Lighthouse projects: Added value through logistics
The 40th Zurich Logistics Colloquium will take place on Thursday, May 8, 2025, and will once again present various logistics lighthouse projects. The organizer, Dr. Acél & Partner AG, is once again counting on the cooperation of ETH Zurich for the anniversary edition.
Editorial office - March 26, 2025
The traditional Zurich Logistics Colloquium is celebrating its 40th edition: on May 8, 2025, three leading personalities will present the creative solutions and skilful use of individual potential that have led their companies to new successes. Participants will benefit from innovative impulses and pioneering ideas from these lighthouse projects.
This year, the experts will be speaking under the motto «Added value through logistics". The topics in detail:
Highly complex, expensive, indispensable
Smart logistics for the machine tool industry, high pressure to innovate and perform
Dr. Fabian Stoop
Technical Manager
Lestoprex AG, St. Gallenkappel
Circular economy in action
CH-wide collection of electrical and electronic appliances, success factors
Pasqual Zopp
Managing Director SENS eRecycling, Zurich
Recycling starts at the source
Information and logistics are key,
Practical example of unmixed steel scrap
Nicolai Solenthaler
COO
soRec AG, Gossau SG
The presentations will provide new food for thought, potential and ideas. The subsequent aperitif riche will provide an opportunity for a lively exchange with the speakers, other experts and guests.
SCSD 2025: Focus on quantum security and the protection of minors
The Swiss Cyber Security Days (SCSD) took place in Bern on February 18 and 19, 2025. This year's edition was held under the motto "Eye of the Cyber". An annual evaluation of the cyber security situation in Switzerland showed once again that there is still a lot of work to be done.
Thomas Bernard - February 20, 2025
"Eye of the Cyber - create tomorrow" - that was the motto of this year's Swiss Cyber Security Days. (Image: SCSD 2025)
Some visitors may have left this year's Swiss Cyber Security Days with a queasy feeling: Are my passwords still secure? Can I still trust e-banking? And which Tinder profiles are real and which are fake? The threat situation has become even more diverse compared to previous years. Program Director Nicolas Mayencourt emphasized in his opening speech that the cyber security situation is alarming: "Technology is developing exponentially, our thinking is linear. We urgently need to act and boldly shape the digital future - a secure cyberspace and confident use of technology will become a decisive factor for success."
"Democratization" of new technologies
Jean-Marc Rickli from the Geneva Center for Security Policy, for example, underlined the fact that the use of technology is by no means as sovereign as it seems. He showed how the blessing of technological development can easily become a curse. 3D printing? A great thing for prototyping or the production of special components for industry. But also a way to quickly produce a functional weapon made of plastic that outwits any metal detector and can be easily disposed of "after use". Or equipping a drone with facial recognition software and unleashing it on an appropriately "personalized" target is also possible with comparatively little effort. In this way, warfare is no longer just a matter for armies.
Similarly in cyberspace: it is no longer just about phishing emails or other scams. AI is opening up new possibilities, especially for disinformation. The advances in so-called deep fakes are immense and are leading to increasingly unrestrained use - both by petty criminals and state institutions, as examples from the war in Ukraine or the conflict in the Gaza Strip show. Jean-Marc Rickli sees a major danger in the fact that people will ultimately no longer be able to trust any information. "The social contract between citizens and democracy is under threat," says the expert. "Weapons of mass destruction" would be replaced by "weapons of mass disinformation".
Better protection for children and young people
A rather dystopian world in which the younger generation also has to grow up. Regula Bernhard Hug, Head of the Swiss Child Protection Office, and Christian Brenzikofer, Commander of the KAPO Bern, stated at a media conference on site that children and young people are increasingly exposed to dangers in cyberspace. The increasing online addiction of young people, as well as the rising cases of sextortion and paedocrime, are of concern to the specialist unit and the authorities. "In the canton of Bern, the KAPO Bern deals with between 200 and 250 suspected cases of paedocrime," says Christian Brenzikofer. Major efforts to prevent and raise awareness of this issue remain important. Parents and schools are the most important partners in showing young people how to use online media responsibly. But it is also a task for society as a whole, as Regula Bernhard Hug emphasized. The manufacturers of devices and providers of social media portals must also be involved by setting up safety-by-design standards and data protection-compliant age verification. A general ban on social media for young people under the age of 16 would be the last resort.
