SlideShare a Scribd company logo
Emerging Technologies:
Japan’s Position
Eric Vanderburg, MBA
July 24, 2004
Information Technology
Japan was a latecomer in IT
developments as compared to US
July 2000 Japanese government
established IT Strategy Headquarter
& an IT Strategy Council
Goal: make Japan the most
advanced IT country in 5 years
Information Technology
One of the means of realizing
the goal was by building an
ultra-high speed Internet
network
Japan had been lagging behind
in rate of computer use (19th in
number of computers per
capita, 21st in diffusion of
Internet use (data for late
1990s)
Japan’s Information Super
Highway
In terms of goal setting, Japan was
well a head of the US in conceiving
of an information super highway
In 1990, NTT already had its
“visual, intelligent, and personal”
communications strategy (VI&P)
The aim of VI&P was to link every
household in Japan to a fiber-optic
network over the period of 20 yrs
Lack of governmental support
VI&P only had NTT as the main
initiator
The Japanese government never
responded to NTT’s initiative
Even though Japan was well a head
in the initiative by three years, now it
finds itself behind
Human Genome
Japan was well ahead of the US in its
attention to human genome project
(mapping the human DNA)
1n 1981, five years before American
turned their attention to the human
genome project, Tokyo University in
collaboration with a number of private
firms were working on DNA extraction
project- they hope to use Japan’s robotic
technology to speed up the process
Human genome project
1997: Tokyo University professor
Akiyoshi Wada published a report of
their research detailing that it is
possible to do the mapping at 10 Yen
per base pair (this led to America
Celera Genomics project)
There was little recognition in Japan
and funds were committed in an
inconsistent fashion
Human genome project:
International Efforts
1988: International Strategy Meeting
on Genome Sequencing
2000: shares of sequencing efforts by
countries (USA- 67%, UK- 22%,
Japan- 7%, France- 2%, Germany- 2%,
and China - 1%)
Whereas Japan could have taken a lead
because it had it required to, the chance
was squandered as in the case of VI&P
Nanotechnology: Will Japan keep
the lead?
2001, USA announced their
Nanotechnology initiative ($500 m
annual allocation)
Japan has devoted funds to nanofusion,
materials, nanounit fabrication as the key
areas (24 trillion yen in 5 years)
Results: Carbon nanotubes
The big question is whether Japan will
keep a future lead in nanomaterial
Observations- Key Issues
The capability to apply research
developments in nanotechnology
across many industries
In energy revolution
New materials for a wide range of products
Supportive Technology
Infrastructure will determine the
direction of progress
Nano materials- engineering and
manufacturing- complex materials
Observation- Key Issues
The U.S.A main focus and lead is in
nanobiology and electronics
Spending: Massive increase in spending
by Japan-$1b in 2002 up from $120 m in
1997- expected to jump to $ 50 b. over
the next five years (private companies
like Hitachi, Toray & Mitsubishi also
invested $1b into nano-related projects.
Market potential- $200 b by 2010
Japan’s application performance has
been very strong- driving more products
to the market faster
Products- Application
Nissan’s X-Trail sport-utility vehicle has its
front fenders made of lightweight
composite reinforced with nanotubes
Sony’s new lithium-ion batteries that last
longer and possibly in fuel cell for cars
Production capability for nanotubes has
also increased- 2000- about 1 ton a year,
2002- 10 tons a month by Mitsui- others
like Toray are also building plants to begin
production
Entrepreneurship in Nanotech
Startups
Japan has about 100 ventures
U.S.A has about 1000 ventures in
2001 alone
Japanese companies are investing in
promising U.S.A and European
Ventures, funding research activities
at foreign Universities, and forging
strategic links with Asian companies
that could turn into rivals
Conclusion
Technologies are very much related
(supportive technology and cluster concept)
A look at the names of private companies that
participated in Japan’s DNA extraction
project tell it all- Seiko Instruments &
Electronics, Fuji Film, Hitachi, Toshiba &
Mitsui Knowledge Industry)
Japan’s strength in materials related
nanotechnology shows the related nature
of current technological progress and
existing capability- technology trajectory
concept

