THE SECURE TECHNOLOGY ALLIANCE PUSHES for DIGITAL DRIVER's LICENSES Page 6 (Feature Story)

Total Page:16

File Type:pdf, Size:1020Kb

THE SECURE TECHNOLOGY ALLIANCE PUSHES for DIGITAL DRIVER's LICENSES Page 6 (Feature Story) FEBRUARY 2020 THE SECURE TECHNOLOGY ALLIANCE PUSHES FOR DIGITAL DRIVER'S LICENSES Page 6 (Feature Story) Americans are more optimistic about biometrics than Europeans 09 Page 9 (News and Trends) Fake social media profiles are wreaking havoc when left unchecked 14 Page 14 (Deep Dive) © 2020 PYMNTS.com All Rights Reserved WHAT'S INSIDE A look at various governments’ initiatives to 03 launch digital identity programs, as well as the obstacles certain countries — including the United States — face when rolling them out FEATURE STORY An interview with Randy Vanderhoof, executive 06 director of the Secure Technology Alliance, on the advantages of digital driver’s licenses and why a federal-level body may be necessary for nationwide acceptance NEWS AND TRENDS METHODOLOGY The latest headlines from the digital ID space, Who’s on top and how they got there, including 09 including digital identity authentication 16 three sets of top provider rankings milestones in Australia as well as SmartMetric’s and Neustar’s new solutions DEEP DIVE SCORECARD An in-depth examination of the fake profiles The results are in – see the highest-ranked 14 that account for 25 percent of all social media 17 companies in a provider directory featuring logins, and the billions of dollars in damage more than 200 major digital identity players they can do if left unchecked ABOUT 90 Information about PYMNTS.com and Jumio ACKNOWLEDGMENT The Digital Identity Tracker® is done in collaboration with Jumio, and PYMNTS is grateful for the company’s support and insight. PYMNTS.com retains full editorial control over the following findings, methodology and data analysis. WHAT'S INSIDE The spread of biometric verification solutions, such as Around the digital ID world fingerprint and facial recognition technologies, is help- Credit card owners have glowing impressions of bio- ing to boost digital identity adoption around the globe. metrics, with a recent Visa study finding that two-thirds Approximately 96 million facial recognition-equipped of surveyed cardholders preferred biometric authen- mobile devices were in circulation as of 2019 — a num- tication to passwords when conducting banking ber that is expected to skyrocket to 800 million by 2024. transactions. It also found that more than half of re- Fingerprint-scanning smartphones will likely eclipse spondents would switch banks if they were not offered this number, reaching 4.6 billion mobile phones during such functionalities. Respondents had various reasons the same period. for their approval, with 42 percent enjoying not having Most digital identity measures are associated with cor- to remember passwords and 34 percent feeling that porations, but some countries are also leveraging such biometric tools offered improved security over pass- solutions. Australia has been making headlines for sev- words. The 2019 Verizon Data Breach Investigations eral months thanks to its ongoing digital ID initiatives, Report backs up these findings, stating that 80 per- while Argentina, Morocco and Ukraine are partnering cent of data breaches can be traced to compromised or with third parties to launch related pilot programs. weak passwords. The United States lacks a central ID-issuing body to fol- Santander México is aware of the growing demand for low suit, but many states are picking up the slack with biometric verification measures and is thus instituting their own digital driver’s license (DDL) programs. Such such options at its branch locations. The financial insti- programs are in various stages of implementation and tution (FI) has been collecting customers’ fingerprints development in 12 states, with Colorado and Louisiana’s and facial data since February 2019, and it has installed offerings considered to be the most mature. These ini- 9,900 biometric scanning stations at its branches. tiatives still face certain issues — such as not working Santander México plans to enroll 3.7 million customers across state lines — but private organizations are push- and invest approximately 1 billion pesos ($53 million ing for solutions to overcome these challenges. USD) in the program. Biometric tools and other digital identity solutions will Technology provider SmartMetric is also improving its see massive growth in the coming years, meaning gov- biometric offerings, integrating them directly into cred- ernmental bodies will need quick resolutions to these it and debit cards that will be offered at 500 banks by potential issues. The best government is an extension the end of 2020. The biometric cards will feature built-in of its residents' wills, after all, and many citizens appear fingerprint scanners that will prevent unauthorized us- on board with digital identity adoption. ers from making purchases and a miniature battery that © 2020 PYMNTS.com All Rights Reserved 3 WHAT’S INSIDE can be recharged at ATMs, contactless card readers and point-of-sale (POS) systems