< Previous40 edge_ january 2024 opinion A s we end another year, let us take part in the time honoured tradition of making predictions about the next. When it comes to AI, the mind-numbing pace of development in 2023, particularly with generative AI, means we should expect quite a bit of action in 2024. With the incredible rate of onboarding for tools like ChatGPT across the GCC, let’s take a look at what we can expect to change, and what it means for a shared smart future. Here are seven trends we expect to emerge around generative AI in 2024. 1. Cost reduction Providers can expect big costs for large-language models (LLMs), both in terms of gathering access to training data (including human feedback regarding LLM performance) as well as the underlying costs of training the models themselves. To remain competitive, these providers will need to continue innovating at blistering speeds, while providing services at acceptable rates to LLM consumers. The economic pressures at play here will drive a lot of activity towards attempting to reduce costs by making it cheaper to run existing models as well as training newer and more advanced models. 2. Multi-modal models Although the name might suggest that LLMs are solely oriented towards the ingestion and generation of language, LLMs are going multi-modal! The remarkable capabilities of generative AI to produce images / audio / video / etc., are increasingly going to be combined with LLMs. Not only will you be By Sohrob Kazerounian Distinguished AI Researcher, Vectra AI 7 generative AI trends that will shape the GCC in 2024 The widespread adoption of tools like ChatGPT in the region will heavily shape future AI actions and developments AI able to interact with the LLM of your choice simply via natural language, but you will be able to upload images alongside text, speak to the model through voice chats, and have the model generate multi-modal outputs. This flexibility of inputs and outputs is not only incredibly useful on its face, but opens the door to reasoning in incrementally better, and increasingly more human ways. 3. Autonomous agents In 2024, look out for more offerings where generative AI is put to work interpreting human instructions and carrying out complex tasks by breaking them down into sub tasks, and chaining together sequences of actions and reasoning steps. This initiative, in the form of autonomous agents (e.g., AutoGPT and BabyAGI), will initially be confined to fault- and risk-tolerant use cases until autonomous agents have proven themselves to be sufficiently robust. However, this asymmetry presents a risk in the realm of cybersecurity, as threat actors will be more open to adopting such untested tools and may gain an advantage over defenders who will need to be more cautious. 4. ‘Thinking’ vs ‘knowing’ While a lot of innovation has come about because of the ability to finetune LLMs, and to train them through human feedback (using reinforcement learning, i.e., RLHF), a lot of tasks will simply require an LLM that can “reason” sufficiently well to be coupled with more robust means of accessing the right information. In 2024, expect a tug-of-war between RAG and the fine-tuning of models as organisations prioritise a system’s learned capabilities (how it thinks) over the volume and quality of data to which it has access (what it knows). As LLM providers continue to improve model performance, companies putting LLMs into production will begin to tilt towards spending more effort on intelligently extending access to data via RAG and other methods. 5. More integration options Right now, the region’s organisations are exploring ways to adopt generative AI, like LLMs, into their technology stacks. AI providers will LLM Many tasks will demand tools that “reason” and access information effectivelyedge_ january 2024 41 therefore spend 2024 continuing to improve their integration options. They will look to provide ways to customise and connect their offerings to customers’ core business applications. For example, throughout the year we will see it become easier to specify more output formats for an LLM and validate those outputs, which will be extraordinarily important when it comes to regulatory compliance. Tasks like calling arbitrary functions and plugins will become easier for coders, without needing to reinvent these patterns. 6. Laws and society AI adoption has been strong in the GCC. But while governments such as those in Saudi Arabia and the United Arab Emirates have issued guidance on implementation, as part of various economic Vision programmes, formal legislative frameworks have yet to emerge. However, we can expect this to change in the coming year as the explosive adoption of AI rubs up against strict regional rules on data privacy and residency. This will spark renewed discussion on ethical and socio- political questions around AI. Companies looking to adopt gen AI should watch the regulatory landscape with keen eyes. 7. Keeping the ‘mis’ and ‘dis’ out of information Perhaps one of the greatest fears behind AI is its potential to pollute the information ecosystem. Generative AI models are widely available and while some commercial products appear to have ethical “wrappers” around the raw LLM, those that figure out how to game the API, or even build their own models from scratch, will have powerful tools in their hands. The potential for fake audio and video or mass-produced fiction masquerading as news will then become very real threats to societies everywhere. Not only will such content sow distrust among