The state of blockchain in supply chain management today – Information Age

Steve Treagust, vice-president, industries program management at IFS, discusses the role blockchain plays in supply chain management

Blockchain is an increasingly important cog in the supply chain management wheel.

Some organisations associate blockchain with cryptocurrencies or the dark web but not as having relevance for general supply chain operations. Others, however, understand that it can be disruptive technologies that solve logistical problems in complex supply chains among larger groups of organisations.

One example of a visionary team is found in Maersk and IBM, who together launched TRADELens, the worlds first blockchain-enabled shipping solution. More than 90 organisations signed up to take part in this open standard blockchain-driven platform, including more than 20 port and terminal operators and customs authorities in the Netherlands, Saudi Arabia, Singapore, Australia and Peru. Added to that list more recently is India where, starting in July 2020, the first trials will begin of the electronic bill of lading. The solution enables organisations to interact seamlessly and securely, sharing real-time access to IoT and sensor data such as temperature control or container weight, as well as providing standardised protocols and processes.

Access to data generated by the Internet of Things (IoT) can be difficult to control, but how can companies go about achieving this safely? Read here

Blockchain today is making halting inroads into settings where trading partners want to share a distributed ledger to facilitate and track transactions. The Farmer Direct Platform, which provides traceability of food products back from farm to fork, is partnering with Smuckers Folgers brand to use blockchain to provide enhanced supply chain visibility to customers. In most manufacturing and industrial supply chain settings, blockchain remains on the horizon however, although it has strong potential to support processes including 3D printing, where it can help enforce intellectual property, supply chain management and the Internet of Things (IoT).

As more sophisticated supply chains go into production with blockchain-enabled supply chains, others may consider whether the technology solves problems for them as well. Theres a lot of buzz around blockchain, but many organisations and individuals still dont really understand where it fits into their technology stack, due in large part to the association with the cryptocurrency use case.

Some data security and trust concerns still exist around the idea of running a mission-critical supply chain in blockchain, although cryptography-secured chains were shown to provide very high levels of security. All these concerns and misunderstandings can be addressed with education. There is nothing that spurs faster learning than having to compete with an organisation already successfully using blockchain to reduce supply chain costs.

While enterprise and supply chain technologists may not trust blockchain yet, it is somewhat ironic that a lack of trust in the banking industry after the 2008 financial crisis was the original incentive for blockchain. In fact, blockchain was born as the channel to deliver Bitcoin, allowing organisations to avoid banks.

Now, a lack of trust in these same digital assets is the main hurdle to mainstream use. There are two addressable elements to improving trust in blockchain. First is education around the value of cryptography and blockchain technology. Second, when others begin to successfully use blockchain, this will also provide a platform for trust.

The ultimate benefit that blockchain brings to supply chain management very much depends on the type and size of the supply chain. I outlined six business benefits of blockchain in a 2017 blog post, including efficiency, auditability, traceability, transparency, security and feedback. Any of these six could be the number one benefit depending on the business and their individual goals.

If I was to pick one benefit that most applies to all supply chains, it would be traceability. Being able to enable a trace of supply at any time during and after the chain has been completed can provide a competitive advantage, allowing organizations to comply with ever-changing regulations and create overall efficiencies.

Kevin Curran, IEEE senior member, security professor at Ulster University and editor of the Journal of British Blockchain Association (JBBA), explains how blockchain has transformed industry and society. Read here

The next step for blockchain in supply chain management is broader adoption. Its not a case of if this will happen, but when. In my opinion, to boost trust and provide stability, organisations must work together to establish trust-based relationships, creating diverse communities intent on delivering positive value from the blockchain ecosystem. This would also require enforceable regulatory control enough to curb the worst of human behaviour in free markets, but not enough to stifle blockchain innovation.

Continue reading here:
The state of blockchain in supply chain management today - Information Age

Quantum Cryptography Market 2020 by Technology, Equipment, Product Type, Packaging Material, and Region Global Forecast to 2025 – Owned

The global Quantum Cryptography market report examines the market position and viewpoint of the market worldwide, from various angles, such as from the key players point, geological regions, types of product and application. This Quantum Cryptography report highlights the key driving factors, constraint, opportunities, challenges in the competitive market. It also offers thorough Quantum Cryptography analysis on the market stake, classification, and revenue projection. The Quantum Cryptography market report delivers market status from the readers point of view, providing certain market stats and business intuitions. The global Quantum Cryptography industry includes historical and futuristic data related to the industry. It also includes company information of each market player, capacity, profit, Quantum Cryptography product information, price, and so on.