and runs for more than nine years. For more on these stories and other digital ID de- velopments, read the Tracker’s News and Trends section (p. 9). Why DDLs are the authentication method of the future The U.S. currently relies on state-issued driver’s licens- es to fulfill its identity verification needs, but many states, including Colorado, Louisiana and Maryland, are working to digitize these offerings for improved acces- sibility and security. There are still obstacles that must be overcome before DDLs can be accepted nationwide, however. For this month’s Feature Story (p. 6), PYMNTS spoke with Randy Vanderhoof, executive director of the Secure Technology Alliance, about the accessibility, pri- vacy and security advantages DDLs bring to the table, as well as the challenges of implementing them without a federal-level agency to ensure compatibility across state lines. Deep Dive: How fake profiles endanger social media Social media has become a cornerstone of everyday life, with Facebook, Twitter and YouTube boasting a collective 2.77 billion users. Up to 25 percent of these users are fake, however, made up of simple artificial intelligence (AI) algorithms that account for as much as 75 percent of all social media cyberattacks. This month’s Deep Dive (p. 14) explores the ways these ille- gitimate accounts can damage both websites and their users, as well as how providers can up their authentica- tion games to weed out fraudsters. © 2020 PYMNTS.com All Rights Reserved 4 WHAT’S INSIDE WHAT’S INSIDE Share of Americans excited about 48.1% using biometrics at retail stores Portion of customers who prefer biometrics to 34% passwords because of improved security Number of New South Wales, Australia, Five Fast Facts 1M citizens using DDLs Expected number of 500k companies the CCPA will affect Portion of social media accounts 25% that are fake © 2020 PYMNTS.com All Rights Reserved 5 FEATURE STORY FEATURE © 2020 PYMNTS.com All Rights Reserved 6 FEATURE STORY The Secure Technology Alliance Pushes For Digital Driver's Licenses DDLs are gaining popularity in the U.S., where 12 states Privacy, security and constant updates are working to develop and implement them. Many non- DDLs offer a range of benefits that their plastic coun- governmental groups and organizations are working to terparts do not, including improved security and user make them ubiquitous across the country, including the privacy. Vanderhoof noted that there are many miscon- Secure Technology Alliance (STA), a nonprofit indus- ceptions about what forms they could take, however. try association dedicated to developing and improving “It’s important to understand that DDLs are not meant security technologies for a variety of businesses. The to replace the physical plastic card,” he explained. “It’s alliance recently embarked on a nationwide initiative a complement to the card that can be used in situations to promote DDLs, which it believes will improve priva- that warrant more security, privacy, safety and a digital cy and security. audit trail.” “State driver’s licenses are the de facto national ID of Improved security is one of DDLs’ primary attractions. the United States, and yet they can only be effectively Traditional plastic cards are vulnerable to theft, where- used for a limited number of face-to-face applications,” as mobile phones’ security features protect DDLs. said Randy Vanderhoof, the STA’s executive director. Smartphones’ built-in fingerprint or facial recognition “People already trust state-issued identity [cards], so requirements would thwart thieves looking to gain ac- having that state-issued identity … be digital, so that it cess to digital IDs. can be used for transactions [that are not done in per- son], is a huge opportunity in the market.” “Nothing new really needs to be invented to do that, but providers like Apple, Google and Samsung are making PYMNTS recently spoke with Vanderhoof about the improvements to their operating systems specifically advantages of DDLs compared to those of traditional to support these types of mobile identity credentials,” plastic cards, as well as the challenges that make many Vanderhoof said. states reluctant to issue them. © 2020 PYMNTS.com All Rights Reserved 7 FEATURE STORY Another advantage is privacy. Clerks and workers who developing them. Convincing the other 38 states may re- check plastic IDs can see all of the details on them, in- quire overcoming some of the system’s flaws, however. cluding cardholders’ full names, addresses and even their organ donor statuses. DDLs can be designed so 50 states bring 50 different challenges they display only the information necessary, such as The single biggest challenge facing DDLs’ U.S. imple- birth dates when verifying customers looking to pur- mentation is the country’s federated nature, according chase age-restricted items. to Vanderhoof. Each of the 50 states could have a differ- ent method of issuing and authenticating DDLs, which “If [users are] in a situation where they’re looking just would be problematic for those who often travel be- for age verification, there would be an option to display tween states.