Had to come to the sobering realization that there is still a lot wrong with cyber security in Switzerland: Nicolas Mayencourt from Dreamlab Technologies. (Image: Thomas Berner)
Swiss cyberspace: still easily vulnerable
Another highlight of SCSD 2025 was the analysis of Switzerland's cyber security situation, carried out by Dreamlab Technologies. Every year, the company uses specially developed software to scan the infrastructure connected to the internet throughout Switzerland. This involves over 3.2 million ports, of which over 2 million are vulnerable and over one million ports are even open and could be misused without any special IT knowledge. Over 250,000 hosts also work without encrypted communication. There are therefore many critical vulnerabilities. "We are doing anything but well," as Nicolas Mayencourt and Prof. Dr. Marc K. Peter, who presented the results, found out. Government-related IT infrastructures are no exception, as the two explained. For example, there are still a number of weaknesses at the federal government that have been known for years but have not yet been eliminated. The high level of dependence on foreign providers is also problematic, which jeopardizes the government's own digital sovereignty. Overall, the cyber security situation in Switzerland is sobering. "Despite the tense general situation, no major improvements are discernible," Nicolas Mayencourt noted. This is all the more regrettable because 80% of the vulnerabilities could be avoided with simple measures. It also shows that although most SMEs are technically well on their way, there is still a lot of catching up to do in terms of organization. "Cybersecurity is a matter for the boss," says Mayencourt.
Encryption must now be quantum secure
Quantum computer technology poses a further threat to cyber security. The immensely faster computing power of quantum computers means that it will one day be possible to crack all conventional encryption. Experts assume that this moment, known as "Q Day", will take place in 2030. But regardless of this, all encryption systems used today will be obsolete by then anyway, because conventional computer technology will also become increasingly advanced. This means that future-proof encryption systems must be "quantum-proof" in any case. According to the analysis by Dreamlab Technologies, around 85% of servers in Switzerland could already guarantee quantum-safe communication today, but only around 10% are already actively doing so. The good news, however, is that Switzerland is playing a leading role in the development of new post-quantum cryptography standards. For example, the IBM research center in Rüschlikon played a key role in the development of new algorithms that can replace conventional 2048-bit encryption technology.
Satisfied exhibitors and organizers of SCSD 2025
In addition to these focus topics, the SCSD 2025 also had a number of other highlights: There were interesting insights from the Cyber Division of the FBI, for example, and the remarks by Corps Commander Thomas Süssli and panels on disinformation or radicalization on the Internet also met with great interest from the total of around 2,500 visitors. The interdisciplinary exhibition "Alternate Realities" was a novelty. This was realized in collaboration with the Museum of Communication, the gibb vocational school in Bern and the Bernese motion designers Kaspar Kilchenmann and Yan Hirschbühl and impressively showcased the creative possibilities of AI.
Overall, the 90 or so exhibitors and the organizer also drew a positive balance. The SCSD took place at the BERNEXPO site for the second time in a row and built on last year's success. "Especially in the current times, which are characterized by protectionist developments, the Swiss Cyber Security Days impressively demonstrate the importance of cooperation and exchange in order to meet the challenges of the digital world," said Tom Winter, CEO of BERNEXPO AG. Hornetsecurity, a leading provider of cyber threat solutions, took part as an exhibitor for the first time. Country Manager Switzerland, Roger Staub, speaks of a complete success: "With our product solutions, we were able to show how companies can comprehensively protect themselves against cyber threats. We are proud of the networking party, which created a great platform for professional exchange and new contacts. Our commitment to a more secure digital future continues - which is why we expect to be back at the SCSD in 2026." The next edition of the SCSD will take place on February 17 and 18, 2026.
Companies struggle with complex challenges in global supply chain management. The right software can be crucial, but the choice is difficult. The "Aachener Marktspiegel Business Software - Supply Chain Management 2025" compares almost 160 solutions and provides a market overview.
Editorial office - February 17, 2025
A comparison of over 160 supply chain management solutions. (Image: Trovarit AG)
The newly published "Aachener Marktspiegel Business Software - Supply Chain Management 2025", published by Trovarit AG in cooperation with the Fraunhofer Institute for Manufacturing Engineering and Automation IPA and the FIR e.V. at RWTH Aachen University, offers a decision-making aid for all those companies that want to gain a competitive advantage with a new SCM solution.
Comprehensive market overview - orientation in a dynamic environment
The updated edition of the market review examines and compares almost 160 SCM solutions from over 130 SCM providers. This provides companies with a well-founded and independent guide for their software selection. The market review examines both specialized SCM systems and ERP systems with integrated SCM functionalities in order to show which solutions are suitable for which company requirements.
SCM software: increasing efficiency through digitalization
Modern SCM software supports companies in a variety of ways: from demand planning to production and distribution control to real-time monitoring of supply chains. Transparency, flexibility and resilience in the supply chain are essential, especially in view of global uncertainties and volatile markets. The market review analyzes the core functions of SCM solutions and provides companies with a systematic basis for comparison and evaluation.
Practical assistance for software selection
The large number of SCM solutions on the market does not make it easy to decide which software to use. The market review shows which solutions are particularly suitable for specific requirements and provides a structured methodology for the reliable and efficient selection of SCM software. The analysis is based on key criteria such as functionality, user-friendliness, integration capability and investment security.
To mark Equal Pay Day on February 15, 2025, the global consulting firm Mercer has published the "Global Pay Transparency Report". The report concludes that while pay transparency is becoming increasingly important, there is still a lot of catching up to do in terms of implementing transparency requirements, particularly in Switzerland.
