Wearables, IoT and consumer robotics are amongst the hottest topics highlighted at Startup Village 2014. They attract both younger generation teams and investors with international track, promising significant growth potential in future.
New ITU Standard on Identity & Access ManagementITU
A new ITU international standard will bring greater business relevance to the identity and access management (IAM) systems employed by enterprises to manage electronic identities and control access to ICT resources. The standard will enable more intuitive, cost-effective assignment and management of IAM roles and user permissions.
The standard – Recommendation ITU-T X.1257 “Identity and access management taxonomy” – was developed by the ITU standardization expert group responsible for building confidence and security in the use of ICTs, ITU-T Study Group 17.
ITU-T X.1257 addresses the lack of business meaning in IAM roles and permissions which has led to unnecessary complexity in the operation of IAM systems. This complexity affects the entire IAM lifecycle, often leading to the need for costly maintenance of IAM systems as well as conditions prone to the emergence of security vulnerabilities in enterprise systems.
ITU-T X.1257 details requirements for a “task-based access management” framework. Irrespective of industry sector or the size of the enterprise in question, this framework has four clear advantages:
IAM Role Engineers will be in a position to prevent role and entitlements explosion
Application Teams can implement Separation of Duties across multiple applications
Access Reviewers can automate both potential and historical user entitlements
Business Architects will have the ability to perform SIM-related Business Process and Application Rationalization
For more information on ITU-T Study Group 17, please consult the group’s homepage at:
http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/default.aspx
New ITU Standard on Identity & Access ManagementITU
A new ITU international standard will bring greater business relevance to the identity and access management (IAM) systems employed by enterprises to manage electronic identities and control access to ICT resources. The standard will enable more intuitive, cost-effective assignment and management of IAM roles and user permissions.
The standard – Recommendation ITU-T X.1257 “Identity and access management taxonomy” – was developed by the ITU standardization expert group responsible for building confidence and security in the use of ICTs, ITU-T Study Group 17.
ITU-T X.1257 addresses the lack of business meaning in IAM roles and permissions which has led to unnecessary complexity in the operation of IAM systems. This complexity affects the entire IAM lifecycle, often leading to the need for costly maintenance of IAM systems as well as conditions prone to the emergence of security vulnerabilities in enterprise systems.
ITU-T X.1257 details requirements for a “task-based access management” framework. Irrespective of industry sector or the size of the enterprise in question, this framework has four clear advantages:
IAM Role Engineers will be in a position to prevent role and entitlements explosion
Application Teams can implement Separation of Duties across multiple applications
Access Reviewers can automate both potential and historical user entitlements
Business Architects will have the ability to perform SIM-related Business Process and Application Rationalization
For more information on ITU-T Study Group 17, please consult the group’s homepage at:
http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/default.aspx
ITU Security in Telecommunications & Information TechnologyITU
The ITU-T Security Manual offers a comprehensive overview of ITU-T’s work to build confidence and security in the use of information and communication technologies (ICTs).
The manual documents ITU-T’s efforts to respond to global cybersecurity challenges with international standards, complementary guidance documents and outreach to build capacity in the application of advanced ICT security mechanisms.
Introductory chapters highlight high-priority areas of ITU-T security work and basic requirements for the protection of ICT applications, services and information. Central to this introduction is an examination of standards’ role in meeting the security requirements borne of prevalent threats and vulnerabilities.
The manual outlines foundational security architectures as a basis for the discussion of more specific security considerations, following an iterative structure addressing key aspects of ICT security:
Generic security architectures for open systems and end-to-end communications, as well as examples of application-specific architectures, which establish frameworks for the consistent application of multiple facets of security.
Information security management, risk management and asset management, including management activities relevant to securing network infrastructure and the data used to monitor and control the telecommunications network.
The Directory and its role in supporting authentication and other security services. Particular attention is paid to the cryptographic concepts that rely on Directory services, providing an introduction to public key infrastructures, digital signatures and privilege-management infrastructures.
Identity management – a topic of growing importance to connected things, objects and devices – and the related topic of telebiometrics, the use of biometric characteristics for personal identification and authentication in telecommunications environments.
Approaches to network security, including the security requirements for next-generation networks and mobile communications networks in transition from a single technologies (e.g. CDMA or GSM) to mobility across heterogeneous platforms using the Internet Protocol (IP). This section also tackles security provisions for home networks, cable television and ubiquitous sensor networks.
