Connect with us

Features

STEERING THE CLOUD

Published

on

Updated : March 18, 2015 00:01  am,
By Editor

img54Cloud adoption is getting a move on as more organizations understand the benefits of leveraging the benefits of cloud computing

Cloud services adoption may have just moved up a notch in the region over the past year. According to a study commissioned by EMC and conducted by Dun & Bradstreet for the UAE, 95% of enterprises surveyed have already implemented or plan to implement a cloud computing model. Further, 49% of enterprises stated to have currently implemented a private cloud model and 35% consider their environment to be a public cloud. Further, 23% of respondents stated they have plans to implement an Advanced Hybrid Cloud model. These are impressive numbers and just goes to show that cloud computing adoption is indeed gaining speed.

James Spearman, Principle Cloud Consultant & Head of Data Centre Infrastructure, Dimension Data  that offers multiple cloud solutions on premise, in the public cloud or in a hybrid model says, “We’re seeing a general acceleration in the discussions around cloud services with most CIO’s either having a cloud strategy in place or looking for us to assist in determining their strategy in order to ensure that they start to realise the benefits cloud may bring and deliver against the requests business is now demanding.  Clearly each area of the business has different requirements so the infrastructure and applications teams have different cloud service requirements; this has brought about different cloud uptake levels within areas of the business.”

For all obvious reasons like operational efficiencies and scalability plus access to infrastructure and solutions at optimized costs, there is an increased demand for private cloud services.

Shams Hasan, Enterprise Product Manager, Middle East at Dell Middle east says that a discussion about the Cloud needs a separation of the public cloud from the private cloud and believes the latter will see significant growth.

He adds, “We will see increased momentum in Private Cloud projects in 2015 as more and more organizations leverage benefits that range from cost-saving to security. Another key benefit, agility, will be a highlight for private cloud’s continued success in 2015. The rise of converged infrastructure technologies and the ability to remove infrastructure modules as needed should make private clouds an even more agile and attractive option for CIOs looking to reap the other benefits of private clouds.  Cloud computing offers tremendous untapped opportunities for MEA enterprises looking to develop agility and up-to-the-times business practices.”

While private clouds are seeing significant traction, Gartner predicts that public cloud services in the MENA region will grow at 17.1 percent in 2015 to total $851 million with Software as a service (SaaS), estimated to be the largest segment at $205.7 million.

John adds, “SaaS and PaaS discussions are a little more mature than the infrastructure discussions with business putting pressure on IT to deliver against the IaaS discussions.  Dimension Data believes there will be a continued push into cloud based solutions with more and more enterprises starting to explore Cloud solutions for non-critical workloads or alternative consumptions methods for DR.  Forward thinking vendors are now starting to offer their key products in cloud based consumption models that show great appeal to the business.”

The momentum is also being helped along by the fact that CIOs are noticing their peers moving ahead with implementation. Businesses in the region may have been all along circumspect about security issues related to cloud but there is a growing level of confidence with the availability of mature product offerings.

Rajesh Abraham, Director, Product Development, eHosting DataFort that offers both Hosted Private Cloud and Public Cloud options for businesses says, “The hype around cloud services is over and it is becoming a reality. The apprehensions around challenges of cloud adoption have reduced significantly and enterprises are now ready to leverage the advantages of cloud services. Cloud adoption challenges are slowly reducing as vendor offerings become more mature and organizations start noticing their industry peers implementing cloud services.”

That is not to say that all bottlenecks on the way ahead have been cleared. Several challenges confront a growing adoption of cloud services but they may even be non-technical in nature.

“Even though the cloud computing has moved into the mainstream of IT, but there are significant number of non-IT challenges exist, number of non-technical issues, mostly revolving around people, processes, security challenges, contractual agreements and change management issues. These issues or challenges are usually harder to solve than technology problems. The cloud is the foreseeable future for IT but it will exist in many different forms and will evolve significantly over the next few years in UAE,” says Rashid Al Shamsi, Chairman of ixtel, a next generation IT services provider that provides Enterprise Cloud Services.

Non-technology issues can slow down public cloud adoption even as more customers go in for private cloud infrastructure. Security will always be a paramount issue in the region.