Recommended publications
  • Are3na Crabbé Et Al
    ARe3NA Crabbé et al. (2014) AAA for Data and Services (D1.1.2 & D1.2.2): Analysing Standards &Technologies for AAA ISA Action 1.17: A Reusable INSPIRE Reference Platform (ARE3NA) Authentication, Authorization & Accounting for Data and Services in EU Public Administrations D1.1.2 & D1.2.2– Analysing standards and technologies for AAA Ann Crabbé Danny Vandenbroucke Andreas Matheus Dirk Frigne Frank Maes Reijer Copier 0 ARe3NA Crabbé et al. (2014) AAA for Data and Services (D1.1.2 & D1.2.2): Analysing Standards &Technologies for AAA This publication is a Deliverable of Action 1.17 of the Interoperability Solutions for European Public Admin- istrations (ISA) Programme of the European Union, A Reusable INSPIRE Reference Platform (ARE3NA), managed by the Joint Research Centre, the European Commission’s in-house science service. Disclaimer The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. Copyright notice © European Union, 2014. Reuse is authorised, provided the source is acknowledged. The reuse policy of the European Commission is implemented by the Decision on the reuse of Commission documents of 12 December 2011. Bibliographic Information: Ann Crabbé, Danny Vandenbroucke, Andreas Matheus, Dirk Frigne, Frank Maes and Reijer Copier Authenti- cation, Authorization and Accounting for Data and Services in EU Public Administrations: D1.1.2 & D1.2.2 – Analysing standards and technologies for AAA. European Commission; 2014. JRC92555 1 ARe3NA Crabbé et al. (2014) AAA for Data and Services (D1.1.2 & D1.2.2): Analysing Standards &Technologies for AAA Contents 1.
    [Show full text]
  • CIAM Platforms LEADERSHIP COMPASS
    KuppingerCole Report LEADERSHIP COMPASS by John Tolbert December 2018 CIAM Platforms This report provides an overview of the market for Consumer Identity and AcCess Management and provides you with a Compass to help you to find the Consumer Identity and ACCess Management produCt that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaChes to providing CIAM solutions. by John Tolbert [email protected] December 2018 Leadership Compass CIAM Platforms KuppingerCole Leadership Compass CIAM Platforms By KuppingerCole Report No.: 79059 Content 1 Introduction .................................................................................................................................... 6 1.1 Market Segment ...................................................................................................................... 7 1.2 Delivery models ....................................................................................................................... 9 1.3 Required Capabilities .............................................................................................................. 9 2 Leadership .................................................................................................................................... 12 3 Correlated View ............................................................................................................................ 20 3.1 The Market/Product Matrix .................................................................................................
    [Show full text]
  • Mergers in the Digital Economy
    2020/01 DP Axel Gautier and Joe Lamesch Mergers in the digital economy CORE Voie du Roman Pays 34, L1.03.01 B-1348 Louvain-la-Neuve Tel (32 10) 47 43 04 Email: [email protected] https://uclouvain.be/en/research-institutes/ lidam/core/discussion-papers.html Mergers in the Digital Economy∗ Axel Gautier y& Joe Lamesch z January 13, 2020 Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five's strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company's most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves. For these tech giants, therefore, acquisition appears to be a substitute for in-house R&D. Finally, from our check for possible "killer acquisitions", it appears that just a single one in our sample could potentially be qualified as such. Keywords: Mergers, GAFAM, platform, digital markets, competition policy, killer acquisition JEL Codes: D43, K21, L40, L86, G34 ∗The authors would like to thank M.
