Canada Federal Election: Summary of Platforms

If you have not yet voted in the advanced polls, or if you are interested to compare the three parties in their promises -regardless of how they will find enough funding to act on their promises-, this document could be very useful.

It would be also useful if one or several specific issues are of utmost importance to you, and would impact you or the people that you care for.

FederalElectionPlatforms

I hope this helps, especially for those who do not have enough time to investigate and research for themselves.

I, like many of you, hope for a brighter future for my family, Canadians, North Americans and many more in other countries which might be directly or indirectly affected by our choice on Monday Oct. 19th.

Internet of Things: Growth Outlook and Cyber Security

Over 50 billion devices is anticipated to be connected by the end of this decade. Consider that there are almost 7.5 billion people on Earth. 25% of this population is under the age of 15, which typically do not carry (their own) wireless device –in the sense of generating direct revenue for wireless providers-. Therefore, 50 billion of connected devices simply means 9 connected devices per adult. Again, this shows the benefit of the Internet of Things solutions to wireless service providers, which extends the usage of wireless and mobile connections beyond human subscribers. Wireless providers will receive revenue if the service requires connection, or otherwise, they may generate revenue by acquiring and selling the (developers’) solutions to their (already) high number of subscribers.

One of the biggest challenges to the implementation and wide commercialization of IoT solutions is mobile security, and data privacy. Data is collected from people and things, about people’s daily lives, habits, families, friends, patterns, private interactions, finances and much more. People and things may each have a unique identifier, through which they can be searched and located, and their information can be accessed and used in many different ways including to control and manage them. It is obvious that the opportunity is not such that hackers, cyber criminals, and of course terrorists can easily overlook. A Linux worm emerged as early as November 2013, which is believed to have targeted the Internet of Things, specifically. Rate of mobile malware infection was as high as 40% in countries like Russia and China in 2014. Therefore, educating the end-users as well as securing the infrastructure is becoming increasingly essential to the successful implementation and utilization of IoT services. This is why there are initiatives to standardize and implement mobile security, including an initiative at CTIA.

CTIA represents carriers and other players in wireless telecommunication, and has over 100 members, including carrier, supplier and associate members. CTIA advocates on behalf of them at all levels of government, and coordinates the industry efforts, guidelines and programs to promote mobile devices and is most active in North America. Similar to GSMA (discussed in my previous blog post), CTIA has IoT initiatives, with cyber security as one of the most important ones.

Security is required in different levels, including on the connected module itself, the application, the (wireless) connection, as well as the cloud of data itself. Cyber security initiative covers the end-to-end security of the infrastructure. In fact, many of the same practices that were initially developed for M2M and mobile security, have been used as the basis for the development of the cyber security solutions for the Internet of Things. Items such as security audits, VPN, encryption, multiple air interface security, enhanced security features, software update distributions and immutable root of trust are some of the security solutions and technologies to be leveraged and developed by CTIA cyber security working group.

In addition, governmental data security laws and policies have been in place and enforced for several years now. But now these policies and regulations need to be revisited to ensure they are applicable to and sufficient for M2M and IoT solutions and infrastructures. To name some of these policies and regulations, we can mention FCC’s Customer Proprietary Network Information (CPNI) Rules, Children’s Online Privacy Protection Act (COPPA), Federal Information Security Management Act (FISMA), Health Insurance Portability and Accountability Act (HIPAA), and the Patient Safety and Quality Improvement Act (PSQIA, Patient Safety Rule).

Conclusion:

The magnitude of impact on our daily lives and different industries have been obvious. So is the fact that without the right privacy and security regulations, standards and implementation, convenience and benefit come at the very high expense of security and safety, and will leave us extremely vulnerable to issues such as identity theft, financial fraud, attacks and a lot more. Therefore, there is opportunity for advanced cyber security solution providers and educators including wireless providers, network suppliers, infrastructure providers, wireless device and chip manufacturers in a rather complex and interconnected value chain.

Non-profits: their contribution to the economy and why their strategic planning is complicated.

Almost twenty percent of employees in Canada work for non-profits, including governmental organizations. A study conducted by Johns Hopkins University in 2013 shows that in eight countries, including Canada, US, Australia and Japan, the non-profit sector grew more than the total economy. In Canada, specifically, the nonprofit sector grew by 6.4% compared to 5.6% of total growth in GDP. The same study shows that non-profit (paid) employees contributed to 7.1% of total Canadian GDP. Volunteers included, contribution amounts to 8.1%.

Interestingly, setting goals and measuring them for businesses could be more straightforward than for non-profits. That is because the ultimate goals for businesses are selling more to target customers, and making the highest profits for shareholders. In addition, the same person who pays, receives the value, and the person who invests has the clear intention of profiting from his/her investment. In non-profits, interactions, transactions, and intentions are not as straightforward and clear.

