Five Unique Tech Trends in 2016 and Implications for 2017

1) Russian Hacking in U.S. Elections – critical infrastructure implications:
For more than ten years candidates and advocacy groups have used internet marketing hacks to steal their opponent’s websites, redirect internet traffic, or increase negative search results on them by manipulating search engine algorithms. For example, former GOP Presidential candidate Carly Fiorina failed to register carlyfiorina.org and thus had an opposition group use it as negative publicity against her, but she has since acquired the site. Yet 2016 proved to be a turning point in political hacking because of the level and sophistication and sustained effectiveness. The Washington Post reported, “Russian government hackers were able to penetrate DNC servers, compromising opposition files, chats, and emails on republican nominee Donald Trump (Eliza Collins, 12/30/16, USA Today). With this information, Russian intelligence agents masqueraded as third parties to create very believable spear phishing campaigns. These fake emails worked to trick victims into typing in their usernames and passwords after which Russian agents moved further into their networks, undetected at the time.

On 12/29/16, in a first of its kind move, the Obama Administration released a joint FBI and DHS report (JAR-16-20296: GRIZZLY STEPPE – Russian Malicious – US-Cert) on the technicalities of the hack and sanctioned the GRU and the FSB (Russian intelligence agencies) and key companies they contracted with (Katie Bo Williams, 12/29/16, The Hill). The following diagrams (Fig. 1-a and 1-b) show there were two main hacking groups and that they used mostly classic hacking tactics that were clearly preventable. APT29 hides via encrypted communication and speeds up commands via PowerShell code automation, applied to multiple operating systems. Thus they must have been observing and studying/testing for a while to get this right as its complex across phones, tablets, and PCs. At the same time, APT28 was using a private tunnel (like a VPN) to install and remotely run applications – key loggers designed to steal information and credentials.

Russian DNC Hack Diagram – Fig. 1 – a: (JAR-16-20296: GRIZZLY STEPPE – Russian Malicious – US-Cert).
Russian Hack Part 3.png
All this started as far back as the summer of 2015, so the full penetration went undiscovered for more than a year. In that time, it has been alleged that the hackers were releasing embarrassing info to manufacture fake negative news against Hillary Clinton. In one instance the release of this info resulted in the resignation of the on DNC Chair, Florida Representative Debbie Wasserman Schultz. Yet the hack is not fully partisan because many sources confirmed that, Republican House members, thought leaders and non-profits to the GOP, were also hacked (Jeremy Diamond, 12/16/16, CNN).

Russian DNC Hack Diagram – Fig. 1 – b: (JAR-16-20296: GRIZZLY STEPPE – Russian Malicious – US-Cert).
Russian Hack Part 2.png

On 12/30/16 the Obama Administration took the strong action of expelling thirty-five Russian diplomats in response to the hack. Shortly thereafter they enacted OFAC (Office of Foreign Asset Control) sanctions against Russian business entities associated with these people. They left the country under close U.S. escort on 01/01/17 as they arrived at an airport to depart on a private Russian plane sent by president Putin.

Alleged Hacker and Russian Spy, Alisa Shevchenko – Fig. 3:
1483128352073-cachedInterestingly, one of the people expelled, Alisa Shevchenko, was praised a year before by the United States which does not speak well for U.S. intelligence agencies. Specifically, The Department of Homeland Security said “Alisa Shevchenko had helped prevent cyber crime under a program for information sharing between the public and private sector. Ms. Shevchenko was also said to have assisted a French company, Schneider Electric, in identifying vulnerabilities in its software” (Andrew E Kramer, New York Times, 12/31/16). However, we think she may have been a Russian spy all along and could have been inside key U.S. systems at that time but this unconfirmed. Her company, Zora Security, has been a key supplier to the Russian Military’s Main Intelligence Directorate, or G.R.U. In her recent Twitter posts she indicates that she is indifferent to being discovered by the U.S. intelligence agencies. This is likely because she is a close pawn of Putin’s who did a fairly good job going undetected as long as she did. More intel is likely to come out substantiating this.

