Décryptage de l'Internet des objets au travers des 4 axes majeurs de la transformation digitale (Data, Cloud, Mobile, Empowerment). Présentation de l'AWT dans le cadre du Café Numérique spécial "Internet des objets" à Louvain-la-Neuve, le 20 octobre 2014
The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the "Evil Twin of the Internet" since more than 57 percent of its area is occupied with unlawful content.
Mobile device usage has skyrocketed in enterprises and so have the risks. Eric Vanderburg and Trevor Tucker discuss the evidentiary value of mobile forensics, its limitations, and how cybersecurity can ensure the processes, procedures, and controls necessary to protect mobile devices and organizational data. This helps companies and attorneys to be better prepared for investigations and associated legal implications of mobile use in the enterprise.
When identifying the most useful best-practice standards and guidance for implementing effective cyber security, it is important to establish the role that each fulfils, its scope and how it interacts (or will interact) with other standards and guidance.
Cybersecurity standards are generally applicable to all organisations regardless of their size or the industry and sector in which they operate. This page provides generic information on each of the standards that is usually recognised as an essential component of any cyber security strategy.
This presentation includes cloud security overview, Could Security Access Broker, CASB's four pillars, proxy and API deployment mode and advantage and limitation of deployment modes
The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the "Evil Twin of the Internet" since more than 57 percent of its area is occupied with unlawful content.
Mobile device usage has skyrocketed in enterprises and so have the risks. Eric Vanderburg and Trevor Tucker discuss the evidentiary value of mobile forensics, its limitations, and how cybersecurity can ensure the processes, procedures, and controls necessary to protect mobile devices and organizational data. This helps companies and attorneys to be better prepared for investigations and associated legal implications of mobile use in the enterprise.
When identifying the most useful best-practice standards and guidance for implementing effective cyber security, it is important to establish the role that each fulfils, its scope and how it interacts (or will interact) with other standards and guidance.
Cybersecurity standards are generally applicable to all organisations regardless of their size or the industry and sector in which they operate. This page provides generic information on each of the standards that is usually recognised as an essential component of any cyber security strategy.
This presentation includes cloud security overview, Could Security Access Broker, CASB's four pillars, proxy and API deployment mode and advantage and limitation of deployment modes
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka PPT on "Cybersecurity Fundamentals" will introduce you to the world of cybersecurity and talks about its basic concepts. Below is the list of topics covered in this session:
Need for cybersecurity
What is cybersecurity
Fundamentals of cybersecurity
Cyberattack Incident
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveIvan Sang
Achieving effective cybersecurity and governance is a complex challenge for states, businesses and individuals. Recent empirical analyses indicate that cybercrime now costs the global economy over USD 600 billion annually, but many experts believe that this is a conservative figure that understates the actual amount. Reports of cyber breaches that affect democracy, financial services, retail, healthcare, defence, utilities, and infrastructure are becoming more frequent. Also, this trend is projected to increase in the near future. Governments of developing countries, including Kenya, are slowly adopting technology as a tool to offer efficient services. In contrast, cybercriminals use some of the most cutting edge cyber technologies to commit criminal offences and to outfox state countermeasures. Another trend is that cyber threats originate not only from individual actors or highly organized groups, but are also increasingly states-sponsored. Weaknesses in the cyber domain such as deficient cyber or law enforcement capabilities and poor legislation have been exploited to cause harm and impede socio-economic progress. Using a comparative approach, this presentation shows that cybersecurity is a shared responsibility for private citizens, communities, corporations and states alike. It also illustrates that professionals should play a more active role in minimizing and deterring cyber incidents. This session will explore the case of Kenya as country-specific yet comparatively relevant jurisdiction to explore strategic responses to cybercrime, the operational limits of cybersecurity governance and propose ways to mitigate cyber risks.