Get sample copy of Quantum Cryptography Market report @ https://www.adroitmarketresearch.com/contacts/request-sample/958

Global Quantum Cryptography Market 2020-2025 is an exhaustive investigation of the global Quantum Cryptography market together with the future projections to assess the investment feasibility. The report also comprehends business opportunities and scope for expansion. These insights will help the leaders to formulate strategies resulting for increased profitability. Furthermore, the report includes both quantitative and qualitative analyses of the Quantum Cryptography market throughout the forecast period.

Top Leading Key Players are:

ID Quantique, MagiQ Technologies, Infineon Technologies, QuintenssenceLabs, Crypta Labs, ISARA, Toshiba, Microsoft, IBM, HP, PQ Solutions, and Qubitekk.

Browse the complete report @ https://www.adroitmarketresearch.com/industry-reports/quantum-cryptography-market

The report is a holistic, ready-to-use compilation of all major events and developments that replicate growth in the Quantum Cryptography market. The report is rightly designed to present multidimensional information about the current and past market occurrences that tend to have a direct implication on onward growth trajectory of the Quantum Cryptography market. The report also illustrates minute details in the Quantum Cryptography market governing micro and macroeconomic factors that seem to have a dominant and long-term impact, directing the course of popular trends in the global Quantum Cryptography market.

Based on application, the market has been segmented into:

NA

Additional topics covered in the global Quantum Cryptography market report are as below:Various marketing plans and policies, suppliers and dealers involved in the Quantum Cryptography market, analyzes factors influencing market growth, manufacturing trends, and tracking technics. The global Quantum Cryptography market research report executes SWOT analysis and PORTERS Five Forces Quantum Cryptography analysis to unveil the strength, weaknesses, opportunities, and threats. Moreover, it compares the past data to recognize the threats faced by new participants in the global Quantum Cryptography market, the threat from other services or Quantum Cryptography products, and the entire market scope of the competitive players.

The global Quantum Cryptography market report delivers a complete vision of industrial background, that explains in-depth analysis of Quantum Cryptography industry upstream and downstream of a company that comprises of raw material, distributors, and equipment. The Quantum Cryptography market report also offers data related to production, volume, usage rate, price, income, profit margin etc.

Some Major TOC Points:Chapter 1. Report OverviewChapter 2. Global Growth TrendsChapter 3. Market Share by Key PlayersChapter 4. Breakdown Data by Type and ApplicationChapter 5. Market by End Users/ApplicationChapter 6. COVID-19 Outbreak: Quantum Cryptography Industry ImpactChapter 7. Opportunity Analysis in Covid-19 CrisisChapter 9. Market Driving ForceAnd Many More..

Research Methodology Includes:The report systematically upholds the current state of dynamic segmentation of the Quantum Cryptography market, highlighting major and revenue efficient market segments comprising application, type, technology, and the like that together coin lucrative business returns in the Quantum Cryptography market.

For Any Query on the Quantum Cryptography Market: https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/958

About Us :

Adroit Market Research is an India-based business analytics and consulting company. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a markets size, key trends, participants and future outlook of an industry. We intend to become our clients knowledge partner and provide them with valuable market insights to help create opportunities that increase their revenues. We follow a code Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX 75204, U.S.APhone No.: USA: +1 972-362 -8199 / +91 9665341414

See original here:
Quantum Cryptography Market 2020 by Technology, Equipment, Product Type, Packaging Material, and Region Global Forecast to 2025 - Owned

DigiCert IoT Device Manager: New features and capabilities to drive 5G transformation – Help Net Security

DigiCert has announced a robust set of features and capabilities in DigiCert IoT Device Manager that enable telecommunications providers to deploy 5G network services to cloud environments while maintaining security, compliance and performance.

Hosted on the DigiCert ONE platform, IoT Device Manager provides support for strong authentication in dynamic, cloud-native environments, as well as scalability and operational integrity.

Todays telecommunication organizations face a variety of similar transformation challenges as they migrate to 5G using cloud data centers. Many are moving from primarily physical environments with primitive authentication techniques, minimal use of cryptography and pre-shared keys.

These traditional infrastructures are capital-intensive to scale, inefficient and inflexible, slowing delivery of new services and time to market. Increasingly, they are moving toward more dynamic business models built around a DevOps mindset.

These 5G and cloud environments are virtualized, dynamically scalable and enable unparalleled business agility and smooth scalability.

To support their transformation and enable more rapid time-to-market for products, telecommunication providers require a platform designed for todays highly dynamic, cloud-native, modern business models.

The platform must provide strong authentication across on-premises and cloud environments, and the ability to perform at scale on the worlds largest networks. It needs to ensure operational integrity to help organizations meet compliance requirements and legal mandates.