Editorial office - February 14, 2025
The Global Pay Transparency Report by Mercer still sees some catching up to do in terms of pay transparency, especially in Switzerland. (Image: Depositphotos.com)
The "Global Pay Transparency Report" published by Mercer is based on responses from more than 1,000 companies worldwide. It essentially concludes that pay transparency is becoming increasingly important for companies around the world - not only to comply with local regulations in certain countries, but also to attract and retain employees.
Wage transparency only due to regulatory pressure?
According to the survey, for 77% of companies globally, compliance with regulations is the main reason for their pay transparency strategy. More than 50 percent see improving employee satisfaction and consistency with corporate values as important aspects. The values for Swiss companies are largely in line with the global results.
"It is time for companies to take action on pay transparency. Because fair pay is the second most important reason why employees choose a company. Employers should prioritize this fact in order to continue to operate successfully," says Mikolaj Jaszczuk, Principal Consultant Rewards at Mercer Switzerland.
Significant deficits
Although employers recognize the rising expectations around pay transparency, there is still a significant implementation gap. Less than a third (32 percent) of companies said they were prepared to meet global transparency requirements. In Switzerland, the figure was 50 percent.
Despite differences in pay transparency legislation, US companies are leading the way, with one in five companies having a pay transparency strategy in place. In Europe (excluding the UK and Ireland), only 7 percent of companies have a pay transparency strategy in place, although pay transparency legislation will come into force in the EU in 2026.
Main differences and limits of current equal pay requirements
The Swiss equal pay requirement, which is part of the revised Gender Equality Act, is a step in the right direction, but its one-off nature and lack of required transparency can significantly limit its effectiveness. In an article, Mikolaj Jaszczuk and Stefanie Schweitzer, Managing Consultant Rewards and Pay Equity, shed light on the differences between the Swiss Equal Pay Act and the EU Equal Pay and Pay Equity Directive. While Switzerland prescribes a one-off equal pay analysis, the EU relies on a continuous review to ensure long-term equality.
The Swiss Gender Equality Act, which was revised in 2020, requires companies with more than 100 employees to carry out a one-off equal pay analysis. This must be carried out using a scientifically validated method and audited externally. Companies that pass the audit do not have to carry out any further analyses. This means that there is no mechanism for regular monitoring and further development, which makes the law less effective.
In contrast, the EU directive obliges companies to carry out regular analyses - either annually or every three years, depending on the size of the company. It also promotes transparency by requiring companies to disclose salary information, which should lead to a fairer salary structure. Applicants are also entitled to information on salary structures, while employers are not allowed to ask about salary history. This reduces information asymmetries between companies and employees.
Should Switzerland revise its model?
The article from Mercer identifies the following four main differences between the Swiss regulation and the EU directive:
Frequency of analyses: While Switzerland requires a one-off inspection, the EU relies on continuous monitoring.
Method of analysis: Switzerland requires a scientifically validated regression analysis, while the EU prescribes a more general equal pay test.
Scope and transparency: The EU attaches great importance to transparency by obliging companies to disclose salary information. Switzerland only requires internal communication of the results.
Monitoring and control: There is no official monitoring body in Switzerland. However, the EU obliges member states to set up monitoring bodies to ensure compliance with the regulations.
The authors conclude that the one-off analysis in Switzerland is not sufficient to ensure sustainable equal pay. While the EU directive can bring about a far-reaching change in the salary structure, the Swiss model remains a one-off instrument with no long-term effect. It may therefore be necessary to adapt the Swiss regulations in order to keep pace with international standards and ensure fairer pay.
Hospitality in Switzerland 2025: What does the future hold?
Tourism and the hospitality industry in Switzerland are booming: according to the trade union Unia, the Swiss hotel industry has never recorded as many overnight stays as in the last two years. Keeping pace with the competition remains a challenge.
Yvan Cognasse - February 11, 2025
The Swiss hospitality industry is recording rising guest numbers. Hospitality businesses will rely more on AI and other technology support in the future. (Image: Alev Takil / Unsplash.com)
As a leading provider of technology solutions for the hospitality industry, we at Oracle present our predictions for the hospitality industry in 2025. Based on our expertise and insights from working with various hospitality companies, we expect the following developments over the next 12 months.
1 AI: From experiment to effect
The strong focus on AI-driven automation in the hospitality industry will evolve from buzzwords and experiments to concrete initiatives that solve acute industry problems and create new opportunities.
From streamlining check-in processes to personalizing the guest experience, AI will improve customer service and offer tailored suggestions such as room upgrades or dining recommendations in real time. Sophisticated gestures, long researched and implemented by experienced concierge staff, were previously limited to the size or resources of the hotel. However, AI can help to efficiently plan, find and implement real services in hotels of all sizes - with minimal effort and cost.