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka PPT on "Cybersecurity Fundamentals" will introduce you to the world of cybersecurity and talks about its basic concepts. Below is the list of topics covered in this session:
Need for cybersecurity
What is cybersecurity
Fundamentals of cybersecurity
Cyberattack Incident
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveIvan Sang
Achieving effective cybersecurity and governance is a complex challenge for states, businesses and individuals. Recent empirical analyses indicate that cybercrime now costs the global economy over USD 600 billion annually, but many experts believe that this is a conservative figure that understates the actual amount. Reports of cyber breaches that affect democracy, financial services, retail, healthcare, defence, utilities, and infrastructure are becoming more frequent. Also, this trend is projected to increase in the near future. Governments of developing countries, including Kenya, are slowly adopting technology as a tool to offer efficient services. In contrast, cybercriminals use some of the most cutting edge cyber technologies to commit criminal offences and to outfox state countermeasures. Another trend is that cyber threats originate not only from individual actors or highly organized groups, but are also increasingly states-sponsored. Weaknesses in the cyber domain such as deficient cyber or law enforcement capabilities and poor legislation have been exploited to cause harm and impede socio-economic progress. Using a comparative approach, this presentation shows that cybersecurity is a shared responsibility for private citizens, communities, corporations and states alike. It also illustrates that professionals should play a more active role in minimizing and deterring cyber incidents. This session will explore the case of Kenya as country-specific yet comparatively relevant jurisdiction to explore strategic responses to cybercrime, the operational limits of cybersecurity governance and propose ways to mitigate cyber risks.
Digital Transformation in Social Sciences - What is Computational Social Science?
A keynote presentation given at the Digital Humanities Morning held at the University of Helsinki, 12.05.2015
By: Lauri Eloranta
twitter: @laurieloranta
Facilitating Digital Transformation through Social Media IntelligenceDigimind
"Digital transformation" is now one of the biggest buzz phrases you can find in any organization, but how can companies transform themselves effectively to make better decisions? Digimind's Customer Success Director APAC, Olivier Girard shares the dos don'ts of digitising across departments.
TEDx Manchester: AI & The Future of WorkVolker Hirsch
TEDx Manchester talk on artificial intelligence (AI) and how the ascent of AI and robotics impacts our future work environments.
The video of the talk is now also available here: https://youtu.be/dRw4d2Si8LA
We have never lived in a world of faster and more wide-reaching technology innovations.
Our jobs, businesses, and how we operate as societies are being transformed by
technology, and the current global pandemic is only fast-tracking the digital
transformation. With this post, I want to delve into the top 10 tech trends that are driving the 4th Industrial Revolution, and that will define the next decade.
According to the Blog of the World Economic Forum, eLearning is the #10 Top Internet and Technology Trend in 2014. Get yourself an online education now by enrolling at Swiss eLearning Institute. Exclusively available from www.qnet.net
Know more about QNET by visiting these sites:
http://www.qnetlife.net
https://twitter.com/QNetOfficial
https://www.youtube.com/user/QNETofficial
https://play.google.com/store/apps/details?id=com.qnet.estore.android&hl=en
https://www.facebook.com/QNETIndiaOfficial
From artificial intelligence and augmented reality to multi-connected businesses and new mobility, the focus is on a wide variety of technology – but which trends have a lasting influence on digital transformation, in a post-COVID world? A Social Friendly Report.
7 technologies that will change our futurePioneer Lists
Advanced technologies for sure will change our future, but the thing is how we adopt those in our day to day life. Take a look on those emerging technologies.
In this presentation, Sumit introduces IoT and associated trends. Sumit's interest area lies in enabking physical-digital communication that is independent of physical location
The Internet of Things will radically transform the ways we interact with our world and control our surroundings.
iMinds insights is a quarterly publication providing you with relevant tech updates based on interviews with academic and industry experts. iMinds is a digital research center and incubator based in Belgium.
In this presentation, Nitika introduces IoT and associated trends. Her interest area lies in applications of IoT to asset sharing, collaborative/ MESH economy and internet of caring things.
With the invention of new Li-fi technology, you will soon find light bulbs of your car, light lamps in your room, lights in subway, flashlight of your mobile and any other light source are providing you internet access at very high speed.Li-fi technology is the another milestone in the history of information technology. You have got the idea that Li-Fi Technology is something light. Yes, Li-fi technology or light-fidelity technology transmits data wirelessly at high speeds with the use of light emitting diodes.
Internet-of-things (IoT) is set to create over 40 lakh jobs in 2016-17. This industry demands highly skilled and well trained professionals.
With our 12 hour IoT training and placement assistance program, you will be able to grasp the understanding of basic building blocks of IoT, able to develop local IoT project and control it via your mobile. This is program sets the foundation to explore your interest into IoT.
Harbor Research - The Internet of Things Meets the Internet of PeopleHarbor Research
We have entered an era where people, businesses and social organizations are beginning to understand the profound impacts awareness, collaboration, and intelligence will bring. In the not too distant future, hundreds of millions, then billions, of individuals and businesses, with billions, then trillions, of smart, communicating devices, will stretch the boundaries of today’s business and social systems and create the potential to change the way we work, learn, entertain and innovate.
