What's not to like for it is certainly may be completely different from traditional fareware
Interesting times ahead in deed, Gareth.
I imagine extant systems administrations are absolutely terrified of the implications and likely repercussions.
Those hoping for some respite from the world's ongoing woes are out of luck, apparently. FireEye and McAfee, whose business models center around charging enterprises money to protect their networks from cyber-threats, issued a joint report this week predicting next year you'll see an increase in cyber-threats, particularly …
The more I learn about cybersecurity, the more I wonder why there aren't more problems in the real World. I guess either cybercrooks lack time to exploit everything or many operations were not discovered yet. ...... Potemkine!
Omitted from that guess, Potemkine!, is the very real likelihood you are not being told of the rapidly emerging problems for/in the real World, whatever and wherever and whenever that is ........ and you might like to enquire of whomever/whatever you may think able to supply an answer as to why that should be so/is ........ although it doesn't take one to be an Einstein to make an educated guess which would answer that question correctly without other party input/output.
IMSHO I think I am not so badly informed, thank you for trying to guess.
Why aren't more companies "ransomwared" when so many SME have none or poor cybersecurity?
Why aren't more infrastructure (electricity, water, and so on) paralysed, when cybersecurity in OT isn't part of the culture?
Why aren't more local councils hacked, when they allocate so few means to their IT?
Looking at the attack surface, reality could be (or become soon) way worse.
That has worked extremely well for a long time now, Clausewitz 4.0. It has a certain MAJIC Attraction for Rewards Employing and Enjoying a Venerable Psychotic Addiction for Diabolical Virtual Self-Actualisation ..... in Heavenly Presences.
A Tried and Tested Methodology Proven Almighty Effective and Surprisingly Successful in ...... well, Any and All Fields where/when ProACTively Deployed ........ and there are not many Programs that can guarantee that FailSafe AIdDelivery of Future Supplies.
Yup....Belgium....that well known adversary!!!!
Enjoy: "The best-known example of this approach is when Britain's GCHQ used LinkedIn to compromise sysadmins at Belgian telco Belgacom (now known as Proximus), eventually infiltrating 5,000 staff devices and Belgacom's core network routers."
And that was before GCHQ could track every mobile in the UK....and every medical record as well..........progress on the way to a 21st Century STASI.......
Cheltenham leading the world in anti-democratic technology. First Belgium, then Blighty..........tomorrow the world!!!!