More Related Content

Similar to Emerging Technologies: Japan’s Position

Current Trends of Japanese LOD -through LOD Challenge Japan
Current Trends of Japanese LOD  -through LOD Challenge JapanCurrent Trends of Japanese LOD  -through LOD Challenge Japan
Current Trends of Japanese LOD -through LOD Challenge Japan
Kouji Kozaki
 
High Tech At Low Cost: Unlocking the Chinese Innovation Power
High Tech At Low Cost: Unlocking the Chinese Innovation PowerHigh Tech At Low Cost: Unlocking the Chinese Innovation Power
High Tech At Low Cost: Unlocking the Chinese Innovation Power
Hora Tjitra
 
Comparing nanotechnology trajectories of Russia, China, Brazil, and the Unite...
Comparing nanotechnology trajectories of Russia, China, Brazil, and the Unite...Comparing nanotechnology trajectories of Russia, China, Brazil, and the Unite...
Comparing nanotechnology trajectories of Russia, China, Brazil, and the Unite...
Evgeny Klochikhin
 
Intel APJ Enterprise Day - Introduction to Intel Kabushiki Kaisha
Intel APJ Enterprise Day - Introduction to Intel Kabushiki KaishaIntel APJ Enterprise Day - Introduction to Intel Kabushiki Kaisha
Intel APJ Enterprise Day - Introduction to Intel Kabushiki Kaisha
IntelAPAC
 
The state-of-broadband-2012
The state-of-broadband-2012The state-of-broadband-2012
The state-of-broadband-2012
Prayukth K V
 
Antropius
AntropiusAntropius
Chips With Everything
Chips With EverythingChips With Everything
Chips With Everything
Project Goodman
 
Information and communication in japan
Information and communication in japanInformation and communication in japan
Information and communication in japan
CMR WORLD TECH
 
The state of broadband 2012 achieving digital inclusion for all
The state of broadband 2012 achieving digital inclusion for allThe state of broadband 2012 achieving digital inclusion for all
The state of broadband 2012 achieving digital inclusion for all
Dr Lendy Spires
 
Spain work tech 2050 scenarios and national workshops
Spain work tech 2050 scenarios and national workshopsSpain work tech 2050 scenarios and national workshops
Spain work tech 2050 scenarios and national workshops
Jerome Glenn
 
Intensifying Competition For Technology In Northeast Asia
Intensifying Competition For Technology In Northeast AsiaIntensifying Competition For Technology In Northeast Asia
Intensifying Competition For Technology In Northeast Asia
slee1009
 
Broadband comission annual report 2012
Broadband comission annual report 2012Broadband comission annual report 2012
Broadband comission annual report 2012
Emerson Marques Pedro
 
THE STATE OF BROADBAND 2012: ACHIEVING DIGITAL INCLUSION FOR ALL
THE STATE OF BROADBAND 2012: ACHIEVING DIGITAL INCLUSION FOR ALLTHE STATE OF BROADBAND 2012: ACHIEVING DIGITAL INCLUSION FOR ALL
THE STATE OF BROADBAND 2012: ACHIEVING DIGITAL INCLUSION FOR ALL
Thierry Pires
 
Science & Technology
Science & Technology Science & Technology
Science & Technology
Cake Butter
 
13 (IDNOG01) Introduction about Biglobe by Shin Shirahata
13 (IDNOG01) Introduction about Biglobe by Shin Shirahata13 (IDNOG01) Introduction about Biglobe by Shin Shirahata
13 (IDNOG01) Introduction about Biglobe by Shin Shirahata
Indonesia Network Operators Group
 
2010 STeLA Progress Report
2010 STeLA Progress Report2010 STeLA Progress Report
2010 STeLA Progress Report
CP Yen Foundation 朝邦文教基金會
 
South Korean ICT Development: Key Lessons for the Emerging Economies
South Korean ICT Development: Key Lessons for the Emerging EconomiesSouth Korean ICT Development: Key Lessons for the Emerging Economies
South Korean ICT Development: Key Lessons for the Emerging Economies
Faheem Hussain
 
etc group on Nano geopolitics
etc group on Nano geopoliticsetc group on Nano geopolitics
etc group on Nano geopolitics
Yuyun Ismawati Drwiega
 