IoT Device Manager on DigiCert ONE is built from the ground up to support transformative new models. It delivers:

As telecommunications, manufacturers and other organizations move to increasingly dynamic models, the IoT Device Manager provides the flexibility and rapid scalability they need to support 5G and cloud migration, said DigiCert Senior Vice President of Product Brian Trzupek.

DigiCert ONE delivers the features, compatibility and performance our customers need to accelerate their digital transformation and take advantage of compelling new business models.

IoT Device Manager uses a container-based, cloud-agnostic implementation and allows organizations to provision and embed device identity at any stage of the device lifecycle, from the factory to device deployment in a variety of environments.

It lets customers simplify device identity, authentication, encryption and integrity with a single click, and marry device data visualization with cryptographic, manufacturing and factory process data. IoT Device Manager supports standards-based interoperability with many third-party manufacturing and provisioning systems.

IoT Device Manager is built on DigiCert ONE, a PKI management platform architected and released in 2020 to be the PKI infrastructure service for todays modern cloud-native challenges.

DigiCert ONE offers multiple management solutions and is designed for all forms of PKI. It is flexible enough to be deployed on-premises, in-country or in the cloud to meet stringent requirements, custom integrations and airgap needs.

It also deploys extremely high volumes of certificates quickly using robust and highly scalable infrastructure. DigiCert ONE delivers end-to-end centralized user and device certificate management, a modern approach to PKI.

More here:
DigiCert IoT Device Manager: New features and capabilities to drive 5G transformation - Help Net Security

Europe FPGA Security Market Forecast to 2027 – COVID-19 Impact and Regional Analysis By Configuration, Technology, End User, and Country – Benzinga

New York, July 24, 2020 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Europe FPGA Security Market Forecast to 2027 - COVID-19 Impact and Regional Analysis By Configuration, Technology, End User, and Country" - https://www.reportlinker.com/p05934805/?utm_source=GNW Cellular infrastructure, networking, commercial aviation, industry 4.0, and defense are among the traditional FPGA applications in different industries.

The SRAM segment led the Europe FPGA security market based on technology in 2019.SRAM-based FPGAs store the logic cells configuration data in a static memory. Since SRAM is volatile and is not capable of storing data without power sources, these arrays must be programmed (configured) upon their start.SRAM-based FPGA devices are used in fields such as broadcasting applications, wired and wireless communication systems, consumer products, cryptography applications, and network security; these are also used in the areas with stringent safety requirements, such as aerospace &defense industry, railway applications, industrial sector, and nuclear power plant control systems.

The overall Europe FPGA security market size has been derived using both primary and secondary sources.To begin the research process, exhaustive secondary research has been conducted using internal and external sources to obtain qualitative and quantitative information related to the market.

The process also serves the purpose of obtaining overview and forecast for the Europe FPGA security market with respects to all the segments pertaining to the region.Also, multiple primary interviews have been conducted with industry participants and commentators to validate the data, as well as to gain more analytical insights into the topic.

The participants of this process include industry expert such as VPs, business development managers, market intelligence managers, and national sales managers along with external consultants such as valuation experts, research analysts, and key opinion leaders specializing in the Europe FPGA security market. Flex Logix Technologies, Inc.; Intel Corporation; Lattice Semiconductor Corporation; Microchip Technology Inc.; QuickLogic Corporation; S2C; and Xilinx, Inc. are among the key players operating in the market in this region.

.Read the full report: https://www.reportlinker.com/p05934805/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

The rest is here:
Europe FPGA Security Market Forecast to 2027 - COVID-19 Impact and Regional Analysis By Configuration, Technology, End User, and Country - Benzinga

Rolls-Royce releases online game inspired by Wraith Kryptos – BMWBLOG

Rolls-Royce unveiled their latest special edition model in the shape of the Rolls-Royce Wraith Kryptos at the beginning of July. To mark the moment, the people in Goodwood decided to create an online game, available for everyone, not just the customers. The game is made up of a cryptic challenge, consisting of four levels, each getting progressively harder. Theres even a prize involved but chances are it has already been claimed.

When the Kryptos was unveiled, Rolls-Royce said that cryptic messages and codes have been embedded into the car and that prospective owners will be able to decipher them over time. Upon completing the challenge, they would find an enlightening conclusion, according to Rolls-Royce, and they are invited to submit their findings through the Whispers app, created specifically for Rolls-Royce owners.

Since only 50 Wraith Kryptos cars will be made, the management decided to create an online game for those who also want a challenge, but cant buy a car. This way, they will also be able to decipher the code embedded into the cars. All you need to do is go to the Rolls-Royce website, scan the QR code and the the app on your phone. You could also use a native knack for cryptography.

