Author: John McMahon

Virtual Learning and Distance Education
What’s Going to Save Higher Education?

This crossroads we find ourselves at is inspiring, scary, and uncertain all at the same time. As University leaders struggle to find ways to recover, they must also find ways to teach that are more aligned with what we know about human cognitive architecture and less about tradition. Holding onto tradition stifles many students, but It also holds educators back from seeing possibilities that can arise from bringing methodologies together with technological advancements.

In a May 5, 2020 HBR article – Higher Ed Needs a Long-Term Plan for Virtual Learning, James DeVaney, Gideon Shimshon, Matthew Rascoff, and Jeff Maggioncalda acknowledge the staggering impact that Covid-19 has had on the global education system and the skyrocketing demand for online learning programs. To be sure, these emergency remote teaching applications are stop-gap measures only.  “As the emergency subsides but normal fails to return, higher ed institutions need to do more. There’s a good likelihood that virtual learning, in some capacity, will need to be a part of education for the foreseeable future.

Higher education institutions need a response framework that looks beyond the immediate actions. They have to prepare for an intermediate period of transition and begin future-proofing their institutions. Universities need to provide their own online content from their own faculty. Many professors have never designed nor delivered a course online, and that’s the challenge – rethinking the whole approach to teaching.  We will come back to this point later.

First, we will look at another challenge that universities face.

The HBR article points out that if the coronavirus pandemic occurred a decade earlier, universities would have been devastated. Today we have cloud computing, broadband access, and widespread smartphone adoption to help organizations adapt quickly to almost any situation as long as the Internet is stable. But not all educational institutions are equipped with state-of-the-art technology.

Advanced institutions like the University of Michigan, Imperial College London, and Duke University have already invested time and money in pioneering digital education strategies. Their faculties have been accustomed to online teaching for years. For example, in September 2002, the MIT Open Course Ware proof-of-concept pilot site opened to the public, offering 32 courses. In September 2003, MIT Open Course Ware published its 500th course, including some courses with complete streaming video lectures. By September 2004, 900 MIT courses were available online.

 

Remote learner using multiple cloud-based education apps.

 “Institutions that lack the necessary prerequisites of online learning and remote teaching face a daunting challenge.”

Many education leaders believe that IT infrastructure issues must be addressed before any real progress can be made towards virtual learning.

In the March 31, 2020 HBR article What the Shift to Virtual Learning Could Mean for the Future of Higher Ed, Vijay Govindarjan and Anup Srivastava urge educators to collect data and pay attention to three questions:

1.       Do students need a four-year residential experience?

2.       What improvements are required in IT infrastructure to make it more suitable for online education?

3.       What training efforts are required for faculty and students to facilitate changes in mindsets and behaviors?

Regarding the second question – What improvements are required in IT infrastructure – Govindarjan and Sirvastava point out that online settings amplify the digital divide. Some students have access to the latest model laptops, better bandwidths and more powerful Wi-Fi connections, while others don’t.  “Digital divide also exists among universities, which will become apparent in the current experiment. Top private universities have better IT infrastructure and higher IT support staff ratio for each faculty compared to budget-starved public universities.”

And the question of IT infrastructure doesn’t stop at digital equality. “Software for conference calls may be a good start, but it can’t handle some key functionalities such as accommodating large class sizes while also providing a personalized experience. Even in a 1,000-plus-student classroom, an instructor can sense if students are absorbing concepts, and will change the pace of the teaching accordingly. Instructors and students must note and should discuss their pain points and facilitate and demand technological development in those areas.”

Now that we have explored the IT infrastructure for online education, let’s return to our original challenge – the traditional old school (pun intended) approach to teaching.

Black and White portrait of John Dewey

 

There has to be whole new structure to how material is presented. Learning methodologies have to be reconsidered. In the original Star Trek series, Captain Kirk is often seen playing 3-Dimensional Chess with his second-command Mr. Spock. Invariably, Captain Kirk loses and the series is filled with Spock commenting about people’s actions, indicating 2-dimensional thinking. They’re not considering the X,Y and Z axes of outer space. It seems an apt metaphor for the way educators are trying to solve the puzzle. They know they have to transform, but how? How does a traditional university mindset transition from an in-person classroom environment to an online or hybrid model?

Educators will have to expand their views and ideas of how to present information. They must walk into another environment where there are more options and several possible integrations. Not just adding multiple activities, re-imagining seminars, and fine tuning how they teach courses online, but also dramatically rethinking the whole approach. Take a look at the technological mix of simulators and the emerging science of augmented and virtual reality.

 

Imagining Three-Dimensional Education in the New Normal

Curtis Bonk, Indiana University’s Professor of Education and author of The World is Open: How Web Technology is Revolutionizing Education, tells us that, “This is a revolution. Education doesn’t have to take place with the teacher front and center and students sitting in rows. It can take place outside, under a tree branch, on a boat or plane, in a grocery store or while hiking, if you have an Internet connection.”

Imperial College London is one of the institutions that was set up with cloud-based, distance education systems before the pandemic started. They are certainly in a better position now because of it. They’re using the phrase “multi-mode teaching” to describe how they are approaching this coming fall semester. Others are using the term “blended learning” to describe the same hybrid approach to the online/on-premise teaching environment.

“Our multi-mode learning in the Autumn term will be a change from the traditional university experience, but we are confident it will be an exciting, innovative and most importantly safe approach for our students and staff in these uncertain times. It will also enable students to graduate from the College as highly skilled individuals, sought out by employers.”

Imperial College London has been at the forefront of utilizing the cloud for GPU-heavy, cloud-based applications such as augmented and virtual reality, interventional radiology simulation, and virtual 3D modeling for their Department of Earth Science and Engineering. Even using cloud resources to bring in guest lecturers via hologram teaching has been explored and used by Imperial College London.

 

The Challenge of Specialized Schools in Today’s Environment

The example of Imperial College of London’s innovative thinking puts a spotlight on the issues that specialized schools are facing right now in relation to the discussion of on-site and learn-from-home teaching scenarios. While other schools may be able to limp along with off-the-shelf video conferencing tools for a while, schools involved in architecture, engineering, design, animation, and video production are struggling.

Why?

Because the GPU-heavy applications (like AutoCAD and SOLIDWORKS) utilized by these schools and their students have significant hardware requirements not found in your average laptop –  a solution has to be sourced. To solve their dilemma, these specialized schools are moving to solutions like IronOrbit’s INFINITY Workspaces that allow users to use NVIDIA GPU technology in a cloud environment. With this configuration, teachers and students can use average computers to access cloud-based GPU-heavy programs with zero latency. This use of the cloud’s computing power and ability to help schools save money on in-house IT hardware demonstrates one of the reasons that schools with science, engineering, and art departments are considering the cloud as well.

 

A Priority Higher Than Education

Francis Jim Tuscano, founder of empowerED, brings an important truth to light in this new era of education.

“In the new normal, as students get exposed more often to the Internet, teachers should always consider student’s privacy, safety, security, and digital well-being as top priorities for a successful remote or online learning.”

With increased screen time comes more opportunities to endanger students with online threats such as Zoom-bombing, cyberbullying, and predatory behavior. Part of imagining a “new normal” in education includes a heavy dose of technology focusing on the online safety of students. Safety has to take center stage.

Bringing all of an institution’s students into a controlled, protected, cloud-based learning environment is one of the ways schools, community colleges, trade schools, and universities are handling the security issue.

Helping Post-Secondary Teachers Utilize the Full Range of Their Skillset

Today, like no other time in history, information is available to anyone for free. The Internet is full of books, articles, videos, courses, etc. We no longer live in a world where teachers are the sole source for obtaining knowledge on a topic.

But, teachers were never just the person who reads a book and then presents the material to the class. They’ve always taken on the role of facilitating the educational journey of the students and coaching them on their individual paths. The abundance of information and the proliferation of the technology used to access this information has had an impact on the evolving role of the educator in our society.

Educators are now leveraging IT solutions to replace or supplement traditional learning norms with self-directed learning experiences that are personalized to the student’s education and life or career trajectory. The classroom – whether virtual or on-site – is facilitated by the faculty to become a zone of guidance, collaboration, and communication, as well as instruction.

Where Did Education Technology Begin? — A Nod, and a Connection, to the Past

Education technology has always been with us. It’s just improved over time. There was a time when education was learned by word of mouth, then Gutenburg invented the printing press. It wasn’t so long ago that grade-school students used tablets and chalk in one-room schoolhouses. Today, paper and pen have been replaced with an iPad or Android tablet and stylus. Cloud-based administration and teaching environments are the next steps in this ever-evolving process.

To answer the question more directly, the use of hardware and software for school administration and teaching has its origin in universities across the world and in the military. Each of these institutions had the impetus and the resources in the early days to imagine what technology could do for education.

Education writer and speaker, Audrey Watters, gave a speech at the CENTRO symposium  in Mexico City in which she said, “When we talk about “the future of education” as an explicitly technological future, I want us to remember that “the history of education” has long been technological – thousands of years of writing, hundreds of years of print, a century of “teaching machines,” 75 years of computing, almost 60 years of computer-assisted instruction, at least 40 years of the learning management system, more than 25 years of one-to-one laptop programs, a decade (give or take a year) of mobile learning.” 

In that same speech, Audrey Watters gave the following insight, “Technologies are as likely to re-inscribe traditional practices as to alter them.”

Collaboration teams working remotely.

Is the Advancement of Education Technology Inevitable?

The short answer is, YES. However, the subject is more nuanced than a simple YES/NO answer. Over the years, education technology has followed the advancement and acceptance of technologies in business. As the competition in the business world winnowed the best from the field of available technologies, educators then felt comfortable adopting and adapting those systems for educational purposes.

The cloud is no different. It’s really only been over the past ten years that businesses have discovered and embraced cloud technologies for the business realm. Education has now followed suit, being pushed in this instance dramatically by the COVID-19 pandemic.

Education technology will continue to expand and evolve, partially because education is a large market. For example, as of today, more than 20,000 education applications have been developed for the iPad alone. As remote learning and hybrid models become a mainstay, the practical applications of technology become more apparent.

Universities have even used the cloud to facilitate Massive Open Online Courses (MOOCs) to help people gain an interest in the sciences and give people an opportunity to further their education during the pandemic. These same technologies will continue to be utilized as everyone from trade schools to Ivy League institutions, like MIT, engage the public and influence the next generation of students to come to their school.

 

Is Education Technology Really a Disruptor?

While it’s easy to talk about disruption and use words like “transform” or “revolutionize,” the truth is that technology should be viewed as an enabler.

Here’s an example, for hundreds of years, voting for our political leaders was done by paper ballot. Those paper ballots were then counted by hand.

Now, we have ballot-counting machines, and some municipalities allow electronic voting.

Has that changed politics? Not really.

But these advancements have made it easier for precincts to tally and submit their constituents’ votes.

Educational technology is the same.

Yes, some things will change, but most things will stay the same. The difference is, cloud-based technology will make it easier for teachers and administrators to accomplish what they are already working hard to do each day.

One of the challenges colleges and universities are currently facing is the public opinion of higher education without the trappings of the facilities, classroom environment, and college social life experience. By going further than simply moving existing educational techniques into the cloud, colleges and universities can provide educational value that wasn’t available within the limitations of a physical classroom. There are new opportunities to learn in ways that more closely resemble real-world experiences.

Researchers in the Learning Sciences are “dedicated to the interdisciplinary empirical investigation of learning as it exists in real-world settings and to how learning may be facilitated both with and without technology.” (isls.org). An important point to keep in mind as we explore this question of virtual classrooms is that “not all learning is the same.”The best way to learn probably is through Authentic Learning where students learn by performing the actual task itself. The second-best way is Situated Learning which is the closet to the real thing as possible. Students learn through simulation and solving problems in context.

Dr. Michael Kolodziej, in his online video presentation to National University on The Future of Virtual Education,  points out, “Along with new opportunities come new realities and new possibilities.”

New Realities. New Possibilities.

There are four categories of learning technology: Simulation, Augmented Reality, Mixed Reality, and Virtual Reality. A Simulation experience happens on a flat screen, while Virtual Reality is immersive. Kolodziej shares a fascinating video recording of him in full VR regalia, exploring the International Space Station. Not only does he get to explore the space station, but he also gets to exit the station, travel outside and make a repair using hand controls. “It’s an incredible immersive experience allowing you to imagine the context, to be in the context of a situation without having to actually be there.”

Sustine Chapel
On YouTube you can plug ito a 360 Virtual Reality tour of the Sistine Chapel.