At present, the election systems aren’t considered among the sixteen U.S. critical infrastructures and thus they have no federal protection. This is because current law defines the administration of elections as in the hand of each state and these states do not want federal involvement into their election systems out of fear of political persecution. We can understand this (especially Texas) but think some compromise could be accorded if a state election system was targeted by a foreign government, thus making it a national interest. The federal government is less involved in the day to day activities and security of the sixteen critical infrastructures because 80% of them are owned by private enterprises. However, when Sony got hacked in 2014 it became a national issue a few days later and then the Federal government helped out, but afterward, Sony quickly wanted to avoid contact with them. This is because, although well intentioned and large, the federal government is not as good at most I.T. security as the private sector is. Yet the case of multiple state election systems is unique because they are used only for elections and then are put in storage. Ultimately each states voting data rolls up to the federal level and most of this supply chain is at risk to hacking and manipulation. Thus, the maintenance and updates of these systems and the systems used by dispersed political parties for campaigns need to be improved. This may require some sort of hybrid-critical infrastructure protection, increased private sector partnership, or just more dollars spent by the state election bodies and political parties. Why are commercial facilities and their systems more important than the systems that track election activity and results in a country that fought several wars to stay democratic? By including the election process and systems as a critical infrastructure or hybrid-critical infrastructure, researchers and entrepreneurs will be inspired to improve the process, all the while sustaining or increasing privacy which is a must for a nation as diverse as the United States. More news outlets, advocacy groups, consultants, and academics need to debate this publicly!

2) Tesla and the Growth of the Electric car – decline of the gasoline based car: 
2016 was a profound year of announcements when it comes to the market for electric cars. Many car manufacturers have been playing catch up with Tesla for a few years now. That being said, several companies have produced versions of their own electric car. But there are very few that have produced an electric car designed from the ground up. The Nissan Leaf and BMW i3 were two of those, and as of November 2016 Chevrolet started manufacturing its Bolt EV. Mercedes also announced that it will have several different types of electric vehicles soon. This includes their urban electric-powered straight truck (Fig. 3) which has self-driving capabilities. This would allow inter-city delivery on an EV platform.

Mercedes Electric Self-Driving Truck Prototype – Fig. 3:

mercades-self-driving-truckSimply put, the market is starting to catch up to Tesla. 2017, we think will be the year that makes or breaks Tesla. If Tesla can ramp up production like it plans to, it will continue to maintain market share. By 2018, it has audacious production goals of a half million. With just about every major automotive company producing plans for electric vehicles, competition for this segment will start to get really competitive.

3) Self-Driving Cars – personal and commercial:
Google has been developing a self-driving car for a few years now, but it has been slow to fully develop and bring them to market. In fact, a few of Google’s employees left to start their own company for self-driving trucks. That company, Otto, was recently sold to Uber for $680 million (Mark Harris, Business Insider – Back Channel, 12/03/16). Uber has also been working on self-driving cars with its Ford Fusion line. Now, these cars still have people behind the wheel just in case of an emergency, but it’s the next step in fully rolling out an autonomous fleet of vehicles. Uber gave their fleet of Volvo XC-90s a try for only a week in San Francisco but picked up and moved on to Arizona to continue testing. This was because they didn’t want to comply with California DMV requirements to file paperwork and pay a registration fee. Otto, on the other hand, also made their first delivery of Budweiser beer in Colorado (Fig. 4).  

Otto Self-Driving Budweiser Delivery Video – Fig. 4:

This is dawning the start of Uber Freight where shippers can ship through an Uber App for their truckloads. C.H. Robinson and Amazon are both developing apps like this. We think before cars get the green light to drive in inner-cities, self-driving semis will get the regulatory green light, firstly on interstates. This is because commercial vehicles cost a lot more, are bigger, serve thousands of customers per year, thus the investment in self-driving technology is a justified priority in spite of any risk.  Additionally, commercial shipping is automated in most parts of the supply chain and this is a precursor for self-driving trucks. The NHTSA did publish guidelines on self-driving cars and their testing in September (link here). We think 2017 will be the year of testing self-driving vehicles and in 2018 it will start to become a mass market idea.

4) Surveillance via Smart Phones – privacy implications:
Smartphones are small supercomputers that house more personal info on their users and families than any other device in modern history. From texts, PHI, fingerprint scans, downloaded documents, contact lists, photos, geolocation tags, the use of many cloud databases – both upload and download, and apps that take away some of our privacy – via partial and full consent. A smart phone is more advanced than any gadget dreamed up by 007 and the need for privacy on it is just as important.