There are four different levels and players are initially invited to guide an orb through a maze by tilting their mobile device in the direction they wish to travel, in a time-pressured challenge. Next, a series of questions will reveal just how keen the cryptographer player really is.

The third level will test the observation skills of the participant. The final phase consists of cryptographic ciphers, designed to confuse you. The first ten individuals to complete the game will receive their very own personalized Rolls-Royce treadplate.

See original here:
Rolls-Royce releases online game inspired by Wraith Kryptos - BMWBLOG

A Deep-Dive Into Some of the ZERO Wallet’s Advanced Security Features – Cointelegraph

From its initial announcement back in April to the $430,000 raised in the recently completed crowd-sale, the NGRAVE ZERO has created huge buzz in the crypto community. Billed as the most secure hardware wallet available, the permanently air-gapped ZERO is the first to gain a top security rating of EAL7.

But the devil is in the details so they say, so while waiting for the first units of the device to ship, Cointelegraph asked NGRAVE CEO Ruben Merre to explain just how one goes about making the most secure hardware wallet in the world.

The ZERO came about following the NGRAVE founders poor experiences with crypto security. Not finding any existing solutions that they would completely trust with their cryptocurrency, they set about building their own.

In April 2018 the team began to develop a working prototype using a Raspberry Pi. It was the start of a journey which would see them collaborate with many world class teams and individuals, including the recent acquisition of Jean-Jacques Quisquater as an advisor.

Quisquater is considered the father of zero knowledge proof cryptography, and is famously cited in the Bitcoin whitepaper. So what does he bring to the development of a secure hardware wallet?

Jean-Jacques is closely involved in revealing and resolving potential security threats, even those that are on practically no one else's radar. Because he was involved in the development of the many security projects including those by secret government instances, he knows backdoors as no other. He's also one of the minds in our team that helps us think future-proof.

Much has been made of the fact that the ZERO remains fully air-gapped, eschewing USB and Bluetooth connectivity to communicate solely via QR codes which contain no data about the users private keys.

Also, private keys generated by the wallets Perfect Key system are not derived purely from a master-seed shipped with the device. For extra security they incorporate elements of biometric data such as fingerprints and the introduction of environmental randomness from factors such as light levels.

This might leave you wondering how you will import your existing cryptocurrency private keys onto the device, and whether they will be as secure as freshly generated ones.

We support all the available status quo ways of generating seeds, so you can both import a mnemonic phrase made with another hardware wallet, regardless of the length, or you can also simply create a new one on ZERO. While we recommend using the NGRAVE Perfect Key because of its advanced security features, the user can basically choose what he or she feels most comfortable with.

Finally, in case anybody gets their grubby little mitts on your physical device, the ZERO has four different cumulative levels of tamper-proofing.

The first is tamper resistance, including shielding of radio frequencies, and the physical difficulty of gaining access to the device's innards.

Then comes tamper evidence, which means that if anyone does manage to break open the device, the screen will break and it will be apparent to the user. It also incorporates cryptographic attestation, whereby NGRAVE will verify a device on first use.

The third level is called "tamper responsiveness". This means there are mechanisms in place inside the device that will notice that it is under attack. And ZERO will then automatically wipe the keys. This goes as deep as on the level of individual components that have their own anti-tamper mechanisms.

Finally, there is tamper resolution, which takes place when the user is manipulating the private key in the aforementioned generation process. This results in the resolution of any potential tampering or pre-defined keys in the device.

Cointelegraph will get hands on with the device as soon as it starts shipping to bring you a full review.

More here:
A Deep-Dive Into Some of the ZERO Wallet's Advanced Security Features - Cointelegraph

Beyond Identity, Ping Identity join forces to enable passwordless authentication – The Paypers

According to the press release, Beyond Identity is the first passwordless authentication vendor to deliver full device security posture information to Ping Identitys single sign-on (SSO) solution, PingFederate.

This integration enables enterprises to make adaptive, risk-based authentication decisions, strengthening their defenses, while improving security by eliminating passwords. The company replaces passwords with trusted certificates, originally defined in public-key cryptography and deployed within TLS (formerly SSL).

Moreover, through its Technology Alliance Programme (TAP), Ping Identity collaborates with other security companies to ensure that any enterprise can federate identity and access across their organisation. The TAP programme enables collaboration between Ping Identity and top-tier technology companies to solve unique identity and access management (IAM) challenges, increase the effectiveness of existing IAM products, and take advantage of emerging technologies.