Dr. Kolodziej goes on to share another example of Virtual Reality learning by exploring – this YouTube video shows an immersive VR of the Sistine Chapel. Of course, on YouTube it sits on your flat screen, but plug your Smartphone into a Virtual Reality headset and you’re suddenly there. “You are immediately immersed and transformed into a new space and time. You can think about, experience, and see things in ways that weren’t previously possible. You can travel the world in Virtual Reality.

 

 

 

 

 

The splash page of "A Walk Through Dementia" website.
Developed by the Alzheimer’s Research Center UK, this app presents a virtual reality experience. Visitors are able to look at everyday life through a new lens.

Similarly, another virtual reality model can be found online at A Walk Through Dementia.  The experience is designed to give visitors a better understanding of how someone with dementia experiences everyday life.

Prior to this VR experience being added to a college curriculum, students were tasked with reading a textbook and answering some questions. That’s the traditional model. Using VR for immersive learning enables a paradigm shift by standing in the shoes of someone having trouble finding their way home. You can truly understand what it’s like to have Dementia. It’s a much more impactful way to learn.

 

Comprehensive Approach – Not Just Plug and Play Software Solutions

Ursula Franklin (1921-2016), during her forty-year tenure at the University of Toronto in Ontario, Canada, described technology as a much larger picture than software or hardware. She saw technology as a holistic system comprised of organization, methods, procedures, and mindset. For her, the hardware and software only played a supporting role in what she saw as the larger nature of technology.

Let’s face it.

There are hundreds of companies out there promoting technology solutions for educators. Some of those technologies are fantastic and will help your school immensely. Others fall short of fail miserably and should be pulled from the shelves.

What most aren’t discussing is the need for an over-arching approach to a systemic adoption of technology that will have a positive impact throughout your school, community college, or university.

Why?

Well, most of the technologies currently offered to educational institutions are built to address one issue. For example, the online conference tool Zoom, which was adopted by millions of teachers and students worldwide despite the fact that Zoom has a history of security problems.

Moving into a cloud environment allows you to leverage the cloud to comprehensively and systematically overhaul how your school is using technology at all levels including security and compliance. Other standard cloud benefits include cost savings, ease of use, increased storage capacity and automation, and freeing up IT staff.

 

The Democratization of Education

Beyond our borders, countries are looking at cloud technology to bring equality and democratization to their educational systems. Anita Lie, Professor of Education at Widya Mandala Catholic University Surabaya, in a Jakarta Post article titled, “The New Normal in Education” stated, “Re-imagining anew forms of education may open doors for more equitable quality education for all young Indonesians. Despite all the COVID-19 maladies, the pandemic disruption has brought awareness to new possibilities in reviving our education system and in ushering young Indonesians into the future on a more level playing field.”

One of the concerns surrounding online educational opportunities here in the USA is the cost of devices and Internet for the student learning from home. Fortunately, the cloud gives greater opportunity to marginalized and under-served populations that may not have the resources for a fancy computer with all the bells and whistles. Instead, cloud portals can be used to allow any student with any device that has the bare minimum power to surf the Internet (which nearly all do) to be able to learn in the same online environment as a student with financial advantages.

3 female students and one dark skinned male student at school tables wearing mask.

 

How Can Technology Help Educators Imagine the Next Evolution of Education?

Cloud-Based Learning Management Systems (LMS) – Learning Management Systems have their origins in the late 1990s. Since that time, they have become a critical tool in education delivery. In more recent years, Learning Management Systems have found their way into the cloud to enable easier and secure data storage and workflow mobility for school administration departments. The flexibility of the cloud allows administrative teams to discover new and more efficient ways of operating.

Modular Learning vs. Linear Learning – Cloud-based learning platforms allow for some flexibility in adapting education to the individual. Sure, everyone has to learn certain things in order, but niche electives can be offered, and students can enjoy a far more tailored educational experience. Delivering niche electives in a modular learning format helps students get used to learning in the ways that they will later in life.

Online Education for the Ways People Learn – Visual learners, academic learners, auditory learners, and tactile learners have different preferences. The use of cloud infrastructure and lessons pushed out in print, audio, and video allows an educational institution to deliver the same material in a way that each student will best understand the material. Thought will have to be given to determine how to best facilitate the ease of learning for hands-on, tactile learners. However, this is a challenge even in a traditional classroom setting.

Avatars – Some of the hesitation of students regarding live online classroom interaction is the video component. Thankfully, online gaming granted us the concept of the Avatar. When schools give their students the option between creating an Avatar version of themselves or a live video feed, it helps deal with concerns students may have with their appearance or hesitation with showing their living conditions on camera. Although these issues must be lovingly addressed in the proper setting, Avatars help bridge the gap and allow for more comfort in an online classroom for those who are uncomfortable with the camera. Avatars help level the playing field for some students in a way that cannot be leveled within a classroom environment.

IN CONCLUSION

Although educators responded swiftly and effectively to the pandemic, there’s still more to be done for long-term recovery and paving the way for future sustainability. It’s critical that universities take action now to develop their own long-term strategy, allocate resources, or perhaps devise new ones. For example, streamlining operations and offering more options customized to the individual needs of the student. Virtual learning is sure to play a key role, but developing the strategy will have to embrace the kinds of instructional connection points present in a traditional classroom environment. Interactivity is important. As Johns Hopkins University’s professor William G. Durden points out in his insightful article Turning the Tide on Online Learning, people need to be seen, heard, and exchange ideas. This is the kind of impact that helps affirm identity of the student by the instructor and the other students. As long as people are able to engage that way, and the content they’re learning is substantial, they will stay motivated over a sustained period of time.

Closing with the visionary words of Dr. Michael Kolodziej talking about Artificial Intelligence and Adaptive Learning, “Learning is more than information transfer. The idea that we can program a machine and the machine can program the person is seductive from a process and scaling perspective. The reality is that these things are not that simple. When we think about how to get educators into the meaningful stuff like good learning, authentic and situated learning, we know that Artificial Intelligence platforms can helps us, but they will never replace us.”

How can educators convert this crisis into an opportunity? That’s the big question.

 

To learn more about how we’re helping to answer that question, please call 888-753-5060 or visit our Education Solutions below

 

 

 

 

As businesses struggle to recovery, they need to create business strategies that are resilient and sustainable.
Harnessing the Power of the Cloud for Business Optimization

Because the world is more fluid, unpredictable, and less stable than ever, the cloud represents a resilient business strategy that is sustainable. 

 

Business optimization is the process of making your operations more efficient and cost-effective. Moving to the cloud enables these improvements to happen easily and with great flexibility.

For enterprise organizations, being in the cloud provides them with the ability to scale up their infrastructure quickly, without setting up an additional in-house hardware. It’s not only fast, but it reduces the cost associated with development.

Employees can access files using Smartphones, laptops, and tablets while you reduce operational costs, boost speed, and improve accuracy.

That’s just the beginning. But still, we’re just scratching the surface of what the transformational “supernova” known as the cloud can do for your business.

Moving to the cloud is not a cure-all solution that is going to solve all your optimization and business continuity challenges. Sure, there will be great benefit in simply migrating your IT infrastructure to the cloud, but to fully benefit from this game-changing technology, leaders have to seek out the cloud solution that is optimized for their unique needs. Not all companies are created equal, and neither are clouds.

Cloud Optimization is about delivering business efficiency to your organization. Leaders need to target objectives, look towards future trends, and make predictions as best they can. These insights help IT operations make better cloud decisions and accelerate business innovations that will impact the future of your company. Remember, it’s not just a matter of surviving the years ahead. The goal is to thrive and, ideally, have the ability and wherewithal to shape your own future.

 

DID SOMEONE SAY, “BUSINESS CONTINUITY?”

It just so happens that being in the right cloud environment also ensures business continuity!

Let’s face it. There are many ways organizations can be disrupted.

There are natural disasters, service outages, security breaches, industry innovations/competition, and now, add lockdowns caused by pandemics to the list.

Without implementing a business continuity strategy as a part of an overall cybersecurity roadmap, any process optimization changes you make can be taken away from you in a second. By being in the cloud (instead of utilizing on-site servers to back up your data and host your applications), the cybersecurity and business continuity elements are already baked into your solution. This assurance of security and reliability gives you the freedom to customize and tweak your internal, IT-supported processes and innovate more effective ways to develop and deliver your products and services.

The decisions you make about your cloud infrastructure can determine the future of your company.

Imagine for a moment that you’re the CEO of one of the top three travel management companies in the USA. You’ve got more than 1,000 employees and twenty-plus locations scattered across the country.

But you’ve got a BIG problem.

The in-house infrastructure you implemented ten years ago is now out of date, operationally overloaded, and in urgent need of hardware, software, and security upgrades.

What to do?

Well, you could invest hundreds of thousands of dollars in new in-house hardware, software, and security solutions, or, you could start looking at the cloud as a potential game-changer for your growing enterprise.

That’s the choice that Darryl Hoover, CTO of Direct Travel, had to make.

He chose to use IronOrbit’s cloud infrastructure to help his organization take the next step in business optimization.

Darryl says, “Our success in the travel industry comes down to our ability to leverage technology and put it to work for our customers. IronOrbit helps us keep that competitive edge.”

 

Harnessing the Cloud for Business Optimization

5 Things You Need to Know

1. Know the Competition

It’s not a surprise that many companies are already using the cloud to house their data and infrastructure. Gartner, one of the industry’s leading think tanks, shows the numbers behind the massive move to a cloud-first infrastructure across all industries.

In an article titled Cloud Shift Impacts All IT Markets Christy Pettey of Gartner notes that “Gartner’s latest IT spending forecast shows that spending on data center systems is forecast to be $195 billion in 2019, but down to $190 billion through 2022. In contrast, spending on cloud system infrastructure services (IaaS) will grow from $39.5 billion in 2019 to $63 billion through 2021.”

What do all these big-dollar forecasts mean for you?

Your competition is either considering a move to the cloud, or they’re already there.

 

2. Know the Costs

Cost is always a factor. Doing the math and understanding what cloud infrastructure will mean for your business optimization goals, in conjunction with your budgeting, is critical. Here are some factors related to cloud infrastructure costs.

OPEX vs. CAPEX – Cloud-first business optimization strategies allow you to get away from the life cycle (and break/fix cycle) of in-house IT infrastructure and move the IT budgeting from the CAPEX side of the ledger to the OPEX side.

Scaling Cost with Requirements – Although a company with infinite resources can afford to build IT capacity that they won’t use for 3 to 5 years, your company isn’t likely in that position. Cloud infrastructure allows you to utilize economies of scale and level-up your expenses only when your business process growth requires.

Budgeted Expenditures – Predictability is valuable. The cloud simplifies IT budgeting because all maintenance, updates, security, and upgrades are done by the cloud provider within a stable, monthly fee.

Improved Performance Raises Productivity and Lowers Costs – Improved efficiency and increased productivity have to be considered when it comes to the cost/benefit analysis of cloud infrastructure for business optimization. Profitability arises when employees can easily access their work without spending time on keeping their computers functioning and secure.

3. Know the Process

The unknown is everyone’s primary source of worry. When the IronOrbit team explains the cloud migration process to a business leader, he/she then has the clarity and information needed to make a decision about utilizing a cloud environment to improve business optimization.

This is how an enterprise cloud migration/implementation process works.

Consultation – Getting together with the key stakeholders in the client company to explore their goals for the cloud migration or implementation

Exploration – Digging in and getting a firm grasp on the current IT assets of the client company and the processes that those IT assets support

Collaboration – Working with the in-house IT organization of the client company to determine a roadmap for moving data and IT-supported processes into the cloud

Presentation – Submitting completed migration roadmap to client company leadership for review and approval

Implementation – Moving data and workflow in stages into the cloud in accordance with the roadmap that has been established and working in coordination with the client organization’s IT team

Testing and Quality Assurance – Ensuring that each stage of the migration process has been completed successfully and is achieving the desired/expected results, i.e., optimization of business processes

 

4. Know the Hurdles

Some companies try to tell you that moving enterprise systems from in-house IT assets to cloud infrastructure is a breeze, but they just aren’t telling you the truth. The fact is that enterprise IT assets are complicated. Moving them into the cloud is a complex procedure. That’s why it’s critical to choose the right team to handle the tough stuff and to help you get over the operational hurdles you must face before a cloud-first strategy results in business optimization.

Hurdle #1 – Buy In

Getting key stakeholders to get on board with a cloud implementation to achieve better business optimization is one of the first hurdles you will face. People like infrastructure that they can see and touch. As a result, there is an innate bias against cloud infrastructure – even if it is better on many levels than buying and maintaining in-house IT assets.