In the future, AI will support hoteliers in making important decisions by recognizing and monitoring problems that might otherwise go unnoticed. In this way, hotels can make their processes more efficient, react flexibly and make quick, data-based decisions. AI will also change staff planning by optimizing work processes and taking over routine tasks. This gives staff more time to focus on more demanding and valuable tasks.
With open APIs and plug-in marketplaces, hotels can test AI technologies quickly and cost-effectively and receive results within a few weeks, enabling a faster decision to implement or switch to alternative solutions.
2. the controlled journey of the guest: from arrival to the follow-up of the stay
The first innovations in the area of guest-oriented applications were associated with hesitation, resistance and obstacles. Hoteliers, for example, were concerned about sacrificing guest service and disrupting operations. Those days are over. The successful adoption of technology solutions in the hospitality industry has allayed these concerns by enabling improved service and granular control over the guest experience - perfectly aligned with hoteliers' needs.
In the future, guests will have more control and influence to make their trips individual and memorable. Thanks to the multitude of online booking platforms and new providers in the travel industry, such as credit card companies with travel rewards and special offers, new opportunities are opening up for tech-savvy travelers in particular. By cleverly using several loyalty programs, they can combine various benefits and tailor their trips perfectly to their personal wishes.
Hoteliers who embrace innovation and focus on creating unique guest experiences are unlocking significant opportunities. By using technology to support new experiences before and during the stay, hotels can enhance their offering. Technology on and off property is enabling a customer-centric, attribute-based sales approach that allows hotels to go beyond traditional room types and pricing. This evolution allows guests to customize their stay by selecting specific attributes such as a higher floor, a balcony, a connecting room or a mini-kitchen to suit their preferences and needs. Hotels that recognize and capitalize on these partnership opportunities will find themselves at the forefront. Not only in terms of revenue growth, but also in delivering memorable guest experiences.
3. technical consolidation: rationalization of processes, improvement of guest satisfaction
The hospitality industry is at a turning point and technology is at the heart of the change. Hotels have recognized the critical role that technology plays in the success and enhancement of the guest experience. As guest expectations are constantly evolving, it is crucial for hotels and hospitality businesses to stay ahead of the curve. This means not only introducing innovative solutions, but also strategically partnering with technology providers who can simplify their operations and expand their offerings.
By consolidating their technology ecosystems and choosing vendors that offer a comprehensive suite of core solutions, the need to duplicate interfaces and map data between systems, which could lead to friction and silos, can be avoided. In this way, foodservice brands can streamline their operations and reduce the complexity often associated with managing multiple vendors.
This streamlined approach can bring numerous benefits. Working with providers that have a broad range of capabilities can increase cost efficiency. By bundling services and solutions, suppliers can offer more competitive pricing and flexible packages tailored to the individual needs of hospitality operations. This not only simplifies the financial side of supplier management, but also opens up opportunities for cost savings that can be reinvested in improving the guest experience.
Another key benefit of strategic vendor partnerships is the potential for innovation. When hotels and hospitality businesses work closely with technology providers, they can jointly develop solutions that address specific industry challenges and meet the unique needs of their guests. This collaborative approach fosters a culture of innovation that helps hospitality businesses stay at the forefront of the latest developments and offer their guests an exceptional and differentiated experience.
4. sustainability and environmentally conscious innovations will make great progress
With the 2030 sustainability targets only five years away, there will be a renewed focus on sustainability practices and more environmentally conscious technological innovations will be integrated into hotels. This can include a variety of areas, such as energy management and smart water monitoring systems that help hoteliers optimize their energy and water consumption respectively.
Furthermore, hotels will increasingly adopt cloud-based and digital platforms that can reduce on-site energy consumption, promote paperless operations and minimize waste. There will be a particular focus on the use of sustainable and recycled materials in products to make the hospitality industry more environmentally friendly from the ground up.
5. security as a competitive advantage
Several notable security breaches over the past year have reminded the hospitality and gaming industries that they are attractive targets for cybercriminals. The exposure of guest data, disruption of operations and damage to brand reputation have served as a stark reminder that security remains a key priority and an ongoing challenge for the hospitality industry.
While security is a necessity, doing more can be a competitive advantage in an increasingly risky digital world. Guests are increasingly sensitive with their personal data, and a breach of trust can lead to a loss of loyalty and significant reputational damage. By treating security as a fundamental aspect of the guest experience, hospitality and hoteliers can ensure that their businesses remain resilient and trustworthy for years to come.
As a direct response to this, we expect an accelerated development towards cloud solutions in secure data centers. The cloud offers advanced security features that on-premise solutions often cannot match. With advanced encryption, multi-factor authentication and robust access controls, cloud solutions can provide stronger protection against cyber-attacks.
By leveraging the expertise and infrastructure of cloud providers such as Oracle, hospitality businesses can benefit from purpose-built, secure data centers. These facilities are designed to protect sensitive data and mitigate risk so that guests' information remains protected and confidential.
