Connect with us

Features

Working a home revolution with Velop

Published

on

Velop, a Whole Home Wi-Fi product from Linkys, is anticipated to be a significant milestone for the consumer networking leader.

Linksys is unveiling Velop, a Whole Home Wi-Fi product in the Middle East this month and this is anticipated to be a significant milestone for the consumer networking leader.

Velop, a Tri-Band modular Wi-Fi system that can be installed in various mesh configurations providing fast and reliable Wi-Fi to the edge of a home network, was unveiled first at CES this year. Each Velop “node” is a powerful Tri-Band AC2200 device that serves as router, range extender, access point, and bridge and as part of a single Mesh network promises to enhance connectivity for home users who are constrained by limitations of current network technologies.

Amanulla Khan, Managing Director, Linksys, Middle East, Turkey & Africa opines that says that while it is an era of connected devices, consumers haven’t invested in best network performances. He believes that Velop offers consumers a great opportunity to enhance their connected experience

He says, “Today, everyone’s aware that there is an explosion of connected devices. We have been hearing of this, mostly as part of boardroom level discussions but increasingly moving into SMB and consumer level as well. It is in fact a living room discussion. Everyone wants to stay connected and more importantly, they have a stake in it. People do not still understand that while they may have the best of devices and highest bandwidth subscription you can afford, they do still need a great wireless network at home to enable all of these experiences. That is where the focus has to be and the message has to go out.”

He adds that on an average, a consumer maybe spending about 6000 AED on an average towards broadband subscription. Consumers maybe spending a similar amount on connected devices within a family within that time frame. In a three year time frame, they may be probably spending as much as 30,000 AED on connected devices and broadband subscription. However, they may not be willing to spend 2000 AED on a network that will enable all of those experiences with the devices and the network, which therefore needs a change of mindset.

Velop is expected to solve those limitations which come with the Router and range extenders or dual-band modular mesh systems, where the Wi-Fi speed is cut in half with each “hop” from one access point to the next. This is the next level of a seamless WiFi experience envisioned by Linksys.

Amanulla says, “With the smart devices coming in, people started asking for WiFi connectivity coverage as they started moving away from the living room, to the balconies, terraces, bedrooms, gardens etc. that is when Range extenders came in that gave coverage. However, they had limitations. Over time, consumer habits evolved including multiple streaming of high definition videos on multiple devices at the same time. They started demanding for better WiFi experience. However, existing router and range extender combinations had limitations as they may extend the range but they didn’t envelop your home, resulting in many dead spots. It doesn’t give a seamless network experience because there are multiple networks with multiple SSIDs; you need to have different usernames and password to connect.”

Further, he adds that there is the sticky client issue because your device connects to the first proximity network; at homes this could be the router network in the living room but as you move away, into the bedroom for instance, you want to connect to the range extender network but you device is still connected to the original network that is still giving off a weak signal. So your device stays connected to the weak network unless the signal is lost and then gets connected to the range extender network.
Bottleneck effect, real time interruptions, channel interference are among the challenges.

Amanulla opines, “So your network speed could be 100 mbps- network from router- you get 80-90 mbps. The moment your range extended gets connected, it drops your network by 50%. If you have a second range extender, then it drops further by 50%. This is an inherent bottleneck. Throughput drops by 50%. Real time interruption is another challenge because as the use moves away from the router network, the performance drops as the signal weakens and then finally breaks and then gets connected to the network from the range extender. In the time between these two events, there is a performance breakdown of connectivity. Channel interference is also an issue because of the multiple networks in use which reduces the WiFi connectivity. Finally, multiple products means need for multiple ways of managing all these devices.”

There is a shift in consumer expectations now as they want the WiFi experience to be reliable and seamless across their home.
“What we bring in today is a whole Home WiFi experience. It address each of these problems I have discussed in a current set-up. It gives you coverage; envelops your home with WiFI and gives you performance edge to edge. So if you have subscribed to 100 mbps, you will be getting exactly that in every nook and corner of your home and on every device and application you use.

According to Linksys, the Whole Home WiFi market is the category that is looking the brightest. Whole home WiFi is the next big thing in consumer networking market.