Shams says, “As the region recoups from recent exposés in security and data privacy, Business and IT leaders and managers scrutinize cloud computing opportunities with a more prudent eye.  In the Middle East there are still three mega trends influencing cloud adoption: trust; government regulations; and technology adoption.  Some of these trends have less to do with technology and have also seen limited development the past year in the region impacting to a larger degree plans for adoption of Public Cloud services adoption.  Dell’s observation is that Middle East Customers are still wary with Public Cloud offerings, but are very interested in Private Cloud builds; Dell has had a few successful engagements with Customers with the latter.”

Private to hybrid – the cloud accelerates!

A private cloud provides a distinct and secure cloud based environment where the computing power of the virtualized infrastructure is delivered only to the specified client organization that owns the cloud. So there is greater control and privacy vis-à-vis a public cloud and it suits organizations in some of the critical sectors like Banking, Government etc to have critical workloads run in such secured environments.

Rashid says, “Current adoption of private cloud computing is a work in progress for most organizations as they continue to implement server virtualization, automation and orchestration capabilities. Private clouds will dominate the most critical functions. Many factors drive the decision over public or private cloud. Industries with the strongest adoption of private clouds are financial services, healthcare and Government services, with financial services and healthcare facing heavy regulatory and compliance issues that are exacerbated, though not impossible in the cloud.”

Shams claims that the year has seen cloud adoption move from discussions in the board room to tangible adoption but there are many more opportunities in the cloud up ahead. Technology innovations including converged infrastructure, hyper-converged infrastructure, I/O virtualization, software-defined-networking, software-defined-storage, open-networking, and density-optimized servers have significantly reduced the barriers for Private Cloud adoption.

He adds, “We are starting to see enterprises in the region take advantage of Cloud opportunities in different ways.  Larger traditional enterprises are testing Public Cloud offerings with non-mission-critical functions, temporary workloads, and administrative tasks while also implementing Private Clouds to leverage faster, more flexible, and more cost-effective ways to meet the technology needs of their organizations.  Meanwhile young digitally native startups and SMEs are taking larger opportunities in the cloud to grow their businesses rapidly.”

However, he hurries to add that with the diversity of businesses in the Middle East, there’s a variety of comfort levels with the cloud ranging from large enterprises to SMBs, and from the public-sector organizations that operate in stringent verticals such as Defense to organizations (in both private- & public- sector spaces) that enjoy less stringent demands. So for business critical data and workloads large number of organizations, in his opinion will prefer to keep it in-house, they can.

James opines that there are many organizations that have delivered Private Cloud solutions within their organizations and while they may not have been full scale deployments of cloud, should provide some key lessons moving ahead.

He comments, “In the past, these have tended to deliver against the automation and orchestration elements of cloud and have been designed to fulfil on one specific area of business – such as highly automated VDI. But nonetheless great learnings and strides have been taken by many organizations.  It is rare to find a full true cloud deployment with granulated metering or self service capabilities delivering fully back against the true cloud definition.  These early adopters have, however, learnt some great lessons around what cloud can deliver and how by embracing the true benefits of cloud in public, private and hybrid usage, will really drive the future shape of how IT will start delivering and consuming in the future.”

Hybrid clouds bring the best of the two approaches and is winning over more customer confidence. That seems to be the case with the region in terms of deployments as well. As the study conducted by Dun & Bradstreet reveals, there is a growing interest in Advanced Hybrid cloud solutions with respondents stating they have plans to implement an Advanced Hybrid Cloud model that will allow greater flexibility.

As Mohammed Amin, Senior Vice President and Regional Manager, Turkey, Eastern Europe, Africa, and Middle East, EMC Corporation said, “IT organizations are striving to transform to deliver services that support the changing needs of their customers. Today, IT must leverage private cloud because it is trusted, controlled, and reliable, and public cloud because it’s simple, low cost, and flexible. This study clearly highlights the growing interest in adopting advanced hybrid cloud models to create a perfect blend of the two worlds.”

The hybrid approach allows a business to take advantage of the scalability and cost-effectiveness of public cloud services and at the same time makes sure that sensitive data is kept absolutely secure in the private cloud. Managing this in a seamless way without disruptions will be key.

Rashid says, “Many enterprise are opting for hybrid cloud when it wants to get the best of both worlds – private and public. For example it has a bunch of data that it doesn’t mind putting on the public cloud, and it also has some highly sensitive data that it wants to keep on-premises by using the private cloud.

However, the negative aspect when going for a hybrid cloud solution is that businesses will have to fine tune the lines of collaboration and communication between Public and Private cloud users.”