In 2025, we are therefore reinforcing the message that safety is at stake. It is the foundation on which both guest trust and brand reputation are built. By prioritizing safety, hospitality businesses can not only protect themselves, but also promote a culture of trust and reliability that resonates with guests.
Author: Yvan Cognasse is a seasoned digital transformation expert with over 30 years of experience. He is head of the Business Insights and Enterprise Architects team in the Northern Europe region at Oracle and responsible for driving solution growth and maximizing operational excellence. Yvan Cognasse is also a lecturer in digital transformation at HEG Geneva and a keynote speaker on artificial intelligence.
Serious security gaps discovered in hospital information systems
According to a report by the National Cyber Security Test Institute (NTC), serious security gaps have been identified in hospital information systems. The report makes recommendations on how cyber security in Swiss hospitals can be sustainably improved.
Editorial office - January 23, 2025
Some hospital information systems have serious security vulnerabilities, according to a report. (Image: Depositphotos.com)
Hospital information systems are at the heart of modern hospitals. They control the flow of information, process sensitive patient data and ensure smooth processes in the hospital environment. An investigation by the National Cyber Security Test Institute (NTC) has now revealed that the cyber security of these essential systems is inadequate in many cases.
Results of the analysis
According to the report, serious security vulnerabilities were found in all the systems examined. In total, the report identifies more than 40 medium to severe vulnerabilities. Three of these are of the highest criticality. Solutions based on outdated architectures were found to be particularly vulnerable. The main problems include fundamental architectural issues, missing or improperly implemented encryption, vulnerable peripheral systems and insufficient separation between test and production environments, according to the report.
Tests have shown that some of the identified vulnerabilities allow full access to patient data and systems within a few hours. While most of the relevant vulnerabilities have now been resolved or mitigated, some fundamental problems require a comprehensive redesign of the software architecture, which according to the manufacturers will take several years. In addition, several critical vulnerabilities in peripheral systems were discovered during the analysis that were not part of the defined scope of the audit, but were recognized as incidental findings due to their conspicuous nature.
The report deliberately refrains from giving details of the weaknesses. Instead, it provides general information about the NTC Vulnerability Hub as well as targeted notification of affected hospitals via the Cyber Security Hub (CSH) of the Federal Office for Cyber Security (BACS).
Recommendations for hospitals
The report contains eight key recommendations for the sustainable improvement of cyber security in Swiss hospitals. These include taking cyber security requirements into account as early as the IT procurement stage and carrying out regular vulnerability analyses for ongoing monitoring. In smaller hospitals in particular, responsibilities with regard to cyber security must be clearly defined and the necessary resources made available. In addition, increased networking between hospitals and access to the Cyber Security Hub (CSH) of the Federal Office for Cyber Security (BACS) is recommended.
AI in 2025 between self-optimization, cooperation and efficiency
Nutanix, a service provider specializing in hybrid multicloud computing, sees the use of artificial intelligence in companies entering a new phase in 2025. It will be characterized by self-optimization, cooperation and efficiency.
Editorial office - January 17, 2025
AI in 2025: Induprakas Keri from Nutanix predicts the development of self-optimizing software. (Image: Nutanix)
2025 marks the start of a profound transformation of enterprise software. It will go beyond the previous democratization of software development and engineering using generative AI and will change the previously stable software workflows. This is how Induprakas Keri, Senior Vice President and General Manager Hybrid Multicloud at Nutanix, sees the near future. "This year, a new type of software will come onto the market that learns from its application and improves the user experience and productivity of development teams independently, i.e. without active programming," says the expert.
Cooperation with the help of AI agents
In addition to self-optimization, the topic of cooperation will become increasingly important. This involves the collaboration of AI agents that can also conduct negotiations. "For companies to benefit from this, they need employees with the appropriate skills, processes and technologies," explains Debo Dutta, Chief AI Officer (CAIO) at Nutanix. New reasoning models, including open source models, would give AI models additional capabilities. Dutta assumes that AI inferencing will continue to gain in importance due to the increasing spread of reasoning models and agents.
In his opinion, new technologies and architectures will emerge to support the new generations of models and multi-agent systems. For example, in-memory computing will become popular in order to overcome the memory wall. In addition, entire memory controllers will run on intelligent network cards. His colleague Keri agrees and expects the power consumption of AI inferencing, especially at the edge, to become a serious challenge: "Contrary to popular belief, inferencing will be the real power guzzler, rather than training."
Also a consequence of AI in 2025: electricity consumption as a cost driver
As power consumption increases, so do the costs for companies. According to Dutta, this is mainly due to the scaling of the computing capacities required for inferencing. Companies therefore need to rethink their expenditure on infrastructure and energy.
To ensure that investments and operating costs do not jeopardize the success of AI projects, companies should use artificial intelligence in particular to "identify inefficiencies and automate labour-intensive processes", according to Tobi Knaup, General Manager Cloud Native at Nutanix. He recommends: "IT managers should pursue the strategy of financing AI with the help of AI." IT itself is under pressure to work with maximum efficiency and should therefore decommission products that do not use AI.