    [Show full text]
  • API Lifecycle Platform (147) Backend Building Tools/Mbaas (43)
    DESIGNED BY The API Landscape Last Update: February 2020 Mehdi Medjaoui Business processes as an API/API-as a Products (235) Fax/Mail/Voice (14) Email APIs (22) Data Management APIs (9) Payment APIs (28) Ecommerce APIs (13) Headless Ecommerce APIs (4) AI APIs (25) Data-as-a-service (40) Accounting APIs (11) Messaging APIs/CPaas (42) Tokbox Lob Dyspatch Mailjet Customer.io Campaign Monitor aWhere Calcfox Dwolla Quovo BlueSnap Recurly Elastic Path BigCommerce BigML Traitify MonkeyLearn Wit.ai S&P Capital IQ Xignite Dow Jones FullContact CB Insights Envestnet | Yodlee Intuit Quickbooks Sage Intacct KashFlow e-conomic Subledger Vidyo Clickatell Nexmo Bitext Weibo Plivo Moltin Foxy.io Moosend SendinBlue SparkPost Pepipost OpenDataSoft Lingk Clarifai Attentive Dialogflow Nstack Infobip StrikeIron Withings Esri Planet Mapbox Bandwidth Interfax Kash Authorize.Net Adyen 2Checkout Moltin commercetools Snipcart Crystallize Expensify FreeAgent Debitoor TrueLayer Billecta CallFire Clique API Sinch Tropo Agora.io SendBird Open Banking APIs (5) Search Engine APIs (5) Mailgun Postmark Dyn JangoSMTP WhoAPI Human as a service APIs (3) Hutoma Myra Labs Qloo Elastic Beam Estimize Clearbit Finicity Quandl Human API Mappy Phaxio Sipwise Invoiced SecurionPay JudoPay Mangopay Chec Impala By Ping identity Zang Hoiio Aculab Apidaze Gupshup 2600Hz SolarisBank Plaid LucidWorks Elastic Amazon SES Elastic Email PostageApp Timekit Samsung Digital Amazon Mechanical Restb.ai ATN.io Infermedica Geoportail Bings Map Google Fit Google Maps Intrinio Health hSenid Mobile
    [Show full text]
  • A Target to the Heart of the First Amendment: Government Endorsement of Responsible Disclosure As Unconstitutional Kristin M
    Northwestern Journal of Technology and Intellectual Property Volume 13 | Issue 2 Article 1 2015 A Target to the Heart of the First Amendment: Government Endorsement of Responsible Disclosure as Unconstitutional Kristin M. Bergman Reporters Committee for Freedom of the Press Recommended Citation Kristin M. Bergman, A Target to the Heart of the First Amendment: Government Endorsement of Responsible Disclosure as Unconstitutional, 13 Nw. J. Tech. & Intell. Prop. 117 (2015). https://scholarlycommons.law.northwestern.edu/njtip/vol13/iss2/1 This Article is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY A Target to the Heart of the First Amendment: Government Endorsement of Responsible Disclosure as Unconstitutional Kristin M. Bergman May 2015 VOL. 13, NO. 2 Copyright 2015 by Northwestern University School of Law Volume 13, Number 2 (May 2015) Northwestern Journal of Technology and Intellectual Property A Target to the Heart of the First Amendment: Government Endorsement of Responsible Disclosure as Unconstitutional By Kristin M. Bergman* Brian Krebs, a former reporter for the Washington Post who is now known for his blog Krebs on Security, remained relatively unknown for most of his career. But in December 2013, Mr. Krebs found that hackers had exploited a data vulnerability in Target’s electronic-payment system, compromising millions of credit-card numbers that had been used to purchase goods from the second-largest discount retailer in the United States.
    [Show full text]
  • Merger Policy in Digital Markets: an Ex Post Assessment 3 Study Is to Undertake a Less Common Form of Ex Post Assessment
    Journal of Competition Law & Economics, 00(00), 1–46 doi: 10.1093/joclec/nhaa020 MERGER POLICY IN DIGITAL MARKETS: AN EX Downloaded from https://academic.oup.com/jcle/advance-article/doi/10.1093/joclec/nhaa020/5874037 by guest on 18 December 2020 POST ASSESSMENT† Elena Argentesi,∗Paolo Buccirossi,†Emilio Calvano,‡ Tomaso Duso,§,∗ & Alessia Marrazzo,¶ & Salvatore Nava† ABSTRACT This paper presents a broad retrospective evaluation of mergers and merger decisions in markets dominated by multisided digital platforms. First, we doc- ument almost 300 acquisitions carried out by three major tech companies— Amazon, Facebook, and Google—between 2008 and 2018. We cluster target companies on their area of economic activity providing suggestive evidence on the strategies behind these mergers. Second, we discuss the features of digital markets that create new challenges for competition policy. By using relevant case studies as illustrative examples, we discuss theories of harm that have been used or, alternatively, could have been formulated by authorities in these cases. Finally, we retrospectively examine two important merger cases, Facebook/Instagram and Google/Waze, providing a systematic assessment of the theories of harm considered by the UK competition authorities as well as evidence on the evolution of the market after the transactions were approved. We discuss whether the competition authority performed complete and careful analyses to foresee the competitive consequences of the investigated mergers and whether a more effective merger control regime can be achieved within the current legal framework. JEL codes: L4; K21 ∗ Department of Economics, University of Bologna † Lear, Rome ‡ Department of Economics, University of Bologna, Toulouse School of Economics and CEPR, London § Deutsches Institut fuer Wirtschaftsforschung (DIW Berlin), Department of Economics, Tech- nical University (TU) Berlin, CEPR, London and CESifo, Munich ¶ Lear, Rome and Department of Economics, University of Bologna ∗ Corresponding author.