Globally, IDC predicts that almost half of the large enterprises will have deployed hybrid cloud by the end of 2017. All this clearly indicates that customers are more comfortable in adopting hybrid cloud. Enterprise customers are making sure they have a mix of strategies in place that provide them the best solutions. Several other factors including availability of public cloud services locally will have a significant role to play.

James says, “Most organizations will settle on a hybrid cloud architecture moving forward, the percentage of on/off site cloud usage will of course vary immensely based upon many factors and local availability of public cloud will be a driving factor that may shift over time.  We’re also seeing a big push from vendors to unlock the ability to transition to a Hybrid IT environment as they see this transformation happening within their customer base.  In this region, we are seeing enterprises considering how they will enable this process moving forward and often ask how IT can integrate the public cloud environment with their on premise solution to attain the efficiencies being promised by cloud.”

Security concerns always a top priority when it comes to adopting the cloud. Many customers seem to be more comfortable keeping their data in a datacenter that are local rather than have data stored in datacenters that located elsewhere.

Rashid says, “Not surprisingly, challenges relating to security and privacy continue to rank highly on the list of concerns for both IT and business executives. However, the organizations are becoming more confident in the security of cloud providers if the data remains’ in local datacenters. This does not mean that security is no longer a key issue for business. Of the possible security concerns, data loss and privacy risks are the main concerns along with legal and regulatory compliance which is often security related.”

Security concerns will never go away and shouldn’t according to James because that is an important factor of choosing your cloud supplier. Further, choosing the cloud supplier needs to be based around a more elaborate process rather than just basing the decision on where the data is going to be stored locally.

James adds, “Most global cloud suppliers have an extremely tight story around security and will normally over deliver on the security processes of traditional enterprise data center.  Understandably most local organizations are more comfortable for their data to stay on shore.  When a local cloud supplier is able to demonstrate the ability to deliver cloud services competitively to the same security level as the global cloud suppliers, then it would make sense to choose local suppliers. There is a degree of workload profiling that needs to be undertaken by enterprises to understand if there is any risk to moving some of the data out of country, many times you see enterprises making the decision around their entire data set rather than data for certain workloads.  Data location is not just security and sovereignty though, there is also a network performance and outgoing bandwidth cost based decision. A comprehensive approach to assessing the security of cloud providers will mitigate concerns and, in certain cases, illustrate that cloud providers are able to offer more comprehensive security for a company’s data.”

The ability of the cloud provider to meet the organization’s needs should be the key consideration.

Rajesh says, “Local players can provide enterprises with a local data centre and 24/7 bilingual local support. Low latency and faster access to applications is another advantage offered by local data center service providers. However, choosing a local data center provider over multinational companies and vise-versa depends upon the nature and size of the business and it does get tricky to determine the right services provider to best suit the company’s needs. So rather than basing criteria on Local or Global, we suggest working with an experienced services provider, offering customized plans to meet customers’ specific requirements.”

The journey to the cloud is an ongoing task. Companies like Dimension Data are enabling organizations

build the IT strategy around cloud, identify the necessary cloud migration projects, deliver the actual cloud capacity and assist transform the workloads to be cloud capable when required.

Eventually, a larger percentage of workloads in a typical enterprise IT infrastructure would shift to cloud but which will vary customer by customer but there will be ever growing confidence and also the conviction that cloud will enable the organization to be more agile and stay ahead. Shams believes that Cloud usage correlates with revenue growth as cloud adopters see significant benefits – which are even greater for organizations with a deeper commitment to cloud – over those that have not adopted cloud solutions.

He adds, “According to findings of the Dell Global Technology Adoption Index (GTAI): nearly every IT decision-maker surveyed said their company either uses or plans to use cloud solutions; only a mere 3 percent of respondents are not planning to leverage cloud solutions.  Exploring what drives this trend, the Dell GTAI observes: there’s a strong correlation between cloud use and company growth. Of those using cloud, 72 percent of organizations surveyed experienced 6 percent growth or more in the last three years, with just 4 percent experiencing zero or negative growth. This is in sharp contrast with companies not using cloud, where just 24 percent have growth rates of 6 percent or more, and 37 percent experienced either zero or negative growth.”

