We have continued our research within Telecommunications and Computing. We identified a new area of disruption: Edge Computing and continued with our research in the other areas of disruption that we discovered. This time our research was more focused on the negative impact that these areas of disruption can or will have. 
 
Issue #1 with Quantum Computing

Essentially quantum computing addresses problems that cannot be solved by classical computers. Quantum computing has the potential to change the world for the better. So, what can possibly go wrong? Privacy is the one disadvantage that does not come with quantum computing which for the most part is something we as individuals do not have. We are constantly being watched all day every day. Even if we have decided to delete an image off the internet or store it in a file with a passcode on it. Nine times out of ten it has already been reviewed by someone else or can be restored by looking through the person's iCloud. Nothing is every permanently deleted no matter if we deleted it years ago. Identity theft continues to increase each and every year as technology becomes more advanced. Breaking current encryption systems is a part of quantum computing which leaves doors open for data theft. If organizations do not already have cryptography to post-quantum algorithms any and all information will be leaked. 
EX: As quantum computers allow for more efficient algorithms, the dangers of hacking increase. Such security risks have been a top priority at Google. They have high expectations for what approach they will take to create their future quantum machine. In the meantime, DARPA (Defense Advanced Research Projects Agency) has set out grand challenges for computer science with a hefty $2 million prize. DARPA's goal is to keep U.S. cyber strength relevant amid the rapid decline in Moore's Law and potential loss of global technological leadership. If quantum computers proliferate, they will threaten everything — not just bank records and medical documents, but everything. They represent a security leak so fundamental that it could be worse than the apocalypse. The quantum computer poses a possible threat to the infrastructure of the United States. Yet the American authorities do not have enough measures in place to stop this type of danger. One way that they can defend themselves is by inventing new safety standards that work with the current technologies.

Solution: For instance, we have a post-quantum crypto (PQC) toolkit that allows you to test digital certificates against quantum algorithms as well as a post-quantum cryptography maturity model to better understand the treat of PQC and how your organization can prepare.
 
The Impact of Quantum Computing on Society
Quantum computing is made up of qubits while modern day computers are made up of bits. 
The issue that occurs with qubits steams from the fact that they are extremely fragile. So, when they are disturbed errors can occur causing the entire system to fall apart. “This phenomenon, which scientists call decoherence, poses significant challenges to the dependability of quantum computers.” Qubits are disturbed by temperature, dust, along with disruptions to any part of a composite system can cascade across the whole system. Due to its fragility, the amount of time a qubit can store memory before falling into decoherence is less than one minute. 
https://www.american.edu/sis/centers/security-technology/quantum-computers.cfm
 
Quantum Computing related to other groups:
Quantum Computing can help with the issue of climate change as group climate-energy-space is dealing with https://eos.org/features/how-quantum-computing-can-tackle-climate-and-energy-challenges
Quantum computing also goes into another groups project such as, policy-government-security. With quantum computing there is no such thing as privacy that identity thief will be as easy as ever. https://www.taylorwessing.com/en/interface/2022/quantum-computing---the-next-really-big-thing/quantum-computing---the-biggest-threat-to-data-privacy-or-the-future-of-cybersecurity 

Issue #2 with Zero Touch

Promises to make deployments easy but usually comes with hidden obstacles vendors don’t tell you about security

