This article started with a random stream of thoughts which finally made some sense. This article is divided into 3 parts: Technology. Economics. Motivation. Each of these talks about a few topics of interest and seeks to add some words and ideas into your jargon so you can have a though-provoking “Day 1” of this year.
Snapshot of what this section has to say about the…
- Increasing investments and belief in the potential of integrated technologies such as the Internet of Things. (This article highlights SoftBank’s Acquisition of ARM)
- Potential problems with authentication / encryption of data from multiple IoT devices and the adoption of protocols to help minimise the risk (This article highlights Single Sign On and Kerberos)
- Promise of unprecedented security through concepts of Quantum Cryptography and the inferences from the No-Cloning Theorem
1. SoftBank’s Acquisition of ARM
The Advanced RISC Machine / Acorn RISC ARM is a world-renowned chip architecture development company whose architecture helps in rendering processors more cost-effective, reducing power consumption and ensuring effective heat dissipation, making it most suitable for smartphones, tablets, laptops and various such devices. With over 100 billion ARM processors produced as of 2017, ARM is the most widely used instruction set architecture and the instruction set architecture produced in the largest quantity.
ARM was acquired by SoftBank in 2016 for $32 Billion, and the “Why” behind this is truly interesting and is rooted on the idea that IoT will spread / explode as much as smartphones and tablets, and in addition to being the best “architecture designer” currently, ARM has the potential to disrupt the whole IoT space, making SoftBank invest heavily in ARM. Read the article below for more.
2. Single Sign On and Kerberos
SSO is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications. The service authenticates the end user for all the applications the user has been given rights to and eliminates further prompts when the user switches applications during the same session. On the back end, SSO is helpful for logging user activities as well as monitoring user accounts.
Of course the security issues of the entire array of data being compromised if the SSO credentials are compromised exists, however this problem can be avoided by proper coupling with identity governance, authentication (shared secret) and protocols such as Kerberos, which is used to authenticate service requests between trusted hosts across an untrusted network.
The video below talks about how Kerberos works, do give it a watch to appreciate the “simplicity in complexity”
3. Quantum Cryptography and No-Cloning Theorem
Cryptography is a truly interesting field and has been, throughout history, used in sending the simplest of messages between siblings, classmates, best of friends to even secrets involving national security. Cryptography essentially involves encrypting a secret message (making it really secret and available for access to one the intended parties) and decrypting it. However, with the advancement in technology and the computational power of computers, figuring out / intercepting a message and trying numerous combinations to crack the code takes but a few hours at max, (or seconds, according to a few TV shows, if you were so inclined to them), giving rise to the validity and necessity of Quantum Cryptography, One-way Functions and so on. Click here to have a look into what No-Cloning Theorem States and reinforces the power of Quantum Cryptography.
What is Quantum Cryptography?
Will Quantum Computers break Encryption?
As we advance on the technology front exponentially, with investments reaching the skies, there are millions who are increasingly unemployable. Though technology breaks barriers and build bridges, technology hasn’t been yet seen as a “creator of jobs” or taking link from my previous article – “a regulator”, or any construct that looks at an “impact” angle (on a large scale). I was looking into the relationship between unemployment and the economic growth of a nation, and I came across Okun’s law, Misry Index and so on. Here is something to get you start, and hopefully trigger you to find out more.
Okun’s Law and Misery Index
Okun’s law pertains to the relationship between the U.S. economy’s unemployment rate and its GNP / GDP. It states that when unemployment falls by 1%, GNP rises by 3%. However, the law only holds true for the U.S. economy and only applies when the unemployment rate is between 3% and 7.5%.
Misery Index helps determine how the average citizen is doing economically and it is calculated by adding the seasonally adjusted unemployment rate and inflation rate. Various economists like Robert Barro and Steve Hanke have added elements of interest rate, percentage GDP surplus / shortfall between actual and trend rate and so on to help better integrate elements of employment, inflation, GDP among others and aid concerned stakeholders in making macroeconomic decisions.
If you are interested to know more, click here.
However, it is my personal view that the relationship between unemployment rates and GDP wouldn’t be so clearly relatable with technology replacing / displacing jobs, world growing more connected and skills required to be employable growing ever so difficult. With increasing threat of being people unemployable as opposed to unemployment, how then will governments, policy makes, corporation and other entities ensure that unemployment rate is kept in check? That’s a question you can ponder on and I can probably write about another day.
Sometimes, what sounds good might be too good to be true, and what sounds too good to be true becomes the truth. All my articles have an inherent theme – “Embracing technology growth on one hand, while trying to emphasise that it isn’t sufficient on the Impact Front”. Here are 2 examples to substantiate it.
From 1976 to 2003, we had a commercial supersonic passenger plane, which literally broke the barriers of technology and engineering, and soared higher than any other, only to soon face the forces that brought it down to the bottom.
In 2001, in India, a group of chainsnatchers snatched a woman’s chain and threw her out of a moving train, and no one on the train did anything to stop that from happening. She hit another passing train, fell on the tracks. The train ran over her legs, having one of them totally severed and the other severely broken.
However, in less than 2 years after, out of her sheer confidence, will power and inner drive, she reached the summit of Mount Everest at 8848ft, and proved that even when all odds are against you and the possibilities of success look bleak, you can reach the top.