neighbours; it may compromise the health and safety of entire communities. Governments, industry and civil society will need to work together to develop entirely new tools to combat these types of disinformation. Years of AI We have years of AI to come. But what we do next year - how we adopt it, train it, use it, govern it, and even how we defend against it - will set the stage for the acts to follow. It is up to us what shape the play takes but if we are thoughtful, we can have the future we want: safe, prosperous, and sustainable. “In 2024, look out for more offerings where generative AI is put to work interpreting human instructions and carrying out complex tasks” Generative AI This innovation can aid in creative tasks and generate new ideas but will not replace human creativity42 edge_ january 2024 opinion D espite best efforts from the government and security teams, ransomware attacks continue to plague the Middle East. Traditional prevention and detection strategies are no longer working, and organisations must shift their focus to breach containment to stop attackers from moving through the network and reduce the impact of attacks. The Middle East region has a tense cyberspace landscape. The fault lies in a combination of a thriving economy and high rates of digitisation attracting the attention of malicious actors around the globe. Despite commendable efforts by the authorities, the average cost of a data breach in the Middle East is now over $8 million, according to IBM, almost double the global average and the second-highest cost globally behind the US. Ransomware remains a top threat globally and the Middle East is no different - the activity of ransomware groups increased by 77 percent in the first quarter of 2023 compared to the same period in 2022, with the most targeted countries in the GCC being the UAE (33 percent), Saudi Arabia (29 percent), and Kuwait (21 percent). With cyber threats showing no signs of slowing down, organisations need to focus their efforts on building a security strategy that can maintain operations in the event of an attack. The UAE and KSA already have high cyber maturity, but with attacks more pervasive than ever and AI increasing success rates for attackers, strengthening resilience is critical. By Ashraf Daqqa Regional Director - META, Illumio Fortifying the Middle East How zero trust segmentation can rapidly and effectively thwart ransomware attacks CYBERSECURITY How does a ransomware attack proceed? To build resilience against ransomware, we first need to understand how they work. Most attacks start with a successful phishing attack, exploit of an exposed vulnerability, or leveraging a misconfiguration, leaked credentials, or malicious insider to gain access to gain access to an organisation. Then once in, attackers behave as inconspicuously as possible during the compromise, moving undetected through the network, obtaining comprehensive access rights - also called privileges. Once they have reached their target – likely high- value applications or sensitive data - only then is the ransomware deployed, and the encryption of important data and systems begins. The limits of EDR or XDR and network monitoring or observability Now, one could argue that there are security products such as Endpoint Detection and Response (EDR) or Extended Detection and Response (XDR) and network monitoring or observability solutions to detect, report and - in the case of EDR/XDR - react to such suspicious behaviour. But the problem is these solutions were not designed to contain ransomware. EDR and XDR, focusing on “detect” and “respond” functions, identify and counteract threats across endpoints, email, servers, cloud workloads, and network traffic. Despite their effectiveness, they don’t ensure 100 percent protection. A successful attack can cripple an organisation. Network edge_ january 2024 43 opinion monitoring lacks proactive prevention, only detecting attacks, and is insufficient against advanced persistent threats. In the face of fast, sophisticated attacks, discovery and response may occur too late. Enhanced security strategies are crucial to preemptively thwart attacks and fortify overall resilience against evolving cyber threats. Building resilience with Zero Trust Ransomware’s success depends on maximising the reach and impact of an attack as quickly as possible, so the only way to strengthen defences is to begin by accepting that at some point you will be compromised. This means adopting an “assume breach” mindset and building a breach containment strategy based on the principles of Zero Trust. Fortunately, the Middle East is already a leader in Zero Trust adoption – research shows that security teams are prioritising Zero Trust over data privacy and regulatory compliance. But the focus until now has largely been on securing access through Zero Trust Network Access (ZTNA) rather than segmenting networks and containing breaches through modern technologies like Zero Trust Segmentation (ZTS). ZTS extends protection outside of the perimeter, enabling rapid containment of ransomware attacks. It also supports a “defence in depth” by ensuring that any attacks that bypass detection and response do not become cyber catastrophes. ZTS actively defends networks from infiltrated attackers, blocking all traffic by default and permitting only pre-approved traffic. This innovative approach assumes everything is untrusted, allowing only known-good elements. In case of a breach, ZTS contains the impact to a limited area, safeguarding customers and broader