Walden faculty presents at UN Conference
Walden faculty presents at UN ConferenceWalden faculty presents at UN Conference
Walden faculty presents at UN Conference
WaldenUniversity
 
Toward a world leader e government in korea
Toward a world leader e government in koreaToward a world leader e government in korea
Toward a world leader e government in korea
Tino Lew
 

Similar to Emerging Technologies: Japan’s Position (20)

Current Trends of Japanese LOD -through LOD Challenge Japan
Current Trends of Japanese LOD  -through LOD Challenge JapanCurrent Trends of Japanese LOD  -through LOD Challenge Japan
Current Trends of Japanese LOD -through LOD Challenge Japan
 
High Tech At Low Cost: Unlocking the Chinese Innovation Power
High Tech At Low Cost: Unlocking the Chinese Innovation PowerHigh Tech At Low Cost: Unlocking the Chinese Innovation Power
High Tech At Low Cost: Unlocking the Chinese Innovation Power
 
Comparing nanotechnology trajectories of Russia, China, Brazil, and the Unite...
Comparing nanotechnology trajectories of Russia, China, Brazil, and the Unite...Comparing nanotechnology trajectories of Russia, China, Brazil, and the Unite...
Comparing nanotechnology trajectories of Russia, China, Brazil, and the Unite...
 
Intel APJ Enterprise Day - Introduction to Intel Kabushiki Kaisha
Intel APJ Enterprise Day - Introduction to Intel Kabushiki KaishaIntel APJ Enterprise Day - Introduction to Intel Kabushiki Kaisha
Intel APJ Enterprise Day - Introduction to Intel Kabushiki Kaisha
 
The state-of-broadband-2012
The state-of-broadband-2012The state-of-broadband-2012
The state-of-broadband-2012
 
Antropius
AntropiusAntropius
Antropius
 
Chips With Everything
Chips With EverythingChips With Everything
Chips With Everything
 
Information and communication in japan
Information and communication in japanInformation and communication in japan
Information and communication in japan
 
The state of broadband 2012 achieving digital inclusion for all
The state of broadband 2012 achieving digital inclusion for allThe state of broadband 2012 achieving digital inclusion for all
The state of broadband 2012 achieving digital inclusion for all
 
Spain work tech 2050 scenarios and national workshops
Spain work tech 2050 scenarios and national workshopsSpain work tech 2050 scenarios and national workshops
Spain work tech 2050 scenarios and national workshops
 
Intensifying Competition For Technology In Northeast Asia
Intensifying Competition For Technology In Northeast AsiaIntensifying Competition For Technology In Northeast Asia
Intensifying Competition For Technology In Northeast Asia
 
Broadband comission annual report 2012
Broadband comission annual report 2012Broadband comission annual report 2012
Broadband comission annual report 2012
 
THE STATE OF BROADBAND 2012: ACHIEVING DIGITAL INCLUSION FOR ALL
THE STATE OF BROADBAND 2012: ACHIEVING DIGITAL INCLUSION FOR ALLTHE STATE OF BROADBAND 2012: ACHIEVING DIGITAL INCLUSION FOR ALL
THE STATE OF BROADBAND 2012: ACHIEVING DIGITAL INCLUSION FOR ALL
 
Science & Technology
Science & Technology Science & Technology
Science & Technology
 
13 (IDNOG01) Introduction about Biglobe by Shin Shirahata
13 (IDNOG01) Introduction about Biglobe by Shin Shirahata13 (IDNOG01) Introduction about Biglobe by Shin Shirahata
13 (IDNOG01) Introduction about Biglobe by Shin Shirahata
 
2010 STeLA Progress Report
2010 STeLA Progress Report2010 STeLA Progress Report
2010 STeLA Progress Report
 
South Korean ICT Development: Key Lessons for the Emerging Economies
South Korean ICT Development: Key Lessons for the Emerging EconomiesSouth Korean ICT Development: Key Lessons for the Emerging Economies
South Korean ICT Development: Key Lessons for the Emerging Economies
 
etc group on Nano geopolitics
etc group on Nano geopoliticsetc group on Nano geopolitics
etc group on Nano geopolitics
 
Walden faculty presents at UN Conference
Walden faculty presents at UN ConferenceWalden faculty presents at UN Conference
Walden faculty presents at UN Conference
 