He says, “This is growing by 130 % or more. We believe this will be a 200 million USD opportunity by 2018. Every other category is declining or staying flat. Gateways are declining; Range extenders are more or less flat.”

Linksys is targeting connected families, typically with four members. According to the company’s perspective, connected families are typically heavy on network usage but not very tech savvy; they are not buying products or feature, rather are buying the experience. They however have more connected devices.

“They want ease of set-up; they don’t even want to face the hassle of remembering the passwords. A majority are using older wireless networks and may have not migrated even to wireless AC. These are people we are targeting. The connected family segment is a contrast to the prosumer segment who form about 10% of our customer base. The prosumers may own the ugliest of routers but they will tailor their performance according to their requirements. For connected families, WiFi is the second most important thing after food, according consumer research. They want seamless experience with WiFi. They want one network experience which reliable throughout the home,” says Amanulla.

They need a product whose look and feel which is sleek and good to flaunt. They want performance and reliability which is most important; they want ease of use with some good features at preferably no additional cost. Linksys believes they are responding to all these customer expectations with Velop.

“Our company DNA is consumer focus. We do a lot of consumer research and understanding the consumer pain point and then invest in a technology that addresses all those pain points. We have focused on reliability, seamless, ease of use and great design. Velop comes in a tower design that fits in smoothly into any home environment. It takes 88% les footprint than the average router. It has a groove which will manage the cables without them running around. The power adaptor also merges with the overall design,” says Amanulla.

He further elaborates that Velop brings intelligence and power. It is triband and one of the bands is dedicated for backhaul and has got dynamic frequency selection. Velop decides the best band your devices should get connected to at any given point within your network for enabling the best performance. The intelligence is built into the devices and take away the consumer’s hassle of having to decide. It has a built-in algorithm to decide that.
“Velop also decides the best path to connect to the network. It has a technology to help you decide where you need to install the 2nd, 3rd and 4th Velop nodes. All these nodes work as a single network; it is a mesh network. It also decides the best way of coming back to the internet, to complete the network.”

Velop is available in 3-pack, 2-pack and 1-pack options.
“You can start with one node as a standalone device. You need more nodes for a bigger home. An average home here may take up to three nodes. In a typical US environment, we have tested a node’s range for up to 2000 sq ft coverage; so with 3 nodes, you get 6000 sq.ft coverage in an ideal environment. We recommend upto 10 nodes in a single mesh network which gives you upto 20000 sq.ft coverage in an ideal environment,” says Amanulla.

The nodes have intelligence built in – If you terminate the service provider cable into a node, then the node configures itself as a router. If it connects behind a router, then it know it doesn’t need to configure in a router mode or you are trying to expand the network- so it expands your network. You will communicate with Velop via the Linksys app on Bluetooth. The Linksys app (formally known as the Linksys Smart Wi-Fi app) is completely redesigned and includes an innovative app-led setup process for Velop. The entire setup flow happens within the app and uses Bluetooth to securely communicate between the mobile device and the nodes.

One of the tribands is dedicated for backhaul which guarantees performance and two are for connecting your devices. It is also intelligent to go with a wired environment. If you use a cable to connect the node, then it will use the cable for backhaul and then you can use all three bands for your devices.

According to Amanullah, it is intelligent to decide the best network topology for a given environment- it can work in a star, tree, mesh, a daisy chain and a wired topology. Most mesh networks arguably can work only in star topology where there is a main unit while in most instance, the router in the home is not at the centre which is why you need a daisy chain.
Linksys is offering three years warranty and three years tech support with Velop. It has 3 step simple set-up process. It is integrated with Alexa voice support; today it has limited features but more are expected to be added soon.
Amanulla believes that the Velop Whole Home WiFi network family will help expand the home networking market as more consumers will feel the confidence to upgrade their network and take advantage of the technology.
He adds, “We believe there will a lot of new consumers coming on board with Velop. More people will be comfortable with replacing their old networks. While we have always fort to market with new technologies, this is revolutionary. We launched at CES and have already won a lot of awards. We have a rating of 4.8 stars for this product on Amazon.”