According to Rajiv Ramaswami, President and CEO of Nutanix, Nutanix itself is aiming for a 25 percent increase in development productivity: "We will use artificial intelligence to generate code for unit tests and a range of other functions." These and similar projects will become a reality in 2025 and will spread to more and more areas of the company with the emergence of new AI applications.
Swiss cybersecurity startup at the world's largest technology show in Dubai
The GITEX technology trade fair in Dubai is the world's largest technology and start-up trade fair and the most important business and technology event for the Middle East, Africa and Asia. It takes place from October 14 to 18. High-caliber exhibitors will be on site again this year, including the Swiss cybersecurity startup Exeon.
Editorial office - October 14, 2024
High-ranking visitor: Gregor Erismann, Co-CEO of Exeon Analytics receives Arthur Mattli, Swiss Ambassador for the UAE and Bahrain at GITEX in Dubai. (Image: zVg / Exeon)
At GITEX 2024, various Swiss companies will be presenting topics ranging from AI, metaverse, blockchain, cyber security and telecommunications to climate tech and future mobility at the Swiss Pavilion. Exeon Analytics, a young cybersecurity company dedicated to protecting corporate IT/OT landscapes through AI-driven security analytics, will also be presenting its Network Detection & Response (NDR) platform to a global audience for the first time at the technology fair in Dubai. The Zurich-based cybersecurity specialist's platform is characterized not only by the fact that it does not require additional agents and sensors, but also by its high level of deployment flexibility (either in the cloud or in the company's own data center). The on-premise version in particular significantly increases the security of sensitive data in critical sectors such as finance, healthcare and public administration, as data sovereignty remains entirely within the company, Exeon continues. Gregor Erismann, Co-CEO Exeon Analytics: "GITEX offers us the ideal setting to take a further step in our internationalization strategy with our AI-driven cyber security innovations and to get in touch with many potential customers and partners."
Exeon Analytics' NDR platform provides comprehensive protection against cyber threats by monitoring network communications. ExeonTrace uses lightweight traffic metadata for analysis, does not require complex traffic mirroring or packet decryption and leverages existing IT, cloud and OT infrastructure to collect analytics data. The self-learning algorithms (AI) were developed at ETH Zurich. The AI detects anomalies in real time and uncovers as yet unknown attacks, which primarily strengthens the cyber resilience of companies that are part of the critical infrastructure - energy, finance, health and utilities. Swiss customers include companies such as Swiss International Air Lines, PostFinance and the Swiss Federal Administration. Nils Planzer, CEO of Planzer Transport AG, is also quoted: "With ExeonTrace, we at Planzer have found a Swiss solution to monitor our network and detect cyber threats at an early stage."
International symposium on production metrology at the FH Ost
On September 3, 2024, the 10th International Conference on Production Metrology will take place on the premises of the University of Applied Sciences FH Ost in Buchs SG. Lectures and an accompanying exhibition await visitors.
Editorial office - August 16, 2024
The Buchs campus of the University of Applied Sciences of Eastern Switzerland will host the International Conference on Production Metrology for the tenth time on September 3, 2024. (Image: University of Applied Sciences of Eastern Switzerland)
For the tenth time now, the Eastern Switzerland University of Applied Sciences (FH Ost) and Swissmem (Machine Tool Division) are inviting you to the international symposium on production metrology. It will take place as a face-to-face event on September 3, 2024 at the campus in Buchs (canton of St.Gallen). Once again, various topics from the field of metrology are on the program, presented in eight specialist lectures. For example, new developments in coordinate measuring technology or computer tomography and, in particular, how AI can provide support in these areas. Practical issues relating to the determination of measurement uncertainties will also be discussed, as well as new guidelines and liability issues. The speakers come from research and development as well as industry and production.
In parallel to the specialist presentations, over 20 manufacturers of measuring devices and measuring technology accessories from Germany and abroad will be presenting their products and services in an exhibition and will be available to answer questions. The conference starts at 9:15 a.m. and ends at 5:00 p.m. Registration opens at 8:45 a.m. Participation in the symposium costs CHF 320 (including conference documents, drinks during breaks and lunch); there are discounts for students and Swissmem members.
Companies see artificial intelligence as a great opportunity to increase their economic performance and revolutionize the work of their employees, for example by making them more productive or saving time because they can find information faster. However, these benefits can only be realized through a coordinated AI strategy across the entire company.
Guest article by Chris Noon - August 15, 2024
The benefits of GenAI are tempting, but if employees use AI tools unregulated, it can quickly lead to problems for companies. (Image: Dropbox.com)
71 % of employees were already using AI tools before their superiors knew about it. This unauthorized use of AI technology that can access potentially sensitive company data is called "shadow AI". Shadow AI describes the use of generative AI products without IT oversight, using unprotected personal accounts that do not have the security checks or data agreements that would apply to a corporate account. Without a comprehensive strategy and employee training, such a situation can expose the company to significant risks.