2016 proved to be a turning point in the privacy vs. government surveillance debate. It intensified after the mass shooting in San Bernardino, CA, which happened at the end of 2015, killing 14 people. Then in 2016 the government sued Apple to get them to build a backdoor into the perpetrators iPhone to which Apple strongly objected. The government eventually broke into them phone shortly thereafter with the help of Israeli tech contracts. Keep in mind that ever since Edward Snowden leaked NSA documents in 2013 about the government’s overreach into technology companies, to get them to build back doors, it has become more politically acceptable to resist such demands. Congress has made very minor surveillance rollbacks, mostly related to phone metadata but much more work needs to be done (Ellen Nakashima, The Washington Post, 11/27/15).

Andriod phones have also suffered hacks and backdoors.  A source described it this way, “security experts say they have discovered secret ‘backdoor’ software in some Android phones that sends users’ personal data to China. Kryptowire, the security firm that discovered the vulnerability, confirmed this information on its website on Tuesday. The firm wrote that certain Android devices contain pre-installed software that collects and sends personal data, such as texts and geographical location, to an unauthorized third-party” (New York Times, 11/15/16).  This is a clear blow to android privacy and will require costly R&D by Google.  With the growth of third party phone applications these risks will continue to increase and get more complicated.

Illustration of Apple vs. The FBI – Fig. 5:
1458594148060
Although the government argues that back doors make the nation safer, this makes no logical sense and there are no real world case studies to support it. First of all, the fact that the government needs to rely on the private sector for such backdoors and tech consulting proves that the private sector is where technology innovation comes from and that supports the concept of intense free competition.

The U.S. intelligence agencies would not be much better than a “drunken inspector gadget” without third-party consultants and tech firms. Key private sector innovation in the military industrial complex has helped this nation win wars and secure freedom for all – way back to the founding of the Union. This includes stealth fighter technologies, radar technologies, canons, and it does not require government overreach or back doors. The government is a paying customer of the best tech products and has always been.  

Yet when the same consultants and tech firms serve regular customers, like Apple with the iPhone, those customers have a reasonable expectation of privacy and quality. This should not diminish merely because the government can’t solve a crime or problem quickly. Apple CEO Tim Cook described the government’s request this way, “it’s the software equivalent of cancer. He said he was prepared to take the fight all the way to the Supreme Court. This would be bad for America, he said. It would also set a precedent that I believe many people in America would be offended by” (Enjoli Francis, ABC News, 02/24/16). There are far more security benefits in keeping private technology data private. This includes privacy after domestic breakups, privacy from cyber-stalking, privacy from annoying marketing, privacy from political persecution and harassment. Also, Government agencies can use these same private technologies to conduct military and intelligence operations without worrying about being hacked by opposing governments or terrorists.

In 2017 we think technology companies will increase the security of their products, and companies like Apple and Google are already in the process of doing this. In Apple’s case, they have spent millions to hire encryption legend Jon Callas, who invented PGP encryption, to redesign the security of their products (Reuters, 05/24/16). We think most company shareholders, investors, customers, and finance people now see the additional cost to build in great security as required.  To customers, security on a product is worth a price premium and a globally competitive company must have secure products.

We also think policy makers will have to do more to accommodate the privacy concerns of citizens, perhaps partly like the E.U. has done. We also think 2017 will further debunk the connection between backdoor system hacks and terrorism prevention. Clearly, monitoring the entire free world’s metadata is a violation of democratic norms, and it waters down security greatly because it can easily be manipulated for every imaginable bad reason. Most likely, setting people up, and government leaders throughout all history like to find people to blame for their problems/misdeeds. Yet behavioral profiling and good traditional police and intelligence work in conjunction with advanced sustained diplomatic dialogue with a range of diverse groups, friends and enemies alike, should produce better intelligence for more specific actionable results. The intelligence community has thousands of tech tools to use to secure the nation, mostly private sector based, so they don’t need to monitor all metadata.

5) Using Drones for Last Mile Deliveries – suited for rural and high traffic areas:

Amazon Prime Drone via Prime air – Fig. 6:
imagesAmazon made its first test delivery by a drone in the U.K. in 2016. This will continue to be developed as Amazon continues to test and tweak its system for making deliveries by drone. In fact, this is one of many programs where Amazon is developing its systems in “last mile” delivery. They also currently have their own fleet of vans to deliver and they use their Flex program of drivers to pick up and deliver packages. They also recently filed a patent for “floating warehouses” where these would have inventory in an airship that drones could pick up products and then deliver them, for example to a sporting event (Kate Abbey-Lambertz, 12/30/16, Huffington Post). Realistic but far out innovation like this will continue to challenge UPS and FedEx to provide a better customer experience. Drone delivery is just one idea. The benefit or idea behind drone delivery is that it could deliver to customers within a half hour. This would drastically improve the time to deliver to its customers. Currently, with Prime Now, you can get one-hour and two-hour delivery in certain areas.  