Hurdle #2 – Bandwidth

When your entire data and workflow are securely accessed through an internet connection, it’s critical that your business has reliable bandwidth to handle the traffic and a backup IP.

Hurdle #3 – Training

Optimizing business processes through the utilization of cloud assets is a game-changer. It’s important not to leave your staff in the dark. Each step of the process needs to be communicated from the top down. Talk to the employees that are most impacted by the change. Cloud implementation needs to be framed as a positive for the employees. They need to be trained on new aspects of the process that have been impacted by the cloud implementation.

 

5. Know the Benefits
Using cloud-based data sets, servers, and desktops, your organization can work to drive real-world business advantages.  Here are just a few examples of them.

The Benefits of Moving to the Cloud during Recovery

We’ve saved the best for last!

As mentioned in an earlier IronOrbit blog, the cloud has tremendous energy. The information travels up and down. Large amounts of digital information move in every direction. You need to learn to go with the knowledge flow if you’re going to thrive. The flow of knowledge stocks on the cloud will better equip you to look ahead, predict trends, and respond in a timely manner to the ever-changing market. Being in the cloud ensures that you are interconnected globally, where ideas and knowledge are exchanged freely.

It’s not just about knowledge flows, though that’s compelling enough. It’s also about being able to take advantage of leading-edge technology as it becomes available.

Consider the March 1, 2019, Deloitte article, CLOUD-BASED SERVICES ARE MAKING IT EASIER FOR COMPANIES TO USE AI. “These streamlined ways of using AI are coming at the right time as organizations recognize the value of investing in AI to improve their competitiveness. Companies without a great deal of AI expertise can still benefit, as user-friendly cloud services continue to improve and proliferate. The message for companies that want to remain competitive is that they need to jump in – and it’s never been easier or more essential to tap into the power of AI.

 

IN CONCLUSION

Business Optimization is achieved when gaps in process and technology challenges are addressed in relation to the resources available. Today’s business optimization isn’t about a one-time restructuring, but rather an ongoing, dynamic alignment of people, processes, and technology. This kind of strategic agility can only be supported adequately in a cloud infrastructure.  The Harvard Business Review article by Nicholas Bloom and Nicola Pierri, from August, 31, 2018, makes the point clear. “Flexible access to computing resources allows firms to scale-up (or down) rapidly and to experiment with new products and features. The operational agility can be particularly valuable when facing uncertain demand or a fast-evolving competitive environment.”

Another strong case for using cloud technology to optimize business is made earlier in the same article. It reports that cloud computing is an unusual technology that “provides high-powered computing without the overhead costs associated with in-house software and hardware provisions.”

 

THE BIG PICTURE

Here’s the most important question.

If you’re not going to utilize the cloud for continuous collaboration of processes to meet market demand and stay ahead of the competition, what are you going to do – and how much money are you going to have to spend to make it happen?

5G enables a new kind of network. One designed to connect everyone and everything together including machines, objects, and devices. Could it be setting the stage for singularity?
What is 5G and Why Should You Care?

5G enables a new kind of network. One designed to connect everyone and everything together including machines, objects, and devices. Could it be setting the stage for singularity?

 

5G is a new digital system for transforming bytes (data units) over air. This new interface uses milometer wave spectrum. It enables the use of more devices within the same geographic area. For example, 4G can support 4,000 devices per square kilometer (.62 miles). 5G will support around 1 million devices in the same area. And those 1 million devices will operate at ultra-fast speeds. We’re talking exponentially faster download and upload speeds with hardly any latency (the time it takes devices to communicate with wireless networks).

The world is still in the throes of the pandemic. That is true. But the pandemic hasn’t slowed the adoption of 5G. Most companies continue to implement 5G networks. This technology has the potential to transform the lives of people around the world.

However, legislation and security will have to keep pace, to protect against numerous potential threats.

According to the Global Mobile Suppliers Association (GSA), at the end of March 2020, 70 mobile network operators launched the 5G commercial network in 40 countries. Sixty-three of those launched mobile services, (57 full launches, 6 limited availability launches). Thirty-four operators had launched 5G fixed wireless access or home broadband services (27 full launches, 7 limited availability launches).

Despite the impact of the coronavirus pandemic, the spread of 5G technology continues. Measures like social distancing have delayed the launch of 5G services in some countries. Operators had to stop. Mobile companies in other countries keep launching 5G network.

Joe Barrett, president of GSA, says, “We have all been surprised by how 5G has taken off. Deployments and commitments from across the globe have picked up pace. There are commercial launches in the world’s largest mobile market. The combination of these milestones will lead to an explosion in 5G users.”

“5G has the potential to cover up to 65 percent of the world’s population with 2.6 billion subscriptions by 2025. An Ericsson Mobility Report. says it will generate 45% of the world’s total mobile data traffic.”

5G Connection Technology & Advantages

5G is the 5th generation wireless connection. It represents the most advanced leap forward in mobile technology. At the speed of 20 Gbps, which is 20 times faster than 4G, 5G promises a faster and more reliable technology. Users can transfer a much larger amount of data with a latency of one millisecond. Connected vehicles, remote medical procedures, smart homes, and smart cities become reality. We are entering the age of big data. There are huge opportunities for digital service providers. Huge amounts of Data and metadata will be collected through their services. Phone companies are already releasing 5G mobile devices.

A study by Ericsson found that 5G adoption would come in three phases:

1. Premium smartphone downloads of content in seconds rather than minutes.

2. 5G home wireless broadband to challenge traditional cable TV (video and broadband delivered video).

3. 5G hot zones of ultra-high speed in demanding locations like airports, offices and shopping areas.

5G Risks & Threats

In a March 3, 2020 article in the digital magazine CIO, Jaikumar Vijayan reports on the security risks that will accompany the benefits of fifth-generation cellular networks. In the article, he quotes vice-president of Gartner Research Katell Thielemann, “5G is emerging as an accelerator to deployment. But it is also a source of concern from a security standpoint. Speed to market and cost considerations are taking precedence over security considerations.”

The resulting complex digital connectivity could prove to be a weakness. Modern life becomes dependent on connected technologies. This hyper-connectivity amplifies existing dangers and creating new ones. With the extended adoption of 5G, the world will be more connected. Data will be continuously exchanged between devices and applications. The threat of cyberattack will increase. There will be a greater number of vulnerable entry points to a network. There will be many opportunities to attack 5G infrastructures. This includes billions of IoT devices, and next private networks, that were not connected before.

Some of the weaknesses that have been discovered so far:

˃ High reliance on suppliers, some of which are state-backed, could pose risks of cyber attacks from some countries to others.

˃ 5G networks will be introduced gradually, so old 3G / 4G networks and new 5G architecture will have to coexist for a while, which will increase security concerns. The European Union Agency for Cybersecurity (ENISA) highlights, in its latest report on future 5G threats in terms of cyber security, the following protocols of concern: TCP / IP (DHCPv4), SS7 / Diameter, SIP, TLS, ARP, BGP.

˃ The network has moved away from centralized, hardware-based switching to distributed, software-defined digital routing.

˃ 5G further complicates its cyber vulnerability by virtualizing higher-level network functions, in software, formerly performed by physical appliances.

˃ 5G creates more entry points for attackers.

˃ Even if it were possible to lock down the software vulnerabilities within the network, the network is also being managed by software, often early-generation artificial intelligence, that itself can be vulnerable. According to Steve Durbin, Managing Director of the Information Security Forum (ISF), “Nation states, terrorists, hacking groups, hacktivists, and even rogue competitors will turn their attention to manipulating machine learning systems that underpin products and services.”

˃ Increase in short range communications will require many more cell towers that will potentially bring more attacks from cyber criminals.

 

 

Cybersecurity & Measures

 

Cyber accountability requires a combination of market-based incentives and appropriate regulatory oversight.

 

“With 5G networks there’s more computing functionality that you can deploy at the endpoint,” says Scott Crawford, analyst at 451 Research. That means organizations will need to pay more attention to tasks like identifying and validating endpoints. They will also need to ensure that their connected devices are in compliance with security policies before they interact with other devices or with sensitive data.

 

Techniques That Will Redefine Cybersecurity Approaches in the 5G Era
Reversing the under-investment in cyber risk reduction

The continuously changing environment requires organizations to make substantial investments in new technologies and processes. Companies will have to invest in compliance. New regulations will emerge.

Implementing machine learning and AI protection

There will be a major advantage of using AI-powered solutions.
Security products will continue self-learning and updating to fit a given environment.

Shifting from lagging indicators of cyber-preparedness (post-attack) to leading indicators

A 2018 White House report indicates a problem of under-reporting cybersecurity incidences. Failure to report such crimes inhibits the ability to respond immediately. and effectively.

Continued cooperation between the public and private sectors is the key to effectively managing cybersecurity risks. Both the private sector and government agencies working together can better share information and raise cybersecurity standards. This kind of coordinated effort can develop trust and accelerate the closure of the 5G gap. Such a program could also limit the damage when cyber attackers successfully penetrate a network.

Cybersecurity starts with the 5G networks themselves

All the networks that deliver 5G must have proactive cyber protection programs.

Insert security into the development and operations cycle

It’s more important to integrate security. Software, firmware, and hardware have to be better protected.

Best Practices

The National Institute for Standards and Technology (NIST) Cybersecurity Framework has established five areas for best practices. The five areas are: identify, protect, detect, respond, and recover. These principles are the basis of industry best practices. The Consumer Technology Association (CTA) has helped produce an anti-botnet guide. It outlines best practices for device manufacturers.

“Cybersecurity will play a critical role, with organizations called to adopt a granular segmentation of their networks. The Zero Trust model will become a real standard,” explains Greg Day, VP and CSO EMEA of Palo Alto Networks. The Zero Trust approach is based on a simple principle: “never trust, always verify.” It’s assumed that any person, or device, requiring access is to be considered a potential threat. So authorized access to a specific areas are restricted.

An effective 5G defense strategy is based on 3 fundamentals:

1. Reduce risk by implementing a “Zero Trust” strategy, contrasting the increase in the perimeter that can be attacked.

2. Ensure the correlation of data flows in a roaming world and the visibility of the suppliers’ ecosystem.

3. Make sure cybersecurity strategy keeps pace with reducing latency and increasing data.

The Pace of Digital Innovation and Threats Requires a New Approach to the Business-Government Relationship

In a Brookings article, Tom Wheeler and David Simpson warn that  “the toughest part of the real 5G race is to retool how we secure the most important network of the 21st Century. Never have the essential networks and services that define our lives, our economy, and our national security had so many participants, each reliant on the other-and none of which have the final responsibility for cybersecurity. Here are some of the key take-away points:

˃ More effective regulatory cyber relationships with those regulated

˃ Recognition of marketplace shortcomings

˃ Consumer transparency

˃ Inspecting and certifying connected devices

˃ Stimulate closure of 5G supply chain gaps

˃ Re-engage with international bodies

Contracts aren’t enough. Most small and medium 5G network providers are not bound by any of government contracts.

 

What 5G does for US
5G will do many things to transform our lives, including giving us faster download speeds, next to no latency, and more capacity and connectivity for billions of devices especially in the areas of virtual reality, the IoT, and artificial intelligence.
5G and Privacy

People are always concerned about how tech companies treat their data. The GDPR in Europe and CCPA in California are legislation that protect personal data. To comply with GDPR, any company that collects, stores, and processes personal data has a significant set of obligations. There will be many actors in the 5G ecosystem interacting with personal data. Only a privacy-by-design approach to 5G can ensure their satisfaction. This is according to the first white paper of the 5G PPP Security Working Group.

Any future 5G system should be able to answer Lawful Interception (LI) requests. LI should be performed in a secure way without compromising the privacy of network users. The information provided must be verifiably trustworthy and securely delivered. Given packetized and dominantly encrypted network traffic delivery, a must-have technical building block of LI is Deep Packet Inspection (DPI). Without DPI, no analytic insights can be derived from live or recorded user traffic, thus rendering LI powerless.

“There is a lack of clear-cut security regulations for mobile wireless communications based on 5G at this point. The current 3GPP (3rd Generation Partnership Project) standards mainly apply to earlier mobile telephony protocols. They don’t fully address the emerging challenges.” says David Balaban, computer security researcher.

IN CONCLUSION

5G, the future of connectivity, is now a reality. Initial impressions are mixed. 5G is coming whether businesses and the public at large are ready for it or not. Navigating the transitional challenges is going to be quite an undertaking. There are privacy and security concerns. 5G providers, government, and businesses will have to collaborate to come up with solutions.

We can expect road bumps, hacks, and misappropriation of private data along the way. But 5G opens up a world of possibilities for everyone. Everyone can benefit. From the big-city executive to the farmer in Iowa using agricultural AI to support a greater crop yield.

