Los Angeles restaurant ordering based platform will add “Order Food” buttons and stickers. Local restaurants aided this way
Food pictures and videos on Instagram are widely used. Users will be able to easily order because buttons and stickers will link directly to ChowNow to complete order flow.
It’s a great marketing tool for restaurants, said Chris Webb (ChowNow’s CEO and co-founder) and an easy way for them to inform their customers that they are open for business — even if they may not have open tables.
Nice idea, especially as restaurants were hardly hit by this virus crisis.
China did shut down travel, western countries did not shut down economy during virus spread
My opinion is that diferent countries will recover on different timeframes after COVID-19. It depends on when the pandemy started to spread in the relevant country and, of course, the extent of spread.
Ironically, it seems that the most and first affected country might be, in the end, better than others.
VPNs secures communication between company servers and employees’ devices, but end user devices are exposed if not secured enough. Also, other compensating measures need to be in place.
Courtesy of The Cyber Security Hub™ (TCSH), I would like to depict a link that TCSH had pointing to, citing that Work From Home(WFH) using VPN is not 100% secure, other risks existing in that activity (WFH). This article I wrote is for those who believe that VPN is all you need for a secure WHF. I extract selectivelly from the mentioned article only what I believe is critical in order for non-expert readers to grasp the essence.
So, BYOD (Bring Your Own Devices) is a high risk. At least, it has to be approved by the company which the employee works in. This device MUST be secure enough against penetration, so I would strongly recommend: (i) remove admin rights from this device (to the extent possible) and (2) anti-virus and firewall on them is a must (although recently I have learnt that such amunition is not enough against a skilled hacker).
2) The IT infrastructure support generally i.e. in normal time (not these times of pandemic crisis) around 30% of users that work remote. Generally. During COVID-19, if all users go remote, then ” Houston, we have problem!”. I mean, no organisation has envisaged so far that its staff will work from home in such a huge majority. Therefore, buying an additional equipment to support the increasing demand of users to work using VPN takes time (months). Configuration and integrating such new equipment into the existing infrastructure also requires time.
3) I will end up with this recommendation (excerpt from the article) that I fully agree with:
So, stay safe not only from COVID-19 virus, but also to avoid get viruses (electronic form) or other electronic malware from hackers.
For this purpose, employees need a secure device (as I have mentioned above, i.e. remove admin rights and have installed anti-virus and firewall software) and instructions regarding how to counter phishing attacks (about these I hope you have already introduced regular simulations as I have recommended in this article on LinkedIn previously) so when employees working from home and they are not supervised or no quick requesting and support link with IT department, they hopefully be able to apply at home that knowledge.
In a previous page I wrote about the balance that always has to be reached between costs in risks, including cyberattacks. So, I have expressed the opinion that there is no point in spending too much on some fancy security tool that covers a risk that, if occurred, it will cost the company far less than the cost of the mentioned tool.
Of course, this article is for those that are concerned more about how to restore the functionality of their servers, rather than sensitivity of data. For example, SMEs that are intermediaries dealing with wholesale trade of goods or transportation are probably more concerned about restoring their data rather than exposing publicly the data of its staff in case of a data breach (although data protection authorities lately use significant fines for data breaches – so, a trade-off between penalties and information security budget, whichever is less might need to be asessed).
This is the case with small companies, and some of medium-sized ones. Eventually, deleting all and starting from scratch, taking data from papers and input them in the company’s system, be it an ERP or other system might be less costly than securing its system investing a disproportionate budget.
However, if you have good back-ups in place, you don’t need to take it from scratch. Only since last back-up. Provided that several pre-conditions are met in respect of those back-ups.
The back-ups will work to mitigate elegantly the ransomware attacks provided that:
you have back-ups defined according to your risk appetite and your organisation will have to delete all current live info from production environment (in order to delete also the malware from your systems because you don’t have the decryption key and might not want to pay for the ransom)
frequency of back-ups is to be defined according to how much back in time you want to repeat doing latest data entries in your systems (while remain in the risk parameters defined in your strategy and are virtually unaffected) as to be up-to-date and have latest customer transactions data available in your systems. This procedure supposes to take data from papers (contracts, written customer aplications, customer orders in written form). If to restore data from emails, this is a separate activity and I presume in this article that you have the email server hosted in the cloud (having the email server on premises without back-up on cloud will miss the opportunity to take data from customers from emails, so no back-up at all means data will not be recovered if the ranswom virus will spread on the email server as well)
the duration needed to input again the data since the last back-up (as to be up-to-date) does not take longer than needed (at least you have defined in advance a task force that is to be available upon request to do such data entries and have procedures in place how to do it)
the duration of reseting your systems / or reinstall all systems from the kits is not so long and is feasible to do it in the pre-defined time frame
last, but not least: testing regularly the back-ups will avoid surprises, namely when everything is recovered from back-ups but the systems do not work … or recovering from the back-ups is a messy process (so exercising regularly the procedures how to recover data is essential)
a second condition is to have back-ups decoupled from your live systems (unless you have a real-time back-up technology, in that case you have to have a third back-up that is done manually, decoupled from / live environment, namely on tapes or other independent systems that stay off-line all the time, like a safe storage of data if you like). Yep, you got it: the risk of having the back-up systems coupled (connected) on-line with your live systems (in order to do the back-ups automatically with predefined frequencies) has the downside that back-up systems might also be infected with the malware.