Cybersecurity and incident response, looking at how best to develop an effective response to cyber attacks, including the need to understand the source and nature of attacks when sharing associated information with monitoring agencies.
Application-specific security needs, emphasizing the security features defined in ITU-T standards for Voice over IP, Internet Protocol Television, Web services, and identification tags such as RFID tags.
Technical measures to counter common network threats such as spam, malicious code and spyware, including the importance of ti
Internet of Things: Definition, Applications, Issues and Future Prospectiverahulmonikasharma
Internet of Things (IoT) is the extension of Internet into the physical environment around us; by the embodiment of electronics into the everyday physical objects that we tend to use. This makes the digital and physical entities linked by the means of appropriate communication technologies. Penetration of these everyday objects into the web strengthens the goal of offering a whole new set of services to the users, showing them the amalgamation of varied devices, versatile data and various technologies as one common operating picture, using IoT. With the IoT advancements in various sectors, more number of devices are being digitally augmented leading to the discovery of newer issues and challenges that are faced due to these 3 Vs; varied devices, versatile data and various technologies. This survey focuses on identification of such issues and challenges in IoT; suggesting some clues for future research.
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.
Challenges and Opportunities of Internet of Things in Healthcare IJECEIAES
The Internet of Things (IoT) relies on physical objects interconnected between each other’s, creating a mesh of devices producing information and services. In this context, sensors and actuators are being continuously embedded in everyday objects (e.g., cars, home appliances, and smartphones) thus pervading our living environment. Among the plethora of application contexts, smart Healthcare is gaining momentum. Indeed IoT can revolutionize the healthcare industry by improving operational efficiency and clinical trials’ quality of monitoring, and by optimizing healthcare costs. This paper provides an overview of IoT, its applicability in healthcare, some insights about current trends and an outlook on future developments of healthcare systems.
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
Internet of Things forecast, economics, applications, technology, research challenges, sensor networks security, attack models, countermeasures, network security visualization
Autonomous vehicles: A study of implementation and security IJECEIAES
Autonomous vehicles have been invented to increase the safety of transportation users. These vehicles can sense their environment and make decisions without any external aid to produce an optimal route to reach a destination. Even though the idea sounds futuristic and if implemented successfully, many current issues related to transportation will be solved, care needs to be taken before implementing the solution. This paper will look at the pros and cons of implementation of autonomous vehicles. The vehicles depend highly on the sensors present on the vehicles and any tampering or manipulation of the data generated and transmitted by these can have disastrous consequences, as human lives are at stake here. Various attacks against the different type of sensors on-board an autonomous vehicle are covered.
I have created this executive summary after studying hundreds of pages of reliable research papers in regards to IoT and the economic impact in different sectors.
Although being made early 2017, it is still applicable and with a total potential impact of $3.9 - 11.2 Trillion USD per Year by 2025 across 9 Settings, it is a subject will impact you and your business in one way or the other.
Note: All data is attributed to its source.
A Survey on the applications of IoT: an investigation into existing environme...TELKOMNIKA JOURNAL
In today’s digital environment, devices are able to interconnect and react to contextual data more than ever before: artificial intelligence is beginning to coordinate how data collected from sensors and de-vices within the network is analysed, and device ecosystems are replacing standalone devices to deliver solutions to the user. In this paper, the researcher explores current implementations of IoT that have led to positive outcomes for the user; but also, the challenges that remain in today’s applications. Moreover, ex-ploring these current barriers may be able to infer future applications capable of being deployed on a global scale
The core of the development of the consumer Internet of Things is to improve user experience, cultivate usage habits, enhance user stickiness, and then obtain more valuable user data and realize data value-added.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
ITU Security in Telecommunications & Information TechnologyITU
The ITU-T Security Manual offers a comprehensive overview of ITU-T’s work to build confidence and security in the use of information and communication technologies (ICTs).
The manual documents ITU-T’s efforts to respond to global cybersecurity challenges with international standards, complementary guidance documents and outreach to build capacity in the application of advanced ICT security mechanisms.
Introductory chapters highlight high-priority areas of ITU-T security work and basic requirements for the protection of ICT applications, services and information. Central to this introduction is an examination of standards’ role in meeting the security requirements borne of prevalent threats and vulnerabilities.