Most solutions do live up to being ‘zero touch,’ but only after extensively configuring the device
This is a major security concern because you have to load it up with so much sensitive information about your network
Recent reports show that ransomware claimed a victim every 10 seconds in 2020
Most recent security threats are associated with the increasing number of IoT devices, cloud-based and mobile-based services
It's critical to minimize your exposure to threats but your network attack surface is more distributed now, especially during the pandemic
Having to preconfigure devices for ZT makes it easier to become a victim
Hackers can easily exploit your systems through something like an open port that one of your employees forgot to close
Essentially, preconfiguring puts you at unnecessary risk
ZT Network services need to be safeguarded by additional security measures to not only secure the network but also preserve data, privacy, and integrity
Costs
ZT transformation projects are expensive
Large enterprises evaluate ZT models but only a small fraction pull the trigger on projects
“In 2019, the number of enterprises that adopted ZT IT operations was smaller than the number who cancelled their projects”
Doesn’t Fully Automate Entire Lifecycle
“Never expect to eliminate operations centers completely, but to make them more productive”
While ZT automates deployment & redeployment processes, as well as detect abnormal operating conditions through monitoring, they don’t properly close the loop from alarm to response & remedy
Doesn’t hand off an entire problem to human overseers, but rather just the steps the tools themselves can't cover
Automation is when you can automate simple tasks, while orchestration is when you can automate entire processes and workloads. Most zero-touch solutions allow you to implement a little bit of both automation and orchestration, but limit or simply lack support for orchestrating across devices and environments.”
The more manual work you have to perform, the less value you get out of ZT --> high costs
Most solutions require you to manually bootstrap VMs, activate service licenses, run Docker apps, and even update device firmware as new patches are released
Though ZT might save you time and effort on initial setup, consider how these savings might evaporate in the long run
Fault Avalanche - In complex IT infrastructures, a system or resource failure can spur follow-up issues.
High level tech run on and depend on something at a lower level
If something fails at that underlying level, then everything above it fails too
Depending on how IT teams to monitor, correlate and report on faults, an operations expert can end up w/ a thousand reported problems when really there's only one
“When a core resource fails, it often causes a range of secondary IT system failures due to their relationship with that failed core component. These secondary failures can themselves cause more failures, resulting in an explosion of fault reports that makes it difficult for IT operations personnel to respond, or even understand what's happening.”
Advice - Enterprises should ease into zero-touch automation. Never expect to eliminate operations centers completely, but to make them more productive. Aim to improve routine tasks and define policies to handle non-complicated issues through automation. While zero-touch tools will reduce manual efforts, they'll still need to be monitored by human operators.
5G

Issue #3 with 5G regarding aviation 

While 5G can bring a lot of good and innovative changes, but also can bring some issues as well  
One of the issues is its potential impact on aviation. 
The aviation industry has long had concerns over 5G and its affects on flights, the issue is radio interference. 
This started in January of this year, when 5G services used frequencies in a radio spectrum called c-band
It uses a similar frequency as an airplane's altimeters, which could lead to the disruption of flights 
Altimeters are a key part of an airplane, and any disruption or problem is dangerous. 
The Federal Aviation Administration (FAA) suspects that 5G may have caused roughly 80 instances of aircraft system inference
The Federal Communications Commission and FAA have long been at odds over this. While tension have seemed to calm, it is something to keep an eye on in the future.
5G will continue to grow and get more advanced like it did with c-band, eventually 6G will come. Who’s to say that these advancements and innovation will not lead to potential disruptions and problems regarding aviation? 
Why do we go from 4G to 5G, and not 4G to 6G? 
 
This was a question that was posed to us by Professor Shannon. It is a question that can also be reworked/expanded on, why did we go from 4G to 5G and not 3G to 5G? The main reason that we have found so far is that it is because of a lack of capacity or ability. We do not have the technology to handle going from 4G to 5G instantly. When 3G was used and prevalent, we did not have the technology available and what else was needed in order to jump to the 5G that we currently have now. As consumers we have a very limited and easier view and experience with these switches in technology. We simple buy the updated version or update our current technologies. It is a much longer and more thought-out process when it comes to countries and mobile providers rolling out 5G to switch from 4G. It takes years of planning and mapping out. A question that we had while looking into this was whether or not we could've waited at 3G and then just upgraded to 5G, completely skipping 4G. Can I stay at 4G and wait for 6G to come out and then upgrade? The reason why this scenario is highly unattainable is because of the need to upgrade in order for your technology to work efficiently and at the level you need it to. You do not want to be left behind technologically. The world will be involving all around you. By the time you decide to upgrade and get with the times after awaiting, you will face an uphill battle trying to get with the times
   
 
Issue #4 with Automated Reality (A.R) 