Over the past 30 years the mobile industry has evolved from a fragmented, vehicle centric, low volume, high priced, business focused service, into a global mobile broadband business that has created new industries, new use-cases, billions of customer and innovative devices. The variety of mobile devices is about to explode as the mobile industry moves into what could be described as the third wave of Internet connectivity - a world where billions of “things” are connected. The next few years therefore promises to be as exciting and potentially as disruptive as the past 30 years.
Similar to Digital Transformation & Internet of Everything (20)
Founder & CEO de nextmoov et de Stoomlink. Membre historique de la communauté M-Forum lors du lancement de NextRide, lauréat de l’appel à projets fédéral Smart Mobility Belgium et acteur visionnaire de la mobilité durable, Thomas Hermine viendra décrypter pour nous les enjeux de cette intelligence au service de nos déplacements quotidiens. Il nous expliquera pourquoi, cette approche qui attire des entreprises issues d’autres secteurs d’activités afin de créer des écosystèmes inédits, est aujourd’hui nécessairement sociétale.
Co-founder & CEO de la société Back2Buzz. Economie circulaire, lutte contre l’obsolescence et l’explosion du volume des déchets électroniques, Back2Buzz en a fait son credo en devenant un acteur de premier plan de la vente de smartphone remis à neuf. A ce titre, Back2Buzz est pionnière dans la réconciliation entre transformation numérique et transition écologique. Cette entreprise citoyenne est également un acteur au cœur de l’innovation des objets connectés avec sa « Paper Watch » comme elle l’a encore démontrée lors du dernier Consumer Electronic Show (CES) à Las Vegas ou lors du Salon VivaTech à Paris.
Christophe Benavent, professeur de stratégie et maketing: "Les plateformes nu...Agence du Numérique (AdN)
Google, Amazon, Facebook, Apple, Microsoft et consorts occupent une place dominante dans l'économie mondiale, au point de "vassaliser" les entreprises traditionnelles. Mais elles jouent aussi un nouveau rôle utile de coordination des échanges internationaux.
Coworking|Digital Wallonia, le réseau des espaces de coworking wallons, a le plaisir de vous inviter à la cinquième édition d’I love coworking, sa soirée spéciale coworkers!
Au programme, la découverte des projets entrepreneuriaux des membres des espaces de coworking du réseau et une large partie consacrée au réseautage dans l’esprit festif, ouvert et collaboratif typique de l’esprit coworking!
Présentation de Olivier Bogaert de la Federal Computer Crime Unit sur la sécurité globale sur internet / les réseaux sociaux; introduction au social engineering.
Présentation des membres de l'Infopôle Cluster TIC faisant partie de la grappe dédiée à la cybersécurité, ayant participé à l'élaboration du dispositif KIS-Keep It Secure by Digital Wallonia.
Présentation projetée lors de l'évènement de lancement du dispositif KIS Keep It Secure by Digital Wallonia au CréAgora de Namur le 3 Décembre 2018 en présence du Ministre Jeholet.
Les pitches des coworkers donnés durant la soirée #ilovecoworking 2018 du réseau Coworking Digital Wallonia:
Chevalliance
CrashStickers
CTI Consulting
flowzone
Happy Give&Get
IRepair
Le martien rose
Le secrétariat heureux
Louveto Studio / Agence de design graphique
LR Physics
MC-Intérieur
Seerus
SoSmart
Supersuper
SYSSY
Voixdetre
SkillDeal
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Digital Transformation & Internet of Everything
1. Digital Transformation
The Internet of everything
Image : http://www.kmgus.com
Café numérique| 20/10/2014 | @awtbe | @unpeudeblabla
2.
3. 7+ Billion
People
Living Longer
Technology
Ubiquity
Constrained
Resources
Social Reform
End of capitalism?
Global
Context
ICT solutions ?
4. Mobile Cloud
Empowerment
Data
Digital
Transformation
Smartphones, tablets,
connected objects, …
Permanent connectivity
and interactivity blur the
boundaries between real
and virtual worlds.
Mobile technologies
are the medium of the
digital transformation
Unlimited development and
storage capacities, available on
demand “As a Service” have
unlocked the creation and
deployment of digital projects
on an unprecedented scale .
Cloud computing is the platform
of the digital transformation
Global, customizable, open, ...
Their activation allows to
consider the world from a
complete new algorithmic and
predictive point of view.