This new network holds the key to advancing the spread of a slew of exponential technologies. It will set in motion fundamental changes to a industries and services. It’s just one more thing to make your world a little faster. Actually, it will make it a whole lot faster.

But here’s a question for you. Will 5G set the stage for what Jayshree Pandya, in a Forbes article, calls the troubling trajectory of technological singularity?

The New Normal – How 2020 Changed Business Forever
As businesses venture forward they must learn to navigate the uncertain waters of the new normal.
Businesses will have to include resiliency planning as they venture forward.
THE SHAPE OF THINGS TO COME: SOME THOUGHTS ABOUT THE NEW – NEW NORMAL

It surprised me. The first time that I heard a news broadcaster use the words “the new normal” in reference to the post COVID time frame made me stop and think. Here was a term first used following the financial crisis of 2008 and it’s aftermath. Until then, I was expecting everything to go back to how we had always known it.

I thought about it. I realized that the newscaster was right. COVID-19 has changed the way we do business – and life – forever. In the midst of the current COVID-19 pandemic, many facets of the way we do business have shifted. Daily, we see our lives become more confined. The uncertainty of it all restricts us in many ways. It is too early to tell what all the permanent business ramifications will be. But there is change in the air. One thing is certain. This situation will expose corporate weaknesses and strengths. How the story unfolds for your business depends largely on how you navigate the waters ahead.

Look at the current impact of the virus on business operations. It’s clear that the shift toward the “new normal” has caused the adoption of certain technologies sooner and faster than ever expected. Here are 6 ways technology trends have changed for better or for worse.

What Has Coronavirus, and Our Reaction to it, Changed in Business Forever?
Online collaboration tools such as Microsoft Teams enables people to connect from home, from the office, or anywhere else. Definitely part of the new normal.
Online collaboration tools such as Microsoft Teams enables people to connect from home, from the office, or anywhere else.

1.      The way businesses view and handle remote workers has changed.

In this article from MarketWatch, we see some business benefits of allowing employees to work from home, such as taking advantage of a more diverse talent pool and flexibility in labor costs.

A great number of employees now working from home. They’ve been working from home for a prolonged period of time. Many companies will have to make adjustments and accept remote workers. Being able to transition to a home or remote office when problems arise will be the new normal. The bonus: the flexibility allows for a more productive and capable workforce.

Tool and technology that’s ready to go in either environment is a great way to support your team. It encourages autonomy and collaboration among teams. Get the job done, regardless of location. That’s the new normal.

·         Zoom or Microsoft Teams are cloud-hosted communications tools that allow for adhoc web meetings among different groups.

·         Trello is a great way for companies to work together on projects, allowing for integration into other subscription-based business apps like Google drive or Dropbox for sharing.

·         Slack is an attractive alternative to email, allowing single or team-based conversations that are searchable.

 

the new normal means Machine learning can be confused by weird behavior....they may be mislead because of unusual spending habits during a pandemic, but they will play a key role in mitigating the fallout from this pandemic and better prepare us for the next.
Machine learning models may be mislead because of unusual spending habits during a pandemic, but they might play a key role in mitigating the fallout from this pandemic. They’ll definitely minimize the impact of the next.

2.      The way businesses view and use artificial intelligence has changed.

Another trend that has been gaining more traction is the use of artificial intelligence (AI), specifically, machine learning. Being able to mine through the copious amounts of data we have on coronavirus is helping scientists and researchers find answers quicker than ever.

The use-case for machine learning (ML) is not limited to scientific research. Imagine being able to accurately forecast sales data. Or what if you could have a chatbot that could answer customer service inquiries 24/7 from your website?

ML has deep roots in cybersecurity. ML has the ability to analyze network traffic and detect anything seen as malicious. Many of the latest security tools incorporate AI/ML. They are able to learn the current cybersecurity posture of business systems. They can proactively combat malware threats.

The first step for a company is to vet, implement, and accept machine learning. This could be for a specific task or to provide general support to a department. Once this happens, the doors to advance technology swing open. The power of ML to benefit a company become apparent.

 

The new normal means a turning point for the way we work and learn. All because of the cloud.
Cloud technology has brought stability and flexibility to a world lacking both. Web-based platforms and services continue working without getting overwhelmed by the sudden rise of people going online to do business, work, or play.

3.      Acceptance of the public cloud infrastructure has changed.

With COVID-19 forcing businesses to rely on the cloud, company leaders that were once wary of public cloud infrastructure are now embracing it.

A recent CRN post reports cloud computing have enabled companies to scale business applications. And they’ve been able to do it reliably. Thanks to the minds behind Google, AWS, and Microsoft Azure, rapid scaling has been virtually trouble free.

Microsoft Azure alone has reported a 775% increase in usage of cloud services like Teams, PowerBI, and Windows Virtual Desktop.

Relying on a proven infrastructure is good. Doing it without managing physical server hardware is even better. It is more critical now than ever before.

Businesses that use a cloud infrastructure can scale back without incurring unneeded costs. If they are in a current downswing.

Remote work, SaaS applications, and Cloud Infrastructure are in high gear. The COVID-19 crisis will cause these trends to gain more traction and use. Companies will scale their services and solutions. Those that wing themselves from on-premises infrastructure will have the advantage. They may even elect to downsize physical office buildings. Or not. Having the choice is also an advantage.

The changes to business and technology brought on by COVID-19 are here to stay. There are significant business benefits from this course adjustment. The adoption of cloud-based technologies is one of them.

·         The ability to work from wherever is convenient and productive.

·         The capacity to deliver a solution that is always available – regardless of business demand or outside factors.

·         The freedom for a company to better align with its employees and customer needs.

4.      The competitive edge and viability of companies has changed forever.

People are forced to stay home more. They don’t want to risk exposure. They become reliant on delivery services like Door Dash, PostMate, and InstaGuard to get food and supplies. Streaming services like Netflix and Amazon Prime are bigger than ever.

Who is losing out?

Restaurants by the thousands will struggle to climb out of the COVID-19 trauma. Some won’t make it. The franchise chains will. Cinema theaters across the country are currently closed, and some of them will not reopen. This will have an impact on how movies are exhibited. It will also impact what types of feature films are developed and financed. Fewer studios will be willing to take the risk of financing blockbuster movies. This is especially true of disaster movies. These are the movies that cost hundreds of millions of dollars to make and market.

One night in early April, the Governor of New York summed up the problem, “The simplicity of it is so what makes it so tragic. Because we don’t have a piece of equipment somebody is going to die? How did we get to this place? In this county. We have to buy all our supplies from China? I can’t get protective equipment because China is making it? China is making the ventilators?”

But it’s not just medical supply chains that are being reconsidered. The coronavirus pandemic will also have long term effects on the tech hardware industry.

Parts needed to assemble various hardware and electronic products come from a multitude of sources. Most of them are overseas. A factory that makes television monitors doesn’t necessarily make the screens. The processing chips are made at a different factory. The power supply might be made at yet another factory. It’s all interconnected. If one factory is shut down, it impacts all the others down the line.

The entire system can grind to a halt. Having a supply chain that involves multiple nations like the United States and China will most certainly be re-evaluated. It’s better to have all the needed components of a particular name brand product to build closer to home. This will kill some tech manufacturing firms and enrich others.

The use of AI automation is going to make it more attractive for manufacturing to come back to the USA. That will shorten the length of supply chains while ensuring their security.

Apple’s already indicated that it won’t be able to make a sufficient supply of its Smartphones for the year. That’ll be true of other smartphone makers…some won’t make it. It has already begun.

The is Irony is that a virus that originated in China is ultimately helping China’s economy to bounce back. China has the capacity to manufacture much of the equipment needed in other parts of the world, including our own. Long term, many companies are going to be looking at diversifying their supply chain. They’ll avoid putting all their eggs in one basket.

 

the new normal will include remote work options
What ever shape the new normal takes, remote work will definitely remain part of the picture.

5.      Everyone in the company working in and from one building – or any company-owned building – has changed forever.

In an April 20th Fast Company article, several enterprise CEOs and influencers, including Jared Spataro (corporate vice president, Microsoft 365), agree that working from home and increased video conferencing will become the new normal.

Jared Spataro talks about the new normal for technology post pandemic
Jared Spataro is the Vice-President of Microsoft 365.

Jared Spataro is quoted as saying,“This time will go down as a turning point for the way people work and learn. We have a time machine as China navigates its return back to work—and we’re not seeing usage of Microsoft Teams dip. People are carrying what they learned and experienced from remote work back to their “new normal.” We’re learning so much about sustained remote work during this time.”

Business is not the only place where “from home” situations will continue well after COVID-19 has been conquered. Education is another sector that has changed forever. But what about all those families that don’t have basic access to the Internet at home? School shutdowns requiring students to take online courses widen the socio-education disparity in our society.

Sal Khan talks about the new normal and how it will affect business after COVID-19
Sal Khan, founder of Khan Academy.

Sal Khan, founder and CEO of the educational nonprofit Khan Academy, said, “The need for online access and devices in every home is now so dire that it may finally mobilize society to treat internet connectivity as a must-have rather than a nice-to-have. We’re already seeing governments, school districts, philanthropists, and corporations step up to close the digital divide. If this continues to happen, we could get to a state of nearly universal online access at home.”

Sal Khan’s prediction is already happening in Singapore where universal Internet connectivity is nearly 100%. Universal Internet connectivity in Singapore is part of their Intelligent Nation 2015 and Smart Nation initiative. In August 2018, Ookia’s speed tests determined that Singapore’s broadband speed of 181.47 Mbit/s is the highest in the world.

6.      Our view of reliance on a single revenue stream – as a business and as individuals – has changed forever.

Will Lopez, head of accountant community at HR platform Gusto put it all into perspective when he said,

“This won’t be the end of brick-and-mortar store. Just as it won’t be the end of the digital cinema theater. These are important businesses. They help form the social fabric of our communities. But retail shops and restaurants will change the way they operate. The crisis has reminded people that they need to remain agile. It has reminded us to move with the times. Don’t be stuck with the old way of doing things.”

Where many of these shops have historically relied on foot traffic. These same shops will now develop ways to create alternative streams of revenue. For example, many restaurants will link up with delivery service platforms. They’ll expand their geographic reach. More boutiques will develop an online presence that reaches beyond their local neighborhoods.”

As we look ahead to the future to see the new normal, businesses have got to balance the weight on their shoulders.
Business leaders are too busy struggling to keep their operations going to wonder what the new normal will be like. We’ve got to get through this first.
IN CONCLUSION

The “new normal” will mean most companies will stall. Many will go out of business. The ones that do survive must continue to optimize the way they operate. They will have to rethink their business models moving forward. Supply chains have been disrupted. For many this experience has been a painful lesson. Companies will respond. They’ll have to. They will strengthen whatever back-up plans they have in place. If there are none. They will have to build them from scratch. This includes expanded work-at-home capabilities for more employees. They’ll have to consider options. Then they must position themselves to take advantage of those options.

New resiliency metrics will be rolled into valuations along with climate-related risks. The whole concept of resiliency will have the same importance as cost and efficiency. Resiliency is no longer a nice to have, but a necessity.

Individuals, communities, businesses, and governments are learning new ways to connect. Business leaders are finding faster, cheaper ways to operate. Conferences and meetings happen on online. Everybody that can has been working from home. These are positive changes. Better management. A more flexible staff.

Can we create a next new normal? One that will be better than what it replaced? Can we become agile enough to move even as the situation moves? Can we learn to address the challenges positively.  These will be a long-term questions for us all.

What innovations will there be to leverage?

What technologies will business leaders use to thrive in the “new normal?”

How Technology Will Keep U.S. in Business (part 1)

Companies, individuals, and politicians are asking the same question. What is the nexus between health and economic prosperity? We need the breathing room to heal from the crippling effects of the COVID-19 crisis. Can technology provide that? Can it also keep the U.S. in business at the same time?

Before the USA fell victim to the coronavirus, our economy was booming. Every business sector was feeling the positive impact of high consumer confidence. We enjoyed record-low unemployment, and a strong stock market.

But then, the bottom fell out of the tub.

Because of COVID-19 many things happened quickly. The stock market took a dip. Millions became unemployed overnight. And the average consumer became too afraid to spend any reserve cash they may have stored up. According to the Brookings Institute, the economy has “almost certainly entered a contraction.”

The coronavirus changed life in the U.S., in the whole world, in a few dizzying weeks. California governor Gavin Newsom put the whole state of California on lockdown. He wasn’t the first to make such a decisive and bold move. About a week earlier, CNN reported Adam Silver, the Commissioner of the National Basketball Association, announced the league would suspend the NBA season. Silver made this decision immediately after two of his players tested positive for the coronavirus.