Therefore, Beyond Identity and Ping Identity are providing enterprises with the following features:

password elimination: reduces a major source of risk by eliminating the possibility of account takeover;

improved end-user experience: no passwords for users to create, remember, or change;

risk-based authorisation: granular device and device security posture data and a completely machine-verifiable audit trail;

reduced it costs and overhead: user self-service registration, migration, and recovery of devices, eliminating help desk calls;

rapid time to value: codeless, configuration-based integration with PingFederate and can be set up in under an hour.

Go here to read the rest:
Beyond Identity, Ping Identity join forces to enable passwordless authentication - The Paypers

Self-contained, ready, and secured – Enhancing Red Hat OpenShift with hardware cryptography – Security Boulevard

Self-contained, ready, and secured Enhancing Red Hat OpenShift with hardware cryptography

The purpose of the blog is to introduce you to incorporating high assurance cryptographic security with hardware security modules (HSMs) into your Red Hat OpenShift projects. Since this might be new territory for some in the developer community, Ill take a moment to explain what an HSM is.

An HSM is a specialized hardware device that is designed for the purpose of protecting encryption keys and conducting cryptographic processes such as creating digital signatures. Keys are generated according to strict security standards and based on an internal high-quality entropy source. HSMs are robust, tamper-resistant devices that incorporate innovative security features to ensure the protection of sensitive key material.

The alternative to using an HSM is to store encryption keys in software which can be risky since skilled attackers can identify critical key material based on its unique, random characteristics. High value keys should be protected to the best achievable standards, since their loss might cause considerable financial and reputational damage as well as a compliance violation. HSMs provide this protection and many are certified to internationally-recognized standards like FIPS 140-2 and Common Criteria, while also being recognized by security auditors as an effective tool to mitigate cyber risk.

Applications in a containerized architecture are built, deployed and operated with contemporary methods including orchestration and dynamic scalability. These advancements bring challenges when it comes to including integration with HSMs, in a way that is compatible with this type of modern workflow. This is because applications that rely on HSMs historically require installation of special supporting software and libraries, plus manual configuration of both the server and the HSM to enable secure connections to be made between them.

Now, thanks to the integration of nCipher nShield HSMs with OpenShift, it is possible to easily incorporate highly scalable crypto operations into your containerized application architecture.

Before discussing how to integrate nShield HSMs with OpenShift, it may be instructive to consider visually where the HSM fits in the context of the OpenShift platform:

As depicted in the diagram above, the nShield HSM is an external component accessed over the network. It provides highly available and scalable certified crypto offload for protecting valuable key material so that it is never exposed within the containerized architecture or platform (where it might be observed or captured by systems administrators).

Implementing cryptographic operations to enhance application security can be complex. Developers benefit from tools which make this task easier, and that provide an approved reference architecture to follow. Therefore, nCipher provides a set of standard scripts that enable supported integration with and connection to certified nShield HSMs in a streamlined and repeatable way. This reduces development times while using a tested process for delivering high assurance application security.

With these scripts, application developers can easily include the necessary nShield libraries for use with their PKCS11 or Java programs inside container images. Alternatively, off-the-shelf container images provided by third parties can be extended to include such libraries to enable their use with nShield HSMs. Typically this would form part of a CI/CD (continuous integration, delivery and deployment) pipeline so as to allow new versions or iterations of applications to be created with the same capabilities integrated.

Another container image is built with the nShield hardserver to enable and manage the connection to one or more nShield HSMs. These standardized images are stored in the normal enterprise container registry, and can be launched into any compatible container runtime.

One or more application containers are deployed into a pod alongside an instance of the hardserver container. The latter is supplied with details of the nShield HSM(s) to connect to (which can be in private or co-located hosting, or nShield as a service); while the application containers mount the corresponding Security World files from suitable persistent volume storage.

Different applications and/or versions of the same application can share HSMs in the same Security World, making use of the same or their own application keys which can be permanent or temporary depending on the volume/storage mapping configured.

nShield HSMs can support OpenShift development at any scale and with flexible or dynamic provisioning. Rather than upgrading servers or virtual machines, new application versions are deployed typically alongside and then instead of older versions with traffic distributed using included or external load balancers.

Using the nShield container option pack with Red Hat OpenShift, developers and operations teams can easily integrate their new or existing applications with nShield HSMs in a way that is straightforwardly accessible from contemporary containerized deployments. There is no need to install or configure software and appliances, meaning a much faster time-to-security. Instead of leaving potentially valuable application keys vulnerable, they are safely generated and used only within the HSMs protected and certified boundary.

nShield HSMs are also highly scalable, which make them a good companion for use with large or dynamically deployed containerised application architectures and allows developers to increase capacity with confidence. For implementations leveraging the subscription-based nShield-as-a-Service, the maintenance and management of the HSM itself is offloaded from the IT team.

