Is Blockchain in the MASH for Local Government?

In their latest insight briefing, SOCITM pose the question, Blockchain technology: could it transform digital-enabled councils?

They urge councils and wider public sector authorities to follow developments around blockchain Distributed Ledger technologies with a view to experimenting with their potential use in the development of future service transformation plans.

It is safe to say that blockchain is currently one of the hot technology topics trying to establish itself as a new way of handling trusted transactions. The rise and publicity surrounding BitCoin has driven this current hype and whilst the underlying technology of blockchain is very appropriate for financial-based systems, it is still unclear what viable (and practical) uses there will be across other sectors.

UK Government has issued a number of articles and papers regarding this topic, and they are actively investigating the potential of the technology to support a number of public-facing services. But the challenge is: ‘what is the use case that can exploit the capabilities of blockchain?’.

As an organisation, Sopra Steria sees the potential of this technology to provide immutable chain of evidence based systems and we are actively working on a number of potential use cases across a number of sectors.

The opportunities for Local Government need further investigation to consider how blockchain could be used to improve services, reduce costs, or help tackle fraud. As the SOCITM article suggests, these opportunities have yet to be clearly defined and articulated. Whilst G-Cloud 8 now shows services related to blockchain, there are only two of any real substance – one from a leading provider of blockchain Distributed Ledger Technologies, and the second a consultative service on what, and how, to use blockchain.  The others simply make reference to blockchain – so there is still a substantial way to go before there are pre-defined services available for Local Government.

Should Local Government be investigating the opportunities for blockchain/Distributed Ledger technology?  Absolutely!

There are a number of potential areas where the ability of providing chain of evidence based capabilities could be used, but the challenge for Local Government is to define the business and application processes needed to use blockchain. One of the areas in which we see major opportunities is the ability of coordinating MASH (Multi-Agency Safeguarding Hubs) by providing a means of identifying master records across different agencies. The ability of establishing a clear data level trust relationship is going to be critical to delivering successful MASH services.

Sopra Steria supports SOCITM’s call to identify the appropriate uses and applications of blockchain which will stand the test of time. As an integral part of their design process, councils should now be considering the advantages of using both blockchain, and other emerging technologies, when shaping future transformation programmes.

Take a look at our paper, “Blockchain: harnessing the power of distributed ledgers”, earlier posts on this topic on our blog or leave your thoughts on this subject below.

Digital at scale: how digital can transform business

If you spend time at pretty much any tech company, from startups to big corporates, you’re likely to hear the word ‘digital’ a bit too much.  Some people are doing it, some are making their journey towards being more digital and others are still struggling to define what exactly it is, and in many ways, it’s that final category that have the most honest answer to the question – What is digital?  And this is what experts from the technology and financial services industry discussed during a recent seminar at London Technology Week.

It’s easy to define digital as being about technologies – that digital is at its core the binary ‘0’s and ‘1’s, on and off and all the brilliant devices and interfaces that have spawned out of it.  While that’s not entirely wrong, it paints a picture that everything digital is very clean cut, with a definite right and wrong answer that follows any question – but the truth is very different.  The technologies are far from a constant, and everything from the technology chosen to the implementation will change not only for different demographics but from person to person, and will adapt to their current situation, desires, needs and moods.  Technology then, is transient, and to be truly digital you must be open to constant and relentless change, throwing away technology, processes and ways of working constantly, and ensuring that the new tool adopted is chosen intelligently, to be the best tool for the job, and the most commercially viable solution.

This however all sounds like the territory of startup businesses.  Businesses that are new to the scene, or with very flexible business models are often far more adept to change as they do not have the long-standing commitments to clients, legacy platforms and some of the regulatory requirements of their big corporate counterparts.  Some may suggest that these big corporates should simply throw away the legacy platforms, circumvent the regulation and transform their clients, and noble though that may be, it’s a fool’s errand.  For these businesses, what they really need is to find a way to take advantage of new technology, whatever that may be, and develop systems that allow them to adapt to change which work alongside and complement their legacy ‘technological debt’ and support their regulatory requirements rather than dispose of them. This is digital at scale.

