Le compartimos una de las ediciones de la revista Vritti con artículos y contenido de interés que cubren NFC (Near field communication), IOT (Internet of things) internet de las cosas, en donde también podrá ver cómo se comporta el crecimiento del mercado de la billetera móvil en Oriente Medio y el papel del dinero móvil en la rehabilitación de los refugiados en las zonas de conflicto. #BilleteraMóvil
Each year Wing surveys the IoT landscape through our IoT Startup State of the Union. We do this to understand what is happening beyond the headlines, and share these insights with our community. This year, we expanded our data set to 3670 deals, across 68 IoT sub-categories, between 2013 and 2017.
COVID-19 has impacted countries, communities, and individuals in countless ways, from business and school closures to job losses not to undermined loss of lives.
State of the internet of things (IoT) market 2016 editionPrayukth K V
2015 was the year IoT gained legitimacy.
Businesses budged off a “start small think big” mindset.
In 2016, they’re building IoT into future strategies and
business models. Companies across all industries now
have IoT squarely on their radar. The worldwide Internet
of Things market spend will grow from $591.7 billion
in 2014 to $1.3 trillion in 2019 with a compound annual
growth rate of 17%. The installed base of IoT endpoints
will grow from 9.7 billion in 2014 to more than 25.6 billion
in 2019, hitting 30 billion in 20201.
By 2017 the Internet of Things market will be bigger than the PC, tablet and phone market combined. This report explains what the Internet of Things actually is and the impact it will have on social.
In this study I have tried to conduct a technology forecast for the mobile industry. In order to do this we have developed and followed a ten steps methodology as follows;
First we started by defining the industry and determining the exact sub industry definition. Second we studied the history of mobile phones with special focus on the important milestones to determine the important inflection technology events which took the technology to the second level, or helped in diffusing the technology, or created a new trend or resulted in a technology disruption. Third we gone through an industry analysis phases in which we studied the market growth rate, market share of different players, identifying leaders, followers. Followed by studying the market dynamics and main trends from both producers and consumers. Producers revenue pyramid, current and future strategies have been included. Fourth we composed the industry PEST analysis followed by industry overall analysis using porter five forces model. Fifth, a study for the major technological trends have been conducted, resulted in identifying main important industry trends. For each of the identified industry trend, we have identified the main technological challenges based on the consumer pull demand and the technology implication of each. Sixth, we constructed our technology future wheel based on all the previously mentioned types of analysis, resulted in identifying the main technology subcomponents. Seventh, we gone through a structural analysis followed by cross impact analysis for those subcomponents. Eights, a relevance tree for all those subcomponents including different technological alternative for each have been constructed. Followed by an analysis based on experts opinion about existing diffusion rate for each of those technology alternatives. Ninth, a road map for the forecasted technologies have been compiled, followed a wild card listing for alternative technologies which may exist in the near or far future, even technologies which in research and we believe that it is extremely wild have been included. Tenth, a conclusion of our forecasted short and terms technologies landscape have been composed and presented.
Each year Wing surveys the IoT landscape through our IoT Startup State of the Union. We do this to understand what is happening beyond the headlines, and share these insights with our community. This year, we expanded our data set to 3670 deals, across 68 IoT sub-categories, between 2013 and 2017.
COVID-19 has impacted countries, communities, and individuals in countless ways, from business and school closures to job losses not to undermined loss of lives.
State of the internet of things (IoT) market 2016 editionPrayukth K V
2015 was the year IoT gained legitimacy.
Businesses budged off a “start small think big” mindset.
In 2016, they’re building IoT into future strategies and
business models. Companies across all industries now
have IoT squarely on their radar. The worldwide Internet
of Things market spend will grow from $591.7 billion
in 2014 to $1.3 trillion in 2019 with a compound annual
growth rate of 17%. The installed base of IoT endpoints
will grow from 9.7 billion in 2014 to more than 25.6 billion
in 2019, hitting 30 billion in 20201.
By 2017 the Internet of Things market will be bigger than the PC, tablet and phone market combined. This report explains what the Internet of Things actually is and the impact it will have on social.
In this study I have tried to conduct a technology forecast for the mobile industry. In order to do this we have developed and followed a ten steps methodology as follows;
First we started by defining the industry and determining the exact sub industry definition. Second we studied the history of mobile phones with special focus on the important milestones to determine the important inflection technology events which took the technology to the second level, or helped in diffusing the technology, or created a new trend or resulted in a technology disruption. Third we gone through an industry analysis phases in which we studied the market growth rate, market share of different players, identifying leaders, followers. Followed by studying the market dynamics and main trends from both producers and consumers. Producers revenue pyramid, current and future strategies have been included. Fourth we composed the industry PEST analysis followed by industry overall analysis using porter five forces model. Fifth, a study for the major technological trends have been conducted, resulted in identifying main important industry trends. For each of the identified industry trend, we have identified the main technological challenges based on the consumer pull demand and the technology implication of each. Sixth, we constructed our technology future wheel based on all the previously mentioned types of analysis, resulted in identifying the main technology subcomponents. Seventh, we gone through a structural analysis followed by cross impact analysis for those subcomponents. Eights, a relevance tree for all those subcomponents including different technological alternative for each have been constructed. Followed by an analysis based on experts opinion about existing diffusion rate for each of those technology alternatives. Ninth, a road map for the forecasted technologies have been compiled, followed a wild card listing for alternative technologies which may exist in the near or far future, even technologies which in research and we believe that it is extremely wild have been included. Tenth, a conclusion of our forecasted short and terms technologies landscape have been composed and presented.
Internet of Things Corporate PresentationMomentumPR
Internet of Things Inc. (TSX-V: ITT) is an IoT software and solutions provider acquiring and implementing strategic disruptive solutions targeting the Industrial IoT markets including: manufacturing, agriculture, energy management, transportation.
What we got covered?
1) What Is Industrial IoT
2) Application of Industrial IOT
3) Machine To Machine (M2M)
4) Benefits of Industrial IoT
5) Vendors in Industrial IoT
6) Features of Industrial IoT
Evolution of Internet of Things (IoT) Ecosystem - Potential in IndiaJayanth Kolla
This is India's first, and one of the world's first market-specific industry analysis report on Internet of Things (IoT) domain.
This report evaluates the global developments in the IoT space. And, delves deeper into the current state, growth potential and future outlook of IoT ecosystem evolution in India. This report assesses India as a potential market and innovation hub for IoT based products and solutions.
This is the Executive Summary and ToC of the full report
The Internet of Things (IoT) is actively shaping both the industrial and consumer worlds. Smart tech finds its way to every business and consumer domain there is — from retail to healthcare, from finances to logistics — and a missed opportunity strategically employed by a competitor can easily qualify as a long-term failure for companies who don’t innovate.
Check out more articles at- https://insideaiml.com/articles
The vast network of devices connected to the Internet, including smart phones and tablets and almost anything with a sensor on it – cars, machines in production plants, jet engines, oil drills, wearable devices, and more. These “things” collect and exchange data.
Devices and objects with built in sensors are connected to an Internet of Things platform, which integrates data from the different devices and applies analytics to share the most valuable information with applications built to address specific needs.
The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
IoT allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy, and economic benefit.
Lesson IoT platforms - Master IoT UPC - 4th March 2019Marc Pous
During the lesson of the 4th of March 2019, Marc explained his experience on IoT and IoT platforms.
At the second part of the session, Marc gave a hands-on session about how to connect an Arduino MKRFox 1200 (Sigfox) available for the students to thethings.iO IoT Platform.
IoT and Communication Technologies for Smart CitiesSamerLahoud1
The developing telecommunication infrastructures are shaping future opportunities in Smart Cities. Such infrastructures are required to meet the unprecedented needs in terms of energy efficiency, security, scalability, and resiliency. In this talk, we will focus on Low-Power Wide Area Networks (LPWAN) and their role in enabling Smart Cities. LPWANs represent a novel wireless communication paradigm, which will complement traditional cellular and short-range wireless technologies in addressing diverse requirements of applications for Smart Cities. LPWANs are attracting a lot of attention primarily because of their ability to offer large coverage and long battery life operating devices. We will also provide a use case of deploying a wireless LoRa infrastructure that supports various indoor and outdoor services for the citizens of future Smart Cities.
One of the best ways to understand the investment potential of IoT is to have insights regarding the market growth potential and the earning power of specific technologies, business sectors or companies. Patent information can provide many valuable insights that can be exploited for finding investment potential of IoT. Most of all, patents can provide insights regarding the state of the art and future direction of IoT innovation for the specific technologies (e.g., Smart UI/UX, Autonomous Vehicles, M2M Connectivity), products/services (e.g., Smart Homes, Healthcare/Medical Devices, Connected Cars, Big Data Analytics) and companies (e.g., Apple, Cisco, IBM, Qualcomm, Samsung). Patents also can provide insights regarding a new company to become play a leading role in the emerging IoT market. Furthermore, patents can provide insights regarding emerging disruptive IoT products/Services by providing IoT products with new performance/value proposition attributes that may not previously have been valued by existing end users (e.g., convergence with other technologies to create synergies). Therefore, one can find the specific IoT technologies, business sectors or companies for investment opportunities in venture capital funding, M&A, patent/technology acquisition/monetization, leveraged buyout and stock investment. Following illustrates some examples of IoT technologies, business sectors and companies for potential investment opportunities that are obtained from patent information.