We think Amazon will continue to develop its drone delivery in 2017 by testing it in many countries across the world. The FAA in the U.S. has been one roadblock to Amazon testing in the United States. This is just one agency that is figuring out how to regulate this new technology as it tries to prevent small planes and traffic from colliding with drones. Amazon’s competitors are watching and we’ll see how far they get in 2017.

jeremy-swensonmike-cassem
Jeremy Swenson and Mike Cassem are two seasoned, part-time, Intel certified, retail technology marketing and training representatives on assignment at Best Buy for clients including Intel, H.P., Trend Micro, Adobe, and others – presently on sabbatical. They also spent five years crafting their public speaking and writing skills in Toastmasters International. For full-time work, Swenson doubles as a Sr. business analyst, process improvement and project management consultant. While Cassem doubles as a marketer and sales logistics analysis consultant. Tweet to them @jer_Swenson and @micassem.

What the Windows Phone Must Overcome to Gain Traction:

There is no doubt that Microsoft is a tech super power in this game of smart phone wars, but Google’s Android and Apple’s iOS have challenged them to date.  As per Fig. 1. Microsoft’s phone OS (operating system) market share has stayed about steady at about 2.9%.  Blackberry on the other hand has so little market share they are hardly worth mentioning since their mobile phone OS market share has dropped to .09% at the end of 2015 (Fig 1.).  Although different phone OS market research reports have slight up or down variations, the point is that Microsoft and Blackberry are hugely losing the Smart Phone Wars.

Fig. 1.
Smart Phone Stats dec 2015Last time Cassem and I commentated on this situation was August of last year when Microsoft was high on the release of Windows 10, arguably their best operating system in a decade but not without risk.  In our last piece we valued many aspects of Microsoft’s products including the Cloud, SharePoint, and Windows 10 for business users, but we only began to address the full story.  Yet our prior conclusion that Microsoft as a company is undervalued is unchanged because they have so many successful products including Server, Exchange, Visual Studio, System Center, Dynamics, and SharePoint, in spite of their phones weaknesses.

In this post we will specifically explore why Microsoft is losing the smart phone war and what can be done about it so they can win.  First of all, Microsoft was late to the game in October 2010 with the release of the Windows Phone 7.  Google was early with the T-Mobile G released in October 2008. (Fig. 2.).  Apple was the first with the iPhone 1 released in June 2007.  Microsoft’s late entrance in conjunction with their delay to take phone apps seriously has proven to push app makers to the dominate platforms, Android and iOS.

Mobile applications are increasingly addictive for phone users and since the Windows platform has so few that means most mobile gamers, media streamers, and multitaskers will avoid the Windows Phone in the immediate future.  Most corporate mobile phone contracts favor the iPhone and those contracts will take years to be undone to the detriment of Microsoft.

Fig. 2.
First Android Smart PhoneWith 53.3% (Fig. 1.) of the phone OS market share there are a few things that Android got right.  The integration of Google Calendar is easy, useful, and free.  Conversely, on a Windows phone, the integration of Microsoft Outlook is awkward, overly optimized for a traditional PC, and it’s not free for the full version.  As an owner of many Android phones I can see how the many OS updates have proved to make the platform much better with more efficiency and less bugs, especially on the Lollipop release of Android.

Apple comes in second with 42.9% of the mobile OS market share (Fig. 1) because they have gotten a lot of things right.  Apple’s OS works well together and is recognized as artful by the majority of the creative community — their early integration of iTunes and the iPod into the iPhone made it a big hit.  Also, you can use the iPhone with Apple TV, an iMac, iCloud, the Apple Watch, and Airport Time Capsule, to name a few.  ITunes has been a force to deal with but has started to lose market share in recent years as streaming services and other digital music services have come on board, specifically Pandora and Google Play.  Android users will say iPhones are overly simplistic, but to those users, that is a benefit.  There are a lot more settings options in Android, but Apple fans feel they don’t need all those features.  This is one ongoing battle between iOS and Android.