He not only led the sports world shut down but he foreshadowed things to come. Organization
leadership has to acknowledge what is happening and respond. It may not be the perfect response, but they have to do something.

There is an old principle: divergent groups of people, even former enemies, will come together to fight a common threat. You could make the argument that nature was reminding us why we’re all here on one planet….to survive together as a species.

Telecommuting was already a trend gaining popularity and acceptance. Working from home would become the norm over the next 5 to 10 years. The coronavirus shortened that time frame. It pushed us further in a direction most businesses were already going.

 

COVID-19 has shaken us to our core.

The aftershocks will tremble beneath our feet for quite some time. Just in the last 2 weeks the Small Business Administration has issued more than $305 Billion in loans to more than 1.4 million small businesses nationwide.

The pandemic has provoked all companies large and small to launch their own grass-roots efforts. Okay, this is what we do as a company. How can we take what we do and help others during this crisis? In this divisive world we live in, we’ve seen companies from all over the world pitch in and help.

On March 25, 2020, Bloomberg Technology spoke with Cisco CEO Chuck Robbins. Robbins said within the first 24 hours of CISCO announcing free cloud security and Webex offers, they had 240,000 new subscribers. “Before this crisis we were running 300 million users per month. We are now doing 4 and a half million meetings per day. We’re at 12 billion meeting minutes through March. I want to put this into perspective. In the United States, for any one-hour period, we will do 100 million meeting minutes. This is a platform that is now trying to support 3 to 4 to 5 times the volume it was ever built for just a few weeks ago. I’m so proud of what our team has accomplished. They’re working 7 x 24.”

When asked about his own experience working from home, Robbins said, “We all like working from home. At least periodically. I think we all miss the office tremendously.

We’ve looked at this across three vectors. What are we doing for our employees? What are doing for our customers? And what are we doing for our community?

Even from home, we’re able to execute on all of that. All our 75,900 employees are working from home.

We’ve stated we’re going to continue paying our contract and hourly workers. We’re doing a video meeting with our employees every week right now. We have medical experts on. We want to keep everyone up-to-date on what’s happening in the world. Everybody’s anxious to get back, but for now, it’s working great.

The big thing we’re worried about is our communities. We’ve been working very hard in Silicon Valley with our public counterparts to make sure we’re taking care of them as well.”

The best way to help society, business, and culture navigate a crisis is to just doing the right thing. Do what is fair for our country and for each other.

Most American companies went into the crisis in good shape. Businesses have found themselves peering over a steep ledge at a moribund economy. Like a wild animal on its last leg. Business owners scrambled to move entire work forces from the corporate office to home offices. Fast food restaurants closed their dining rooms. Kept their drive-thrus. Fine dining restaurants closed their doors. Most of them shifted their focus to call-in orders and online take-out orders. Brands that never ventured into having a digital business, now jockeyed for functioning apps. Some of kept a scaled down version of their workforce to keep the storefronts open. They offer curbside pick-up service.

 

Many restaurants, even fine dining establishments have remained open by offering curbside pick-up and delivery options.

Even though I am involved with the technology industry, I prefer to interact with a human while checking out at the grocery store. I’m the same way when it comes to ordering a smoothie from Nékter or a cup of coffee from Starbucks. I’d rather walk into the shop and ask an employee for my order than use an app on my Smartphone. Due to the pandemic, my local Starbucks recently re-opened, but open only for app order pick-ups. I had to finally download their app. It took a few minutes. I placed my order. paid for it via my account. A couple of minutes later, a lady wearing mask and gloves, placed it on the table blocking the front door.

This is a common site. Specialty shops leveraging technology to keep business moving.

 

In an April 11th article, The Economist told a story of an online grocer who saw its servers so overloaded that it suspected hackers. “We thought we were under a denial-of-service attack,’ says Tim Stiener, the company’s boss.” As it turned out, customers were desperately trying to get food and drink deliveries for the weeks ahead.

Later, the same article reported, “Around the world, small and medium-sized firms are particularly exposed. The US Chamber of Commerce found that 54% of non-sole-proprietor firms with fewer than 500 employees were either closed or expected to close in coming weeks.

Rich Lesser, “Our purpose is to unlock the potential of those who advance the world. We work across boundaries to take on the hardest problems and to drive real value creation for businesses and for the world in which we live.”

Rich Lesser, the CEO of Boston Consulting Group, which advises big global firms, says that robotics and other new technology approaches to manufacturing make the case of moving factories closer to home more compelling. This is because they reduce the cost difference. Just as previous information technology was put to work underpinning the spread of supply chains, so today’s can be used to shorten them — potentially making companies more responsive to local tastes.”

Alphabet, Amazon, and Apple are contributing to the country’s economic resilience. For most other companies, the pandemic and lockdowns are huge disruptors.

The way companies use technology will make a difference. They will either close their doors or survive this difficult time. Few, very few, might even grow. The role of technology has changed over the past few weeks. Drones have delivered medical supplies. Artificial intelligence is at work to identify COVID-19 infections. There are plans to use AI technology to predict future hot spots.

The technical aspects of having employees work from home is easy to support. It becomes more complicated when you’re dealing with sensitive data. Remote workers may have access to corporate virtual private networks (VPNs). VPNs enable access to office networks,

More network bandwidth and expanded hardware is needed to encrypt the connections. Gartner analyst Rob Smith says that one-third of all companies are ill-equipped to send all their employees home. Another third have no remote work plan. Corporate VPN is an aging technology. It almost became obsolete as companies migrated to cloud-based services. As a result, companies were not interested in investing in VPNs simply to allow more employees to work from home. Of course, all of that has changed now.

 

Telecommuting is no longer just a perk. It is the wave of the future.

More and more companies see employee productivity actually increase. Telecommuting is likely to remain as an option. At least part-time.

But using VPN is not optimal. What is optimal? Optimal is moving to the cloud. 

More and more business leaders understand that the future of IT is based on cloud technology. Many of them will make the move once society comes up for air between the first and second waves of this pandemic. They don’t want to be stuck in this position again.

This concludes part one of HOW TECHNOLOGY WILL KEEP U.S. IN BUSINESS.

Be on the look out for part two. The concluding section will feature 7 key areas where technology works to help the USA in business.

Until then, keep learning, stay informed, and be safe.

 

 

 

 

Why Every AEC Firm Needs to Move to the Cloud Now

Cloud computing is the future of everything digital. Modern IT environments use it. “Modern IT” is now hosting its infrastructure in some form of the cloud. Moving to the cloud is especially important for architects, engineering, and construction firms (AEC). A 2017 Sage Survey found that most of AEC firms had already moved to the cloud. It was quite a jump from an earlier survey conducted in 2012 when only 16% of construction contractors had migrated to the cloud.

That’s why most of them are on the cloud in one form or another. The AEC industry is highly fragmented, data-intensive, and project-based. Designing, building, and repurposing require all the traditional disciplines you’d expect, but also many ancillary areas such as energy, environment, and waste.

The Journal of Cloud computing: Advances, Systems, and Applications reported that sharing data and supporting coordination between people involved is difficult and reliant on third-party tools to support such capability. “We believe cloud computing provides a more efficient and robust mechanism for individuals within the AEC industry to collaborate and share data. Work is already underway in the AEC sector for developing data and process models to enable greater interoperable working between project participants.”

This research has led to the development of the concept of Building Information Models (BIM) – a design process that looks at a building’s life cycle. The BIM concept helps designers and others see how a building will use resources before it’s built. BIM was an evolution of ideas.  Start with a powerful digital drawing tool and then evolve it into a much more sophisticated program. The software works in partnership with the designer or architect. A set of drawings becomes an interactive database. When the designer draws on the screen, the BIM system computes the properties of the building and even suggest improvements for everything from energy efficiencies to people flow while costing out every conceivable option. Every variable is built into the AutoDesk software. Any design changes are immediately reflected in revised cost estimates. It tells how much energy the modified design will save. The architect is working with a set of drawings and a data model that understands the whole building as a three-dimensional living system. Keep in mind that BIM includes all the information about a building. It should be a complete 4D virtual repository of the data associated with the structure from beginning to the end of its life.

 

Being on the cloud facilitates hiring, and retaining, some of the best talents all over the world.
THE CLOUD ENABLES REMOTE COLLABORATIVE TEAMS to work seamlessly together on complex projects.

Collaborative working environments have been long-standing key aspects of AEC workflows. Traditionally, those collaborative teams had to commute to one centralized location. Today, offering work environment flexibility (home office or corporate office) has become somewhat of an expected perk. This was a trend long before the coronavirus reared its ugly head. Now, there are government mandates pressing the point even more. We’re all being forced to work from our homes. Coronavirus aside, future AEC firms don’t want to have their collaborative teams tied to one physical location. Not any more.

Jennifer Howe, VP of SMMA (an architectural firm headquartered in Boston) and acting president of the ACEC organization, Massachusetts Chapter says, “As much as I don’t want to be working from home, there are times when I need to be working from home. Our IT staff had us set-up to work remotely, but it wasn’t the same as what we have now with the cloud. I can be on my laptop with IronOrbit and see everything the same way as we see it while we’re in the office.”

She recognizes that it’s more of an employee’s market now. “The ability to offer talented candidates the option to work from home is an added incentive to join your team.” That’s especially true when nothing is lost while moving from the office workstation to your mobile device-of-choice working at home. But there are other reasons to migrate to the cloud.

A much more enhanced remote work experience is not the only reason to move the cloud. The biggest, more critical reason, is security. But it can’t be just any cloud solution. , The cloud environment needs to customized to the unique needs of the firm. Jennifer talks about the biggest threat every firm faces. “Ransomware attacks are a tremendous concern. An ACEC Mass member firm had a recent incident where they were hit with a cyber-security breach. That was very concerning to our entire chapter. ACEC actually hosted an informative event where they shared some of the issues that they had. For SMMA, as government contractors, we need to be very protective and careful with the information that we have.”

Just a few short years ago, Google Drive and DropBox were the popular options between those who wanted to share large files. Those options weren’t great at protecting intellectual property. Concerns over security justifiably kept many AEC firms from utilizing them.
In addition to state-of-the-art firewalls, antivirus protocols, malware filters, and encryption, a truly holistic approach to security includes 24/7 monitoring.
Industry-Wide Concern for Security Is At An All-Time High

Carlos Charry is the Director of Technology for SMMA. He says security has been a top concern for everybody. “One of our competitors got hit with ransomware a few years back. It made me look at our own situation and ask, ‘Are we prepared for this?’ I knew we weren’t ready.”

The level of security provided by IronOrbit – the firm’s cloud solution provider is far beyond anything they could have accomplished on their own. The entire IT infrastructure is protected by state-of-the-art firewalls, antivirus protocols, malware filters, and encryption. The security doesn’t stop there. There is an entire team of engineers, rotating around the clock, monitoring the data centers for any type of potential security threat.

But Carlos adds, “The question of security aside, you still have to keep up with technology. That means having your IT infrastructure on the cloud. The cloud provides faster updates. Just keeping all your applications up to date saves you a lot of trouble. Most of my time before the cloud was spent handling IT issues.  Things like the network not being responsive or our server going down. I spent time on things like that and couldn’t devote myself to what I truly love to do which is to improve our business processes. I want to make them better so the company can become ever more efficient.

Carlos continues, “The cloud has enabled us to hire anyone anywhere in the world. The employee just needs a PC and an Internet connection of some kind and they can utilize our tools. We currently have people working for us from Maine and New York. Since we’ve moved to the cloud, my headaches have been reduced. Once an employee is connected to the cloud, I don’t have to worry about it. I know the data is automatically being backed up. My worries are basically gone.”

FINDING THE RIGHT WAY TO COLLABORATE IS CRITICAL TO RUNNING AN EFFECTIVE BUSINESS

Jennifer says, “Working with Carlos, our IT director, we’re always looking for better ways to do our work. SMMA is a full-service design firm. Collaboration is the key to our success. Finding the right way to collaborate internally and collaborate with our clients is a critical part of running an effective business.

MOVING TO THE CLOUD. WHAT IS IT LIKE?

People were hesitant at first. The cloud environment is different from having your server on the premises. It’s different. “As we were going up to the cloud, and trying to figure out how to use it, they weren’t sure at first what to expect. Is it going to make my life better or worse? Finally, through effective collaboration and communication, we found it to be an invaluable tool. I find that I can access whatever I need wherever I am.  One of the things that surprised me was being at a client meeting and just being on wi-fi and act as if I were in the office. I’m able to pull up any document I need at any time. For example, I do a lot of government work. When I’m doing a client visit, I often don’t have wi-fi available to me. No worries. I just turn on the hotspot on my phone and still be able to open up a CAD drawing. You’d think that would be impossible to do, right? But it really works quite well.”