Features

Paving the Way for AI Success in Business

Published

on

AI in business

By Karim Azar, Regional Vice President – Middle East & Turkey, Cloudera

The digital landscape is evolving at an unprecedented pace, and at the heart of this evolution lies the transformative potential of artificial intelligence (AI). Across industries, AI is not merely a buzzword but a revolutionary force driving innovation, efficiency, and growth. Its impact extends beyond automation, touching every side of business operations and decision-making. It can revolutionize multiple sectors and fundamentally reshape the corporate industry.

Nonetheless, challenges arise with technological evolution, particularly in accessing and overseeing varied datasets across diverse environments. These challenges frequently act as obstacles to achieving successful AI implementation. In response to these challenges, the technology landscape is witnessing significant advancements in open data lakehouse technologies, providing a robust foundation for AI and analytics. Let’s delve into key technological developments and their advantages, focusing on the broader implications rather than specific products.

Unlocking Business Potential

AI has the potential to unleash new opportunities for businesses. McKinsey’s findings reveal that more than 62% of companies in the Gulf Cooperation Council (GCC) region currently utilize Generative AI in some operational aspect. The research underscores the substantial potential of AI to create tangible value in the GCC, with an estimated value of up to $150 billion.

This adoption trend is not without merit; statistics show that 83% of businesses adopting AI report substantial (30%) or moderate (53%) benefits. AI can address various challenges by providing predictive analytics and personalized customer experiences, enabling organizations to make faster and more accurate data-driven decisions.

Despite the obstacles in adopting AI, such as data management complexities and security concerns, offering air-gapped deployment for large language models (LLMs) is still a viable option. This feature boosts security, data privacy, and performance while also lowering customer operational expenses. However, overcoming these challenges requires more than just technological solutions. It demands a comprehensive approach that includes robust data governance frameworks, continuous employee training programs, and collaboration with regulatory bodies to ensure compliance with data protection laws.

AI Across Industries

AI is not a one-size-fits-all solution. It is applied differently across industries and business functions, including healthcare, finance, manufacturing, and retail. The potential uses of AI are vast, from boosting supply chain efficiency to transforming healthcare outcomes and customer service.

For example, in the healthcare industry, AI-powered predictive analytics can help doctors identify patients at high risk of developing certain diseases, allowing for early intervention and personalized treatment plans. AI algorithms can analyze market trends and financial customer behavior to recommend customized investment strategies. In manufacturing, AI-driven predictive maintenance can proactively anticipate equipment failures and schedule maintenance activities, minimizing downtime and reducing costs.

As businesses increasingly adopt AI, they invest in their organization’s future. By promoting innovation and agility, companies can leverage AI to maintain competitiveness in a digital era. Prioritizing data privacy and security helps build trust with customers and stakeholders, ensuring AI technologies’ responsible and ethical use.

AI is a significant transformation in how businesses function and innovate. Embracing AI opens up vast opportunities for organizations to reshape their operations, stimulate growth, and influence the future of business. While the journey may present challenges, the potential benefits are boundless for those willing to embrace the power of AI.

Continue Reading

Features

Smart Cities and the Rise of Intelligent Transportation Systems: Exploring the Benefits and Risks of Vehicle Surveillance

Published

on

By: Dr Ryad Soobhany, Associate Professor, School of Mathematical & Computer Sciences, Heriot-Watt University Dubai

Intelligent Transportation Systems (ITS) have emerged as a transformative solution in urban areas, tackling challenges such as high traffic and pollution. These systems, incorporating a network of static and mobile sensors, including cameras on buildings or vehicles/drones, embedded in the smart city infrastructure, are revolutionizing traffic management. By harnessing data from cameras, in-vehicle GPS systems, in-vehicle Near Field Communication (NFC), IoT devices, and Artificial Intelligence (AI), ITS enable the monitoring and tracking of vehicles for Intelligent Traffic Management Systems (ITMS) or Public Transportation Management Systems (PTMS).

While intelligent transportation systems offer significant benefits, it’s crucial to acknowledge the challenges and risks they pose. ITMS provides real-time monitoring of traffic on roads and at junctions, while PTMS focus on managing transportation fleet and passenger information services. Emergency Response Management Systems (ERMS) primarily monitor the emergency responders of the smart city. The use of intelligent vehicle surveillance systems improves traffic management, public safety, and urban planning, but it also raises concerns about the data privacy and security of users and infrastructure, a risk that must be carefully managed.