Leaving no one behind with the introduction of AI
One of the main problems of shadow AI by individual users is inappropriate and non-compliant use due to a lack of uniform corporate guidelines. This fragmented, individualized approach to the introduction of generative AI (GenAI) contributes to splitting the company: On one side are the employees who use the latest technology without sharing with their colleagues, and on the other are the reluctant non-users who lag behind their supposedly more advanced colleagues. Without a holistic strategy and training for employees on how to use these new tools, those who experiment on an individual basis may be frustrated by not being able to gain useful insights or accurate results. Furthermore, these initial negative experiences carry the risk of employees abandoning AI tools altogether.
Unauthorized use puts sensitive data at risk
A current Study by Veritas found that 31 % of respondents admitted to sharing potentially sensitive information with generative AI tools. Business accounts for AI products typically have agreements in place to ensure that company data is not used to train AI models. However, personal accounts, which are often used in shadow AI, usually do not have these agreements. This means that any company data shared via a personal account could inadvertently be used to train the AI model.
Securing company data should therefore always be a primary concern. In addition, serious consequences can arise if employees use these powerful tools without guidance or their own judgment. AI tools are still prone to erroneous or inaccurate results and even "hallucinations". Relying on erroneous results without questioning them can lead to wrong decisions and potential legal or financial repercussions for the company.
AI strategy that sets rules but also invites experimentation
To meet these challenges, companies should pursue a coordinated AI strategy. It is important that IT teams identify trustworthy providers and agree clear terms for handling sensitive data. Working with vendors that have sound AI principles, including rules for data security and the prevention of data breaches, will minimize cyber risks and legal liabilities. For companies with sufficient resources, developing a customized AI solution by leveraging existing large-scale language models is also a viable option. The result is a powerful AI that integrates seamlessly into the company's data ecosystem and processes, increasing productivity and freeing up time for strategic tasks.
To get the most out of their AI investments, companies should also develop a comprehensive program that continuously educates their employees on best practices for integrating AI into their daily work. This will ensure that all employees can reap the benefits of AI technology. In every team, there is an "early tech adopter" whose curiosity and passion puts them ahead of others who are more hesitant to experiment. Such employees, working with their IT teams, can become AI champions within the organization, sharing learnings, best practices and insights with colleagues and fostering a collaborative learning environment.
Combining ethics and innovation
Within the confines of the company's AI strategy, automating routine tasks can help employees increase their performance and save time to focus on the work that brings the most value to the business. However, it is important to remember that AI should not be used as a substitute for human intelligence and review. AI is now able to automate numerous tasks and generate large amounts of content within seconds. But employees still need to use their own critical thinking. Because if they haven't really read the text generated by the AI or haven't really considered the problem they are trying to solve, they will only create bigger problems in the future. Therefore, for all the AI euphoria, companies need to keep thinking about the long-term ethical and social impact of AI on the workforce, while ensuring that AI complements human capabilities in a balanced way.
Author:
(Dropbox.com)
Christopher (Chris) Noon is Director and Global Head of Commercial Intelligence & Analytics (CIA) at Dropbox. As such, he leads the company's data science initiatives. His team develops tools to visualize customer engagement and identify trends. Prior to his career at Dropbox, Chris was a lecturer in ancient history and archaeology at Oxford University. He moved from academia to the technology industry with the aim of using his expertise to bridge the gap between technology and education. For these efforts he was awarded a Fellowship of the Royal Society of Art.
OT security is a top priority for CIOs
OT security has become an important topic for companies in industry and manufacturing worldwide. This is shown by the first "State of Industrial Networking Report" from Cisco. While the topic was previously underestimated, most future OT investments will flow into this area.
Editorial office - August 09, 2024
According to a Cisco study, cybersecurity, including OT security, has the highest investment priority, just ahead of AI. However, there is still room for improvement in cooperation between IT and OT. (Graphic: Cisco)
The increasing networking of OT (operational technology) and IT is creating a complex, dynamic environment that is susceptible to cyberattacks. Legacy systems, growing attack surfaces and an overstretched workforce are exacerbating the problem. At the same time, AI as a new technology will further improve the operation of industrial networks. "Operational technologies, and the industrial network in particular, have become a key differentiator for organizations globally," says Vikas Butaney, SVP/GM, Cisco Networking - SD-WAN, Multicloud and Industrial IoT. "IT and OT leaders recognize that strengthening their OT security is critical to driving business resilience, improving efficiency and preparing for the next wave of AI innovation."
Cybersecurity regulations in OT "extremely important"
According to the "State of Industrial Networking Report" study by Cisco, 89% of respondents consider compliance with cyber security regulations in OT to be very or extremely important. This shows that CIOs are increasingly aware that the greatest vulnerabilities lie in their operational infrastructure. At the same time, 92 percent of managers recognize the benefits of a uniform cybersecurity solution for OT and IT networks.
