-series measurement over time, containing statistical noise and produce estimations of unknown variables.

IT Infrastructure Managed Services

For the one-day prediction Kalman filter can be used, while for the long-term forecast a linear model is used where its main features are Kalman predictors, infected rate relative to population, time-depended features, and weather history and forecasting.

The one-day Kalman prediction is very accurate and powerful while a longer period prediction is more challenging but provides a future trend. Long term prediction does not guarantee full accuracy but provides a fair estimation following the recent trend. The model should re-run daily to gain better results.

GitHub Link: https://github.com/Rank23/COVID19

ANALYZING

The Center for Systems Science and Engineering at Johns Hopkins University has developed an interactive, web-based dashboard that tracks the status of COVID-19 around the world. The resource provides a visualization of the location and number of confirmed COVID-19 cases, deaths and recoveries for all affected countries.

The primary data source for the tool is DXY, a Chinese platform that aggregates local media and government reports to provide COVID-19 cumulative case totals in near real-time at the province level in China and country level otherwise. Additional data comes from Twitter feeds, online news services and direct communication sent through the dashboard. Johns Hopkins then confirms the case numbers with regional and local health departments. This kind of Data analytics platform plays a pivotal role in addressing the coronavirus outbreak.

All data from the dashboard is also freely available in the following GitHub repository.

GitHub Link: https://bit.ly/2Wmmbp8

Mobile version: https://bit.ly/2WjyK4d

Web version: https://bit.ly/2xLyT6v

Conclusion

One of AI’s core strengths when working on identifying and limiting the effects of virus outbreaks is its incredibly insistent nature. AI systems never tire, can sift through enormous amounts of data, and identify possible correlations and causations that humans can’t.

However, there are limits to AI’s ability to both identify virus outbreaks and predict how they will spread. Perhaps the best-known example comes from the neighboring field of big data analytics. At its launch, Google Flu Trends was heralded as a great leap forward in relation to identifying and estimating the spread of the flu—until it underestimated the 2013 flu season by a whopping 140 percent and was quietly put to rest. Poor data quality was identified as one of the main reasons Google Flu Trends failed. Unreliable or faulty data can wreak havoc on the prediction power of AI.

References:

About the Author:

Bargunan is a Big Data Engineer and a programming enthusiast. His passion is to share his knowledge by writing his experiences about them. He believes “Gaining knowledge is the first step to wisdom and sharing it is the first step to humanity.”