Benefits

There are several benefits from the implementation of vehicle surveillance systems in urban areas and the most obvious one is a better vehicle traffic flow by using ITMS. Cameras placed strategically across the city monitor traffic to identify congested areas and road traffic incidents (e.g. accidents). Implementing dynamic traffic lights systems at junctions and temporary speed limits can improve traffic flow. Using AI, predictive traffic routing forecasts traffic bottlenecks and suggests alternative routing.  The use of PTMS leads to enhanced scheduling of public transportation; for example, the arrival/departure of trains/metro at the station is synchronized to feeder buses or taxis being stationed outside the station. There is an improvement in customer satisfaction and journey planning with real-time updates for public transport. Traffic flow is also improved by monitoring of cycle and pedestrian lanes, where safer cycle lanes will encourage road users to adopt cycling in certain urban areas adapted for cycling.

There is an overall improvement in public safety by better traffic management, with better response time to emergency situations by the ERMS, such as ambulances. LPR/ANPR (Licence Plate Recognition/Automatic Number Plate Recognition systems and GPS tracking systems in cars allow the monitoring of vehicles while they are located withing the bounds of the smart city. Stolen or wanted vehicles can be detected and followed through the city. The use of surveillance cameras, LPR/ANPR systems and GPS tracking can improve identification of criminal activities, which should enhance the response of law enforcement. Under-Vehicle Surveillance Systems (UVSS), which are cameras placed at strategic places on roads in the city take pictures or videos of the underside of vehicles to check the chassis for stolen cars. UVSS can also be used to detect contraband at ports or entry/exit points in smart cities.

The use of LPR/ANPR systems ease the management of Low Emission zones, which are areas where low emission vehicles (e.g. electric or hybrid vehicles) can circulate without charges and vehicles with higher emission rates have to pay an hourly or daily charge. The implementation of Low Emission zones can bring environmental benefits. The improved traffic flow in the urban areas can also lead to environmental benefits with less emissions in traffic jams and long traffic queues at junctions. Apart from environmental benefits, there are economic benefits linked to better health and overall happiness of citizens and visitors.

Risks

Several risks are associated with the amount of data collected from the vehicle surveillance systems. The main concern is the privacy of the smart city’s car drivers and car owners. Vehicles and their drivers are tracked everywhere they travel around the city and the speed they travel. This can lead to tracking drivers and without proper legal frameworks, the data collected can be used to encroach on the users’ privacy. The large amount of collected and stored data can be quite attractive to cyber criminals and might lead to cyber-attacks. Any data breach from these attacks might expose the personal information of drivers and their vehicles. Cyber-criminals can target the surveillance systems, for example hacking the intelligent dynamic traffic speed system and changing the traffic speed around the city.

Having video surveillance around the urban areas recording the public can lead to ethical issues. Most of the time, drivers might not have provided informed consent to participate in the vehicle surveillance systems. The lack of consent from users can lead to non-compliance with regulatory bodies and can result in legal challenges from user groups. Users need to be made aware that they are entering a vehicle surveillance zone and their data might be recorded. Vehicle surveillance systems can be used to discriminate against certain sections of the community, for example, young drivers might be unfairly targeted by the vehicle surveillance systems because they allegedly drive fast and dangerously, which allegedly cause accidents. Any cyber security attack or data intrusion can lead to users losing trust in the vehicle surveillance system.

The use of vehicle surveillance systems can benefit smart cities and enhance the quality of life of residents and visitors, but the authorities must respect the personal privacy of the public by ensuring that data are collected and processed ethically and guarded against any cyber-attack. Security policies and mitigation plans are primordial for vehicle surveillance systems.

Continue Reading

Features

Enabling MEA eGovernment Entities to Enhance Experiences while Cutting Costs

Published

on

WSO2

By Uday Shankar Kizhepat, Vice President and General Manager- Middle East and Africa Region, WSO2

We live digitally. Much of our professional work is digital, as is much of our leisure time. Our commercial activity – shopping, service subscription, banking, and more – is digital. And our government is digital. No doubt governance itself requires the wisdom of individuals. But the transactional part – filing, requesting, registering, licensing, and so on – is digital. Governments in the Middle East and Africa (MEA) know they have an opportunity, with today’s technologies, to streamline transactional government functions while cutting costs.