However, many companies are still a long way from comprehensive collaboration. For example, 41 percent of respondents report that their OT and IT teams work independently of each other. However, a unified approach can lead to greater cyber security (39 %), more efficiency (32 %) and more monitoring options (29 %). 48% of respondents believe AI is the technological advancement that will have the greatest impact on industrial networks over the next five years. Accordingly, AI will be a high priority for spending on automating tasks, improving network performance and providing predictions. At the same time, 49 percent expect AI to improve network management for IT and OT.
The most important lessons learned from the study
Prioritization of cyber security in OT: Companies that integrate cyber security into their industrial network strategy will need less effort, time and money to defend against attacks. They can invest more resources in developing OT as a platform for innovation and growth.
Improved collaboration between IT and OT: The required technologies and skills are increasingly overlapping between OT and IT. Teams can therefore no longer work in isolation. Comprehensive organizational processes and uniform technological solutions are required to optimize and protect data and systems.
AI as a competitive advantage: Innovative companies are using AI in OT to manufacture high-quality products faster. They can also use it to optimize efficiency, use data, support employees, protect themselves against cyberattacks and stay one step ahead of the competition.
Drone flights as a service from Swisscom and Nokia
With the Swiss drone network, Swisscom Broadcast is creating a secure infrastructure on the basis of which automated drone flights can be offered and operated as a service. From fall 2024, the network will enable customers to use secure drones for infrastructure inspections, police operations or to protect large areas.
Editorial office - August 08, 2024
Drone flights are an efficient means of carrying out inspection and surveillance missions. Swisscom Broadcast is now launching a Switzerland-wide drone network in collaboration with Nokia. (Image: Pixabay.com)
Swisscom Broadcast has been offering customized drone flights as a service for over a year. The collaboration with Nokia Drone Networks now takes the offering to a new level: the so-called Drone-in-a-Box units will improve the broad availability of operationally efficient drone applications for industrial purposes and to ensure public safety. The collaboration will enable the automation of drone operations beyond visual line of sight (BVLOS).
Advantages for various applications
When the drone network is launched, the following three drone services will initially be offered:
First responder drones in the blue light environment: The use of remote-controlled drones supports the efficiency and effectiveness of blue light organizations. The information gathered from the remote-controlled drones within the first few minutes enables the rapid and coordinated deployment of all emergency services involved. Thanks to sensor-supported aerial reconnaissance of hazards, the safety of first responders on site is increased. The rapid assessment of accident sites, fires or crime scenes increases the speed of deployment, which can save lives.
Infrastructure inspection: The drone-in-a-box units, which will be distributed throughout Switzerland and connected via the network in future, will improve the safety of people involved in the maintenance of power lines, bridges and buildings. In future, a company with critical infrastructure will be able to simply order a drone when dangerous inspections or inspections that are difficult for people to access are due. Ongoing inspections help to detect and repair damage at an early stage. In this way, companies ensure that their infrastructure is well maintained and that the legal requirements for monitoring critical infrastructure are met. Swisscom Broadcast uses drones from our drone network to fly over infrastructure at intervals specified by the customer, generating detailed image material in the process. This can be used to create a digital twin, for example, if required. Supported by artificial intelligence, it is efficiently determined whether there are significant changes to the infrastructure.
Strengthening perimeter protection: Geopolitical changes and new technologies may require raising the level of protection of critical infrastructure, production sites, public spaces, prisons, borders and police/military facilities. The perimeter protection solution provided by Swisscom together with partners relies on drones for simple inspection tasks on the ground and in the air. Combined with alarm sensors, the security level of facilities and areas requiring protection can be significantly increased. Automated, drone-based monitoring makes it possible to reduce costs as part of a defined security plan.
Strict regulation of autonomous drone flights
Special drone regulations apply to drone flights that take place outside of direct visual contact. There is a need to minimize risks above (air risk) and below (ground risk). The Federal Office of Civil Aviation (FOCA) monitors operational drone flight activities in Switzerland using the "Specific Operations Risk Assessment" method (SORA for short). Together with Nokia and the responsible regulatory authorities (OFCOM), it ensures that all flight activities comply with the legal framework, particularly with regard to frequency use and flight safety.
Drone flights as a service thanks to cooperation with Nokia
Nokia and Swisscom, two companies with many years of expertise in the area of 4G/5G, are working together to develop the drone infrastructure. Both companies have the know-how and corresponding resources to efficiently implement this project with a national impact. Nokia has extensive expertise in the development and production of high-quality software and hardware and has already gained experience in setting up a drone network in Belgium.
In future, customers will be able to access the drone infrastructure developed and produced in Europe via Swisscom Broadcast and obtain drone services from a single source. From consulting, automated piloting and monitoring of drone flights to secure data storage in Swisscom Data Centers.