In recent years, the Internet of Things (IOT) has attracted many attentions. It allows a number of objects that have been embedded with wired or wireless communication interfaces to automatically communicate and interact with each other. The IOT is a system, combination of embedded controllers, sensors, software’s and network. After internet and mobile communication, IOT is regarded as the third wave of information because of its huge market prospects. The development of IOT can support a variety of applications including Intelligent Art, Intelligent Logistics, Intelligent Medicine & Healthcare, Intelligent Transportation, Intelligent Power, Smart Life etc. IOT Gateway plays an important role in IOT applications since it bridges between wireless sensor networks with traditional communication networks or internet. This paper includes an IOT Gateway system based on Zigbee and Wi-Fi protocols according to the presented data transmission between wireless sensor networks and mobile communication networks, typical IOT application scenarios and requirements from telecom operators, protocol conversion of different sensor network protocols, and control functionalities for sensor networks, and an implementation of prototyping system and system validation is given.
In recent years, the Internet of Things (IOT) has attracted many attentions. It allows a number of objects that have been embedded with wired or wireless communication interfaces to automatically communicate and interact with each other. The IOT is a system, combination of embedded controllers, sensors, software’s and network. After internet and mobile communication, IOT is regarded as the third wave of information because of its huge market prospects. The development of IOT can support a variety of applications including Intelligent Art, Intelligent Logistics, Intelligent Medicine & Healthcare, Intelligent Transportation, Intelligent Power, Smart Life etc. IOT Gateway plays an important role in IOT applications since it bridges between wireless sensor networks with traditional communication networks or internet. This paper includes an IOT Gateway system based on Zigbee and Wi-Fi protocols according to the presented data transmission between wireless sensor networks and mobile communication networks, typical IOT application scenarios and requirements from telecom operators, protocol conversion of different sensor network protocols, and control functionalities for sensor networks, and an implementation of prototyping system and system validation is given.
Internet of Things Corporate PresentationMomentumPR
Internet of Things Inc. (TSX-V: ITT) is an IoT software and solutions provider acquiring and implementing strategic disruptive solutions targeting the Industrial IoT markets including: manufacturing, agriculture, energy management, transportation.
What we got covered?
1) What Is Industrial IoT
2) Application of Industrial IOT
3) Machine To Machine (M2M)
4) Benefits of Industrial IoT
5) Vendors in Industrial IoT
6) Features of Industrial IoT
Evolution of Internet of Things (IoT) Ecosystem - Potential in IndiaJayanth Kolla
This is India's first, and one of the world's first market-specific industry analysis report on Internet of Things (IoT) domain.
This report evaluates the global developments in the IoT space. And, delves deeper into the current state, growth potential and future outlook of IoT ecosystem evolution in India. This report assesses India as a potential market and innovation hub for IoT based products and solutions.
This is the Executive Summary and ToC of the full report
The Internet of Things (IoT) is actively shaping both the industrial and consumer worlds. Smart tech finds its way to every business and consumer domain there is — from retail to healthcare, from finances to logistics — and a missed opportunity strategically employed by a competitor can easily qualify as a long-term failure for companies who don’t innovate.
Check out more articles at- https://insideaiml.com/articles
The vast network of devices connected to the Internet, including smart phones and tablets and almost anything with a sensor on it – cars, machines in production plants, jet engines, oil drills, wearable devices, and more. These “things” collect and exchange data.
Devices and objects with built in sensors are connected to an Internet of Things platform, which integrates data from the different devices and applies analytics to share the most valuable information with applications built to address specific needs.
The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
IoT allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy, and economic benefit.
Lesson IoT platforms - Master IoT UPC - 4th March 2019Marc Pous
During the lesson of the 4th of March 2019, Marc explained his experience on IoT and IoT platforms.
At the second part of the session, Marc gave a hands-on session about how to connect an Arduino MKRFox 1200 (Sigfox) available for the students to thethings.iO IoT Platform.
IoT and Communication Technologies for Smart CitiesSamerLahoud1
The developing telecommunication infrastructures are shaping future opportunities in Smart Cities. Such infrastructures are required to meet the unprecedented needs in terms of energy efficiency, security, scalability, and resiliency. In this talk, we will focus on Low-Power Wide Area Networks (LPWAN) and their role in enabling Smart Cities. LPWANs represent a novel wireless communication paradigm, which will complement traditional cellular and short-range wireless technologies in addressing diverse requirements of applications for Smart Cities. LPWANs are attracting a lot of attention primarily because of their ability to offer large coverage and long battery life operating devices. We will also provide a use case of deploying a wireless LoRa infrastructure that supports various indoor and outdoor services for the citizens of future Smart Cities.
One of the best ways to understand the investment potential of IoT is to have insights regarding the market growth potential and the earning power of specific technologies, business sectors or companies. Patent information can provide many valuable insights that can be exploited for finding investment potential of IoT. Most of all, patents can provide insights regarding the state of the art and future direction of IoT innovation for the specific technologies (e.g., Smart UI/UX, Autonomous Vehicles, M2M Connectivity), products/services (e.g., Smart Homes, Healthcare/Medical Devices, Connected Cars, Big Data Analytics) and companies (e.g., Apple, Cisco, IBM, Qualcomm, Samsung). Patents also can provide insights regarding a new company to become play a leading role in the emerging IoT market. Furthermore, patents can provide insights regarding emerging disruptive IoT products/Services by providing IoT products with new performance/value proposition attributes that may not previously have been valued by existing end users (e.g., convergence with other technologies to create synergies). Therefore, one can find the specific IoT technologies, business sectors or companies for investment opportunities in venture capital funding, M&A, patent/technology acquisition/monetization, leveraged buyout and stock investment. Following illustrates some examples of IoT technologies, business sectors and companies for potential investment opportunities that are obtained from patent information.
In recent years, the Internet of Things (IOT) has attracted many attentions. It allows a number of objects that have been embedded with wired or wireless communication interfaces to automatically communicate and interact with each other. The IOT is a system, combination of embedded controllers, sensors, software’s and network. After internet and mobile communication, IOT is regarded as the third wave of information because of its huge market prospects. The development of IOT can support a variety of applications including Intelligent Art, Intelligent Logistics, Intelligent Medicine & Healthcare, Intelligent Transportation, Intelligent Power, Smart Life etc. IOT Gateway plays an important role in IOT applications since it bridges between wireless sensor networks with traditional communication networks or internet. This paper includes an IOT Gateway system based on Zigbee and Wi-Fi protocols according to the presented data transmission between wireless sensor networks and mobile communication networks, typical IOT application scenarios and requirements from telecom operators, protocol conversion of different sensor network protocols, and control functionalities for sensor networks, and an implementation of prototyping system and system validation is given.
In recent years, the Internet of Things (IOT) has attracted many attentions. It allows a number of objects that have been embedded with wired or wireless communication interfaces to automatically communicate and interact with each other. The IOT is a system, combination of embedded controllers, sensors, software’s and network. After internet and mobile communication, IOT is regarded as the third wave of information because of its huge market prospects. The development of IOT can support a variety of applications including Intelligent Art, Intelligent Logistics, Intelligent Medicine & Healthcare, Intelligent Transportation, Intelligent Power, Smart Life etc. IOT Gateway plays an important role in IOT applications since it bridges between wireless sensor networks with traditional communication networks or internet. This paper includes an IOT Gateway system based on Zigbee and Wi-Fi protocols according to the presented data transmission between wireless sensor networks and mobile communication networks, typical IOT application scenarios and requirements from telecom operators, protocol conversion of different sensor network protocols, and control functionalities for sensor networks, and an implementation of prototyping system and system validation is given.
The Internet of Things (IoT) is a term used to describe a network of interconnected devices that are able to communicate with each other and share data. These devices can be anything from smart appliances in your home to sensors in a manufacturing plant or even wearable devices like fitness trackers. The applications of IoT are numerous and continue to expand as technology advances. In this article, we'll explore some of the most important and interesting applications of IoT.
Smart Homes and Buildings
One of the most well-known applications of IoT is in smart homes and buildings. IoT devices can be used to control everything from temperature and lighting to security systems and home entertainment systems. Smart home devices can be controlled remotely through smartphones or other devices, and can even be automated based on the user's preferences and routines.
Smart buildings take this concept a step further, with IoT sensors and systems used to optimize energy usage, monitor air quality, and even control elevators and other building systems. These applications can help reduce energy costs, improve safety, and enhance the overall user experience.
Healthcare
IoT has a variety of applications in the healthcare industry, from wearable devices that monitor vital signs to smart pills that track medication usage. IoT sensors can also be used to monitor patients in hospital settings, allowing medical staff to detect changes in a patient's condition more quickly and respond accordingly.
In addition, IoT devices can be used for remote patient monitoring, allowing patients to receive care in their own homes rather than having to travel to a medical facility. This can improve patient outcomes and reduce healthcare costs.
Agriculture
IoT sensors and systems are increasingly being used in the agricultural industry to optimize crop yields and reduce waste. These sensors can be used to monitor soil moisture, temperature, and nutrient levels, allowing farmers to make more informed decisions about when and how to water and fertilize their crops.
In addition, IoT systems can be used to track the movement and health of livestock, helping farmers to detect and respond to potential health issues more quickly.