Security varies greatly in each of the platforms.  Apple has a very secure and closed off OS and network and they rarely share info with other tech companies.  Apple’s app network is also massive and thus they have experience with a lot of different architectural frameworks and they are good at approving and declining apps based on security.  Unlike Apple, Android has had some issues with fake apps designed to compromise security that were available for download in the app store.  Additionally, in recent weeks Apple has taken a respected but partially controversial stance to protect its user’s privacy in the wake of what many argue is an overreaching government. (In Debate Over Apple-FBI Dispute, Gates And Zuckerberg Don’t Agree).  This is a public debate that needs to continue and unfortunately as of now, Microsoft has given a more a-political and lukewarm response to this debate – though Microsoft founder Bill Gates disagrees with full privacy coverage arguments.

Windows 10 appears to be a pretty solid platform that builds off of some security benefits of Microsoft’s enterprise systems.  Windows 10’s Credential Guard protects corporate identities by isolating them in a hardware-based virtual environment.  Device Guard depends on Windows 10’s virtualization-based security to allow only trusted applications to run on devices — letting the service use signatures defined by your enterprise-controlled policy (Tech Net Device Guard Overview).  In our mind, Microsoft needed to do this to help leverage its legacy network of enterprises that could upgrade to the new Windows 10 OS in the most secure way including Server, Exchange, Visual Studio, System Center, Dynamics, and SharePoint.

Moving on, iPad and Android based tablet customers have been frustrated with the slow speed and low power and functionality of these devices for a long time.  In response to this Microsoft has been an innovator and leader with the design and release of the Microsoft Surface.  The Surface redefines what a tablet can be.  It brings full computer power, something that had not been done on a tablet in the past.  As the Surface improved up to its latest iteration, the Pro 4, it proved to validate the clever Windows 10 OS.  As of January 28th 2016 Surface sales are up 29% from last year (2015) (Microsoft Q2 2016 Earnings Report) which suggests that with the right improvements they could also get considerable gains in the phone market.

Why would someone change to a Windows Phone?  First off, there are a lot of users out there that are familiar with Windows in general.  “For example, Skype has been downloaded more than 900 million times on iOS and Android devices, Microsoft CEO Satya Nadella said during a recent earnings call” (Microsoft Q2 2016 Earnings Report).  The only problem in most people’s minds is that they use their phone differently than they use their PC.  Microsoft has to convince these people that there are similarities, cross-usage benefits, and that the user experience is better or good.  From a user experience standpoint, Windows Hello is a great feature that provides for facial recognition log in and Cortana is the virtual assistant that is controlled by voice recognition (Fig. 3.).  Positively, Office Mobile comes with all Windows 10 phones and that includes a great iteration of PowerPoint with a fun and easy to use interface (see video below).  Moreover, all Windows 10 phones can connect to Blue Tooth keyboards, mice, and dual monitors.  Granted, the mobile version doesn’t have a desktop built in like the PC version does but it has something better for the mobile environment, Continuum.  Continuum turns your phone into a big-screen projector and a big-time productivity tool when you have the Microsoft Display Dock as described in the video below.

Fig. 3.

The new Windows 10 is a much more connected OS than previous OSs.  It seems that part of Microsoft’s strategy is connecting the new OS with their cloud business over time.  The Windows 10 Phone gives a lot of connected apps that show new emails, current weather, and news just by glancing at the home screen.  In the iPhone, the icons will rarely show updates.  The only iPhone app that comes with the phone that shows updates is the calendar app.  This is an idea that is built into Windows 10 giving people the convenience of not actually having to open the app to get the information they are quickly looking for.  If they want more information, they can open the app and go from there.  Lastly, the criticism of Nokia as a phone company is exaggerated.  It is a good thing for a hardware and software company like Microsoft to own a phone maker and although not all Lumia models have been hits they have a positive trajectory.  This trajectory is due to enhancements including a great camera, crystal clear screen, a removable battery, Windows Hello, Office Mobile, and most of all its ability to transform into a desktop computer via Continuum.

Jeremy Swenson and Mike Cassem are two seasoned, Intel certified, retail technology marketing and training representatives on assignment at Best Buy for clients including Intel, Trend Micro, Adobe, and others.  Swenson doubles as a Sr. business analyst and project management consultant while Cassem doubles as a Marketer and Sales Consultant.  Tweet to them @jer_Swenson and @micassem.
Jeremy Swenson About Photo for BlogMike Cassem