One way to do this is to introduce digital identities. By allowing each citizen to be recognized by their “bytes essence,” public authorities open the door to transformative programs that use these trusted online personas to get things done reliably and rapidly. Many regional nations are acknowledging the potential of digital ID systems and have cultivated track records for themselves in areas such as boosted citizen engagement and enhanced accuracy of outcomes.

Digital IDs offer a practical means to ensure useability when new e-government services come online. Identity verification, service accessibility, and data protection are three major, long-standing challenges encountered by regional governments on their digital transformation journeys. The digital ID solves all of them. It offers an elegant solution to the verification issue, obviously, but its simplicity enhances accessibility, and its security features protect data. 

The ’guarantee’

The digital identity may look straightforward, but its elegance is built on a toolbox of advanced technologies such as biometrics, encryption, and blockchain. These building blocks come together to give a guarantee of authenticity when an individual presents their credentials to an online gatekeeper. And we should not use the word “guarantee” lightly. It lies at the core of the viability of any authentication system offered by a government. When waved through the door, verified users can access tax history and health records. They can pay bills or register with a government agency. If verification is erroneous, a host of problems can arise.

The digital ID is a holistic, citizen-centric approach that strikes a balance between security and performance and yet does not compromise either. It eliminates bureaucratic bottlenecks and elevates the citizen experience without the public-sector agency ever relinquishing control of any part of the process. But how? How do digital IDs allow government services to operate at peak efficiency and grant seamless access to every citizen while not faltering when it comes to risk management? How do responsive, always-on services guarantee privacy and security? Well, the answer comes full circle, back to digital transformation. 

Governments in the Arab Gulf region mention digital transformation frequently in published guidelines that map the way to economic diversification. These same guidelines apply to the government itself, which must set about transforming systems, processes, and functions to prepare for digital IDs and the world they promise – one in which a digital service provider can offer both seamless access and security. Complexities come from the scale and interconnectedness of operations, and the need for every shred of data, every machine-to-machine process, and every user session to be secure. Regulatory obligations must be juggled with budgetary constraints while technology leaders play intermediary to vying stakeholder factions within the organisation. It is easy to see how challenging it might be to maintain interoperability and data-sharing in such a fraught environment.

Of course, none of this will deter government organisations in the MEA region. They know what the hurdles are, but they also know what is to be gained – smoother services that cost less to provide while engendering greater citizen trust and in fact are leading the way in some of these digital initiatives. Remember, regional governments also know that the expectations of their citizens have, in a very real sense, undergone a digital transformation of their own.

Success stories

If we cast our eyes around the region, we can see digital ID-centric transformation in action already. Some government organisations in the Middle East have introduced biometric facial recognition as part of digital identity phase-ins and are using the system for secure digital document storage. Also in current use are systems that allow single, mobile-based logins. In these countries, the government’s identity access management (IAM) system undergoes a sweeping overhaul that allows the unification of credentials data to provide secure digital identity.

In the Asian subcontinent, we find a government that directed its telecoms ministry to build a national information exchange layer using an API. Strict identity management was rolled out as part of this ambitious project. With digital identity in place, the government can enable slicker collaboration between its departments and enhanced efficiency in outputs. It can do all this while optimising data access and consumption, which empowers analysts to deliver more actionable insights to stakeholders across agencies and ministries.

In Africa, one country showed its peers how an integrated identity and access management solution can be used for risk-based authentication, single sign-on, multi factor authentication, and user self-service. The solution was designed to minimise the risk of identity theft, but it was also (through single sign-on) able to reduce complexity when onboarding and offboarding users.

Conflict resolved

If digital solutions are the future of government, then digital identity is the future of public-sector cybersecurity and risk management. Governments in the region have been trying for years now to transform service delivery and engender citizen trust and engagement, but security has always been in conflict with agility. Having leveraged digital identity, authorities rid themselves of the downsides and reap rewards such as those described here. These regional successes underscore not only the profound impact digital transformation can have on society, but the indispensable role digital identity will play in delivering those efficiencies in a way that promotes trust.

Continue Reading

Trending

Please enable JavaScript in your browser to complete this form.

Copyright © 2023 | The Integrator