Manufacturing
IoT is also being used in the manufacturing industry to improve efficiency and reduce waste. IoT sensors can be used to monitor equipment and machinery, providing real-time data on performance and identifying potential maintenance issues before they become more serious
High-level overview of what IOT is, its history & future, the definition and its components, the applications for consumers & businesses and the challenges
How IoT is Revolutionizing Mobile App Development.pdfSuccessiveDigital
Embark on a journey into the future with our exclusive guide to IoT App Development! Explore the incredible ways in which the Internet of Things is completely revolutionizing the world of mobile app development, opening up a world of endless possibilities. From smart homes to wearable tech, this revolution is fundamentally changing how we interact with our devices. Join us as we delve into the complete guide of IoT app development and discover how it's reshaping our digital landscape.
Internet of Things Insights of Applications in Research and Innovation to Int...ijtsrd
In existing world IOT find a great attention from researchers, it becomes an vital technology that offers a well defined communications between objects and machines. That will offer immediate access to information about the real world and objects in it leading to innovative facilities and increase in effectiveness and output. The IoT developments address the whole IoT spectrum form the devices at the edge to cloud and data centres on the backend and everything in between through ecosystems are generated by industry, research and application stakeholders that enable real world use cases to quicken the in IoT and establish open interoperability standards and common architectures for IoT solutions. This paper studies the perception of many IoT applications and innovation of original connected technologies to the challenges that in front of the execution of the IoT. Deepika Bairagee | Aditya Sharma "Internet of Things: Insights of Applications in Research and Innovation to Integrated Ecosystem" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31213.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/31213/internet-of-things-insights-of-applications-in-research-and-innovation-to-integrated-ecosystem/deepika-bairagee
This presentation highlights the definition of IoT, various applications of IoT, the Role of IoT in building smart cities, and the challenges and opportunities of Implementing IoT for smart cities.
The Internet Of Things will have an increasing impact to all industries and health and fitness are no exception. This definitive guide provides a blue print for the things we all need to keep in mind as we adopt the IOT revolution.
The Internet of Things (#IoT) enables us to bring the power of the Internet and analytics to the real world of things. In the IoT world, physical objects need to be connected to the internet using a connected method to process data in real time or offline. This data can be used to control the object itself or in a smarter way to control another object.
The Internet of Things (#IoT) enables us to bring the power of the Internet and analytics to the real world of things. In the IoT world, physical objects need to be connected to the internet using a connected method to process data in real time or offline. This data can be used to control the object itself or in a smarter way to control another object.
All of these assist individuals in bettering their lives, while businesses assist in bettering their operations. However, as both men and women strive to live better lives than they did the day before, and as IoT simply enhances one's lifestyle, demand for IoT will only grow with time.
When consumers perceive value from using the Internet of Things (IoT) devices and applications, the trend will quickly create a new market. To read the entire article published in HITEC 2016 Special Report, please click here: The Future of IoT in Hospitality, By Dr. Aluri (pp. 18-21).
Although IoT apps simplify our lives, they are loaded with much more complexity and cybersecurity behind the development. Peerbits is the leading IoT app development company in India to deliver robust IoT based solutions to different industries. Right from IoT app designing, device selection, architecture development to cybersecurity, we provide comprehensive care for your IoT apps.
What is the Internet of Things? How does it Work?AbhijitVerma9
The Internet of Things (IoT) is a network of physical objects embedded with sensors, software, and other technologies to connect and exchange data with other devices and with the systems over the internet. These devices range in complexity from common household items to huge industrial instruments. Internet of Things (IoT), also referred to as the Internet of Everything (IoE).
Similar to revista Vritti+edition+6 - mahindracomviva (20)
Como parte de este trabajo, CGAP y sus socios hicieron una recopilación completa del conocimiento global reciente sobre cómo operan las redes de agentes Cash-in y Cash-out en diferentes mercados y el Proveedor de Servicios Financieros
Del dicho al hecho Evolucionando la corresponsalía al servicio de la inclusi...Imix Colombia
Los nuevos ecosistemas donde “corresponsales” habiliten crédito digital, microseguros o apertura de cuentas están en todo tipo de lugares; de esta manera se ha venido rompiendo las barreras con tecnología, evolucionando la red de distribución.
Gracias a la implementación de plataformas tecnológicas con aplicaciones digitales y gestiones de identidad digital para mejorar procesos de vinculación, habilitación, capacitación de nuevos agentes y monitorear su liquidez la corresponsalía sigue evolucionando aportando aún más a la inclusión financiera, además de que el uso de la analítica y data es útil para predicciones de necesidades de caja, mitigación de riesgos y para posibilitar más confianza con acceso a crédito al agente, garantizando la monetización por la generación de ingresos alternativos y originación de nuevos clientes, diversificando el esquema de pagos más allá de depósitos y retiros.
Colombia se caracteriza por contar con dueños de diversos comercios donde la inclusión financiera es algo necesario para lograr una cobertura amplia, por esa razón hoy cuenta con un gran liderazgo en la capacidad que tienen las redes corresponsales, además de que el volumen transaccional ha crecido a más de un 40% en los últimos 10 años.
Lea y conozca más en el artículo completo, ingresando al link >
SFC, Circular Externa 002 de 2021
La SFC emite instrucciones relacionadas con el régimen de oficinas y la prestación de servicios financieros a través de corresponsales. De la norma destaca:
Se definen los requisitos y condiciones para la prestación de servicios a través de corresponsales móviles y digitales y adicionar los ramos de seguro que pueden ser comercializados a través de uso de red.
Se establecen los requisitos de información relacionada con la prestación de servicios a través de corresponsales.
Se ajusta el formato 534 “Uso de productos y servicios financieros” junto con su proforma.
Se determina la realización de pruebas obligatorias entre el 26 y el 30 de abril de 2021, así como el comienzo de la transmisión oficial desde julio de 2021.
Ver Anexo
En 2020, nuestras vidas cambiaron de una manera que ninguno de nosotros podría alguna vez imagino. La pandemia en curso nos hizo adaptarnos a una nueva normalidad, haciendo de nuestros hogares nuestros lugares de trabajo y nuestras familias y mascotas nuestros compañeros de trabajo. Aprendimos un nuevo forma de comunicarnos y conducir nuestra vida.
A pesar de este escenario en constante cambio, nuestro 2020 cohorte nunca dejó de trabajar y prepararse para cada reunión y evento. Todo esto me emociona mucho sobre lo que pudimos lograr durante el programa acelerador. Las startups de este año crecieron notablemente. Demostraron que los límites no existen cuando hay una fuerza impulsora para cambiar el mundo.
También me gustaría tomarme un momento para agradecer al Equipo de MCMX, porque todo esto no habría sido posible sin él. Cada miembro dio un sobresaliente rendimiento, asegurándose de que el programa se ejecute sin problemas.
En 2021 seguiremos trabajando para atraer modelos de negocio cada vez más disruptivos que generan fuentes exponenciales de trabajo e ingresos para todo el
región. Este año queremos lograr una expansión total de nuestros esfuerzos mediante la contratación de nuevas empresas de clase mundial que proporcionar nuevas perspectivas a nuestro programa.
Me encantaría invitarte a ser miembro activo de MassChallenge México para descubrir la magia creado por las startups de nuestra región. En nuestra comunidad, somos conscientes de que estos modelos innovadores son reales disruptores y que son los mejores catalizadores para impulsar la economía de nuestro país.
Las cosas se pondrán mejor.
Saludos,
Camila Lecaros
Director General, MassChallenge México
Decreto 1692 del 18 de diciembre de 2020Imix Colombia
Recientemente el gobierno Nacional de Colombia informó sobre la nueva reforma en regulación de pagos digitales, el decreto 1962 del 18 de Diciembre 2020 estableció las nuevas reglas de acceso a nuevos participantes de los sistemas de pago.
La estrategia Tech&Touch utiliza una persona (touch) para usar un servicio financiero digital en
una comunidad. A continuación algunas de las principales motivaciones:
1resolucion0118 Corresponsales Solidarios o No BancariosImix Colombia
RESOLUCIÓN No. SEPS-IGT-IGS-INSESF-INR-INGINT-INSEPS-IGJ-2020-0118
Superintendencia de Economía popular y solidaria
Resolución Corresponsales Solidarios o No Bancarios
Proyecto de Decreto: Productos canales digitales e inclusivosImix Colombia
Octubre 9, de 2019 se modifica el decreto 2555 de 2010 con respecto a corresponsales, cuentas de ahorro electrónicas, depósitos electrónicos, el crédito de bajo monto y se dictan otras disposiciones.
Conozca cuales son los avances e innovación en el sector financiero, el licenciamiento Fintech y las oportunidades de innovación en el sector financiero.
Conozca el resumen "Aceleradores a un mundo inclusivo en un ecosistema de Pagos digitales", en el siguiente articulo podrá observar la brecha de los 25 países en los que la digitalización ha tenido un gran impacto y revela 10 pasos o aceleradores que los gobiernos y las empresas pueden tomar para construir las economías digitales.
Introducción microsoft social engagement crmImix Colombia
En un mundo social conectado, la interacción con los clientes puede darse en cualquier lugar y momento, y es vital para hacer que su negocio crezca. Microsoft Social Engagement pone eficaces herramientas para contenido social a disposición de sus equipos de ventas, marketing y servicio. Estas herramientas les permiten obtener una idea clara de la opinión que tiene la gente sobre su negocio y ponerse en contacto de forma proactiva con clientes, admiradores y críticos en los medios sociales.