In a non-profit, the person who pays for the service to be rendered is not necessarily the same person who receives the benefit. Non-profits do not have investors. The donors, who fund the non-profit, do not contribute in hopes of future gain and growth in their investment. They have other intentions; they might donate simply because they value the cause, because of taxing reasons, regulatory obligations, or sometimes for personal (political or other) interests. I would categorize the impact of these complexities on the strategic planning in two folds: 1) multitude of clients with different interests and priorities, and 2) loyalty to mission without being influenced by the interests of specific groups or individual donors. It should also be heavily considered that the less concerned a non-profit is with fundraising, the more it can focus on the fulfillment of its promise to the community.

Non-profits have a multitude of customers, who should all be kept satisfied at the same time, or else the organization cannot survive. These customers (or as they are called for non-profits, clients) include donors, program participants, volunteers (including staff who offer their services for free or at a considerable discount), and the public or –to be more specific- the beneficiaries.

Each customer group is a totally different demographic, with very different needs and priorities. So, goal congruence among the very different stakeholders is key to survive, while remaining legitimate, accountable and ethical. Non-profit leaders need to: 1) remain loyal to their mission by offering promised services to their beneficiaries, 2) keeping their participants involved by offering interesting, decent and engaging activities and services, 3) raise funds by determining the interests and priorities of their donors, and 4) retain the most valuable staff and volunteers to achieve their goals. This should all be conducted at the LOWEST COST, and in the most efficient way. Therefore, innovation, creativity and learning become the inseparable and inevitable elements to the successful orchestration and growth of a non-profit.

The common notion that strategic planning is not essential to non-profits, simply because they do not need to be profitable, is totally wrong. Quite the opposite, non-profits are in much more severe need to follow a very well-thought strategic plan. Such plan should reconcile the (sometimes conflicting) goals and objectives of very different stakeholders, establish the most innovative and keen methods of fundraising, offer the most efficient operational approaches, and attract and retain the most valuable, knowledgeable and dedicated resources. Yet, and to make the tasks even more arduous, all these contradicting assignments should be fulfilled without compromising the mission and objectives of the organization.

What is GSMA, and its IoT initiatives.

GSMA (or Group Special Mobile) is a European association formed in 1995 and is one of the very few major institutions, responsible for standardization, deployment and promotion of GSM telephony system. The association currently represents the interests of over 800 mobile providers and 200 companies in over 220 countries. Its responsibility and mission is now much broader than the initial definition. With all the new services and advanced technologies, whose widespread adoption and standardization is key to the deployment and commercialization of the innovative services, GSMA has much more to do than just promoting the GSM telephony systems. Its initiatives and activities are now very diverse and include areas from spectrum for mobile broadband to public policy matters such as mYouth, sector regulation and child abuse contents, to mobile payment and transport services. Not surprisingly, IoT is also on this list.

GSMA IoT initiative is titled as “Connected Living” with the vision of enabling a world of IoT, where consumers and businesses enjoy access to rich services, through connection via an intelligent and secure mobile system. This is specifically to ensure operators will have a standardized environment, where all players collaborate in an efficiently-regulated environment, with a network optimized for IoT type of services; these services typically need low to moderate data throughput, and low power in most of the cases. Therefore the two major characteristics of a connected network –for the IoT- should be efficiency and security. In the next level, device management and billing models should be defined. Device management has been important, especially because of some use cases in remote areas, where provisioning, re-provisioning is done via wireless system and not manually. For one instance, M2M was one of the main use cases for embedded SIM several years ago.

Now, I would like to encourage you to think about M2M and the IoT from the perspective of a mobile operator. Without M2M, mobile operator’s potential market is heavily LIMITED TO the population, where each person will require one or may be two mobile devices (plans) in its best case. But M2M and IoT take the market to another level where a wireless operator is not limited by the population, but is offering value added services, and can make money not only through minutes and gigabytes and sometimes bundled plans, but by offering interesting and beneficial services. Think about all different sectors, including health care, manufacturing, retailers, mining, electronic appliances, environment, consumers, and all different targets including children, infants and seniors among many more. So, the opportunity would be enormous for operators who had become just a pipeline for the streaming data, where others were exploiting the value, with no extra or special benefit to mobile operators who just sold the data plans. This is why providers have been closely monitoring, capitalizing and purchasing the IoT startups for the past couple of years, and the wave continues, and should continue for another two to five years.

The M2M an IoT, therefore, could be important to operators, which explains why GSMA, that represents their interest, is now taking the steps, and is working with governments too, to ensure the required regulations and standardized secure environment will be in place for the deployment of consumer-focused and business-focused IoT services to fulfill (as they mark it really well) the ‘socio-economic’ benefits.