Data are the fuel of the
digital transformation
Social technologies disrupt the traditional
relationships and pyramidal organization of
our society. They enable the disintermediation
of organizations. Empowerment is the citizen
pilot of the digital transformation
Source : Master Plan TIC & AWT
5. Smart machines
Physical
Virtual
Adapted from Gartner
By 2020, the
majority of non-routine
career
paths will be
disrupted by
smart machines
in both positive
and negative
ways.
Virtual
Personal
Assistants
Smart
Advisors
Natural
Language
Aides
Autonomous
Vehicles
Smart
Robots
Machine
Focused
Helpers
6. Internet of everything
Internet
of things
Internet
of industry
Internet
of energy
Internet
of data
Internet
of you
Internet
of health
50 billions of
connected
things by 2020
(Cisco)
Internet of …
7. “Classic” Internet of things [1]
Koubachi revolutionizes the way objects and
things in your household are communicating
with you. They want to identify the potential of
Smart Objects and create new possibilities of
use, new services, and a simpler yet more
powerful user experience.
Koubachi accurately determines the vitality of
your plant and sends you a notification with
precise care advice at the right time.
8. “Classic” Internet of things [2]
A car is stopped 92% of the time. That
is why Volkswagen has launched a
partnership with Keyzee to propose
the dematerialization of the keys.
Thanks to a smartphone, everyone can
allow access to his car to a friend,
colleague, …
9. Beacons
The Regent Street app uses the
beacon technology which allows
shoppers to receive alerts from the
stores they pass via their Bluetooth
connection. Beacons have been
installed along the street at
participating stores so when shoppers
visit Regent Street they receive
tailored content about everything
from brand new in-store promotions,
upcoming events and exclusive offers
only available for visitors to the street
on that day.
Source : www.regentstreetonline.com
10. Internet of you … quantified self
Fitbit.com : to empower and inspire
you to live a healthier, more active life.
We design products and experiences
that fit seamlessly into your life so you
can achieve your health and fitness
goals, whatever they may be.
11. Internet of the body
A medical sensor attached to the skin
like a temporary tattoo could make it
easier for doctors to detect metabolic
problems in patients and for coaches to
fine-tune athletes’ training routines. The
entire sensor comes in a thin, flexible
package shaped like a smiley face.
Source : www.news.utoronto.ca/temporary-tattoo-measures-metabolic-stress
12. Internet of Data
Finalist at the startups competition at
LeWeb 2012 (IoT), Qunb is a DaaS
aggregation platform where it is
possible to interact and cross different
data sources. Described as the
"YouTube" of data, it allows users to
“consume“ specific data and to see
them in the most accurate format.
13. Internet of Data
A way to measure rainfall using mobile phone network
signals has been put into practice across a whole country.
Rain absorbs and scatters mobile phone signals in a way
that can be analysed to yield an overall rainfall picture.
The trial in the Netherlands, outlined in Proceedings of
the National Academy of Sciences, showed the method is
comparable to radar and rain gauges.
http://www.pnas.org/content/early/2013/01/29/1217961110.full.pdf+html
14. Internet of Data
AXA Seed Factory is a seed fund specialized in digital services
related to insurance and banking businesses. For the first
time, an insurer will directly collect data, which will be
provided on a voluntary basis, for the health of its customers.
Beyond the fun aspect of such a partnership, changes are
already possible with the establishment of fee schedules may
take into account the physical or dietary habits of each
activity. There is also the problem of security of personal
data, even if Withings says guarantee privacy.
Source : www.axaseedfactory.com
16. Internet of energy
www.simpleenergy.com. A new way for people to save
energy that is social, fun and simple. Online platform
that helps users understand their energy use with
actionable insights, that scores them against their
Facebook friends and that rewards them with real
prizes. Facilitates both smart grid rollouts and energy
efficiency even in the absence of smart grid meters.
17. Internet of energy / industry
Solar-powered. Wireless. Data-driven.
Solar-powered trash can reduces carbon
footprint, cuts costs. Big Belly trash cans
compact the trash they receive and call
for pickup when they are full. Fewer
pickups means savings on truck fuel and
maintenance staff time.
Source : www.bigbellysolar.co.uk
18. Internet of [personal] industry
Shapeways.com. 3D printing marketplace and
community, empowering designers to bring
amazing products to life. Through Shapeways,
designers gain access to the best industrial 3D
printing technology, capable of manufacturing
products with complex designs in a wide range
of high-quality materials.