Put simply, digital at scale explores how businesses can leverage digital, be it technology, ways of working or any other idea that comes under the umbrella of digital to transform their business, supporting existing technologies, commitments and regulation where appropriate, and disposing of them where necessary.

Sopra Steria’s MiFID II project with the FCA is an example of where digital at scale has been implemented. For all the businesses that are wary of how technologies like cloud and open source could work in a highly regulated environment, there’s no better example than that of the regulator itself adopting these technologies.  The MiFID II regulatory support service is built for the cloud, ingesting, processing and persisting files on AWS, with innovative open source platforms like Cassandra and Spark ensuring that all submissions are processed quickly and with an extremely high degree of accuracy, with an architecture that supports changes should a specific client or geography require, like private vs public cloud or separate technology components.  What is particularly profound about this solution though is how it backs into and supports the legacy environment, through a simple FTP gateway, ensuring that the wealth of historical data is utilized and, as is so important in an environment like this, remembered with a system that can speak both the languages of the old and the new into the future, maintaining a stream of communication regardless of changes made on either end.

The MiFID II platform is only one example of these principles put to work, and though the distant future might see us living in a fully digital world we must be conscious today that whether we transition fast or slowly, we must do so safely too, and with a strong commercial focus to build not simply small digital players, but truly successful enterprises with digital at scale.

Find out more about our FCA Market Data Processing project and Sopra Steria’s #intelligentdigital campaign.

Reflections on London Technology Week 2016

 Last week our feet didn’t touch the ground. Throwing ourselves into the annual jamboree of London Technology Week, we were blown away by the vibrancy and energy of the experience. As a dynamic, innovation team, we’re always open to great insights from the cutting edge of tech. And yet, we made surprising discoveries, courtesy of the tech festival’s diverse contributors, on the four consecutive ‘Digital Breakfast Bites’ we hosted.

On Monday, for us it was all about the challenge of moving beyond the prototype. In a lively canter through Blockchain, we investigated the state of play for shared ledgers and how this seemingly unregulated and risky technology can not only work alongside a large enterprise, but be used to enhance their regulatory compliance and security.

On Tuesday, we learnt how great service design is shaping the banks of the future. Stepping out of the wilderness of fintech, we discussed how the foundations of great UX and customer centric design are shared across all industries, and how a fundamental grass-roots upheaval is required by the big players in the banking sector to keep up with innovative new challenger banks.

Wednesday saw us enter the store of the future, with a whistle-stop tour of the technologies and interfaces that are being used to engage with the customer. From virtual reality to motion sensing, we explored how all digital experiences are linked by the fundamental desire to gather and analyse data and to better understand our customers.

On Thursday we traversed the vast reaches of ‘Digital at Scale’, where large enterprises tackle the nexus of digital technology and legacy platforms. We saw how the two, apparently irreconcilable powers can have a symbiotic and not mutually exclusive relationship.

And that’s where we left it – with belief in the reconciliation of two opposable forces to achieve a transformational outcome. Quite apposite you’d think for a week marked by a referendum of tumultuous consequences. When the dust has settled we’ll still be reflecting on the great experiences we has as a London Technology Week host. Bring on 2017.

Did you participate in a London Technology Week 2016 event? Leave your comment below, or contact me by email.

Assisted evolution

Natural selection is Charles Darwin’s most celebrated theory.  It depends on the fact that in each generation there will be mutation. This mutation creates variation in a species affording some with an advantage to survive in a changing world.

Today we are seeing a new world emerging.  A world of rapid change, iteration and re-invention, even within a single lifespan.  This is the digital world.  As we observe the rise of the digital world we are also seeing the evolution of a new ‘breed’ of human, the Digital Human.  In place of favourable genetic mutations the Digital Human augments his or herself in a shroud of technology which is constantly mutating, iterating and updating, and bolting on modular upgrades as and when they see fit to suit their individual needs and desires.