Toward a world leader e government in korea
Toward a world leader e government in koreaToward a world leader e government in korea
Toward a world leader e government in korea
 

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
Eric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
Eric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
Eric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Emerging Technologies: Japan’s Position

  • 1. Emerging Technologies: Japan’s Position Eric Vanderburg, MBA July 24, 2004
  • 2. Information Technology Japan was a latecomer in IT developments as compared to US July 2000 Japanese government established IT Strategy Headquarter & an IT Strategy Council Goal: make Japan the most advanced IT country in 5 years
  • 3. Information Technology One of the means of realizing the goal was by building an ultra-high speed Internet network Japan had been lagging behind in rate of computer use (19th in number of computers per capita, 21st in diffusion of Internet use (data for late 1990s)
  • 4. Japan’s Information Super Highway In terms of goal setting, Japan was well a head of the US in conceiving of an information super highway In 1990, NTT already had its “visual, intelligent, and personal” communications strategy (VI&P) The aim of VI&P was to link every household in Japan to a fiber-optic network over the period of 20 yrs
  • 5. Lack of governmental support VI&P only had NTT as the main initiator The Japanese government never responded to NTT’s initiative Even though Japan was well a head in the initiative by three years, now it finds itself behind
  • 6. Human Genome Japan was well ahead of the US in its attention to human genome project (mapping the human DNA) 1n 1981, five years before American turned their attention to the human genome project, Tokyo University in collaboration with a number of private firms were working on DNA extraction project- they hope to use Japan’s robotic technology to speed up the process
  • 7. Human genome project 1997: Tokyo University professor Akiyoshi Wada published a report of their research detailing that it is possible to do the mapping at 10 Yen per base pair (this led to America Celera Genomics project) There was little recognition in Japan and funds were committed in an inconsistent fashion
  • 8. Human genome project: International Efforts 1988: International Strategy Meeting on Genome Sequencing 2000: shares of sequencing efforts by countries (USA- 67%, UK- 22%, Japan- 7%, France- 2%, Germany- 2%, and China - 1%) Whereas Japan could have taken a lead because it had it required to, the chance was squandered as in the case of VI&P
  • 9. Nanotechnology: Will Japan keep the lead? 2001, USA announced their Nanotechnology initiative ($500 m annual allocation) Japan has devoted funds to nanofusion, materials, nanounit fabrication as the key areas (24 trillion yen in 5 years) Results: Carbon nanotubes The big question is whether Japan will keep a future lead in nanomaterial
  • 10. Observations- Key Issues The capability to apply research developments in nanotechnology across many industries In energy revolution New materials for a wide range of products Supportive Technology Infrastructure will determine the direction of progress Nano materials- engineering and manufacturing- complex materials
  • 11. Observation- Key Issues The U.S.A main focus and lead is in nanobiology and electronics Spending: Massive increase in spending by Japan-$1b in 2002 up from $120 m in 1997- expected to jump to $ 50 b. over the next five years (private companies like Hitachi, Toray & Mitsubishi also invested $1b into nano-related projects. Market potential- $200 b by 2010 Japan’s application performance has been very strong- driving more products to the market faster
  • 12. Products- Application Nissan’s X-Trail sport-utility vehicle has its front fenders made of lightweight composite reinforced with nanotubes Sony’s new lithium-ion batteries that last longer and possibly in fuel cell for cars Production capability for nanotubes has also increased- 2000- about 1 ton a year, 2002- 10 tons a month by Mitsui- others like Toray are also building plants to begin production
  • 13. Entrepreneurship in Nanotech Startups Japan has about 100 ventures U.S.A has about 1000 ventures in 2001 alone Japanese companies are investing in promising U.S.A and European Ventures, funding research activities at foreign Universities, and forging strategic links with Asian companies that could turn into rivals
  • 14. Conclusion Technologies are very much related (supportive technology and cluster concept) A look at the names of private companies that participated in Japan’s DNA extraction project tell it all- Seiko Instruments & Electronics, Fuji Film, Hitachi, Toshiba & Mitsui Knowledge Industry) Japan’s strength in materials related nanotechnology shows the related nature of current technological progress and existing capability- technology trajectory concept