Documente Academic
Documente Profesional
Documente Cultură
Artificial Intelligence
Cloud Computing
Research & Development
The Federal Information Technology Acquisition Reform Act made changes to the ways the U.S. federal
government buys and manages computer technology.
Pre-Reforml: US spends over $80 Billion a year on IT and Products and services. Almost half goes to
maintaining old and out-of-date systems.
Cybersecurity Information Sharing Act (CISA) - Its objective is to improve cybersecurity in the United
States through enhanced sharing of information about cybersecurity threats, and for other purposes.
Cybersecurity Enhancement Act of 2014: It was signed into law December 18, 2014. It provides an
ongoing, voluntary public-private partnership to improve cybersecurity and strengthen cybersecurity
research and development.
Federal Exchange Data Breach Notification Act of 2015: This bill requires a health insurance exchange
to notify each individual whose personal information is known to have been acquired or accessed as a
result of a breach of security of any system maintained by the exchange as soon as possible but not later
than 60 days after discovery of the breach.
National Cybersecurity Protection Advancement Act of 2015: This law amends the Homeland Security
Act of 2002 to allow the Department of Homeland Security's (DHS's) national cyber security and
communications integration center (NCCIC) to include tribal governments, information sharing, and
analysis centers, and private entities among its non-federal representative
Post-Reform Impact:
With a track record of excellence in complex problem solving and a natural advantage in globally
significant industries, Australia offers compelling opportunities in disruptive technologies for buyers,
investors and collaborators.
Important Technologies:
ADDITIVE MANUFACTURING - 3D model data - Streamlining supply chains, reducing inventory
requirements, lowering production costs, and driving new intelligent lightweight designs.
ARTIFICIAL INTELLIGENCE - Australia’s innovation and startup hubs, accelarators and venture
capital communities are actively promoting and building capability in AI. (CAI) Centre for
Artificial Intelligence is a world-leading research centre in AI. Its vision is to develop theoretical
foundations and advanced algorithms for AI and to drive progress in related areas such as
Computational Intelligence, BI, Data science, Machine Learning.
AI and Robotic automation is perhaps the biggest economic opportunity that Asutralia has over
the next 30 years. It is by far the largest source of productivity growth and could potentially add
up to $2.2 Trillion in value to the Australian economy by 2030.
AUTOMATION
Australian industry ws an early adopter of automation – the use of machines and technology to
make processes run on their own without input from an operator.
BIG DATA
The department of the Prime Ministe and Cainet has also established the DATA INTEGRATION
PARTNERSHIP FOR AUSTRALIA(DIPA), demonstrating austalia’s commitment to a data-led
economy and data-driven organizations.
BLOCKCHAIN
Investment by the Australian Government through Data61 to research this undeniably globally
transformative technology puts Australia on the leading edge of the nations looking to educate
the population on the applications and opportunities presented by the blockchain technology.
CLOUD
Australia’s cloud computing competitive advantage stems from its geographic isolation,
availability of low-carbon energy sources for data centres, low sovereign risk profile and a
regulatory environment with robust privacy laws. SAAS, IAAS, PAAS are the three primary types
of cloud services.
Getting global investments from US, Amazon Web Services, IBM, Microsoft and Oracle.
Financial service firms such as Chi-X and Bloomberg has investments in Sydney.
CYBER SECURITY
With robust legislation, advanced law enforcement capability, rigorous policy development and
strong technical defences, Asuralia is an ideal environment for advanced research in cyber
security.
CSIRO’s Data 61: Australia’s largest data innovation, developmed the seL4 Kernel, which provides the
strongest operating system security available in the world. The Defence Science and Technology Group
has developed award winning approaches for the trustworthy use of commercial hardware. Data61 and
DST are partenering to bring together these developments and provide feasible rustworthy software
and hardware solutions with broad applicability.
Statistics: 1) Gowth of the Australian cyber security industry from A$ 2 BN to A$ 6 BN. Has the potential
to almost triple in size by 2026.
GVA(£bn)
2010 2011 2012 2013 2014 2015 5 Year
Growth
IT, 25.4 27.9 28.9 30.6 33.1 34.7 38.8%
Software
and
Computer
services
% if UK 1.8% 1.9% 1.9% 2.0% 2.0% 2.1%
total
UK Total 1,414.6 1,452.1 1,495.6 1,624.3 1,661.1 17.4%
Existing regulatory arrangements for the digital sector are largely driven by the European
Commission’s Digital Single Market (DSM) Strategy,17 published in May 2015. This outlined 16
initiatives to update the Single Market for the digital age, promote digital trade and encourage
the growth of the digital economy. These consist of a mix of regulatory and non-regulatory
measures, covering digital, broadcasting and telecoms. The DSM includes initiatives on:
free flow of data;
cyber security;
e-Privacy;
setting ICT standards; and
intellectual property.