Corresponsales bancarios en Colombia: Expansión rural y su frontera, informac...Imix Colombia
Conozca la situación actual de los canales de corresponsalía bancaria:
La situación actual del modelo de corresponsalía se caracteriza por:
Duplicación de los puntos en los reportes estandarizados existentes. Papel central de los agregadores en la operación de la mayoría de los puntos, tanto en áreas urbanas como rurales.
El canal no ha alcanzado su madurez en áreas rurales, donde aún hay espacio para crecer.
Los avances en inteligencia artificial combinados con la proliferación de apps de mensajería, son el combustible para el desarrollo de los Chatbots - programas de software que utilizan mensajería como la interfase para realizar un número de tareas como programar una reunión, reportar el clima, hacer un pago o ayudar a los usuarios a comprar un par de zapatos.
Viendo el potencial inmenso de los ChatBots, los negocios están comenzando a invertir de manera importante en aprovechar la economía de los bots.
E book introducing_microsoft_social_engagement_sourceImix Colombia
En un mundo social conectado, la interacción con los clientes puede darse en cualquier lugar y momento, y es vital para hacer que su negocio crezca. Microsoft Social Engagement pone eficaces herramientas para contenido social a disposición de sus equipos de ventas, marketing y servicio. Estas herramientas les permiten obtener una idea clara de la opinión que tiene la gente sobre su negocio y ponerse en contacto de forma proactiva con clientes, admiradores y críticos en los medios sociales.
Reporte de Inclusión Financiera a septiembre de 2016, el indicador de Inclusión Financiera se ubicó en 77,4% equivalente a 25,6 millones de adultos con algún producto financiero. Por su parte, los adultos con productos activos o vigentes llegaron a 21,8 millones que significan el 65,9% de los adultos del país.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
2. BLURB
CHANGING LIVES
MOBILUTION
IN THE MEDIA
TECHNICALLY
SPEAKING
NFC 101 10
TRENDING NOW
Demystifying the
internet of things 4
Interviews and Articles
Awards
Analyst Mentions
Press Releases
40
Kick-starting the
Mobile Wallet Revolution
in the GCC Region 26
Iran: Poised for
Mobile Wallet 32
Right to a Future:
Empowering and
Rehabilitating Refugees
through Mobile Money 20
41
41
42
3. Dear readers,
In this quarter’s edition of Vritti we provide you with a rich
selection of articles covering NFC, IOT, growing mobile
wallet market in the Middle East and the role of mobile
money in rehabilitating refugees in conflict zones.
In the article “Demystifying IOT”, we focus on some
of the amazing opportunities IOT provides, besides
looking at the enabling system of standards and
technologies needed for it to thrive.
In our “NFC 101” boot camp, you learn about various
NFC usage cases, NFC technologies and some really
neat parlour tricks, like instantly configuring your WiFi
/Bluetooth with just a tap of your mobile NFC device.
Next, we turn our attention to the Middle East with its
increasing base of mobile wallet users. We have
focussed our attention on the evolution of mobile
payments in the region with our articles "Kick-Starting
the Mobile Wallet Revolution in the GCC region" and
"Iran: Poised for Mobile Wallet".
And finally, "Right to a Future: Empowering and
Rehabilitating Refugees through Mobile Money" looks
at how mobile money can play a big role in the economic
rehabilitation of refugees by replacing food aid with
digital cash aid.
I hope you enjoy reading our articles like we enjoy
writing them for you.
Happy Reading!
Blurb
Srinivas Nidugondi
SVP and Head of Mobile Financial Solutions
at Mahindra Comviva
3October 2016vritti
5. 5Trending Now
By Rajasekhara Reddy P
October 2016vritti
In payment industry, IoT provides device manufacturers
with a path to embed secure payments into their
connected devices, enabling anything from a watch to
a car to initiate payments. Imagine with just a touch of
a button, consumers could pay for gas/petrol, food or
parking, toll gate, without leaving their connected car.
I will be briefing about the specific technologies that make the IoT possible, and
provide details on current standards development activities in progress.
The concept of the “Internet of Things” (IoT) is no longer the stuff of science
fiction but an essential part of the reality of our everyday lives. Today, there
are more than 13 billion interconnected digital and electronic devices in
operation globally, the equivalent of nearly 2 devices for every human on
earth. Although the most common examples of IoT consist of the so-called
“smart home” devices such as programmable thermostats and remote
controlled appliances, future growth of IoT is more likely to come from
applications of the technology in commercial and industrial environments
and healthcare and public safety.
6. 6 Trending NowOctober 2016vritti
The “Internet of Things” (sometimes also
referred to as the “Internet of Everything,”
or IoE) generally refers to the multiple
networks of devices or technology
platforms (“things”) that communicate with
each other via wireless protocols and
without direct human interaction.
Connections made through IoT-enabled
devices facilitate the rapid and efficient
transfer of data needed to support a wide
range of activities and operations.
The Promise of the Internet of Things
Consumer and residential:
Remote monitoring , control appliances,
lighting, heating , air conditioning, water
usage, security for house, entertainment
systems ,smart watches, eyeglasses.
IOT provides a number of usage cases in
the consumer durables segment. Sensors
embedded inside household appliances
provide a steady stream of information that
can throw light on the status of the device:
how much energy/resource/time is the
device consuming? Is it broken? When to
schedule maintenance and repair?
Connecting sensors to household devices
can provide x-ray vision that can drive the
behavioral changes that not only make our
lives simple and seamless but also lead to
better utilization of scant resources.
Now we have smart fridges that do the
buying for us. Sensors fitted inside the
fridge ensure that we never run out of eggs,
milk, bread by placing orders before the
provisions are about to run out. For
insurance companies, smart fridges like
these could help in fixing premium based
on user’s lifestyle and eating habits.
Some research companies estimate that
the global market value for IoT products
and devices, currently about $655 billion
(USD), will increase to $1.7 trillion by the
year 2020, a compound annual growth rate
(CAGR) of 16.9 percent. Today’s IoT is
already bringing advanced technological
capabilities to multiple consumers, commercial
and industrial market segments. Some
examples of current and potential
applications for IoT technologies include.
7. 7Trending Now October 2016vritti
Health and Healthcare
Under this category wearable devices like
wrist bands provide real time data for
doctors to update patient medical records
from any location. Wearable devices can
keep close tabs on vital metrics like BP,
blood sugar, heart rate etc providing
insurance companies with the data for
fixing premiums.
Industrial and manufacturing
IoT has many industrial usages too. For
example, with sensors embedded inside
machines, it is possible to keep a close
watch on various metrics like motion,
temperature etc which can help to
schedule maintenance. IoT technologies
can monitor inventory levels at warehouses
and retail outlets, helping to optimize
inventory investment.
Transportation
IoT applications in the transportation sector
include smart cars and smart roadways
that can help manage the flow of traffic and
minimize congestion, and applications that
identify vacant parking spaces. IoT
transportation applications are also being
applied to public transportation systems,
helping to balance capacity with
anticipated ridership in real time, and
providing riders with accurate scheduling
information. In payments, car sensors
would debit your mobile money account
with the requisite parking fees as soon as it
senses that you have vacated the parking
spot which would take away the day to day
hassles of physical payments. Not only
parking, today’s connected car experience
allows payments for petrol/diesel and toll
fees, with just touch of a button.
8. 6 Trending NowOctober 2016vritti
The environment
Finally, IoT technologies are being used to
monitor environmental conditions that
could affect human, animal or plant life.
IoT-equipped sensors can be used to
detect rising water levels in rivers and
streams that could lead to flooding,
increases in air pollution levels due to
automobiles or industrial activity, localized
atmospheric conditions that could portend
an increased risk of forest fires, and even
vibration patterns that could signal risk of
an earthquake, landslide or avalanche.
These examples represent just a small
sampling of the myriad of current IoT
applications, and illustrate some of the
many potential benefits that can come from
the continued growth and deployment of
IoT technologies.
The deployment of the IoT is based on a
handful of enabling technologies. These
include communications networks and
protocols, hardware devices and
components such as sensors, wireless
charging technologies and software.
Communications Networks
An IoT network can be defined by the total
area within which IoT devices are expected
to operate. Smart home IOT can operate
on LAN (Local area network) and consumer
or residential applications can operate on
Wide area network (WAN), PAN (Person
Area Network) -based IoTs enable the
wireless connection of computers with
printers and other peripherals,
entertainment systems with headsets and
remote controls, body area networks
(BANS) provide connectivity between a
variety of wearable technologies and smart
clothes, and even implanted devices.
Wireless Communications
Protocols
Charging Technologies
Most IoT applications require the use of
wireless communications protocols to enable
the transmission of data between devices.
Some of the Wireless communication
protocol are Wi-Fi , Bluetooth and variant,
NFC, Zigbee, ZWave, The appropriate
wireless protocol for a given IoT device is
usually prescribed by a number of factors,
including the type of communications
network with which the device is intended
to operate, anticipated data rate
requirements, the availability of energy
needed to support communications
transmissions, and any application-specific
requirements regarding security.
Wireless charging technologies are becoming
increasingly important for IOT as it eliminates
power cards and cables for charging.
9. Trending Now
Software
Finally, like most technology platforms, IoT depends on
multiple types of software. These include IoT platforms and
protocols, embedded operating systems and dedicated IoT
applications. Certain software tools are intended for use
with specific IoT applications, such as those intended to
support smart home devices. In addition, some software is
proprietary and may be subject to certain commercial
restrictions, while other software is open source and freely
available for use.