Issues facing AR Development and Integration
Staggered development and lack of Research and Development spending has caused a significant decline in progress compared to other technology being sold to consumers
This has led to an “awkward phase” that has led researchers to believe that the consumer is less engaged and not eager to spend discretionary income in the direction of AR related tech
In the tech community, many believe there is a clear advantage in development to companies that have already invested in hardware (such as Meta with Oculus)
Companies such as Apple have had internal struggles developing consumer ready products due to their lack of progress in developing a product such as a VR headset
Google is another example that has had hardware experience (Google Glass) and has seen major improvement in the development of AR use cases
This Article from TechCrunch discusses these issues, using insider-information from within Silicon Valley
Issues facing AR regarding privacy and Security 
In recent years, popular apps such as Pokémon GO have employed AR technology in order to garner a more immersive user experience
Although popular, the game has been the cause of recent lawsuits due to trespassing and destruction of private property
With the release of more intuitive and immersive AR experiences that tech companies are looking to sell to consumers, many issues of security have been called into question
The following article from Deloitte shares recent issues with AR security concerns
https://www2.deloitte.com/us/en/insights/industry/public-sector/regulating-digital-reality-augmented-spaces.html
With constant scanning of one's surroundings, AR headsets have been questioned by many in terms of copyright
For example, AR technology has the capability to digitally replace a billboard with new images that the user may see, instead of the originally intended message in real-life
Revenue stream-risk is a fear of many regarding the implementation for a number of reasons
AR companies employing areas of note within a space may drawl attention from areas which are occupied by small businesses]
For example, a company could geotag a popular location such as Time Square in Manhattan, and drawl tourists away from smaller neighborhoods that may have seen their business if not drawn to other areas
Issue #5 with Edge Computing 
It is computing that occurs at the fringes of corporate networks. Where end devices such as phones, laptops, and sensors connect to the rest of the network. The edge used to be the location where these devices connected in order to deliver data to, receive instructions from, and download software updates from a centrally located data center or the cloud. That model is no longer widely used in the age of IoT. The sheer volume of data collected by IoT devices necessitates larger and more expensive connections to data centers and the cloud. Due to the nature of the work performed by these IoT devices, much faster connections between the data center or cloud and the devices are required.
Edge computing is being driven by the growth of IoT and is required for 5G.
Environment
Edge computing is also great for the environment it helps lower energy consumption and reduces latency. 
Edge computing enables temperature and humidity sensors in agricultural fields to collect valuable data. Where real-time analysis or storage of that data is not required. Making it more sustainable. 
To predict potential disasters, remote sensors can gather and analyze data about changes in the environment or the weather.
Issue-Solution 
Although there are advantages and disadvantages to edge computing, especially with the anticipated expansion of 5G access. More users are accessing data using a variety of devices, which is rapidly changing edge computing and how it is used. 
A good example of that is Latency
Latency can be decreased if computation is done locally or only at the center, which is closer to the data. But typically, latency problems arise as a result of distributed computing and computation in both directions. 
Samsung claims that programmatically expected latency associated with both node and core can be determined by examining network architecture made up of edge data centers and edge nodes. The edge transfer process can then be enhanced based on the calculated difference in latency between them.
Another issue is security which is huge
IoT is known for having weak security, and each device in an edge server represents another endpoint that could be vulnerable. Smaller data centers, like devices are not built with security precautions in mind are not updated as frequently as they should be. 
Zhejiang Geely Group, a global auto manufacturer, offers a solution for edge computing security problems. Edge computing presents significant technical and physical security challenges as a result of the substantial amount of data exchange between the data center and the edge. Security mechanisms must be scaled and decentralized in the case of embedded or micro-embedded devices used as a component of an edge server. Which they will need to add more hardware.
Connections to Other Groups Topics/Projects
Telecommunications and computing can really affect some of the other areas the class are investigating. 
One of the main ways is through connectivity, allowing for the possibility for certain things to be possible
News and information are one that stands out immediately. Our topic is all about making these faster and easier, that goes with news and information perfectly. In today's world everything news related is being released online in some fashion. News sources have two things on their mind: how to get the news out fast and make it accessible. The increases in telecom will further allow news sources to do just that.  
We will also be able to expand how news and other information is delivered and presented though automated reality. 
5G can also have an effect on climate change as well. 5G is all about making things more efficient, this efficiency will reduce our carbon footprint. 5G is expected to reduce carbon dioxide emissions by 330.8 million metric tons by 2025 according to a report done by Accenture.    
ZT --> smart manufacturing w/ “robots” --> 3D printing food in agtech
ZT --> smart cities --> climate
ZT security issues --> policy, gov, security
Back to Top