19. Industry 4.0
"Industry 4.0" : a revolutionary factory that integrates Internet
technologies in its manufacturing process. This revolution is
powered by the digitization of economic and productive
exchanges. A global interconnected system, in which
machines, products and systems communicate constantly.
Source : gimelec.fr & General Electric
21. Internet of health
Propellerhealth.com. Mobile platform
for respiratory health management.
Through sensors, mobile apps and
services, Propeller helps reduce the
cost of care while delivering better
quality of life for individuals with
chronic respiratory disease.
Source : Propellerhealth.com
22. Internet of health
Source : owletcare.com
The Smart Sock is worn by your baby as he/she
sleeps. It collects heart rate, oxygen, and sleep data
and sends it via Bluetooth 4.0 to the parent's
smartphone. Your infant's data is then pushed to
the cloud and is available to any internet
connected device.
23. Connected cows
A connected cow transmits
200 mb of data each year.
Source : Orange & www.sparked.com
24. From 3D Printing to
… human augmentation
A survivor of a serious motorbike
accident has had pioneering surgery
to reconstruct his face using a series
of 3D printed parts
Source : www.bbc.com/news/uk-wales-26534408
25. Pros and cons
• Regulation.
• Cloud computing / APIs.
• Big Data.
• Business need for
cost reduction.
• Apps infrastructure for
smartphones.
• Falling costs of
embedded technology.
• M2M services.
• …
• Lack of standards.
• Networks concerns
(WiFi, 3 & 4 G,
Bluetooth, NFC, …) &
slow deployment of IPv6.
• Viable energy sources.
• Privacy and people.
• Integration of solutions
with enterprise IT.
• Believability of solutions
by businesses.
• Security concerns.
Partly adapted from Gartner
26. Key 1. Remember the 4 axes.
Mobile, Cloud Computing,
Empowerment & Big Data.
Their interaction drives
the digital transformation.
27. Key 2. An algorithmic world
Those who will be able to control,
understand and transform data
will have the power.
28. Key 3. The materialization of the digital.
We enter the third digital revolution.
The first has digitalized information.
The second has digitalized relationships.
The third will digitalize … our life.
29. 1. La connaissance et les gains
d’opportunité.
2. L’éducation.
3. La santé.
4. Industrialisation et
production.
5. L’Etat.
30. Le pouvoir et l’argent s’installent
sur Internet. Le portable entre nos
mains prend la place du chapelet.
Facebook est une communauté
sans Dieu, mêlée de confession. …
Bientôt, semées sous votre peau,
les puces feront partie de votre
corps. Vous serez votre propre
robot. Un autre monde est déjà au
travail. Tout ce que la science est
capable de faire, elle le fera.
31. Data & Services Veille & Contenu
Hub & NWOW
Plateforme ICT Events & Com
Powered by
AWT[IC]
Web, Open Data, support ICT,
API, Cloud, [C][B]YOD, …
Production et activation de contenu
conseil, baromètre, avis, projets, …
Salons, presse, forums TIC,
communication, partenariats, …
Structuration TIC, vitrine TIC, NWOW,
support physique, Web TV, […]
32. Présentation AWT[IC]
Follow us
Plateforme ICT André Blavier
Powered by
AWT[IC]
www.awt.be/cafenlln
Avenue Prince de Liège 133
5100 Jambes (Namur)
www.awt.be
info@awt.be
+32 (0)81 778080
ab@awt.be
@unpeudeblabla
www.twitter.com/awtbe
www.facebook.com/awtbe
www.awt.be/web/rss
www.youtube.com/user/awtbe
Editor's Notes
Google … mais aussi Bing et Yahoo!
Facebook ? Facebook + Bing ?
Recherches toujours plus fines et plus « humaines »
Recherches sur les images, le son, la vidéo, …
Google … mais aussi Bing et Yahoo!
Facebook ? Facebook + Bing ?
Recherches toujours plus fines et plus « humaines »
Recherches sur les images, le son, la vidéo, …
Google … mais aussi Bing et Yahoo!
Facebook ? Facebook + Bing ?
Recherches toujours plus fines et plus « humaines »
Recherches sur les images, le son, la vidéo, …
Google … mais aussi Bing et Yahoo!
Facebook ? Facebook + Bing ?
Recherches toujours plus fines et plus « humaines »
Recherches sur les images, le son, la vidéo, …
Google … mais aussi Bing et Yahoo!
Facebook ? Facebook + Bing ?
Recherches toujours plus fines et plus « humaines »
Recherches sur les images, le son, la vidéo, …