Standards Development Activities by Key contributors
Huge efforts are currently underway to develop standards
and protocols that will help to guide future IoT technology
development. Some of the Key development activities are
IEEE P2413 - IEEE has created draft standard for an
Architectural Framework for the Internet of Things (IoT). It
intends to define common architectural elements for IoT
technologies, and the relationships among various IoT
applications.
Open Interconnect Consortium — The Open
Interconnect Consortium (OIC) is working to develop open
source specifications to support interoperability between
various types of IoT technologies.
Industrial Interconnect Consortium — The Industrial
Interconnect Consortium (IIC) is working to develop an
open framework architecture, standard specifications and
security requirements for IoT technologies. The IIC and OIC
signed a strategic liaison agreement in February 2015 to
foster collaboration between the two groups
Thread Group — This group promotes the interoperability
of IoT technologies and devices used at home. Recently
Thread group launched certification program which uses
Thread Protocol along with UL .
Some of the other organizations like NFC Forum, AllSeen
Alliance, AirFuel Alliance are working for IOT
interoperability applications that run on most operating
systems and platforms .
The industry has played an important role to date in the
development of standards applicable to IoT technologies,
as part of the larger effort to support interoperability
between IoT devices and applications.
International Electrotechnical Commission (IEC) and
International Organization for Standardization (ISO) are also
working to define standards for IoT .
7October 2016vritti
10. Conclusion
IoT has the potential to increase availability of information, and is likely to transform
companies and organizations in virtually every industry around the world. As such, finding
ways to leverage the power of IoT is expected to factor into the strategic objectives of
most technology companies, regardless of their industry focus. The number of different
technologies required to support the deployment and further growth of the IoT places a
premium on interoperability, and has resulted in widespread efforts to develop standards
and technical specifications that support seamless communication between IoT devices
and components. Collaboration between various standards development groups and
consolidation of some current efforts will eventually result in greater clarity for IoT
technology companies
8 Trending NowOctober 2016vritti
13. 11Technically Speaking October 2016vritti
- By Parveen Rai
NFC is the hottest and most happening technology to dominate the
contactless domain. The contactless card has evolved into an NFC Mobile
Phone by adding the functionalities on a mobile phone. An NFC Mobile
Phone has three advantages compared to existing contactless cards:
— Interactivity
— Remote multi-application management
— Remote user management.
What is NFC?NFC stands for Near Field Communication. NFC is a short range wireless technology that
allows communications to take place between devices that either touch or are
momentarily held together usually by no more than a few centimetres. The technology
works via magnetic field induction and operates on an unlicensed radio frequency band.
NFC operates on 13.56 MHz on ISO/IEC 18000-3 air interface at rates ranging from 106
to 424 kbit/s. NFC enables seamless integration of electronic devices by providing safe,
simple and intuitive communication path among communicating devices.
14. 12 Technically SpeakingOctober 2016vritti
How to establish
NFC connection?
NFC is designed for intuitive, simple and safe interaction
between electronic devices. NFC communication is
enabled by bringing two NFC compatible devices over a
shorter range. NFC itself can be used for the direct
exchange of data or to call other contactless data transfer
technologies, such as WLAN or Bluetooth®.
NFC simplifies and expands social networking options:
File Sharing: Tap one NFC device to another to instantly
share a contact, photo, song, application, video, or
website link.
Electronic business card: Tap one NFC device to another
to instantly share electronic business cards or resumes.
Electronic money: To pay a friend, you could tap the
devices and enter the amount of the payment.
Mobile gaming: Tap one NFC device to another to enter
a multiplayer game.
Friend-to-friend: You could touch NFC devices together
to Facebook friend each other or share a resume or to
"check-in" at a location.
NFC can be used to initiate higher speed wireless
connections for expanded content sharing.
Bluetooth: Instant Bluetooth Pairing can save searching,
waiting, and entering codes. Touch the NFC devices
together for instant pairing.
WiFi: Instant WiFi Configuration can configure a device to
a WiFi network automatically. Tap an NFC device to an
NFC enabled router.
SOCIAL NETWORKING
BLUETOOTH AND WIFI CONNECTIONS
15. 13Technically Speaking October 2016vritti
NFC expands eCommerce opportunities,
increases transaction speed and accuracy,
while reducing staffing requirements. A
Personal identification number (PIN) is
usually only required for payments.
eCOMMERCE
Some medication packaging contains RF
tags. An NFC app running on a NFC-
enabled mobile phone could be used to
help patients ensure they are taking the
correct dose at the right time with just a tap
of their phones.
HEALTHCARE
Mobile payment: An NFC device may
make a payment like a credit card by
touching a payment terminal at
checkout or a vending machine when
a PIN is entered.
PayPal: PayPal may start a commercial
NFC service in the second half of 2011.
Google Wallet is an Android app that
stores virtual versions of your credit cards
for use at checkout when a PIN is used.
Ticketing: Tap an NFC device to
purchase rail, metro, airline, movie, concert,
or event tickets. A PIN is required.
Boarding pass: A NFC device may act
as a boarding pass, reducing check-in
delays and staffing requirements.
Point of Sale: Tap a Smart Poster tag
to see information, listen to an audio clip,
watch a video, or see a movie trailer.
Coupons: Tapping an NFC tag on a
retail display or Smart Poster may give
the user a coupon for the product.
Tour guide: Tap a passive NFC tag for
information or an audio or video
presentation at a museum, monument,
or retail display (much like a QR Code).
NFC's short range helps keep encrypted
identity documents private.
IDENTITY DOCUMENTS
ID card: An NFC enabled device can
also act as an encrypted student,
employee, or personal ID card or
medical ID card.
Key card: An NFC enabled device may
serve as car, house, and office keys.
Rental Car and hotel keys: NFC
rental car or hotel room keys may
allow fast VIP check-in and reduce
staffing requirements.
What is the
difference between
NFC enabled
device and an
NFC tag?
NFC device represents an active device,
which generates radio signals to
communicate with the tags. The reader
powers the passive device in case of
passive mode of communication. But an
NFC tag is a passive device which just
stores information which is read by NFC
active devices.
16. 14 Technically SpeakingOctober 2016vritti
What are the uses of NFC?
The uses of NFC are categorized into three major sections which are as below.
THE NFC ECOSYSTEM IS BROAD APPLICATION OF NFC
IDENTIFICATION
TIME &
ATTENDANCE
PHYSICAL
ACCESS
SECURE
PC LOG-ON
TRANSIT
CASHLESS
PAYMENT
LOYALTY &
MEMBERSHIPS
TICKETING
Peer-to-Peer Mode NFC Card Emulation Mode
Applications
LLCP
Logical Link
Control Protocol
RF Layer ISO 18092 + ISO 14443 Type A, Type B + Felica
Read/Write Mode
RTD
Record Type
Definition
& NDEF
Data Exchange
Format
Card
Emulation
Smart Card
Capability for Mobile
Devices
NFC Technology Architecture
System
Integrators
Test &
Certification
Consumer
Electronics
Manufacturer
Semiconductor
Manufacturer
Smart Card
Manufacturer
Reader
Manufacturer
Telecom
Operator
Banking
Financial
Merchant &
Consumers
Education,
Research
Government
Mobile
Device
OEM
NFC
Ecosystem
Source: NFC Forum
Source: NFC Forum
17. 15Technically Speaking October 2016vritti
NFC Reader/Writer Mode
This mode is basically used for service initiation to read NFC tags. An NFC enabled phone reads
data when tapped against an NFC –enabled smart objects and act upon that information.
Here are the real time use cases of this mode.
When a NFC enabled mobile phone terminal is held near or made to touch a
smart poster.All the information (URL, etc.) contained in the Smart poster is
transferred to the phone.
Store Electronic key
Secure PC log-in
Unlock car doors
Setup your home office with a touch by your phone
Wi-Fi and Bluetooth sharing by simply tapping on the NFC Tag.
NFC rate tags for all the commodities available for purchase.
NFC tags can be used as credit card.
NFC enabled device can send SMS texts without typing.
NFC labels enable connection setup to the mobile internet to be made significantly easier.
NFC is the critical link for Internet of Thing which is designed and engineered to provide
zero power operation and maximize privacy both at lower cost.
Authentication, access control
NFC Module
18. 16 Technically SpeakingOctober 2016vritti
NFC Peer-to-Peer mode
In this mode, Two NFC-enabled devices is used to communicate with each other for
exchanging the information in adhoc fashion. Peer-to-Peer mode is standardized on the
ISO/IEC 18092 standard.
Provides a communication channel between NFC-enabled devices (initiator & target) to
exchange data in a point-to-point communication manner. Initiator generates its own RF
field and target acts as a transponder.
Any data transfer is in Request-Response (Normal Response Mode).
Initiator: Initiates the communication by sending messages to target P2P device.
Target: Replies to the request from Initiator.
Below are the real time use cases of this mode.
Simply touching (holding near) the mobile phone to the PC, smooth authentication of
data such as mail data, schedule, image data, phone directory, XML data, etc, and file
information exchange are enabled.
NFC Module
Mail address
Login/password
Telephone
book
Schedule
XML
Side Show
NFC Module
19. 17Technically Speaking October 2016vritti
To exchange small amount of data e.g Set up and share Bluetooth or Wi-Fi link
parameters, exchanging business card or NFC P2P Payment, NFC channel itself can
be used for exchanging information.
To exchange music or photos between two NFC enabled devices, NFC channel
facilitate connection (using handover connection mechanism) to Wi-Fi or Bluetooth for
faster exchange of data.