Rashid is optimistic that the typical enterprise may eventually run nearly as much as 70 percent of its infrastructure in the cloud in the next three years. While that number at the moment looks to be on the higher side, there sure is a strong case to believe that the journey to the cloud in a higher gear now.

Continue Reading

Features

Paving the Way for AI Success in Business

Published

on

AI in business

By Karim Azar, Regional Vice President – Middle East & Turkey, Cloudera

The digital landscape is evolving at an unprecedented pace, and at the heart of this evolution lies the transformative potential of artificial intelligence (AI). Across industries, AI is not merely a buzzword but a revolutionary force driving innovation, efficiency, and growth. Its impact extends beyond automation, touching every side of business operations and decision-making. It can revolutionize multiple sectors and fundamentally reshape the corporate industry.

Nonetheless, challenges arise with technological evolution, particularly in accessing and overseeing varied datasets across diverse environments. These challenges frequently act as obstacles to achieving successful AI implementation. In response to these challenges, the technology landscape is witnessing significant advancements in open data lakehouse technologies, providing a robust foundation for AI and analytics. Let’s delve into key technological developments and their advantages, focusing on the broader implications rather than specific products.

Unlocking Business Potential

AI has the potential to unleash new opportunities for businesses. McKinsey’s findings reveal that more than 62% of companies in the Gulf Cooperation Council (GCC) region currently utilize Generative AI in some operational aspect. The research underscores the substantial potential of AI to create tangible value in the GCC, with an estimated value of up to $150 billion.

This adoption trend is not without merit; statistics show that 83% of businesses adopting AI report substantial (30%) or moderate (53%) benefits. AI can address various challenges by providing predictive analytics and personalized customer experiences, enabling organizations to make faster and more accurate data-driven decisions.

Despite the obstacles in adopting AI, such as data management complexities and security concerns, offering air-gapped deployment for large language models (LLMs) is still a viable option. This feature boosts security, data privacy, and performance while also lowering customer operational expenses. However, overcoming these challenges requires more than just technological solutions. It demands a comprehensive approach that includes robust data governance frameworks, continuous employee training programs, and collaboration with regulatory bodies to ensure compliance with data protection laws.

AI Across Industries

AI is not a one-size-fits-all solution. It is applied differently across industries and business functions, including healthcare, finance, manufacturing, and retail. The potential uses of AI are vast, from boosting supply chain efficiency to transforming healthcare outcomes and customer service.

For example, in the healthcare industry, AI-powered predictive analytics can help doctors identify patients at high risk of developing certain diseases, allowing for early intervention and personalized treatment plans. AI algorithms can analyze market trends and financial customer behavior to recommend customized investment strategies. In manufacturing, AI-driven predictive maintenance can proactively anticipate equipment failures and schedule maintenance activities, minimizing downtime and reducing costs.

As businesses increasingly adopt AI, they invest in their organization’s future. By promoting innovation and agility, companies can leverage AI to maintain competitiveness in a digital era. Prioritizing data privacy and security helps build trust with customers and stakeholders, ensuring AI technologies’ responsible and ethical use.

AI is a significant transformation in how businesses function and innovate. Embracing AI opens up vast opportunities for organizations to reshape their operations, stimulate growth, and influence the future of business. While the journey may present challenges, the potential benefits are boundless for those willing to embrace the power of AI.

Continue Reading

Features

Smart Cities and the Rise of Intelligent Transportation Systems: Exploring the Benefits and Risks of Vehicle Surveillance

Published

on

By: Dr Ryad Soobhany, Associate Professor, School of Mathematical & Computer Sciences, Heriot-Watt University Dubai

Intelligent Transportation Systems (ITS) have emerged as a transformative solution in urban areas, tackling challenges such as high traffic and pollution. These systems, incorporating a network of static and mobile sensors, including cameras on buildings or vehicles/drones, embedded in the smart city infrastructure, are revolutionizing traffic management. By harnessing data from cameras, in-vehicle GPS systems, in-vehicle Near Field Communication (NFC), IoT devices, and Artificial Intelligence (AI), ITS enable the monitoring and tracking of vehicles for Intelligent Traffic Management Systems (ITMS) or Public Transportation Management Systems (PTMS).