The Digital Human feeds off data, and demands a highly personalised experience from the applications that they use and the services that they interact with.

The evolution of the Digital Human can be seen through the lens of the three technological topics in Aurora, our Horizon Scanning Programme: Intelligent Insight & Automation, Ubiquitous Interaction and Distributed Disruption.

Intelligent Insight & Automation explores the future of data beyond predictive analytics, through to prescriptive analytics and full robotics. Critically this technology is adaptive and able, like the most successful creatures in evolution, to respond to changes in its environment.  For the Digital Human analytics and automation platforms help them to understand the changing world around them and automate responses quickly to survive through, or take advantage of these changes.

The Digital Human feeds its desire for data through a ‘Device Mesh’, a shroud of devices and sensors connected to each other via the cloud.  These devices may manifest in many different forms from manual entry on a PC, to obvious collection on our smartphone and wearable devices to almost invisible gathering and transmission.  All of this data however is nothing without intelligent use of analytics to provide insight back to the user, automating changes, evolving with the world around them seamlessly.

The way that technology is able to play back its insights to us is critical to our digital evolution.  In order for us to interpret an all pervasive layer of information interactions must be subtle but clear.  Technologies like augmented reality offer a platform for information to be layered on top of the world around us, allowing us to draw on the crowd sourced knowledge of the internet to obtain a ‘perfect knowledge’ of any given subject without having the need to learn or memorise any details.  This trend is set to continue with the ‘interfaceless interface’ silently helping us about our daily lives. The ambient or embedded nature of these interactions enhances the sense that we are ‘evolving’ as digital humans.

The way that we interact with services is also shifting from centralised control to distributed mediums.  Services like Airbnb and Uber have been a great expression of this change, connecting consumers directly with individual suppliers of services, but even systems like this still depend on centralised validation for their financial transactions.  A technology taking this world by storm is the blockchain, the fundamental technology behind bitcoins distributed validation of transactions, which has the potential to change not only the way that we carry out payment, but how do we as individuals play a part in the collective validation process, forming a part of a crowd sourced consensus of validity and building up a quantified self, a digitised self through a history of transactions and validations?

It makes you wonder, is it our digitised self that is evolving
or is it us?

What do you think? Leave a reply below, or contact me by email.

Learn more about Aurora, Sopra Steria’s horizon scanning team, and the topics that we are researching.

Securing the Net – Quantum Cryptography

Since the early 2000s, private industries, government and defence agencies alike have been hiding behind the steel wall of encryption offered by the Advanced Encryption Standard, otherwise known as AES, a specification for encryption so secure a brute force attack, even by China’s Tianhe-2, the world’s fastest supercomputer, would be unable to break the cipher of AES256 encryption before the universe is to reach its eventual heat death. However, now there’s a new technology that could turn everything we have come to know about encryption on its head, and that technology is quantum cryptography, but before we get into that, a little more about encryption.

Encryption and cryptography is the process of encoding a message so that information, even if it has been intercepted, cannot be read by unauthorised parties. But how do they work? A great explanation comes from the team at Numberphile who explain that the system is akin to the bank providing you with a lock to store your sensitive data, but both the box and the key is held by the bank alone, so if someone steals your box or tries to open the lock, they will have no key. Imagine you wanted to share secret information with your bank. The keys are made up of two numbers, the first is an RSA number. These numbers are area known as ‘semi-primes’, which are numbers with exactly two prime factors (i.e. are divisible by two prime numbers, no more, no less). These RSA numbers are publicly available and can be accessed by anyone, but the second number is held only by the second party, the bank in this example, and is created by multiplying together two huge prime numbers.

To decode this key, the only practical system is to know the two prime numbers used.  If you don’t have these prime numbers, you will need to factorise this number, and that can take a very long time. So long in fact, that even the most power supercomputers would be unable to break the current level of encryption used by banks before the death of our universe!