    [Show full text]
  • Session Presentation
    Secure Your Enterprise Apps! A journey in automating application security and deploying policy control in a cloud world Scott Ryan – Global Technical Solution Architect @saryan210 BRKCLD-2431 #CLUS Agenda • The Changing Landscape and Security Threats • The Journey to Automating Policy to Securely Deploy Applications and Services • Application and Service Deployment Rationalization • Operational Shifts “People, Process, and Tools” • Securing the Application Development Lifecycle • Automating Policy to Securely Deploy Applications and Services • Conclusion #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Cisco Webex Teams Questions? Use Cisco Webex Teams to chat with the speaker after the session How 1 Find this session in the Cisco Live Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot# BRKCLD-2431 by the speaker until June 16, 2019. #CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Security Threats and Changing Landscape The Changing Landscape Devices / Users Devices Network NetworK Users Anywhere / Anything As-a-Service Model Identity-as-a-Service Software Defined Unmanaged IOT Devices As-Code Storage Applications Storage Applications Anywhere Data Protection Secure SDLC Regulations (GDPR) Cloud Native & Data Virtualization Microservice Storage-as-a-Service Compute Architecture Compute Serverless Compute Containers #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Cost of Data Breaches • Average total cost of a data breach: $3.86M • Average cost per lost or stolen record: $148 • The mean time to identify (MTTI) was 197 days • The mean time to contain (MTTC) was 69 days • Average cost of a breach with Automation $2.88M • Without automation, estimated cost is $4.43M • $1.55M Net Difference #CLUS BRKCLD-2431 © 2019 Cisco and/or its affiliates.
    [Show full text]
  • Access Controls
    Security + Access Controls Author: Joseph Lee Email: joseph@ ripplesoftware.ca Mobile: 778-725-3206 General Concepts Identification • Users claim who they are • Users may claim an identity with a username, or smart-card • When using biometric identification systems the use a device such as fingerprint scanner or facial recognition Authentication • Users prove their identity (passwords, PIN number, OTP, biometric scan) Authorization • Access is granted to a specific resource based on the identity that has been authenticated Accounting • Access and usage is logged • Accounting data can be used for controlling, monitoring, non-repudiation, statistics, and billing AAA authentication, authorization, accounting (auditing) • The elements of a comprehensive access management system • Common AAA authentication protocols include: ◦ RADIUS / DIAMETER ◦ XTACACS / TACACS+ ◦ Kerberos ◦ CHAP ◦ PPP ◦ LDAP Authentication Factors Multi-Factor • Using more than one factor in the authentication process Context Aware Authentication • Incorporates extra information such as geolocation, time of day, device MAC address, etc, to improve security • Factors include: ◦Something you know (password, PIN) ◦Something you have (smart-card, phone, USB token, 2nd factor) ◦Something you are (fingerprint, biometric, 3rd factor) ◦Somewhere you are (geolocation, MAC address of computer) ◦Something you do (touch gestures on a touch screen, keyboard dynamics, aka behaviour biometrics) Password complexity • Uppercase (26 A-Z) • Lowercase (26 a-z) • Numbers (10 0-9) • Special
    [Show full text]
  • Mergers in the Digital Economy
    3136 REPRINT Axel Gautier, Lamesch Joé Mergers in the Digital Economy Information Economics and Policy CORE Voie du Roman Pays 34, L1.03.01 B-1348 Louvain-la-Neuve Tel (32 10) 47 43 04 Email:[email protected] https://uclouvain.be/en/research-institutes/ lidam/core/reprints.html Mergers in the Digital Economy∗ Axel Gautier y& Joe Lamesch z June 2, 2020 Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Apple and Microsoft (GAFAM) acquired 175 companies, from small startups to billion dollar deals. In this paper, we provide detailed information and statistics on the merger activity of the GAFAM and on the characteristics of the firms they acquire. One of the most intriguing features of these acquisitions is that, in the majority of cases, the product of the target is discontinued under its original brand name post acquisition and this is especially true for the youngest firms. There are three reasons to discontinue a product post acquisition: the product is not as successful as expected, the acquisition was not motivated by the product itself but by the target's assets or R&D effort, or by the elimination of a potential competitive threat. While our data does not enable us to screen between these explanations, the present analysis shows that most of the startups are killed in their infancy. This important phenomenon calls for tighter intervention by competition authorities in merger cases involving big techs. Keywords: Mergers, GAFAM, platform, digital markets, competition policy, killer acquisition JEL Codes: D43, K21, L40, L86, G34 ∗The authors would like to thank P.