 

Being able to be remote and share a CAD drawing on your laptop using the hotspot on a smartphone is amazing. “You think it’d be impossible, but it actually works very well.”

 

Hector Inirio is the Design Technologist. He says, “That the most attractive aspect of moving to the cloud was a blend of things. There are many aspects of advanced IT that are beyond our expertise such as high-end security threats. Ransomware is a good example. I really liked the fact that cloud technology democratized our computer systems. We’re not transferring any data from our local workstations. The workstations themselves, really become more like dumb terminals. So, no matter what kind the computer was at a particular desk, they all now respond like high-end machines.  Previously, due to cost, we’d only have some users on higher-end machines. The ones who didn’t need the computing power were working on equipment with less computing power. Now, all of them respond with higher specs.”

“I really liked that cloud technology democratized our computer systems. It made all of them perform like higher spec machines” – Hector Inirio

The computer terminals become virtual desktops because they are hosted by the external cloud server. Any slowness or frustrations you’ve experienced with your current Internet connection go away. Once users log in to the hosted desktop you’re using bandwidth from the cloud. There are separate gigabyte connections to the Internet. Your bandwidth virtually becomes unlimited.

The technology needed to aid the construction industry’s complex workflows hadn’t become available until the past few years. There are now plenty of SaaS solutions available to make full use of what cloud technology offers. Most contractors are implementing cloud solutions. The few who are not risk losing any competitive edge they had. These firms are also in danger of becoming irrelevant as technology advances at exponential rates. They simply won’t be able to keep up. Remaining current with the speed of technology means being able to focus on human capital.  These are qualities like talent, skills, know-how, empathy, and creativity. All of these are undervalued human assets to unlock. You won’t be able to leverage this human capital if you’re stuck in the mud because your technology isn’t current.

MAKE FULL USE OF THE BENEFITS

Construction companies already on the cloud should evaluate if they’re making full use of being on the cloud. There is another benefit of cloud computing. Construction companies should be cashing in on the ability to store tremendous amounts of big data files onto more powerful machines. More can be done with fewer resources. Anywhere there’s an Internet connection you’re good to go. Being on the cloud removes hardware limitations, prevents loss of data, dramatically improves security (if designed correctly), and improves accessibility.

One of the key issues within the industry is the storage of building data throughout the whole life of the building. Data processing is also an important concern for the industry. During construction, a large part of the work takes place on-site where computing resources, up till now, have been non-existent.

The cloud offers data processing power. Drones hover over construction sites and take pictures with detailed GPS coordinates and metadata. Stitching these images into an orthograph requires more processing power than typical computers can muster. Visiting job sites can take hours. Now construction sites can be viewed via a SaaS platform. A design captain or engineer can get a real-time view of the location from anywhere in the world, and on any device. This technology also makes sharing data much easier. There’s a misconception that data becomes less secure on the cloud. It turns out the opposite is true. That is if the new cloud environment has been designed with tight security in mind. If the data is kept at a Level 3 Data Center with round the clock monitoring, cybersecurity is on an entirely different level. It’s in a league of its own. One that isn’t possible for on-prem servers or public clouds.

The Coronarvirus Tests Global Readiness for Remote Work
As the threat of a coronavirus pandemic wipes away trillions of market value dollars, the largest mass exodus from the traditional office is underway.
The coronavirus threat pushes the question, “Are we ready to have our employees work from home?” Organizations want to do whatever they can to help contain the spread of the virus.

One of the top healthcare conferences of the year HIMSS canceled at the last minute. Everyone knows why. The canceled HIMSS conference was only the first of a series of conference cancellations this month. How many more conferences are going to be canceled. Only time will tell. A click survey online shows that Google, Intel, FaceBook and Twitter have canceled many of their conference plans. The South by Southwest, or SXSW Conference, has not yet buckled under pressure to cancel.

Andrew Keshner reports in a MarketWatch article that, “As the Coronavirus spreads, companies are increasingly weighing if they should, or even can, have workers do their jobs from home.” The article goes on to announce that Twitter told its 5,000 employees around the world to work from home. The BBC News reports Twitter’s head of human resources Jennifer Christie said, “Our goal is to lower the probability of the spread of the Covid-19 coronavirus for us – and the world around us.” Twitter has been developing ways for employees to work from home. Their mandate moving forward is to enable anyone, anywhere to work at Twitter. Twitter’s began moving to a more mobile workforce before the coronavirus. Now, many companies are taking steps to enable employees to work from home. Asian-based organizations, the ones that could, have already implemented work-from-home options. Several giant multi-national companies such as Citigroup have restricted travel to Asia.

The Best Advice: Plan and Prepare

The media seems to report on the idea that there are only 2 states you can exist in. One is ignorant bliss. The second is a state of panic. There’s a wide territory between those two extremes. People should not panic. They should be aware of what’s going on, have an appropriate level of concern, and respond. People need to consider what’s going on so that they can take action. Managing risk is an important part of life. It’s also an important part of leading a business. Understand the risk. Understand what might happen, and make decisions to keep business moving.

Centers for Disease Control, or CDC, has announced they can’t contain the coronavirus. So that means we’re down to implementing mitigation strategies. This means the CDC is going for non-pharmaceutical interventions (NPIs). This translates to things like closing schools. Mitigating strategies also include preventing people from attending large gatherings. If necessary, issue self-imposed quarantine orders. If self-imposed quarantines don’t work, CDC will issue a contained quarantine order. This means there’s no choice in the matter.

The CDC recommends that companies encourage telework. “For employees who are able to telework, the supervisor should encourage employees to telework instead of coming into the workplace until symptoms are completely resolved. Ensure that you have the information technology and infrastructure needed to support multiple employees who may be able to work from home.” There have been technologies enabling employees to work remotely for some time now. And the interest has grown over the years. It has been a matter of just deciding to offer that flexibility to your employees. Managers have to determine the ratio of working in the office with working at home.  It’s more of a leadership decision rather than any limitation of the technology. But the coronavirus threat will certainly act as a catalyst accelerating the adoption of remote collaboration tools. Most companies will be forced to have their employees stay home.  Microsoft has announced free upgrades. Office 365 users can now make full use of the video conferencing and recording features of Microsoft Teams.

 

Businesses can replace in-person meetings with video and increase networking options. Now is a good time for businesses of all kinds to start preparing. If you don’t have the infrastructure already in place, start planning it. Most organizations are not prepared for wide-spread enablement of remote departments. Many are still evaluating requirements and solutions. Workers can work as effectively at home than in the office. Research indicates employees are even more productive working from their home offices.

Moving to The Cloud Has never Made More Sense Than Now

Cloud technology and remote workspaces enable organizations to be flexible with their staff. It’s also an attractive incentive while recruiting talented employees. Astute business leaders want to be in a better position to offer remote collaboration tools to their employees. They want to establish parameters in which work-from-home culture thrives. Jennifer Howe, VP of SMMA an architectural firm in Boston, and acting president of the ACEC Massachusetts said,” Remote workspaces are invaluable these days. You can’t recruit and retain talent without that kind of flexibility.”

A recent article on the Fortune website calls it the “world’s largest work-from-home experiment.” There are millions of businesses all over the world trying to stay productive amidst this growing crisis. The article goes into detail on the level of upheaval for companies. This is particularly true in Southeast Asian countries. “One of the most unsettling factors for employees is the rapidly-changing impact of the virus. It is prompting daily changes in corporate directives. We’re seeing that kind of impact in the states as more and more cities declare a state of emergency.

 

A giant experiment is underway to see how well new technologies can enable successful mass remote working for employees.

 

Managers worry the exodus from the office will lower productivity. There have been many studies done to support that the exact opposite is true. Productivity doesn’t go down. It goes up. The 2017 Stanford University Research is often quoted. That study found a 13% increase in productivity. A study conducted at the U.S. Patent and Trademark Office showed remote workers had a 4.4% increase in output. The consulting firm Deloitte did a recent survey that found 82% of white-collar workers using flexible work options.

 

Unlike companies that are designed from the start to hire work-from-anywhere employees, traditional in-office companies have to decide how this will work. Management has to set parameters on how remote work happens.
What Does Remote Work Look Like?

Unlike companies that are designed from the start to hire work-from-anywhere employees, traditional in-office companies have to decide how this will work. Management has to set parameters on how remote-work happens. They have to communicate to their employees what the expectations are. How will the team stay in contact with each other throughout the day? What is the level of responsiveness needed? Does your staff need to access robust programs like Autocad, Maya 3D, or Adobe After Effects? If so, then how, on a technical level, is that going to happen? For example, GPU hungry programs will need to be hosted on a virtual server. The work-in-progress files will have to be stored in some central location. This is also something that isn’t accomplished overnight. Now is a good time to start having those discussions.

The worst thing you could do is not do anything. Business leaders shouldn’t ignore the situation as it continues to escalate. Ask yourself, if this continues, would your company be able to operate productively. To what extent will your company be forced to stop its activity altogether?

At some point, we are all going to enter the coronavirus tunnel and make it through to the other side. The collective experience will force us to redefine the way we work. We will consider how we interact with each other. Who operates as a self-starter? Who needs closer supervision?

Alvin Toffler was a writer, businessman, and futurist He envisioned the digital revolution long before it happened and foresaw the remote workforce as an inevitable 21st Century trend.

The idea of remote work is not a new one. It goes back 50 years. Futurist writer Alvin Toffler wrote about remote work in his 1980 book THE THIRD WAVE. “When we suddenly make available technologies that can place a low-cost “work station” in any home, providing it with a “smart” typewriter, perhaps, along with a facsimile machine or computer console and teleconferencing equipment, the possibilities for home work are radically extended.”

Cloud technology enables a home computer…a “low-cost workstation” as Toffler calls it, or any mobile device for that matter. The home computer, smartphone, or tablet essentially serves as a dumb terminal. The processing power actually comes from a virtual desktop. For all practical purposes, it’s just like working from your office. You have access to the same emails, the same software applications, and the exact same files.

Right now, the coronavirus is forcing us to reconsider work-from-home scenarios. Moving personnel to a more comfortable and safer work-from-home environment has its benefits. For some businesses, this means building some kind of infrastructure.

I’d like to close with a question posed near the end of the Forbes article. “If you are an employer and you have the power to offer greater freedom to your workers, should you not being thinking about how to do so?”

 

 

 

Technology’s Impact on Healthcare

Technology is transforming the way healthcare operates. The impact is not on one level but on many.  It is certainly a game-changer for the way communication happens and the way data is stored. Most importantly, it is truly enhancing the patient experience. Technology transforms the way patients are diagnosed and treated. It’s also transforming the way the business side is handled.

The true dynamo behind the great healthcare overhaul is mobile technology. These are the smartphones and tablets carried by doctors and nurses as they move between one location an another. Cloud technology provides on-demand access to any IT resource you can imagine. It also delivers resources previously unavailable. This blog will introduce some of these new resources. Because these resources make use of cloud computing, they can be accessed from any device anywhere on the planet where there’s an Internet connection. The added benefit; again, because it is on the cloud, is the flexibility and versatility of being able to scale up or scale back capacity as needed. Bandwidth is unlimited. Store as much as you want. Gone are the days of being frustrated with your workstation because it is slow.

There are 2 drivers behind this technology. One is to reduce costs. The second is to improve the quality of patient care.

There are more mobile devices than there are people on Earth. Clinicians are connected as never before. This means that medical professionals can immediately tap into, contribute to, and benefit from, a growing pool of global medical knowledge. At the swipe of a finger, a doctor can access the latest research on a given disease, learn about the latest drug, or clinical trial outcomes. They can benefit from the collective experience of colleagues worldwide.

Things are changing from the patient side as well. Patients are becoming increasingly accountable for their own health and well-being. They’re doing their homework on diseases and illnesses. They want access to their own data. In the June 13, 2017, Forbes magazine article How The Cloud is Transforming Healthcare, Khalid Raza writes, “providers must satisfy the demand for instant, top-quality access to healthcare services. Patients – who are accustomed to the 24/7 availability and service from online retailers and financial institutions – expect and even demand such access and services from their healthcare providers. People have become more involved in managing their own healthcare needs, which only complicates matters, and gravitate to the web for diagnosis, information, and treatments.”

Software companies have had the pulse on these industry-wide healthcare trends. These companies have responded with new technologies designed to significantly contribute to the flow of knowledge and the efficiency of future healthcare.  There are now multiple secure messaging technologies available to doctors who want to have a quick informal consultation with a colleague. These tools have many of the same features. For example, all communication is tracked and logged automatically.