Data Protection
From 25 May 2018, the EU General Data Protection Regulation (GDPR) will replace the 1995
Data Protection Directive as the EU standard on general data processing. The UK Government has
introduced a new Data Protection Bill to repeal and replace the Data Protection Act 1998 with a new law
that provides a comprehensive and modern framework for data protection in the UK.
Stronger sanctions for malpractice and set new standards for protecting general data.
Give people more control over use of their personal data, and providing new rights to move or
delete personal data.
Existing frameworks for how trade is facilitated between countries in this sector
World Trade Organisation (WTO) – Sets rules for trade such as General Agreement on Tariffs and
Trade(GATT), The General Agreement on Trade in Services (GATS) and the Agreement on Trade Related
Aspects of Intellectual Property Rights (TRIPS) agreements.
Business Leaders about technology I their organization has already implemented, the top three
answers were:
60% Cloud
53% Data Analytics
31% IoT
When asked about the technology they plan to implement in future, the top three answers were:
32% AI
29% Robotic Process Automation (RPA)
Wearables
CHINA
The three most important government agencies in china with respect to ICT policy are the
National Development and Reform Commission (NDRC)
Takes charge of plans and public investment.
The Ministry of Industry and Information Technology (MIIT)
Is responsible for the policy and operational action in the ICT industry.
The Ministry of Science and Technology (MOST).
Supports R&D
Above all three, there is a newly appointed Central Cyber security and Inforamatiztion Leading
Group, head by President Xi and composed of 21 ministers from related ministries and
commissions.
The most important law may be the Telecommunication Regulation passed in 2000, which
affected the telecom market of China for more than 10 years.
In 2004, Electronic Signature Law was passed to provide the legal status to electronic signatures
in E-commerce.
Radio Regulations, enforced in 1993, has been renewed in 2014 to provide radio spectrum for
mobile broadband.
A core component of China’s ICT strategy has been the development of indigenous ICT technologies
and industries so that China is not dependent on trade in these technologies.
CLOUD COMPUTING
Government views cloud computing as an important wave of ICT development that China my be
able to use to gain a significant competitive advantage. This is why the initial introduction of
cloud computing in to China was quickly followed by a tide of Internet data centre(IDC)
construction. Nevertheless, the growth potential of China’s cloud computing market is
significant. This is why Alibaba, Baidu, Tencent, and other domestic companies began to deploy
cloud computing services several years ago, and many solution or software companies also
embraced cloud solutions. Because of this, international cloud leaders are also focusing on the
Chinese cloud market.
INTERNET OF THINGS
The peak of inflated expectations for the Internet of Things in China began in 2009. But the
widespread adoption of IOT applications did not appear until after that year, and China realized that it
might take dozens of years to see the full benefits from the Internet of Things.
There are many categories in IOT, such as intelligent household appliances, smart power grids,
health applications, intelligent buildings, and smart transportation. China has focused on a number of
different IOT applications.
Every year, 250 petabytes of new data is put into storage in China, equivalent to 40 percent of
Japanese levels and 6 percent of North American levels.
DATA INNOVATION
“BIG DATA” and data innovation more broadly have gained considerable attention in China,
with many conferences held and industry association efforts made in the last three years.
Estimated that China’s total amount of data storage in 2012 is 364 Exabytes.
Alibaba can predict consumer price inflation (CPI) according to the transaction data on its platform, and
it can provide small loans to users according to their credit record. Alibaba even collects data through
the provision of subsidies for its users to encourage usage.
The Industrial and Commercial Bank of China, the largest bank in the world, has 4,500 terabytes of data
which it uses to provide custom service and risk management.
Many actions have been taken corresponding to the new-round’s reform decision in the ICT
field. Virtual Network Operators(VNO) are now required and allowed to rent telecom network
facilities from the incumbents in order to provide their own service.
The government also established the Shanghai Free Trade Zone and adopted the new special
administrative measure (negative ist) on foreign investment access to China.
This means that foreign investment is allowed to run any business in the one as long as it is not
on the negative list.
CONCLUSION
Reforms should focus on results, and the recent reform efforts in China are a refletion of this view.
China has a long way to go before its ICT market is fully open to foreign investment and providing
equal treatment to foreign and domestic providers. Chinese govt. appears to be giving the lion’s
share of policy focus to Chinese ICT industry development.