NFC enabled Bluetooth speakers or earphones can use NFC to establish initial
Bluetooth connection.
Printing images can be done through a NFC enabled printer.
NFC Card Emulation Mode
It allows an NFC Mobile Phone to behave like a smart card or tag in front of a conventional
Reader/Writer. This includes the emulation of memory cards/tags and the emulation of smart
cards. Using this mode, existing infrastructures (e.g., for contactless payment and ticketing)
can communicate with NFC Mobile Phones supporting NFC Card Emulation mode.
In this mode NFC device will act like an
"electronic Wallet" which replaces, credit, debit,
pre-paid and any other magnetic cards which
people use for transactions these days.
NFC chips have been around for years,
installed in smartphones and other
consumer devices. Then Apple embraced
NFC to develop Apple Pay and now NFC is
a common phone feature. The payment
industry tokenization standards used by ICICI
Pocket, IDFC Ziggit and Samsung Pay have
helped these services scale, and the standards
have made it easier for payment services to
work with credit cards, debit cards, loyalty
programs and gift certificates.
TM
Felica
Transportation
®
Mifare
Access Control Attendance Control
NFC Module NFC
20. 18 Technically SpeakingOctober 2016vritti
Below are the real time use cases of this mode.
Users can pay money stored on their digital wallet at parking lots, shop check-outs etc.
NFC devices can act like contactless virtual payment cards.
NFC enables contactless tickets and cards to be held in everyday devices like mobile
phones. Instead of carrying several physical cards, you can choose to carry some or
all of your cards within a personal device like an NFC-enabled mobile phone.
NFC technology can enhance contactless payment at shop check-outs or unattended
payment machines like parking meters. You can pay using virtual payment cards or e-money.
With NFC enabled devices like mobile phones, you can buy tickets, receive them on
your device and then go through “fast track” turnstiles while others wait.
NFC technology is helping to increase the acceptance and usability of contactless
services because it is based on an international standard, designed to work for any
service, in any place, around the world.
References:
NFC and the IoT
https://www.brighttalk.com/webcast/7615/189225?utm_campaign=webcasts-search-results-
feed&utm_content=NFC+Payment&utm_source=brighttalk-portal&utm_medium=web&utm_term=
Tap To Shop: NFC in Retailing
https://www.brighttalk.com/webcast/7615/76115?utm_campaign=webcasts-search-results-
feed&utm_content=NFC+Payment&utm_source=brighttalk-portal&utm_medium=web&utm_term=
Digital Wallets: Challenges in adoption and the future of a cashless society
https://www.brighttalk.com/webcast/6867/213137?utm_campaign=webcasts-search-results-
feed&utm_content=NFC+Payment&utm_source=brighttalk-portal&utm_medium=web&utm_term=
About the author:
Mahindra Comviva.I have 6 years of experience in NFC domain.He has completed his
Engineering from UIT, West Bengal. Prior to his current stint, he worked with Aricent
Technology. He is a technology enthusiast with a keen interest in NFC and payment space.
Parveen Rai is a Lead Engineer for Mobile Financial Solutions at
An estimated 1.9 billion phones worldwide will be NFC-enabled by 2018 and this is just
an introduction about NFC technology and its wide range of possibilities.
That's all for now, “Learn to Tap ....And Tap to Learn"
22. Changing Lives20
R I G H T T O A F U T U R E :
EMPOWERING
REHABILITATING
AND
October 2016vritti
REFUGEESTHROUGH MOBILE MONEY
23. 21Changing Lives
The world is experiencing one of the biggest refugee and
displacement crises in its history. According to United Nations High
Commissioner for Refugees (UNHCR), the number of displaced
people is at its highest ever, exceeding even post-world war II
numbers. An unprecedented 65.3 million people around the world
have been forcibly displaced from their home. Among them are
nearly 21.3 million refugees, over half of whom are under the age
1
of 18 . In fact, if all globally displaced people form a country, it
would be bigger than the United Kingdom and France.
— By Mohit Bhargava
October 2016vritti
0 10 20 30 40 50 60 70 80 Unit Million
65.3 millionforcibly displaced people worldwide
21.3 million16.1 million under UNHCR Mandate
Refugees
5.2 million Palestinian refugees registered by UNRWA
10 million
Stateless pepole
Source: UNHCR
24. 22 Changing Lives
Millions are fleeing from countries impacted
by war, conflict, discrimination and poverty
in search of a better life. However, even
after relocating to more secure and stable
regions, the refugees still have to face poverty
and multiple hardships. Moreover, the influx
of refugees into the host country is impacting
economy and political stability of the host
country, which only serves to alienate the
refugees even further.
Concerned about the seriousness of the issue,
the world leaders convened on September
19, 2016 to address challenges related to
large movements of refugees and migrants,
immediately prior to the general debate of
the 71st session of UN General Assembly
(UNGA). The meeting resulted in the
adoption of New York Declaration for
Refugees and Migrants, which expressed
the political will of world leaders to protect
2
the rights of refugees and migrants . On the
ground-level this translates into providing
aid and support to the refugees and
migrants, enabling them to fight poverty,
hunger and insecurity. It also extends to
economically empowering refugees and
migrants so that they can send children to
school, secure a job or do business and
live a dignified life.
Till now the focus has been in meeting
basic needs like food and the aid is mostly
in-kind such as sacks of flour and rice.
Almost three-fourth of the assistance given
3
by World Food Program (WFP) is in-kind .
However, in recent years there has been a
shift from food aid to cash aid. With limited
banking infrastructure and complexities
involved in opening and operating a bank
account, mobile money has emerged as an
apt channel to disburse cash aid directly to
refugees and migrants. With 271 mobile
money services in 93 countries and agent
network much greater than the banking and
ATM network, mobile money is the most
viable financial inclusion and cash transfer
medium for refugees and migrant.
The concept of transferring cash directly to
refugee’s mobile money account rather
than providing food supply has multiple
advantages. Firstly, cash aid offers
freedom of choice allowing a family to
decide on which food item to buy. In case
of food aid, the aid recipients mostly
complain about the quantity and quality of
food. With cash aid, they have control over
food choice and expenditure, which allows
them to balance food quality and quantity
and get proper nutrition. Cash aid also
provides choice to refugees to spend all of
the aid money at once, or save it in the
form of mobile money on their phone for
future needs. Secondly, as cash aid is in
digital format, it is secure and cannot be
stolen. On the other hand, aid in-kind is
prone to theft as many refugee camps or
colonies are not safe. Moreover, cash aid is
distributed equally to all refugees. There
are no queues and the entire process is
instant and convenient. In case of food aid,
refugees often quarrel to get more food
bags. Digital money also supports
nomadic life style of many refugees, who
can make payments even when they are on
the move. Thirdly, refugees can make
payments directly to the shopkeeper using
mobile money via a peer to peer transfer.
They do not need to covert money from
digital format to cash, making the entire
process cashless and convenient. Even in
case the refugees want to have physical
cash, they can cash-out at mobile money
agents, which are present in large number
in many countries. Lastly, mobile money
based cash aid is more transparent and
prevents corruption. When aid is
October 2016vritti
25. 23Changing Lives
distributed in form of food, middlemen are
involved, who take their cut or pocket a
part of supplies and sell them in open market.
From 2003 to 2012, more than half of the
$17.9 billion the United States of America
4
spent on food aid went to contractors .
Another drawback of food aid is wastage.
Food aid is mostly sourced from donor
countries and transported to refugee areas.
This process can take days during which
food can rot or deteriorate in quality.
Beyond food, cash aid can also be provided
for other purposes such as paying school
fee for children, providing start-up capital
for business and providing financial assistance
to build house. This echoes with UN’S aim
of generating the feeling of respect, safety
and dignity in refugees. From technical stand
point, the same mobile wallet can be used
for providing cash-aid for different purposes.
It is also possible to designate funds for a
October 2016vritti
26. particular cause, for example, an agency
can provide funds which can only be used
to buy food at particular shops. This helps
to ensure that the aid is used for its intended
purpose that is buying food, while ensuring
that the customer also has the freedom to
decide on which food item he wants to buy.
The benefits of mobile money based cash
aid programs are not just on papers. Many
mobile money cash aid programs are live
and have been running successfully. For
example, the World Food Program (WFP) in
Cameroon is providing mobile money based
cash aid to vulnerable refugees and displaced
people, impacted by the Boko Haram
insurgency in the region. Cameroon hosts
over 190,000 internally displaced persons
and 340,000 refugees, from Nigeria and the
Central African Republic, who have fled conflict
and violence spilling across borders. In 2016,
WFP aims to provide assistance to 500,000
internally displaced people and refugees in
5
Cameroon . WFP cash aid program specially
targets single women households and try
to bring stability in their lives.
Cameroon is not a one off case. In Kenya,
WFP is providing financial aid through mobile
phones to refugees in Kakuma refugee
camp. With the digital cash, refugees can
buy food of their choice in local market.
Shopkeepers in the camp carry two phones;
if a customer doesn’t have their own, they
6
can use it to access their electronic funds .
Fadi is one such women living for
past 2 years in Mora, a Came-
roonian city near Nigerian
Border. She is the sole care taker
of her 10 children as her husband
is no longer with the family.
Fadi’s house was burned by
Boko Haram and she also lost
her job. Since then she has been
living in Mora. Since May this
year, she has been receiving
XAF 10,000 FCFA (about US$ 18)
every month, sent by WFP
through her mobile phone,
enabling her to feed her children.