    [Show full text]
  • Join.Me Product Playbook
    join.me Product Playbook Table of Contents I. How to Use this Product Playbook IX. Beating Competitors II. join.me Messaging Overview a. Citrix GoToMeeting III. Feature/Benefit Highlights b. Cisco WebEx IV. Customer Personas c. Zoom d. Skype for Business V. Key Talking Points e. Biba VI. Pricing and Selling Value f. Fuze VII. Customer Demographics g. UberConference VIII. Building Credibility h. Google Hangouts i. Clearslide j. Adobe Connect X. Resources I. How to Use this Product Playbook This join.me Product Playbook is designed as a reference document for join.me Sales Team. It provides join.me product feature information, competitive analysis, outlines of key customer personas and value-based benefit statements. The Product Playbook is intended to assist Sales Team members as they prepare for sales calls with prospects and clients. As such, this should be used as an adjunct to and not as a substitute for other sales enablement assets or training courses, including the Sales Playbook. II. join.me Messaging Overview What it is: join.me is the simple, instant online meeting solution. Short Pitch: join.me has recreated the online meeting experience for how we work today. So simple, instant, and incredibly affordable, it’s ranked #1 in customer satisfaction for ease of use, and it’s the fastest growing collaboration solution used by small start ups to 90% of the Fortune 500 alike. Long Pitch: People are tired of costly and complex online meeting tools that require lengthy downloads, are hard to use and often don’t work. Built for today’s fast-paced, highly mobile workplace, join.me is the simple, instant online meeting app that makes collaborating easier than ever.
    [Show full text]
  • Impact of Artificial Intelligence on Businesses: from Research, Innovation, Market
    Impact of Artificial Intelligence on Businesses: from Research, Innovation, Market Deployment to Future Shifts in Business Models1 Neha Soni1, Enakshi Khular Sharma1, Narotam Singh2, Amita Kapoor3, 1Department of Electronic Science, University of Delhi South Campus, Delhi, India 2Information Communication and Instrumentation Training Centre, India Meteorological Department, Ministry of Earth Sciences, Delhi, India 3Shaheed Rajguru College of Applied Sciences for Women, University of Delhi, Delhi, India {[email protected], [email protected], [email protected], [email protected]} Abstract The fast pace of artificial intelligence (AI) and automation is propelling strategists to reshape their business models. This is fostering the integration of AI in the business processes but the consequences of this adoption are underexplored and needs attention. This paper focuses on the overall impact of AI on businesses - from research, innovation, market deployment to future shifts in business models. To access this overall impact, we design a three dimensional research model, based upon the Neo-Schumpeterian economics and its three forces viz. innovation, knowledge, and entrepreneurship. The first dimension deals with research and innovation in AI. In the second dimension, we explore the influence of AI on the global market and the strategic objectives of the businesses and finally the third dimension examines how AI is shaping business contexts. Additionally, the paper explores AI implications on actors and its dark sides. Keywords Artificial Intelligence, Automation, Digitization, Business Strategies, Innovation, Business Contexts 1. Introduction The emerging technologies viz. internet of things (IoT), data science, big data, cloud computing, artificial intelligence (AI), and blockchain are changing the way we live, work and amuse ourselves.
    [Show full text]
  • Identity As a Service: Single Sign-On to the Cloud (Idaas SSO)
    KuppingerCole Report LEADERSHIP COMPASS by Martin Kuppinger | June 2017 Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO) Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cloud services but some support for on-premise web applications. Your compass for finding the right path in the market. by Martin Kuppinger [email protected] June 2017 Leadership Compass Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO) By KuppingerCole KuppingerCole Leadership Compass Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO) Report No.: 71141 Content 1 Introduction ................................................................................................................................. 6 1.1 Market Segment ....................................................................................................................... 6 1.2 Delivery models ........................................................................................................................ 7 1.3 Required Capabilities ................................................................................................................ 7 2 Leadership.................................................................................................................................... 9 2.1 Overall Leadership .................................................................................................................
    [Show full text]