While intelligent transportation systems offer significant benefits, it’s crucial to acknowledge the challenges and risks they pose. ITMS provides real-time monitoring of traffic on roads and at junctions, while PTMS focus on managing transportation fleet and passenger information services. Emergency Response Management Systems (ERMS) primarily monitor the emergency responders of the smart city. The use of intelligent vehicle surveillance systems improves traffic management, public safety, and urban planning, but it also raises concerns about the data privacy and security of users and infrastructure, a risk that must be carefully managed.

Benefits

There are several benefits from the implementation of vehicle surveillance systems in urban areas and the most obvious one is a better vehicle traffic flow by using ITMS. Cameras placed strategically across the city monitor traffic to identify congested areas and road traffic incidents (e.g. accidents). Implementing dynamic traffic lights systems at junctions and temporary speed limits can improve traffic flow. Using AI, predictive traffic routing forecasts traffic bottlenecks and suggests alternative routing.  The use of PTMS leads to enhanced scheduling of public transportation; for example, the arrival/departure of trains/metro at the station is synchronized to feeder buses or taxis being stationed outside the station. There is an improvement in customer satisfaction and journey planning with real-time updates for public transport. Traffic flow is also improved by monitoring of cycle and pedestrian lanes, where safer cycle lanes will encourage road users to adopt cycling in certain urban areas adapted for cycling.

There is an overall improvement in public safety by better traffic management, with better response time to emergency situations by the ERMS, such as ambulances. LPR/ANPR (Licence Plate Recognition/Automatic Number Plate Recognition systems and GPS tracking systems in cars allow the monitoring of vehicles while they are located withing the bounds of the smart city. Stolen or wanted vehicles can be detected and followed through the city. The use of surveillance cameras, LPR/ANPR systems and GPS tracking can improve identification of criminal activities, which should enhance the response of law enforcement. Under-Vehicle Surveillance Systems (UVSS), which are cameras placed at strategic places on roads in the city take pictures or videos of the underside of vehicles to check the chassis for stolen cars. UVSS can also be used to detect contraband at ports or entry/exit points in smart cities.

The use of LPR/ANPR systems ease the management of Low Emission zones, which are areas where low emission vehicles (e.g. electric or hybrid vehicles) can circulate without charges and vehicles with higher emission rates have to pay an hourly or daily charge. The implementation of Low Emission zones can bring environmental benefits. The improved traffic flow in the urban areas can also lead to environmental benefits with less emissions in traffic jams and long traffic queues at junctions. Apart from environmental benefits, there are economic benefits linked to better health and overall happiness of citizens and visitors.

Risks

Several risks are associated with the amount of data collected from the vehicle surveillance systems. The main concern is the privacy of the smart city’s car drivers and car owners. Vehicles and their drivers are tracked everywhere they travel around the city and the speed they travel. This can lead to tracking drivers and without proper legal frameworks, the data collected can be used to encroach on the users’ privacy. The large amount of collected and stored data can be quite attractive to cyber criminals and might lead to cyber-attacks. Any data breach from these attacks might expose the personal information of drivers and their vehicles. Cyber-criminals can target the surveillance systems, for example hacking the intelligent dynamic traffic speed system and changing the traffic speed around the city.

Having video surveillance around the urban areas recording the public can lead to ethical issues. Most of the time, drivers might not have provided informed consent to participate in the vehicle surveillance systems. The lack of consent from users can lead to non-compliance with regulatory bodies and can result in legal challenges from user groups. Users need to be made aware that they are entering a vehicle surveillance zone and their data might be recorded. Vehicle surveillance systems can be used to discriminate against certain sections of the community, for example, young drivers might be unfairly targeted by the vehicle surveillance systems because they allegedly drive fast and dangerously, which allegedly cause accidents. Any cyber security attack or data intrusion can lead to users losing trust in the vehicle surveillance system.

The use of vehicle surveillance systems can benefit smart cities and enhance the quality of life of residents and visitors, but the authorities must respect the personal privacy of the public by ensuring that data are collected and processed ethically and guarded against any cyber-attack. Security policies and mitigation plans are primordial for vehicle surveillance systems.

Continue Reading

Features

Enabling MEA eGovernment Entities to Enhance Experiences while Cutting Costs

Published

on

WSO2

By Uday Shankar Kizhepat, Vice President and General Manager- Middle East and Africa Region, WSO2

We live digitally. Much of our professional work is digital, as is much of our leisure time. Our commercial activity – shopping, service subscription, banking, and more – is digital. And our government is digital. No doubt governance itself requires the wisdom of individuals. But the transactional part – filing, requesting, registering, licensing, and so on – is digital. Governments in the Middle East and Africa (MEA) know they have an opportunity, with today’s technologies, to streamline transactional government functions while cutting costs.