Cash aid brings normalcy back in
her life, as she can go to local
market and buy food of her
choice and cook a meal which
her children prefer.
24 Changing LivesOctober 2016vritti
27. In-kind aid is irreplaceable in some situation
such as natural calamities when networks
are not available. However for other situations,
mobile money based cash aid, with its
benefits of efficiency, security and freedom
of choice, will rapidly grow as the channel
to support and empower displaced people
and refugees.
The cash aid program also
provides business opportunities
to refugees. Fatosaleh, a female
refugee from Central African
Republic, is working with WFP to
sell cassava flour in Gado refugee
camp in Cameroon. More than
150 people come to her shop
daily. In a month, she sells over
14 tons of cassava flour costing
11 million FCFA5. By running her
own business, Fatosaleh is able
About the author:
marketing and research in the telecom domain. At Mahindra Comviva, he is serving as
Manager in product marketing for the mobile financial solutions portfolio. His areas of
function primarily include evangelizing Mahindra Comviva’s mobile financial products and
their impact on transforming the financial landscape globally.
Mohit Bhargava has over eight years of work experience in product
References:
1 http://www.unhcr.org/figures-at-a-glance.html
2 http://refugeesmigrants.un.org/sites/default/files/un_press_release_-
_new_york_declaration_-_19_september_2016.pdf
3 https://www.wfp.org/cash-based-transfers
4 http://www.telegraph.co.uk/news/worldnews/europe/11848330/Heres-a-
simple-way-to-help-refugees-give-them-cash.html
5 http://news.trust.org/item/20160916162703-20472/
6 http://mastercardcenter.org/action/mobile-money-transforming-financial-
inclusion-refugees/
25Changing Lives October 2016vritti
29. — By Srinivas Nidugondi
Over the past few years, the mobile payments industry has
certainly made its presence felt on the global stage. As per data
released by Statista, in 2011, the number of global mobile
payment customers stood at 160.4 million. A mere four years later
(in 2015), this number jumped to 384 million. However, while this
growth is impressive, it varies across regions. In 2015, a majority
of these customers hailed from the Asia-Pacific region (141.4
million), as per the firm. Meanwhile, a stark contrast was the
Middle East, which had 4.7 million to its credit.
Moving on, let's zoom closer into the
Middle East and North Africa (MENA)
region. Sample this-according to a report
released by the Arab Financial Services
Company, the financial landscape in the
region is characterized by variations in
financial inclusion. On one hand, over 65
per cent of adults in the GCC region
(Bahrain, Kuwait, Oman, Qatar, Saudi
Arabia, and the United Arab Emirates) have
an account at a financial institution. On the
other, however, this figure stands at less
than 20 per cent in countries like Egypt,
Sudan, Iraq and Yemen. Naturally, as a
result, the development and uptake of mobile
payment solutions in the region has been
patchy at best. In fact, there is a wide gap
between the kinds of solutions the customers
are demanding as well. In this context, the
report states that in the less developed
countries, particularly North Africa, mobile
money solutions have been the main
growth vehicle for financial inclusion.
Needless to say, the GCC region has a
different story to tell. Here, developing
mobile payment solutions such as mobile
banking, mobile wallet, etc, is the norm.
27October 2016vrittiMobilution
30. Now let's put the GCC region under the
microscope. First off, there is little doubt
that the business case for mobile payments
in this region is strong, to say the least.
How? Well, for starters, the average mobile
penetration is very high-190 per cent. No
mean number, this!
Needless to say, operators and third party
providers didn't let the grass grow under
their feet before jumping onto the mobile
payments bandwagon. As a result, the space
saw a flurry of activity. Several examples
can be cited in this regards but, for the sake
of remaining crisp and concise, let's cite a few.
It all started in 2013. Boloro, in collaboration
with Zain, launched the GCC region's first
ever mobile payments service on buses in
Kuwait. Customers could securely and
conveniently pay their fares by simply tapping
their mobile phone when boarding the vehicle.
In fact, all the bigwig operators in Kuwait
and Qatar, Zain, Ooredoo and Viva currently
offer this service.
On the other hand, there are entities which
have been a bit slow on the uptake. I allude
to banks, which have preferred to adopt a
“wait-and-watch” stance with regard to mobile
payments. In my opinion, banks ought to
flex their muscles on this stage. And why
not? These players can easily leverage their
already-established relationships with
merchants, not to mention the treasure
trove of customer data they're sitting on.
So, what's stopping them? Well, the biggest
barrier is the fact that these entities still
consider the mobile handset and all
applications concerned as a value added
service. As a result, non-banking players
have ventured far ahead of them in the mobile
payments game. Allow me to add my two
cents-it is time that these players straighten
up and chalk out a strategy to at least finish
neck-to-neck with the competition. The
first step? Start considering the mobile
channel as an integral part of the business!
Of course, these entities must have a war
chest in place before meeting the competition
head-on. Enter the prepaid wallet. Now, the
advantages of the prepaid wallet have been
discussed ad nauseam, which is why I won't
wax eloquent on the same. I would like to
point out, though, that the most important
reason (arguably) why banks ought to take
prepaid wallets seriously is two-fold. First,
their merchants are empowered and second,
this service reduces the high “card not
present” rate during a transaction. A prepaid
wallet is typically built around a stored value
account. Customers can transfer the money
from their bank account or card to the prepaid
wallet. Since payments are not made
directly through cards, the high “card not
present” charges do not apply. As a brief
side-note, permit me to point out that the
very enthusiastic uptake of smartphones in
the region can play a crucial role in the uptake
of this service. After all, 68 per cent of all
handsets in the region belong to this category!
So, why shouldn't such applications flourish?
Now let's turn our focus to another interesting
trend that is rearing its head up in the region.
Enabling seamless payments through
contactless cards is the new kid on the block.
In fact, a few banks have already launched
their offerings in this regard. The revolution
was sparked off in 2015 by Boubyan Bank,
the first entity to launch Tap & Pay credit
cards in Kuwait. Later that year, Riyad
Bank and NCB (supported by AFS)
followed to introduce Saudi Arabia's first
contactless credit card. Also, with mobile
payments foraying into the game, expect
the contactless card to be replaced by the
mobile handset.
Let's take a quick look at the secret sauce
behind mobile-based contactless payments
- namely, the technology. Several can be
used for this service, for instance, Near
Field Communications (NFC), QR Codes
28 MobilutionOctober 2016vritti
32. and sound-based technologies. Of these,
NFC is emerging as the forerunner in this
race. The reason is simple-Host Card
Emulation (an NFC variant) lets banks
launch contactless payments rapidly without
changing the existing SIM card and involving
a trusted service manager (TSM). Little wonder,
then, that NFC is the technology of choice
for banks and financial institutions alike.
Adding another dimension to this, banks
may consider investing in developing their
own HCE platform, as opposed to opting
for OEM pays like Apple Pay and Samsung
Pay. Here's why – a bank-owned HCE
platform works on any NFC-enabled device,
unlike the Apple Pay and Samsung Pay,
which function only on the Apple iPhone 6
and the Samsung S6 devices respectively.
Moreover, with their own HCE platform,
banks will have complete control over the
tokenization platform as well as the token
lifecycle. Banks will have the ability to monetize
the token platform to enhance tokens for
other use cases, like token based ATM cash
out, P2P using tokens, etc.
Net, net, it is only a question of time before
prepaid wallets and contactless payments
are in the spotlight in the GCC region. The
revolution is well and truly underway. What
remains to be seen is the direction it takes,
in terms of uptake, technologies and services.
After all, the Middle East market is an inherently
contradictory one. A customised stance is
thus needed to succeed. Remember, there
is no “one size fits all” approach to mobile
payments!
About the author:
industries including financial services, payments and commerce in a variety of business and
product related roles and most recently with a specific focus on enabling banking, payments
and related services through digital channels. At Mahindra Comviva he heads the Mobile
Financial Solutions business unit, which currently has over 130 deployments globally, providing
servicesformorethanonebillionconsumers.
Srinivas Nidugondi has over 19 years of experience in various
30 MobilutionOctober 2016vritti
35. —-By Kamaljeet Rastogi
'Time is Money.' This is what Benjamin Franklin had said and mobile wallet seeks to
bring these two quantities together i.e. save time while spending and managing money.
A mobile wallet in simple terms is a single-click e-commerce experience where the
customer browses through the items of its choice and make payment with a single-click
on their smartphones.
Though Iran is a developing country but still surprisingly it has a very high banking
penetration with nearly 92 percent people having bank accounts. With such high level of
banking penetration, mobile wallet would prove to be a great opportunity for the banks to
create a platform suitable for the new generation and its new open economy.
33Mobilution October 2016vritti
36. Almost every Iranian (urban or rural) has a
debit card using which they are accessing
various banking services. But there are
several limitations in this.
- Each payment system has
its limits regarding the maximum number of
transactions per day and the amount of
money that can be transferred.
- One of the major
downsides of electronic transactions is that
one has to pay fees for these services.
Depending on how one process their
transactions, they might be charged
various processing fees. Different vendors
have different rates. Some require setup
fees, a minimum number of transactions
each month or a minimum payment.
In case of e-banking or
online financial transactions, though most
transactions involve the use of one-time
passwords thus ensuring safety to a
considerable extent, but some parts of a
transaction, or personal details and bank
account information is accessible through
the credentials for the online portal. This
gives rise to security threats while handling
financial transactions online.