Here are a few of the new technologies that are changing the face of medicine. And they’re all being facilitated by cloud computing in one way or another.

 

DIGITAL FLOWS
SPEED UP
DIAGNOSIS, PROGNOSIS & TREATMENTS

There are still thick heavy reference books collected throughout doctor’s offices and nursing stations. These mammoth books are collecting a lot of dust now. The reference books have probably been forgotten or left where they were simply for reasons of interior design. Now if a nurse or doctor needs a quick reference, they pull out their smartphone. Mobile apps enable clinicians to quickly dial into any information needed about drug interactions or complications associated with a particular condition.

 

The Med360 Mobile App

Med360 is a program that automatically collects every new publication matching your interests. It collects data from thousands of traditional open access journals and funnels it into your personal stream. A doctor has only to call up the app on his or her smartphone, do a quick scan of the screen, and know exactly what’s going on with the patient’s medication history-taking and reconciliation. Pharmacy pickups, dosage changes, and re-fills are presented in a clear interface on the clinician’s mobile device.

 

 

 

 

 

VAST AMOUNTS OF DATA

The February 2019 article in Nature Medicine reported on a program that used patient information such as symptoms, history, and lab results to diagnose common childhood diseases. According to the article, the system was given data on nearly 600,000 patients at a pediatric hospital in China. The results produced by the system were highly accurate.

In another February 2019 article, Cade Metz reported that Google is developing and testing systems that analyze electronic health records in an effort to flag medical conditions such as osteoporosis or diabetes. Similar technologies are being developed to detect signs of illness and disease just based on X-rays, M.R.I.s and retina scans. The main thing these innovations have in common is their reliance on neural networks. This is a breed of artificial intelligence that learns tasks largely on its own by analyzing vast amounts of data.

Computers can be programmed to recognize patterns amongst vast amounts of data. These patterns can be linked to specific conditions. These are patterns that would be difficult, if not impossible, for a person to notice. Huge amounts of data from medical imaging are fed into artificial neural networks. The program follows an algorithm. The computer then proceeds to learn on the job so to speak. The more data it receives, the better it becomes at interpreting the data.

This learning process is already being used in many applications. Computers learn to understand speech and identify objects this way. Self-driving cars can recognize stop signs. It can tell the difference between a pedestrian and a telephone pole.  Google has created a program to help pathologists read microscope slides to diagnose things like cancer.

 

Mobile devices are the key to tapping into knowledge flow streams.

KNOWLEDGE ACCESS

ON

ANY DEVICE ANYWHERE

The fact that everything is accessible on any device anywhere means patients can get medical help at the hospital, at the ambulatory center, and in the comfort of their own home. In the past, if you wanted to see the doctor, you’d physically have to travel to where the doctor practiced medicine and visit the doctor’s office or go to the emergency room.

Now, much of that care can appropriately be pushed into the patient’s home.

 

Telehealth is the distribution of health-related services and information via electronic information and telecommunication technologies. It allows long-distance patient and clinician contact, care, advice, reminders, education, intervention, monitoring, and remote admissions

Hospital at Home, a program at Mount Sinai, enables video visits. You can check-in, access monitoring tools, and input your vital statistics. Patients can do things like check their pulse, blood pressure, or weight. The information can then be sent to the patient’s care team for review and response.

In a May 10, 2019, Harvard Business Review article, Albert Siu and Linda V. DeCherrie report that “research has shown varying but clearly positive impacts on mortality, clinical outcomes, readmission rates, and cost. A 2012 meta-analysis of 61 randomized, controlled trials, for instance, found that the hospital-at-home patients had a 19% lower six-month mortality rate compared to hospitalized patients. Our research finds that patients who receive hospital-at-home care have fewer complications and readmissions; they also rate their health care experience more highly.”

Bruce Darrow, MD, Ph.D. and Chief Medical Information Officer at Mount Sinai in New York.

Bruce Darrow, M.D., Ph.D., cardiologist and Chief Medical Information Officer for Mount Sinai Health Systems says, “It’s empowering for the patient and it’s good for the clinicians too. The technology allows doctors to let the patients do the jobs they would want to do themselves.  Artificial Intelligence is going to be essential to healthcare. When we think about doing the work with patients at growing population levels effectively, A.I. technology is going to play an important role. If I’m a primary care doctor who is taking care of 2,500 patients, only 20 or 30 of those patients will come into my office on any given day. At the same time, there may be several at home who are at risk. Rather than combing through the entire list of 2,500 patients, if I have tools to look at the prior history of the patient along with their current vital signs, I can determine who I need to see first.”

 

Medical record systems are notorious for not communicating with one another.

Darrow goes on to say, “Electronic medical records have been challenging to connect to one another because of the way they were born. The original idea was not to generate a national patient identity that would allow the same patient to be identified as such from one system to another. There was no original standard for what the medical records would do and how they would interoperate with each other.

The government and the healthcare industry have recognized the problem. That’s where the work of the next few years will be. We’re making progress. At this point, I have patients who come to see me in the office. I can pull their information from a number of systems throughout  the New York area as well as nationwide.”

Telehealth

Telemedicine is the practice of caring for patients remotely when the provider and patient are not physically present with each other. This HIPPA compliant video technology enables clinicians to consult with their patients effectively. Patients can follow-up with their doctor through a video visit instead of making the trip to the hospital or clinician’s office. Patients can get an on-demand video visit with emergency trained doctors. A doctor can have virtual communication with a specialist. Or a stroke specialist can be transported in to participate in the care of an emergency room patient. All of these things are possible today.

 

Ransomware Targets Healthcare
The Healthcare Ransomware Epidemic: How to Protect Your Patients
The Problem is Becoming a Crisis

Data breaches are happening at an alarming rate. In fact, the threat of ransomware attacks has become elevated to crisis levels. While there’s increased awareness, attacks are becoming more sophisticated. A variety of large and small organizations are being attacked. No one is immune. The healthcare industry has been and continues to be, prime targets. And for good reason. Healthcare organizations are considered low-hanging fruit by cybercriminals. Hackers know healthcare centers are notorious for having inefficient security. Most hospitals don’t have procedures in place to restore a network once locked by ransomware. Most applications in Hospitals have little or no network segmentation. There are no firewalls between workloads. Basic security protocols are not in place.

Besides the alarming ransomware statistics, there are some attacks that never get reported. The U.S. Department of Health and Human Services experienced 52 data breaches in October. Last year, hackers stole over 38 million medical records. These sobering statistics have made the healthcare industry take notice. Many healthcare organizations are taking steps to increase cybersecurity. But more can be done. This article will take a look at some of the more recent ransomware cases. We’ll look at some mistakes that were made in dealing with cyberattacks. And we’ll offer ways to improve cybersecurity and protect patient data moving forward.

The consequences of a data breach reach far beyond the breaking news story. There’s more to it than the short news article that appears on your computer screen. A single attack can close down an organization for good. It can happen in a few minutes. The consequences can have long-lasting implications. This is particularly true for the healthcare industry. Sure, the reputation of the healthcare center gets flushed down the toilet, but there’s a real impact on the patients. These incidences are not merely expensive inconveniences. Cyberattacks disrupt the entire eco-system of the institution. It puts people’s health, safety, and lives at risk.

 

Healthcare Worker Distressed by Ransomware Locking up IT systems
Security breaches will cost healthcare organizations $6,000,000,000 this year.

 

Often, the healthcare center gets victimized twice. First, there is a ransomware attack. Second, the healthcare system becomes the target of a class-action lawsuit from a community of angry patients and their families.

Consider the New Scientist article about the 2016 attack on the Hollywood Presbyterian Medical Center. It was a Friday afternoon when malware infected the institution’s computers. The attack seized patient data and prevented the staff from further communication. The date was February 5. The same day computer hackers tried to steal 1 billion from the Federal Reserve Bank of New York. It all happened in a matter of seconds. Medical records had to be kept by using pen and paper. They used old fax machines. Patients were sent to other hospitals, operations canceled. The medical center was back on-line after a 2-week standoff. But not until after paying a ransom of 50 bitcoins (the equivalent of $17,000 at the time).

Malware can infect the entire computer system. Someone clicks on a link to a booby-trapped website or opens an attachment in a phishing email. Immediately, malicious malware gets to work encrypting the files. Some malware can immobilize entire IT infrastructures. If data is backed up and you get an attack of malware or something, you can always go back to yesterday’s data.
Healthcare targets often have their backs against the wall during a cyberattack. Because they don’t have their files backed up.

In most cases, a ransom is paid. The hackers deliver the decryption key. And medical centers are able to decrypt the seized files. The Hollywood Presbyterian Medical Center was straight forward. They handled the crisis as best they could. See the above comments about using pen and paper. They negotiated a lower ransom and their data was returned. More recent victims haven’t been so lucky.

Medical malpractice has been part of the healthcare landscape since the 1960s. Now there is an additional risk of medical malpractice during ransomware attacks. If the ransomware attack affects the patient in any way, there will be repercussions.

Doctor Using Tablet
While only a few healthcare systems have policies around using mobile devices, there is a growing movement to regulate such devices.

Take the cyberattack on LifeBridge Health systems. Seven months after the incident, the Baltimore-based health system faced another problem. A class-action lawsuit was filed against them. The lawsuit claimed negligence on the part of the medical center. It also accused LifeBridge of waiting 2 months before informing the affected patients.

LifeBridge had to respond to the allegations. The organization contracted a national computer forensic team to investigate the attack. Patients were offered credit monitoring and identity protection services.

Clearly there are basic mistakes made that contribute to breaches. Mistakes can allow the infiltration to happen in the first place. Resolving a ransomware situation is stressful. People can do things that t make the situation worse.

Ransomware Recovery Mistakes

Health Management Concepts in Florida was attacked with ransomware. The official report was made on August 23. HMC learned about the incident on July 16. The ransom was paid. The attackers delivered the decryption keys. The hospital IT administration immediately took steps to decrypt the data. To their horror, the HMC staff realized they made the problem worse. They accidentally sent files containing patient information to the hackers.

UnityPoint Healthcare had the misfortune of suffering two security breaches in 2018. The second attack compromised the data of 1.4 million patients. At least, that’s the official tally. A series of phishing emails had been made to look like they were from a top executive within the company. An employee fell for the scam. It gave hackers the opportunity needed to penetrate the entire system.

The protection of healthcare assets is not just a matter of protecting patient information but protecting the patients themselves.
Recognizing the Risk is the First Step Toward Protecting Patient Information

The onslaught of cyberattacks against healthcare is relentless. There are inspiring stories of medical centers fighting back. They’re defending themselves against nefarious cyberattacks. They’re saving lots of money. Increasing their efficiency. And better protecting their patients.

One such story belongs to the Interfaith Medical Center of Brooklyn, New York. It’s a 287-bed non-profit teaching hospital that treats more than 250,000 patients every year. They were able to avoid malware outbreaks. Their proactive approach enabled them to detect and respond immediately to advancing threats. Their strategy involved an assessment of threats and implementation of policies and procedures.

Incident response time is critical. Measure it with a stopwatch, not a calendar. All the segmentation in the world isn’t any good if the door won’t be closed in time. Their program was successful. It identified malware infections long before they had a chance to become a problem. They were even able to identify a malware-infected medical device after it came back from a repair vendor.

The Interfaith Medical Center anticipated a ransomware attack and took steps to prepare for it. In a September 3, 2019, Healthcare IT News article, we learn how Christopher Frenz – the VP of Information Security protected the non-profit’s IT system. “One of the ways I approached this was simulating a mass malware outbreak within the hospital, using a custom-developed script and the EICAR test string. Running the script attempted to copy and execute the EICAR test string on each PC within the organization to simulate the lateral movement of a threat within the hospital. Exercises like these are great because they help an organization identify what security controls are effective, which controls are ineffective or in need of improvement, how well or not the staff response to an incident will be, and if there are any deficiencies in the organization’s incident response plan,” he explained.

Christopher Frenz, Interfaith Medical Center's VP of Information Security
Christopher Frenz, VP or Information Security at Interfaith Medical Center, led the charge with his zero trust architecture that protected the network from cyberattacks and saved the healthcare system millions of dollars.
“We have successfully avoided malware outbreaks and are actively detecting and responding to advanced threats, long before they impact privacy or operations.”

Christopher Frenz, Interfaith Medical Center

 

The article ends with some excellent advice from Frenz. “Healthcare needs to begin to focus on more than just compliance alone, as it is far too easy to achieve a state where an organization meets compliance requirements but is still woefully insecure. Organizations need to put their security to the test. Pick solutions that can empirically be shown to improve their security posture.”