So what’s the risk?

There’s a paradigm shift in computing on the horizon. A type of computer which does not abide standard ‘bits’, the ‘0’s and ‘1’s that the computers of today are built upon. These computers introduce the possibility of ‘qubits’ which not only accept these ‘1’s and ‘0’s, but also any possible superposition of these states.  These are quantum computers.

Our present day encryption methods rely upon the belief that a computer will have to carry out huge numbers of processes sequentially.  Each process should take a certain length of time to complete, and the number of processes that it’ll need to complete will take so long that cracking the key in this way becomes effectively impossible.

Quantum computers however do not need to carry out these processes in sequence. Instead, when posed with such a question, they consider all the possible answers simultaneously to arrive at the right answer in what is in essence one process, meaning that it could crack any conventional form of encryption in moments rather than millions of years.

So what can we do?

Fortunately, that same technology which threatens to render our current encryption obsolete also offers us a solution. Quantum Encryption makes use of the strange properties of qubits to create the key which is used to access private information, and these keys can be designed in the same way as our encryption is today, to take thousands if not millions of years for a quantum computer to be able to break the code.

Furthermore, a system for sharing these keys, known as ‘Quantum Key Distribution’ is in development, allowing for the key to be shared between two parties without a third party being able to know anything else about the key, even if the message is intercepted, by encoding the key as quantum data.

Quantum computing looks set to change our cyber security landscape and, I for one am hoping that we get the encryption right before the hackers create any exploits.  I think this technology will revolutionise how we keep our information secure, avoid the recent high-profile attacks repeating themselves and improve national security.

What are your thoughts? Leave a reply below or contact me by email.

Personal best

Our propensity for feeding internet services with personal data is exploding

In 2014 we made 2.4 million posts on Facebook, sent 204 million emails, sent 277,000 tweets and made 4 million searches on Google – every minute.

For users of the Ashley Madison extra-marital dating site, personal data was meant to be just that: personal. The recent hacking and exposure of data is an unfortunate example of how much private information we are willingly, and sometimes unknowingly, giving away about ourselves.

So what is personal data, and why is it so important?

To get an idea of scale we have to understand that not only are we talking about your search history, social media and emails which you knowingly generate, but also a vast amount of other data from your smartphone tracking your location and your medical history to your buying habits. The scale of this data is so huge that it’s recorded in terms of Exabytes – a unit of storage 1 billion times the size of a gigabyte (and, if written, contains 18 zeros).

For years businesses have been decidedly opaque in the value they extract from personal data.  What we are now seeing is that customers are becoming more aware of this data and its value. And this is leading to them being more protective and selective when giving it away and more concerned over the security and privacy surrounding their personal data.

In Europe the midata initiative is exploring this growing change by putting tools and processes in place for people to access their own data and understand the value that is holds. One early project has been brought together by midata and GoCompare for the financial services industry – who has used personal data to enhance the value of their products for a long time.

By understanding their customers’ spending and living habits they have been able to carefully select specific products and market them to the right customers with the right risk appetite. The GoCompare tool however lets consumers conduct the same kind of analysis on their spending data as banks, running this data through a catalogue of financial products to tell customers clearly and visually what the best product should be for them and exactly how much they could save, demonstrating the financial benefit and personalisation they can receive through access and control of their personal data.

The key to the future of personal data lies with a clear appreciation of its value. In the future people like you and I should have access to our own data and a full understanding of how sharing our data can benefit us. We should be able to personalise the amount of data that we are sharing, decide how it’s used and understand the level of security and risks that it brings. Whether you are engaging in a relationship you shouldn’t be or building your nest egg, you should know what you’re giving away and to what end.

So is the future of personal data ownership a bright one?

Personally, I think the data points that way.  The age of Big Data has already arrived, but the era of Small Data is yet to begin.

If you’re interested in this subject and want to join the conversation, leave a message below or contact me in the the Aurora team.