Electronic
payments involve the use of smart cards
(credit and debit cards, ATM cards, etc.)
and this involves the risk of their theft or
loss. In case, a lost smart card falls in the
wrong hands or if it is stolen, the money in
the account that the card is linked to, may
be spent by fraudulent users.
Restrictions
Higher Costs
Loss of Smart Cards
Security Threat -
Limitation of the
current Card
Payment Systems
34 October 2016vritti Mobilution
37. Convenience
Portability
Flexibility
Speed
Cost
- When referring to the
convenience of payment methods, consumers
may have different aspects of the attribute
in mind. These aspects include portability,
flexibility, speed, ease of use, and ease of
setting up and learning to use each
payment method.
- Mobile payments will likely
be more convenient than traditional payment
methods in terms of portability. A mobile
device will eliminate the inconvenience of
carrying multiple plastic cards in a physical
wallet by enabling consumers to link
mobile payments to those card accounts.
Because of this enhanced portability,
consumers may have access to more card
accounts than is feasible with plastic cards.
- In addition to various card
accounts, a mobile device can carry other
payment methods, such as PayPal, that
allow the consumer to pay directly from a
bank account. From the many payment
instruments loaded on the mobile device,
consumers can choose a payment
instrument that best fits a type of payment.
- With contactless payment
methods, including contactless cards and
NFC-based mobile payments, the
consumer need only tap or wave the
contactless device in front of a reader to
make a purchase. According to some
estimates, this method of payment can be
15 seconds to 30 seconds faster than
swiping a traditional card and signing the
receipt or entering a PIN.
- The cost of using a payment
method includes two components. First are
the fees paid to payments providers,
banks, or merchants for using the method.
Second are the costs of equipment and
materials needed to use the method.
Advantages of Mobile Wallet
The ongoing costs to consumers of
using mobile payments are likely to
be lower than for traditional payment
methods.
Another ongoing cost consists of
transaction costs consumers are
charged by banks, payment providers,
or merchants for using the various
payment instruments loaded on their
mobile phones.
Security
Mobile wallet has greatly reduced the
concern of the people to share their
personal information
Mobile payments have significantly
reduced the likelihood of fraudulent
POS transactions,
One cost of using mobile
payments is a data plan subscription fee to
a mobile carrier. The amount of data
communication used for mobile payments,
however, is likely very small.
For most payment
instruments, the transaction costs are lower
while using a mobile wallet rather than that
using debit cards, credit cards etc.
- Consumers consider two aspects
of security in choosing among payment
methods. Firstly, people do not want to
share their personal data and bank accounts
details with third party merchants .Second
is the likelihood of fraudulent transactions.
about their
financial accounts to third party merchants
as they no longer has to share their
account details or debit/credit card details
while transacting as the money is
previously available in the mobile wallet
and one has to just transfer the money to
the given merchant.
by using unique data
to authenticate the payment device in every
transaction.
35October 2016vrittiMobilution
38. Iran is absolutely ready for mobile wallet technology to be
implemented in the country and with such a high level of
people with bank accounts (92%), it would prove to be a great
success for the nation as it would have a positive impact on
the country's GDP, the money circulation, higher government
revenues and provide better financial stability to its people.
Importance of Mobile Money
for People of Iran
36 October 2016vritti Mobilution
39. There has been always an apprehension
among the common masses about sharing
their bank account details and personal
info with every third party merchants and
websites in order to carry out online
transactions. But using mobile wallet they
don't have to face such problems as in
mobile wallet no personal info is shared
also it is a single click system so no
hassles of entering card details and pin
number for each and every transaction.
Mobile wallet has a positive impact on the
money circulation of the country as digital
currency as a replacement of cash reduces
the informal money or the “grey market” in
the financial system.
Mobile Wallet has a significant impact on the
GDP of a country. A study has shown that a
10 percent rise in mobile subscribers in
emerging markets will lead to a 0.6 percent to
1.2 percent increase in GDP in those markets
due to the productivity gains associated
with communication as well as new jobs.
Mobile Wallet also gives a boost to the e-
commerce market and also instrumental in
development of new businesses based on
e-commerce.
Mobile wallets can be used for making
mobile money payments from governments
(G2P), business (B2P) and donors as it is a
secure and less costly way of delivering
wages and social transfers.
Though people with financial accounts in
Iran is quite high (around 92 percent) but
still about 50 percent of the rural
population doesn't have access to plastic
Need of Mobile Wallet in Iran
money (debit/credit cards) or electronic
payment systems thus they have to go to
banks to withdraw cash. Therefore, for
such people who don't have access to
plastic money mobile wallet is a great
medium of doing transactions.
Mobile wallet is not just for making online
transactions but with the advent of latest
technologies they can now be used to
predict or forecast the likely balance for up
to two weeks into the future. Also it
compares the long-term and short-term
consumption, indicating immediately at
opening the app, whether you're doing
good or bad.
People are always interested in spending
less money. In order to assist them in
getting the best deals mobile wallet
provides them with the coupons and
cashback offers regarding the product and
the website they are purchasing from.
Also a large no of merchants have
partnered with the mobile wallet providers
and provided the facility of mobile wallet
transactions at their POS terminals. Here
the customer just had to scan the QR code
or provide a PIN to complete the
transactions on the POS terminals.
Push notifications are enabled to
automatically show the latest balance after
each and every transaction.
Mobile wallet can hold the details of
different cards (debit/credit) of a consumer.
It enables the consumer to use different
cards for different transactions depending
upon their requirements.
37October 2016vrittiMobilution
40. Why Should Iranian Banks
Implement Mobile Wallets?
With the increased integration of social,
shopping and payments experiences on
mobile wallets, banks need to launch their
own mobile wallet services to tap the
potential market.
Young and relatively affluent customers
are, unsurprisingly, more interested in mobile
wallets. Further, technology-savvy users
amongst these are attracted to the social
and shopping features of mobile wallets,
and expect their mobile wallet to provide
not just a great shopping experience but
optimized payment decisions as well. As a
result, mobile wallets present banks with a
great opportunity to reach tech-savvy and
young customer segments.
Mobile wallets can help banks capture a wealth
of data pertaining to a customer's financial
behavior. This data repository, along with
location-based information, can be mined
to provide superior services to customers.
Using mobile coupons and loyalty programs,
banks can collaborate with retailers and
mobile marketers to enable targeted and
relevant offerings and discounts at the
point of sale. Such an approach will help
banks build their brand, including in places
where they are not typically visible.
Further, customers usually rate a bank's
security infrastructure higher than those of
other organizations. Banks are considered to
be more trustworthy at handling the financial
and personal information of their customers.
With the high banking penetration, mobile
wallets offer the best opportunity for banks
to increase transaction volumes and values
and support the overall economic
development of Iran.
38 Mobilution
About the author:
Financial Solutions at Mahindra Comviva. He has over 20 years of experience in the digital
payments space. Prior to his current stint, he worked with Reliance Jio Infocomm, FINO
Paytech, aurionPro Solutions, ABN Amro Bank and Citibank.
Kamaljeet Rastogi is the Global Head, Business Development, Mobile
October 2016vritti
42. INTERVIEWS
AND ARTICLES
2 major benefits UPI
will bring to table for
consumers
Srinivas Nidugondi’s
article
The Financial Express
IN THE MEDIA
MFS needs
business-friendly
guideline
Reyad Hasnain’s interview
Dhaka Tribune
Transaction successful
Kaustubh Kashyap’s
interview
CommsMEA
Payments become
more secure and easy
on QR Code
Reyad Hasnain’s article
Click to read...
The future of digital
payment
Manoranjan Mohapatra’s
article
Business Standard
Click to read... Click to read...
Click to read...
Mahindra Comviva’s
®
mobiquity Money
The Nilson Report
August 2016 issue
Click to read...
Click to read...
40 July 2015vritti In the media
White paper explores
the evolution of the
digital wallet
NFC World
Click to read...
43. AWARDS
Mahindra Comviva wins
Digital Impact Awards
Africa 2016 for
®
mobiquity Money
Roshan and Mahindra
Comviva awarded
‘Juror’s Mention’ at
mBillionth Award in
Business & Commerce
category
Econet Wireless and
Mahindra Comviva win
Future Digital Award for
EcoCash Diaspora
Service
Click to read...
Click to read... Click to read...
41July 2015vrittiIn the media
Mahindra Comviva and
Aite Group predict
digital wallets to rule
mobile commerce
PRESS
®
mobiquity Wallet
leverages iOS 10’s
voice recognition and
3D Touch features to
deliver an enhanced
digital wallet experience
Click to read...
Click to read...
44. ANALYST
MENTIONS
Gartner:
Gartner Hype Cycle for
Communications Service
Provider Operations
Mahindra Comviva
mentioned in the report
Click to read...
Click to read... Click to read...
Click to read...
Click to read...
Gartner:
Gartner Hype Cycle for
ICT in Africa
Mahindra Comviva
mentioned in the report
Gartner:
Gartner Hype Cycle for
Personal Technology
Mahindra Comviva
mentioned in the report
Juniper Research:
Digital Banking:
The Roadmap to 2020
Mahindra Comviva
mentioned in the report
Click to read...
Juniper Research:
Digital Money Transfer
& Remittances
Mahindra Comviva
mentioned in the report
Gartner:
Gartner Hype Cycle for
Digital Banking
Transformation
Mahindra Comviva
mentioned in the report
42 July 2015vritti In the media