operations. When integrated with EDR, this combination enhances cyber resilience. Bishop Fox’s simulation demonstrated the synergistic value of EDR and ZTS, addressing blind spots in EDR and successfully identifying suspicious patterns during sophisticated attacks. This proactive strategy proves effective, ensuring a robust defence against evolving cyber threats. Strengthening cyber resilience in the Middle East It is clear that perimeter protection alone is no longer enough to stop ransomware, and with the threat not going away anytime soon, organisations urgently need to take steps to build resilience and reduce risk through breach containment. Unfortunately, ransomware will always be a threat because it’s the quickest and easiest way for cyber attackers to make money. But attacks will only be successful if organisations continue to allow attackers to roam free throughout their networks. The only way to stop ransomware is to prevent attackers from moving laterally by isolating and containing the attack at the initial point of entry. Zero Trust is an established security strategy for achieving cyber resilience, and Zero Trust Segmentation (a key pillar of Zero Trust) is a proven way to stop ransomware from spreading. By implementing proactive controls like ZTS, alongside reactive technologies like EDR, organisations can be confident that critical data and systems remain safe and business operations can continue, even if a breach occurs. “With cyber threats showing no signs of slowing down, organisations need to focus their efforts on building a security strategy that can maintain operations in the event of an attack” $8MN Average cost of data breach in the Middle East Source: IBM Zero Trust Organisations need to have an ‘assume breach’ mindset and prepare accordingly44 edge_ january 2024 HUAWEI: FreeClip The Huawei FreeClip is the company’s first-ever inaugural open-ear earbuds, integrating wireless audio with a design reminiscent of jewellery. The C-bridge Design, a key feature, ensures a secure fit along the ear’s curvature, drawing from data on over 10,000 human ears and subjected to rigorous reliability tests. Designed for comfort during physical activities, these earbuds deliver open-ear listening, allowing ambient noise without sound blockage. Employing a reverse sound wave system, they intelligently adjust volume to minimise sound leakage, prioritising user privacy. Housed in a pearlescent, stone-textured charging case, the FreeClip provides a simple and elegant aesthetic. With a total music playback time of 36 hours and a quick 10-minute charge for 3 hours of listening, the FreeClip offers practical functionality. edge_ january 2024 45 gadget watch The Kingston D500S is a storage device designed for government and military use, undergoing FIPS 140-3 Level 3 (Pending) certification. It includes secure microprocessor upgrades and self- tests upon bootup, ensuring robust security. KINGSTON: IronKey D500S The Zone Wireless 2 by Logitech is a business headset designed for optimal communication in diverse work environments. Equipped with AI far- end noise suppression, noise-canceling microphones, hybrid Active Noise Cancellation (ANC), and personalised stereo sound, it enhances audio clarity during calls and meetings, especially in noisy settings. The Advanced Call Clarity feature, activated through Logi Tune, effectively minimises ambient noise from the other caller’s side using AI technology. The headset boasts hybrid ANC to block surrounding noises, a transparency mode for environmental awareness, and a Personal EQ for customisable hearing ranges. Practical features include multipoint Bluetooth connectivity, smart enumeration for seamless audio source switching, and a long-lasting battery with up to 40 hours of usage. The headset prioritises sustainability with interchangeable earpads, a replaceable battery, and the use of recycled materials, aligning with Logitech’s commitment to environmental responsibility. LOGITECH: Zone Wireless 2 The drive is housed in a rugged zinc casing, meeting Military Standards for waterproofing, dustproofing, and shock resistance. Notably, it introduces a dual- partition option, allowing admins to create secure partitions for Admin and User, including a Hidden File Store for added privacy. Security features include XTS-AES 256-bit encryption, protection against BadUSB and Brute Force attacks, and a Virtual Keyboard for anti-keylogger measures. Additional functionalities like Read-Only modes, One-Time Recovery passwords, and Crypto-Erase options add flexibility. TAA/CMMC compliance, USA assembly, capacities up to 512GB, and a 5-year warranty with free technical support round out the practical aspects of the Kingston D500S for those prioritising data security and reliability.46 edge_ january 2024 SHURE: SM7dB The Shure SM7dB extends the legacy of the SM7 microphone series, which caters to podcasters, streamers, and vocalists with its integrated active preamp. Maintaining the robust construction and audio quality of the SM7B, the SM7dB features a Shure-designed preamp that adds +18 or +28 decibels (dB) of clean gain. This built-in preamp eliminates the necessity for an external preamp, mitigating potential hiss and noise associated with certain audio interfaces. With a user-friendly design, the preamp can be set to “bypass” for scenarios where additional gain is unnecessary, reverting to the original SM7B performance. The SM7dB ensures optimal sensitivity for typical audio interfaces, facilitating clear audio in recordings, broadcasts, or