The integration of the nCipher nShield with Red Hat OpenShift enables projects to be implemented with a new level of security that delivers the scale and flexibility needed for todays enterprise applications.

To learn more about nCipher nShield HSMs and the integration with Red Hat OpenShift, download our solution brief here. If youd like to learn more about nCiphers unique Security World key management architecture click here [HYPERLINK TO CONTAINER/KUBERNETES LANDING PAGE WHERE SECURITY WORLD WHITEPAPER IS GOING TO BE].

Read the rest here:
Self-contained, ready, and secured - Enhancing Red Hat OpenShift with hardware cryptography - Security Boulevard

Luxury Cars Are Embracing the Drop Model Favored by Supreme, Nike – Bloomberg

Illustration: Robert Beatty

Illustration: Robert Beatty

Rolls-Royce knows that for some clients, the $330,000 Wraithin all its 12-cylinder, 3,800-pound art deco gloryis not enough. The model is six years old, after all, and usually cruises rather reservedly down the street in a shade of navy or noir.

On the other hand, the Kryptos edition of the Wraith, which was released in July, comes with computer-generated ciphers stitched into the buttery leather door panels. Fiber-optic bulbs that have been woven into the ceiling depict an in-motion data stream. The quirky name is a reference to cryptography, the art of using codes. And details such as glowing fluorescent light threads and flecks of green paint are clues to a hidden message for owners to solve.

Kryptos edition of the Rolls-Royce Wraith.Its unique exterior paint color is called Delphic Grey, a hue consisting of a solid anthracite base color with blue and green mica flakes that glitter in the sun. It also has a narrow, hand-painted pinstripe in Kryptos Green and charcoal.

Source: Rolls-Royce

This version will cost $450,000; only 50 will be made. Its the latest in a fresh spate of cars that high-end automakers are producing with unique colorways (and gimmicks) in limited quantities, and at price premiums tens and hundreds of thousands of dollars above standard. These special editionsAston Martins DBS 59, Bugattis Chiron Noire, McLarens 600LT Spider Segestria Borealis, Lamborghinis Huracn Avio, Land Rovers Range Rover Fiftyare to car collectors what the Air Jordan 11 25th Anniversary is to sneakerheads.

And as with the sneaker retail and resale markets, where a 14-year-old can build an empire with bots, the game is often rigged. Special editions of cars sell out quickly to hand-selected friends of the brand whove proven their devotion with their purchasing power. Even so, just like the exclusive sneaker drop, the limited-edition release serves a dual purpose: It generates big hype for the brandand big money.

The encrypted ciphers throughout the inside of the Kryptos look like mere design elements, but they also contain a secret coded message that can be unlocked like a riddle, Rolls-Royce says. Clients who own the car can submit their guesses via an app that the company developed, called Whispers; the answer is kept locked in a safe in Goodwood, England. The reward for figuring out the secret message, alas, is the simple satisfaction of being the first one to do it.

Source: Rolls-Royce

These are volatile days for the makers of high-end autos and supercars, most of which deliver fewer than 10,000 models worldwide each year. (Ferrari sold 10,131 in 2019.) Although some brands have tentatively optimistic outlooks for 2020 and beyondBugatti still has plenty of orders in the pipelineothers face the threat of obsolescence, even extinction.

On May 13, Aston Martin said it would need more cash to fulfill a crucial restructuring plan, even after Ernesto Bertarelli, whose familys $18.1 billion fortune derives mostly from pharmaceuticals, acquired a 3.4% voting stake in the company. His investment followed a $670 million capital infusion in April from a group led by Canadian investor Lawrence Stroll. Then, on June 4, Aston announced it would cut as many as 500 jobs, or 20% of its workforce, to help cope with lower demand amid the pandemic.

Bugattis Chiron Noire.

Source: Bugatti

A powerful headwind against these companies is the strong preference among car buyers for light trucks such as SUVs, which made up 75% of car sales in the U.S. through the second quarter of this year. Bentley, Lamborghini, and Rolls-Royce each recently added an SUV to their lineups, but its not a cornerstone of their brandsrather, its an add-on to their existing sports car collection. (Ferrari says it will have an SUV soon.)

The special edition allows these brands to play to their strengths, by making fast sports cars with enviable looks. Heres how it works: Porsche AG decides to make a special Heritage model of its 911 Targa top convertible and limits it to 992 units. That car costs 38,000 ($48,344) more than the standard Targaa number thats almost pure profit, because the special edition doesnt require the company to make any truly new design elements or mechanical components.