You know something? The above-mentioned pre-conditions are according to good practices and security standards, only they are more or less applied on various enterprises in the IT department. Real life is different than standards, I just hope you have in real life those actions already implemented. If not, and you are a small or medium-sized company that support your business operations significantly with the aid of whatever ERP or IT system, but cannot afford big budget for securing your company agaist cyberattacks like ransomware, you might need to consider implementing those recommendations I mentioned above.
In this context I would say you are probably free from the consequences of a potential ransomware that penetrates your organisation despite all security controls are in place.
In this happy-end situation you don’t have to pay for ransomware.
However, this does not mean security controls and protective actions to fight against cyberattacks are to be completelly ignored because ransomware is one type of attacks, but there are plenty out there ready to catch you unprepared (if there is some data at stake).
Nevertheless, as the duration of time needed to recover your business is the most important and critical / vital criteria to any organisation, I would say that the mitigation by back-ups as explained in this article (provided the conditions listed above are met) might work satisfactorily and will allow you to be quickly back in business.
Note: another assumption I made in this post is that the decision to pay for the ransom (or not) takes into consideration also the sensitivity of data. When I mentioned about cost and risk, presumably at the cost of producing the risk, all the costs, i.e. for example with fines from authorities (for example data protection) for leaking sensitive data outside the company (because securing company’s operations was not enough), or the other reputational risk like losing an important (or several important) customers have been quantified and the decision was taken in the direction to not pay for ransom.
In software development, a “service-centric” software application supposes to write code that gets exposed (typically over a network) via one of many interfaces.
These interfaces are the endpoints to business functionalities and regardless of the architectural pattern (SOA, Microservices), services tend to share the following attributes:
are “black boxes” to users of the service
models a set of activities with specific inputs and outputs
Reduced complexity: in case lot of records are needed to serve a particular business or data requirement. Making multiple requests might suppose implementing processes or uses-cases more complex than they need to be.
Reduced risk: the classical (monolithic) development to serve data requirements might expose too much of the underlying data model.
Bottom line: SOA packages up functionality into endpoints, typically accessible at the enterprise level that is: easy to access for the business, reusable, can be used as building blocks for future applications.
APIs and relation to SOA
SOA is more B2B Business solutions layer where when business need to pass data back and forth between different types of medium, API‘s are built, and business rules are built around that.
SOA is an architectural methodology. It is a way of specifying separation of responsibility from a business oriented point of view into independent services, which communicate by a common API (often but not necessarily by publishing events to a bus).
In recent years, a culture shift takes place in businesses and organizations, especially in the public sector. Thus, there have been recent drivers to open access to data service, often through public APIs which are available online.
API definition: a source code-based specification intended to be used as an interface by software components to communicate with each other.
API = any way of communicating exposed by a software component.
SOA = a set of enterprise architectural design principles to solve scalability issues by splitting responsibility into services.
Microservices (architecture) – MSA
At a very high-level, microservices are an alternative way for architecting applications which offer a better way to decouple components within an application boundary.
Maybe if microservices were rebranded as microcomponents it‘d be easier to understand.
In an application that implements microservices, the application boundaries or interfaces are no different to that of a traditional monolith application, the key difference is what happens behind the application boundary.
Behind the service boundary, collections of independent microservices run in their own processes, all with their own individual set of APIs or web service endpoints that get exposed through the application boundary.
Microservice architecture is focused on multiple, independent, self-contained application-level services that are lightweight and have their own unique data model.
For CIOs / CTOs to make informed decisions:
In the followings, will present main attributes for each
I found 5 leaders (who have the ability to execute and they are also visionaries) and took all of them (in the order as they appear in the Gartner document) into my research to see if any Romanian customer can get some API services in Romania from these. I think it is important to have a local distributor or partner (for reasons relating to easier troubleshouting, local / on-premises customisation, etc)
Google Apigee: not found a partner in Romania for Apigee (see this – no “Romania” word in the results of that search and this – a provider taken also from the results of searches, but who has nothing in Romania, but is present in other countries in the region around Romania)
Software AG: not found a partner in Romania (they coordinate from Poland) – see this
Mulesoft – it seems they have a partner, but did not see a specific focus on API (at least from the main page displaying this partner’s services I could not retrieve details). Thus, see this – pointing to Softvision, but on mulesoft site the link “Partner’s site” points to this website whereby one could find no link/details about API services.
Final conclusions: I saw that the banks in Romania have already contracted some API Management services (for example, no.2 bank in Romania, BCR has something from Axway as per the link mentioned at previous paragraph – see at the bottom, where I found also BNP Paribas as their client).