streaming. Its wide-range frequency response, EQ controls, and cardioid polar pattern make it adaptable for capturing diverse sound sources, from vocals to loud instruments, while advanced features like air suspension shock isolation and electromagnetic shielding enhance overall audio clarity. gadget watch OPPO: Find N3 layer reducing screen power consumption by 20 per cent. Notably, the Find N3 undergoes an advanced lubrication process for the hinge, ensuring a worry-free, long-lasting user experience. The OPPO Find N3 series introduces two foldable smartphones, which features a Torque Control System with four quarter-spindle elements on each side for a smoother folding mechanism. The device incorporates a high-strength steel anchor and joint core, enhancing durability without adding significant weight. The hinge’s core employs liquid metal, reducing thickness by 30 per cent compared to traditional steel, resulting in a slimmer profile. Unfolding reveals a 7.82-inch tablet display supported by carbon fibre plates, ensuring rigidity and minimising warping with over 5,000 microscopic laser-made holes. The 360º isotropic micro-cavity support structure guarantees folding performance under extreme temperatures, accompanied by a self-healing film and a polarizer-free edge_ january 2024 47 gadget watch HTC: Vive Ultimate Tracker The Vive Ultimate Tracker by HTC expands virtual reality experiences by offering multi-point body tracking when paired with HTC’s VR headsets. The tracker supports up to five simultaneous connections for comprehensive full-body tracking. Weighing 94 grams, the lightweight trackers, featuring two wide field-of-view cameras, precisely track 3D motions without the need for a base station. The device can be attached to various accessories, enhancing versatility for activities such as VR training or gaming. The flat and compact design, smaller than a smartphone, sets it apart from its predecessor. Operating without marketing-driven features, the Ultimate Tracker communicates with headsets via the 2.4 GHz and 5 GHz WiFi bands, with a battery life of up to 7 hours, providing a practical and immersive VR tracking solution.48 edge_january 2024 Acer TravelMate P4: For seamless business operations Discover the fusion of performance, security, and sustainability By Arya Devi LAPTOP reviewedge_january 2024 49 review Military-grade durability Durability is another strong suit of the TravelMate P4, with its military-grade certification ensuring it can withstand various environmental challenges. The reinforced IO ports, spill-resistant keyboard, and scratch-resistant Corning Gorilla Glass touchpad further enhance its ruggedness. So, if you are an employee who often takes site visits, it’s safe to carry your laptop with you. In terms of connectivity, the laptop keeps hybrid workers connected with 2×2 Wi-Fi 6E and a wide variety of ports, including two Type-C ports, a smart card reader, and a microSD card reader. Sustainability Acer’s products cannot be described without pointing out its sustainable measures. One of the most commendable aspects is its design. Made from recycled materials and EPEAT Gold compliant, it aligns with eco-friendly principles by using up to 37.7 percent post-consumer recycled plastic and 100 percent recycled packaging materials. While the TravelMate P4 offers an array of impressive features, it’s essential to note some areas where it falls short. The 16-inch display, while spacious, disappoints with its dimness and less vibrant colours, making it less suitable for tasks requiring accurate colour representation (like designing or photo editing). The Acer TravelMate P4 is a solid choice for professionals seeking a balance of performance, durability, and eco-conscious design. Its robust security features, long-lasting battery, and refined user experience make it a valuable tool for productivity on the go. Military-grade durability D esigned to cater to the needs of professionals who demand both portability and productivity, the Acer TravelMate P4 is available in 14-inch and 16-inch models. It boasts a sleek aluminium-magnesium body and a WUXGA IPS anti-glare display with thin bezels. One of the standout features of this laptop is its powerful performance options. There is a choice between Intel vPro option up to 13th Gen Intel Core i7 or up to AMD Ryzen 7 PRO processors. The laptop also charges pretty quickly and has an impressive up to 14-hour battery life. For hybrid professionals For many professionals, especially with the increased hybrid working environment, security is a key concern. Security is a top priority with the Acer TravelMate P4, featuring advanced security measures down to the firmware level. It comes equipped with a discrete TPM 2.0, a fingerprint reader, and an IR camera with a privacy shutter, all contributing to a robust security system. The support for Windows Hello secure login adds an extra layer of convenience. For professionals engaged in video conferences, the TravelMate P4 enhances the experience with four upward speakers delivering distortion-free DTS Audio, a dual microphone array equipped with AI-powered noise reduction, and a physical mute button for added privacy. This touchscreen laptop also has a very quiet keyboard (no more being the annoying co-worker who makes loud typing sounds), larger keycaps, and a 1.55mm travel distance making typing a pleasure. Ac po m re ali 37 pe im wh sp vib re de pr du se us pr who makes loud typing sounds), larger keycaps, and a 1.55mm travel distance making typing a pleasure.Next >