Just as theres no real technological difference between a Nike Air Max LeBron VII Superman and a Ring Ceremony LeBron 10 PE, the only differences between these cars and the base model are in the colors, finishes, and small aesthetic flourishes. That is where Porsche makes its margin, says Michael Dean, head of Bloomberg Intelligences European automotive analysis. The same goes for Ferrari and its limited edition and specials.

Porsche 911 Targa 4S Heritage Design Edition.

Source: Porsche

Brands build enthusiasm on such machines much the same way Nike or Supreme do before a drop: They release teasers of the colorways and vague body lines to the media months in advance and produce polished videos showing an edge of the grille. They drop hints like breadcrumbs across social media about the name, pricing, and quantity of the special object.

It all serves to push the companys name and design prowess into the public eye in the weeks leading up to the release, penetrating (the companies hope) the din on news and social media for the duration of the buildup. By the end of the push, it matters not that 99.9% of the brands fans wont get onethe attention lavished on the object of desire has more than paid for the effort and marketing expense.

Its no surprise, then, that automakers have been churning out special editions in increasingly frequent intervals at higher prices than ever. In 2017, Rolls-Royce added dozens more workers to the bespoke shop where all its special-edition vehicles are made. It went from zero limited-edition series in 2010 to producing the Cullinan Black Badge, the Wraith Eagle VIII, and the Zenith Collectors Edition of the Ghost in 2019 alone.

Inside the Heritage Design EditionPorsche.

Source: Porsche

The Rolls-Royce range has extended significantly since 2011, when it came out with a modern example of a special series, the Spirit of Ecstasy Centenary Collection. Gerry Spahn, Rolls-Royces head of communications for North America, says, We are doing more real, different, cool collection cars than ever before.

At Aston Martin last year, production on special projects went from the normal 50 delivered up to 70, says Vice President and Chief Marketing Officer Peter Freedman. (That was before the coronavirus hit, of course, causing production delays across the board for the enterprise, headquartered in Gaydon, England.) Freedman says he noticed more enthusiasm for such cars starting six or seven years ago.

There is more wealth, he says, and its something thats driven by the wealthy people who always want something unique.

Interest in a car thats special to ones self is a grand tradition in automaking, even if its never been as widespread as it is now. Ferrari was building limited-run 250 GT Berlinettas outfitted by the builder Zagato as far back as the 1950s. By the 1980s, Porsche was creating small batches of its special 930 Turbo LE (limited edition) 911shand-finished with such small flourishes as a deep spoiler. In 2000, Ford released the Mustang Cobra R, limited to a run of 300.

Aston Martins DBS 59 interior.

Source: Aston Martin

Profits on such expensive machines, as noted, can be huge. It takes roughly a billion dollars to develop a new car from scratch. But for a special version of a Rolls-Royce or a McLaren or even a Range Rover, that money has already been spent. Moreover, consumers must pay for the bulk of the car even before its built, when they preorder.

These types of vehicles can be hugely lucrative for luxury and premium manufacturers, says Ian Fletcher, principal automotive analyst at IHS Markit. Profit margins at some brands can approach 40% across the board, thanks to consumer appetites that throw rationality out the window.

We create a business model for everything we do, says Lamborghini Chief Commercial Officer Giovanni Perosino. We try to avoid having any car that loses money. For cars like this, even before we start production, we already have customers with a down payment and a signed letter of intent.

If you ask collectors why they buy them, youll get a varied response. For some its strictly business: Residual values of such special rarities remain strong throughout global setbacks.

Its been happening where the limited-edition cars, because they are so limited and so sought-afterthe values go up, says David Lee, a prominent Ferrari collector and businessman. The market values are a lot more than a standard model, and you feel so good that you made money. I see it as an investment, not an expense.

Freedman echoes this sentiment: They always appreciate, he says. If you look at the last financial crisis and what has happened to the value of historical cars after that, they have exponentially increased.

Ferrari 488 Pista 'Piloti Ferrari'.

Source: Ferrari

Others simply love owning something so distinguishable from the norm. Lee compares it to having a customized Birkin handbag. Its something not everybody sees all the time, and they know its hard to get, so that compliment feels good, he says. The latest addition to his stable, a Ferrari 488 Pista edition, is set for delivery this summer. And then of course knowing how hard you worked in order to achieve that, he says. Its a sense of personal achievement in getting one.

Because not just anyone can get these cars. Only the most dedicated fansand in this case, dedicated means those with a habit of spendingwill even be offered the chance to get one. An invitation to buy a limited-edition supercar means a customer probably already has at least five Ferraris, Dean says. And if you want to buy the Lamborghini Sin, you had better have bought a few of the brands Huracns or Aventadors or Gallardos first.