I could imagine that IBM would have also offered to Romanian companies their API Connect product, but did not find on their website specific Romanian clients using API Connect. Maybe they keep that list confidential.
I know that for banks and fintechs the PSD2 directive (in force since December 2019) requires that banks have to expose their data through APIs for fintechs as consumers of data.
Anyway, if you run a Romanian company that has a complex IT architecture and want to go for digitisation in 2020, flexibility in creating new products in order to satisfy customer needs, you might want to consider gradually build new products having a services-based architecture, i.e. SOA, microservices. Therefore, implementing some APIs (if you did not do that already) and managing them is the way.
In pursuing the above-mentioned endeavour, if I am required to express an opinion, I would recommend to go with one of the leaders from the Gartner Magic Quadrant.
“RPA” refers to a set of modular software programs (or“bots”) to complete structured, repeatable, and logic-based tasks by mimicking the actions taken by existing human staff.
Why an organisation would need that?
There are many advantages, but personally I see also a few Cons.
Transforming an organisation through software development undertaking, within waterfall (or even Agile) projects is way too long, given the current external environment in which everything is moving very fast. Digitisation, disruption, all happen at an incredible speed. RPA is not a classic software development project, but something that could be delivered way more fast. It is in between an operational work and a full software delivered within a classical project meant to automate processes.
Developed bots are capable of interacting with and integrating disparate enterprise applications, databases, and files to limit the business need to develop custom, application specific integrations.
How it works
A set of scheduled bots are capable of running on multiple servers within a company’s environment simultaneously with minimal impact to resource and network capacity.
Practically, if an organisation has many operations (and repetitive) supported by different systems (there is no integrated ERP for all activities, for example) and use a software for invoicing, another software for managing suppliers, and so on, RPA is recommended to be considered.
Cons: I see at least a disadvantage, namely security. A risk assessment is needed anyway, followed by actions to mitigate those risks. For example, as the bots within a RPA solution may use powerfull user accounts in various systems or applications, access to them need to be properly protected from unauthorised staff.
A company that is of Romanian origin that delivers RPA solutions as its core business is UI Path. They are the first Romanian unicorn (assets valued at more than 1 billion USD) company.
RPA solutions could be created to run on various operating systems. UI Path has its RPA solutions designed for Windows.
Please find below a top of 10 companies that offer RPA services:
Jet black (ideea is very interesting) started in 2018
“We’ve learned a lot through Jet black, including how customers respond to the ability of ordering by text as well as the type of items they purchase through texting,” said Scott Eckert, Senior Vice President.
As a learning experience for Walmart it seems all good.
Personally I appreciate the courage to run such an experiment, but Walmart can afford to do it anyway.
What did go wrong?
It seems a customer of Jetblack spent an average of 1500 $ per month, but the costs for Walmart amounted to $15,000 per year per member, as of last summer. Also, JB overlapped with Walmart’s own home delivery options, including its successful Walmart Grocery service, which could deliver the fresh food Jet black could not.
Around 300 employees in JB are going to be laid off soon.
Approval obtained from People’s Bank of China (PBoC) to begin formal preparation to set up a bank card clearing institution in China
MC are not the first US credit institution to require approval from PBoC. Also, Amex (American Express) had submitted the file in 2018. PayPal is targetting GoPay (PP are willing to pay for 70% of GoPay stakes).
Mastercard together with NetsUnion (both companies having set up a joint venture last year whereby NetsUnion is a clearing house for online payments whose stakeholders included PBOC) refiled this year its application as a joint venture called Mastercard NUCC Information Technology (Beijing) Co., Ltd. That application has now been approved.
According to the source below, it seems that the approval of MC (as well as of Amex – through with Amex’s Chinese partner LianLian Group – they both have a joint venture) are a part of the U.S.- China trade deal, which required Beijing to accept and review payments firms’ applications in a timely manner, which hadn’t happened before.
Anyway, they have competitors in Chinese market. China had 8.2 billion bank cards in circulation by the end of September 2019, 90% of them being debit cards. For example, local actors like WeChat Pay will fight to avoid losing market share.
Yet mobile payments in China are expected to grow 21.8% from 2017 to $96.73 trillion by 2023, and the total number of active mobile payment customers is expected to reach 956 million by 2023, up from 562 million in 2017.
Interesting to watch these evolutions: either China joining a western style of payment, or US companies will not succeed there. Will see.
Those apps recorded $195M in 2019 – increasing by over 50% compared to previous year
Apparently, such evolution has been originating from millennials’ lifestyles, such persons chosing to marry later in life and delay having children; and because of that, it seems they allow themselves more time to remain self-focused, compared with their parents’ generation.
Also, internet acces had a more positive advantage for millenials when comparing to the previous generations: they have thus an easier access to information and therefore become better informed about welness and self-care.
Calm and Headspace (two mobile apps) registered (final figures not available though) $92 millions in 2019, and $56 millions respectivelly. Also, they have 24 millions new users in 2019 (Calm) and 13 millions (Headspace).