One way to do this is to introduce digital identities. By allowing each citizen to be recognized by their “bytes essence,” public authorities open the door to transformative programs that use these trusted online personas to get things done reliably and rapidly. Many regional nations are acknowledging the potential of digital ID systems and have cultivated track records for themselves in areas such as boosted citizen engagement and enhanced accuracy of outcomes.

Digital IDs offer a practical means to ensure useability when new e-government services come online. Identity verification, service accessibility, and data protection are three major, long-standing challenges encountered by regional governments on their digital transformation journeys. The digital ID solves all of them. It offers an elegant solution to the verification issue, obviously, but its simplicity enhances accessibility, and its security features protect data. 

The ’guarantee’

The digital identity may look straightforward, but its elegance is built on a toolbox of advanced technologies such as biometrics, encryption, and blockchain. These building blocks come together to give a guarantee of authenticity when an individual presents their credentials to an online gatekeeper. And we should not use the word “guarantee” lightly. It lies at the core of the viability of any authentication system offered by a government. When waved through the door, verified users can access tax history and health records. They can pay bills or register with a government agency. If verification is erroneous, a host of problems can arise.

The digital ID is a holistic, citizen-centric approach that strikes a balance between security and performance and yet does not compromise either. It eliminates bureaucratic bottlenecks and elevates the citizen experience without the public-sector agency ever relinquishing control of any part of the process. But how? How do digital IDs allow government services to operate at peak efficiency and grant seamless access to every citizen while not faltering when it comes to risk management? How do responsive, always-on services guarantee privacy and security? Well, the answer comes full circle, back to digital transformation. 

Governments in the Arab Gulf region mention digital transformation frequently in published guidelines that map the way to economic diversification. These same guidelines apply to the government itself, which must set about transforming systems, processes, and functions to prepare for digital IDs and the world they promise – one in which a digital service provider can offer both seamless access and security. Complexities come from the scale and interconnectedness of operations, and the need for every shred of data, every machine-to-machine process, and every user session to be secure. Regulatory obligations must be juggled with budgetary constraints while technology leaders play intermediary to vying stakeholder factions within the organisation. It is easy to see how challenging it might be to maintain interoperability and data-sharing in such a fraught environment.

Of course, none of this will deter government organisations in the MEA region. They know what the hurdles are, but they also know what is to be gained – smoother services that cost less to provide while engendering greater citizen trust and in fact are leading the way in some of these digital initiatives. Remember, regional governments also know that the expectations of their citizens have, in a very real sense, undergone a digital transformation of their own.

Success stories

If we cast our eyes around the region, we can see digital ID-centric transformation in action already. Some government organisations in the Middle East have introduced biometric facial recognition as part of digital identity phase-ins and are using the system for secure digital document storage. Also in current use are systems that allow single, mobile-based logins. In these countries, the government’s identity access management (IAM) system undergoes a sweeping overhaul that allows the unification of credentials data to provide secure digital identity.

In the Asian subcontinent, we find a government that directed its telecoms ministry to build a national information exchange layer using an API. Strict identity management was rolled out as part of this ambitious project. With digital identity in place, the government can enable slicker collaboration between its departments and enhanced efficiency in outputs. It can do all this while optimising data access and consumption, which empowers analysts to deliver more actionable insights to stakeholders across agencies and ministries.

In Africa, one country showed its peers how an integrated identity and access management solution can be used for risk-based authentication, single sign-on, multi factor authentication, and user self-service. The solution was designed to minimise the risk of identity theft, but it was also (through single sign-on) able to reduce complexity when onboarding and offboarding users.

Conflict resolved

If digital solutions are the future of government, then digital identity is the future of public-sector cybersecurity and risk management. Governments in the region have been trying for years now to transform service delivery and engender citizen trust and engagement, but security has always been in conflict with agility. Having leveraged digital identity, authorities rid themselves of the downsides and reap rewards such as those described here. These regional successes underscore not only the profound impact digital transformation can have on society, but the indispensable role digital identity will play in delivering those efficiencies in a way that promotes trust.

Continue Reading

Trending

Please enable JavaScript in your browser to complete this form.

Copyright © 2023 | The Integrator