Not everybody honestly can take a Sin, Lamborghinis Perosino says. We select first those who are closest to us, who can keep the car and care for it. I have 8,350 customers, and I know which kind of cars they have, which kind of other cars they have. We select those who are our best customers. He adds, We have requests for three to four times more than we have availability.

As for the Kryptos, Rolls-Royce says there are a fewfewer than 10left to be had.

Before it's here, it's on the Bloomberg Terminal.

See the rest here:
Luxury Cars Are Embracing the Drop Model Favored by Supreme, Nike - Bloomberg

Quantum Cryptography Market 2020 Trends, Size, Share, Growth Opportunities, Emerging Technologies, Regional, Key Players and Forecast to 2025 – 3rd…

The new research report titled Quantum Cryptography Market published by Adroit Market Research into his huge database. Primary and secondary research methodologies have been used to formulate this report. This Report Provides an in-depth study analyzing the current and future demands of this market also it provides the overview, definition, cost structure, segmentation, recent developments, application, and industry chain analysis, CAGR growth, and Porters Five Forces Analysis, demand. The report has offered an all-inclusive analysis of the global market taking into consideration all the pivotal aspects like growth factors, market developments, future prospects, and trends.

Get Sample Copy of this Report: https://www.adroitmarketresearch.com/contacts/request-sample/958

Some of the important aspects analysed in the report includes market share, production, key regions, revenue rate as well as key players. This Quantum Cryptography market report also provides the readers with detailed figures at which the Quantum Cryptography market was valued in the historical year and its expected growth in upcoming years. This report on Quantum Cryptography market has been made in order to provide deep and simplified understanding of the market to its end users. In addition, the report include deep dive analysis of the market, which is one of the most important features of the market. Furthermore, the need for making an impact is likely to boost the demand for the experts which are working in the market. Moreover, an in depth analysis of the competitors is also done to have an estimate for the market.

Top Leading Key Players are:

ID Quantique, MagiQ Technologies, Infineon Technologies, QuintenssenceLabs, Crypta Labs, ISARA, Toshiba, Microsoft, IBM, HP, PQ Solutions, and Qubitekk.

Browse the complete report @ https://www.adroitmarketresearch.com/industry-reports/quantum-cryptography-market

The global Quantum Cryptography market offers a thorough study of all the important aspects of the market. All the factors that are responsible for the growth of the global market are studied in this report. In addition to that, the factors causing hurdles in the path are also studied in the report. For the study of any market it is very important to study some factors such as market trends, revenue growth patterns market shares, demand and supply. In addition, it also covers political and social factors which is likely to affect the growth of the market. Production, market share, revenue rate, key regions and major vendors are some of the vital aspects analysed in the report. This report on Quantum Cryptography market has been made in order to provide deep and simplified understanding of the market to its end users.

Based on application, the market has been segmented into:

NA

In addition, the report include deep dive analysis of the market, which is one of the most important features of the market. Furthermore, the need for making an impact is likely to boost the demand for the experts which are working in the Quantum Cryptography market. Moreover, an in depth analysis of the competitors is also done to have an estimate for the Quantum Cryptography market. Moreover, the report provides historical information with future forecast over the forecast period. Various important factors such as market trends, revenue growth patterns market shares and demand and supply are included in almost all the market research report for every industry. Some of the important aspects analysed in the report includes market share, production, key regions, revenue rate as well as key players.

There is a target set in market that every marketing strategy has to reach. In order to reach these targets the vendors in the market always have to look up to new and innovative ideas. These innovations are mandatory in order to satisfy the targeted audience. In addition, it also covers political and social factors which is likely to affect the growth of the Quantum Cryptography market. The study of various segments of the global market are also covered in the research report. In addition to that, for the forecast periods determination of factors like market size and the competitive landscape of the market is analyzed in the report. Due to the increasing globalization and digitization, there are new trends coming to the market every day. The research report provides the in-depth analysis of all these trends.

For Any Query on the Quantum Cryptography Market: https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/958

About Us :

Adroit Market Research is an India-based business analytics and consulting company. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a markets size, key trends, participants and future outlook of an industry. We intend to become our clients knowledge partner and provide them with valuable market insights to help create opportunities that increase their revenues. We follow a code Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX 75204, U.S.APhone No.: USA: +1 972-362 -8199 / +91 9665341414

Read more from the original source:
Quantum Cryptography Market 2020 Trends, Size, Share, Growth Opportunities, Emerging Technologies, Regional, Key Players and Forecast to 2025 - 3rd...