 

There are basic steps healthcare organizations can take to minimize their risk of ransomware attacks. Learn as much as you can about ransomware attacks. Consider all possible points of entry. Where is your IT system vulnerable? Medical software used for patient data has numerous vulnerabilities. Healthcare cybersecurity statistics by Kaspersky Security Bulletin found easy access to 1500 devices used by healthcare professionals to process patient images such as X-rays.

 

Improving the cybersecurity of a healthcare organization, whether large or small, has two parts. One part has to do with the design and implementation of the IT system entire (i.e. whether-or-not there’s back-up and disaster recovery features in place). The other part has to do with your human capital.

 

Malware can be introduced from any number of locations along with your network. Often the attack is designed with multiple points of entry. It could be phishing emails where an employee is tricked into clicking on something that is booby-trapped. It could be a bogus email from what looks like an upper-level executive but is actually from a hacker.

 

ON-GOING EDUCATION AND REFRESHER COURSES
Healthcare Employees Being Educated on Cyber Security Procedures
Healthcare employees should have regular and comprehensive cyber threat education. This enables them to avoid falling into traps that can trigger ransomware. It also serves to establish a strong security culture.

Human beings make mistakes. This is especially true in the busy high-stress environments of hospitals. Or in situations where doctors, nurses, and orderlies work extended 10 to 12-hour shifts. People have to be educated about the risks of cyberattacks and what forms such attacks might take. It’s easy for a rushed employee, at the tail-end of their shift, to unknowingly click a file, download an unauthorized software, or be tricked into loading a contaminated thumb drive. There are basic security processes that should be implemented. These are things like creating strong passwords and changing them at regular intervals. Duel factor protection is also a good idea.

Cybercrooks study the vulnerability of humans. Hackers continually figure out ways to exploit human traits and their gullibility. Through social engineering tactics, cyber attackers design pathways to plant ransomware or get a foothold in an information system.

 

SECURITY IS NOT ABOUT QUICK FIXES

Take the time to ensure the staff and vendors are mindful of what they’re doing. Review policies and procedures regarding handling patient data. Review how to avoid security incidences. As we have seen, any data breach has legal ramifications. There needs to be a systematic response that is carefully considered and forged into a process. Additionally, partner with the right vendor who can design and provide a holistic security solution that will protect your patients.

What is the Cloud?

How many of us really know what the cloud is? Oh sure, we know that the cloud involves storing and accessing stuff via the Internet, but do we understand the powerful transformational nature of cloud computing technology. Do we appreciate how it has changed and continues to change, the way we live and work?

Not that long ago if you mentioned the cloud, most people thought you were talking about the weather. As recently as 2012, Wakefield Research discovered that 51% of the people surveyed, most of whom were Millennials, thought that storm conditions could interfere with cloud computing. Later that same year, Business Insider reported only 16% understood the cloud to be a network of Internet-connected devices to store, access, and share data. So if you don’t know that much about the cloud, don’t feel bad. You’re not alone.

Most people, if they think of the cloud at all, know it simply as a place to keep iTunes, archive our favorite movies, or family pictures and videos. Consumers know the cloud as a storage service offered by Apple. Our knowledge of iCloud is usually associated with the company’s invitation to add more space. Then there’s Netflix. Millions of people access feature-length movie titles stored and delivered on-demand via cloud technology. Do you store and share large files via DropBox? Does your office use Microsoft Office 365?

This article won’t be describing the cloud per se. Nor will it attempt to explain the various types and configurations of clouds. But rather a high overview of how cloud technology transforms companies and whole industries. It will explore the way cloud technology changes the way we work with each other all over the world. Technology growth is accelerating at multiplying rates. This acceleration is due to all the technologies blending together into the cloud.

 

The Supernova
The Cloud is a Supernova

 

We use a soft fluffy metaphor like the cloud, but “the cloud” paints a misleading picture in our minds. The Pulitzer Prize-winning writer Thomas L. Friedman, in his book, THANK YOU FOR BEING LATE, prefers to call the cloud “the supernova.” A term originated by Mircosoft computer designer Craig Mundie. Why refer to it as “the supernova” and not “the cloud.” In the world of astronomy, a supernova is the explosion of a star. It’s a huge astrological event; in fact, the largest explosion that takes place in space.

So too, the cloud is an incredible release of energy. The energy reshapes every man-made system that our society has built. And now, every single person on the planet who can access the Internet can tap into its power. The only difference, Mundie points out, is that a star’s supernova only happens once. The computer supernova keeps releasing energy at an accelerating rate. It’s interesting to note that the components that make up the cloud continue to drive down in cost. The cost goes down while performance keeps going up.

Just as the discovery of fire was a game-changer back in the Stone Age, and Electricity lit the way from one century to the next in the late 19th Century, the cloud has fundamentally changed the modern world. There are more mobile devices on the planet than there are people. Soon everyone on the planet will be connected.

Go with the Flow

The cloud has large amounts of digital information moving in every direction. The information travels up and down. The white-water rapid current moves fast and with equal energy. You have to learn to go with the flow if you’re going to thrive. Like maintaining constant homeostasis, you have to go with the flow to keep your balance. You’ll be better equipped to look ahead, predict trends, and respond to the ever-changing market.

The Flow of Knowledge Stocks

In the past, the traditional idea was to go to college. Get an education. Find a job where you can apply that education. Show up. Do the work and you’d be fine. You’d be set for life. The focus was on one person having a stock of knowledge. Today, the focus has shifted to the flow of knowledge. As pointed out in the 2009 Harvard Business Review article “Abandon Stocks, Embrace Flows,” it’s no longer about having knowledge.

As the world accelerates knowledge tends to become outdated at a faster rate. The premium shifts to a focus on updating knowledge. Choice marketable characteristics will be a high level of curiosity, and staying in touch and maintaining the pulse on the latest advancements. As the world accelerates, stocks of knowledge depreciate at a faster rate. This is true for items you buy as well. Notice how quickly product life cycles have compressed. Even the most successful products fall by the wayside quicker than before. We have to continually learn by participating in relevant flows of new knowledge. And it’s not just a matter of diving into the flow when we feel like it. Participation and benefiting from this flow of knowledge requires that we must also contribute to it on an on-going basis.

This is the world of the cloud. This is where workspaces connect globally. Ideas and knowledge are exchanged freely. The so-called little guy can compete with the big guy. In the March 2016 study “Digital Globalization: The New Era of Global Flows” by the McKinsey Global Institute, we see in great detail how the world is more interconnected than ever.

Many enterprise companies are taking advantage of this interconnectivity. They’re leveraging the technology in order to take advantage of the knowledge flows moving around the planet. For example, Friedman describes in his book THANK YOU FOR BEING LATE, how General Electric supplements its internal resources of engineers to run global contests to see who can come up with the best design solutions. One such contest received 697 entries from companies and individuals all over the world.

It’s All About Interconnectivity

This interconnectivity is expanding “instantaneous exchanges of virtual goods.” The cloud enables digitized financial flows to happen at unfathomable rates. The science journal Nature published “Physics in Finance: Trading at the Speed of Light.” It presents an industry driven by ever-increasing speed and complexity. The article reports that more than 100,000 trades occur in less than a second. That’s for a single customer.

High-frequency trading relies on several things. It needs fast computer algorithms for deciding what and when to buy and sel. Live feeds of financial data are needed. And high-frequency trading also requires about $15,000 a month to rent fast links.

Moving faster also increases the likelihood of mistakes. In 2012, a flaw in the algorithms of KNIGHT CAPITAL – one of the largest U.S. high-frequency firms, caused a loss of $440 million in 45 minutes. The algorithm accidentally bought at a higher price than it sold.

Data speedbumps act like traffic cops slowing down the flow of traffic.

Some trading firms established a way to keep the traffic from moving too fast. They introduced a kind of digital speed bump. Slowing down the flows of digital traffic by 350 microseconds. Apparently this was all time traders needed to benefit from faster feeds. The inclusion of a speed bump, all 350 microseconds worth, meant we’ve already surpassed the optimal speed for trading.

Speed & Complexity Are Free

Because information moves much faster now, global markets become more interdependent on each other. Remember when China made some financial missteps in 2015. It caused a ripple effect that stretched across the planet. Americans felt it immediately. On August 26, 2015, CNN.com reported:

“The American stock market has surrendered a stunning $2.1 trillion of value in just the last 6 days of market chaos. The enormous losses reflect deep fears gripping markets about how the world economy will fare amid a deepening economic downturn in China. The Dow, S&P 500, and Nasdaq have all tumbled into correction territory. It is their first 10% decline from a recent high since 2011. The dramatic retreat on Wall Street has been fueled by serious concerns about the fallout of China’s economic slowdown.”

PayPal has become one of the most important drivers of digital finance. The company set out to democratize financial services by enabling every citizen to move and manage money. The explosion of smartphones gave users all the power of a bank branch at their fingertips. The incremental cost of adding a customer is nearly zero. What is common-place for Americans to do, send money to someone, pay a bill, or get a loan, was now simple, easy, and nearly free for 3 billion people around the world. These were the people who would have to stand in hours to change their currency and stand in another line for hours to pay a bill. PayPal doesn’t rely on FICO scores the way a traditional bank or credit card company does. Instead, they use their own big data analytics based on your actual transaction activity on their site. This gives them a more accurate picture of your creditworthiness. The result: instant loans to more people around the world with a higher rate of payback. PayPal is one of the companies eliminating the need for cash. PayPal is also experimenting with “blockchain” for validating and relaying global transactions through multiple computers.

Cloud technology has brought with it a period of adjustment. We need time to absorb, learn, and get used to the idea of working differently. The cloud will make economies measurably more productive. Because of it Individuals, groups, and organizations are now on a level playing field. These individuals, groups, and organizations can shape the world around them in unprecedented ways. And they can do it with less effort.

Leverage & Synergy

There has never been a better time to become a maker, an inventor, a start-upper or an innovator. It’s leverage and synergy in action as never before.

Leveraging Technology

 

Consider some of these examples:

Uber

The world’s largest taxi company owns no taxis

FaceBook

The most popular media owner creates no media

Alibaba

The world’s most valuable retailer has no inventory

Airbnb

The largest accommodation provider owns no real estate

THE DOUBLE-EDGED SWORD

Technology has always been an amplifier of the best and worst of humanity. It tends to magnify our psychological and spiritual condition both good and bad. Cloud technology is a double-edged sword. On one hand, it empowers the individual, groups, and organizations as never before. Companies communicate faster and more fluidly. Small boutique shops can become multi-national enterprises in a short amount of time. More brains are connected globally. The smallest voices can be heard everywhere for the first time.

Alternately, technology can be used to belittle and disempower. Just as the cloud enables builders and makers, it also gives power to breakers. One person can do more damage more cheaply and more easily. Take Navinder Singh Sarao for example. Sarao, operating from one computer on a network connection out of his parent’s house in West London, single-handedly manipulated the U.S. Stock Market into losing a trillion dollars in less than a half-hour. He “spoofed” the Chicago Mercantile Exchange into setting off a terrible chain reaction. Spoofing is an illegal technique of flooding the market with bogus buy and sell orders so that other traders, both human and machine, are fooled into helping the perpetrator buy low or sell high. He had developed his algorithms to alter how his orders would be perceived by other computers.

Big forces can come out of nowhere and crush your business. You’ll never see them coming. The mobile broadband-supernova is a double-edged sword. How it’s used depends on the values and tools we want to put into place.

WE BECOME WHAT WE BEHOLD
We shape our tools and then our tools shape us.

In summation, the cloud, our technological broadband-supernova, is here to stay. It won’t be the same cloud a few months from now, but it’s here to stay. And things will continue to accelerate. It’s going to be difficult for many to keep up. Keeping up may be one of the great challenges facing society in the decades to come.

In answering the question, “Why is the world changing so fast?” Dr. Eric C. Leuthardt states in his “Brains and Machines” blog:

The reason for accelerating change is similar to why networked computers are so powerful. The more processing cores you add, the faster any given function occurs. Similarly, the more integrated that humans are able to exchange ideas the more rapidly they’ll be able to accomplish novel insights.

Different from Moore’s Law, which involves the compiling of logic units to perform more rapid analytic functions, increased communication is the compiling of creative units (i.e. humans) to perform every more creative task.

A great primer for anyone interested in understanding the transformational power of cloud technology is Thomas L. Freidman’s 2016 book THANK YOU FOR BEING LATE: AN OPTIMIST’S GUIDE TO THRIVING IN THE AGE OF ACCELERATIONS.