The manual outlines foundational security architectures as a basis for the discussion of more specific security considerations, following an iterative structure addressing key aspects of ICT security:
Generic security architectures for open systems and end-to-end communications, as well as examples of application-specific architectures, which establish frameworks for the consistent application of multiple facets of security.
Information security management, risk management and asset management, including management activities relevant to securing network infrastructure and the data used to monitor and control the telecommunications network.
The Directory and its role in supporting authentication and other security services. Particular attention is paid to the cryptographic concepts that rely on Directory services, providing an introduction to public key infrastructures, digital signatures and privilege-management infrastructures.
Identity management – a topic of growing importance to connected things, objects and devices – and the related topic of telebiometrics, the use of biometric characteristics for personal identification and authentication in telecommunications environments.
Approaches to network security, including the security requirements for next-generation networks and mobile communications networks in transition from a single technologies (e.g. CDMA or GSM) to mobility across heterogeneous platforms using the Internet Protocol (IP). This section also tackles security provisions for home networks, cable television and ubiquitous sensor networks.
Cybersecurity and incident response, looking at how best to develop an effective response to cyber attacks, including the need to understand the source and nature of attacks when sharing associated information with monitoring agencies.
Application-specific security needs, emphasizing the security features defined in ITU-T standards for Voice over IP, Internet Protocol Television, Web services, and identification tags such as RFID tags.
Technical measures to counter common network threats such as spam, malicious code and spyware, including the importance of ti
Internet of Things: Definition, Applications, Issues and Future Prospectiverahulmonikasharma
Internet of Things (IoT) is the extension of Internet into the physical environment around us; by the embodiment of electronics into the everyday physical objects that we tend to use. This makes the digital and physical entities linked by the means of appropriate communication technologies. Penetration of these everyday objects into the web strengthens the goal of offering a whole new set of services to the users, showing them the amalgamation of varied devices, versatile data and various technologies as one common operating picture, using IoT. With the IoT advancements in various sectors, more number of devices are being digitally augmented leading to the discovery of newer issues and challenges that are faced due to these 3 Vs; varied devices, versatile data and various technologies. This survey focuses on identification of such issues and challenges in IoT; suggesting some clues for future research.
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.
Challenges and Opportunities of Internet of Things in Healthcare IJECEIAES
The Internet of Things (IoT) relies on physical objects interconnected between each other’s, creating a mesh of devices producing information and services. In this context, sensors and actuators are being continuously embedded in everyday objects (e.g., cars, home appliances, and smartphones) thus pervading our living environment. Among the plethora of application contexts, smart Healthcare is gaining momentum. Indeed IoT can revolutionize the healthcare industry by improving operational efficiency and clinical trials’ quality of monitoring, and by optimizing healthcare costs. This paper provides an overview of IoT, its applicability in healthcare, some insights about current trends and an outlook on future developments of healthcare systems.
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
Internet of Things forecast, economics, applications, technology, research challenges, sensor networks security, attack models, countermeasures, network security visualization
Autonomous vehicles: A study of implementation and security IJECEIAES
Autonomous vehicles have been invented to increase the safety of transportation users. These vehicles can sense their environment and make decisions without any external aid to produce an optimal route to reach a destination. Even though the idea sounds futuristic and if implemented successfully, many current issues related to transportation will be solved, care needs to be taken before implementing the solution. This paper will look at the pros and cons of implementation of autonomous vehicles. The vehicles depend highly on the sensors present on the vehicles and any tampering or manipulation of the data generated and transmitted by these can have disastrous consequences, as human lives are at stake here. Various attacks against the different type of sensors on-board an autonomous vehicle are covered.
I have created this executive summary after studying hundreds of pages of reliable research papers in regards to IoT and the economic impact in different sectors.
Although being made early 2017, it is still applicable and with a total potential impact of $3.9 - 11.2 Trillion USD per Year by 2025 across 9 Settings, it is a subject will impact you and your business in one way or the other.
Note: All data is attributed to its source.
A Survey on the applications of IoT: an investigation into existing environme...TELKOMNIKA JOURNAL
In today’s digital environment, devices are able to interconnect and react to contextual data more than ever before: artificial intelligence is beginning to coordinate how data collected from sensors and de-vices within the network is analysed, and device ecosystems are replacing standalone devices to deliver solutions to the user. In this paper, the researcher explores current implementations of IoT that have led to positive outcomes for the user; but also, the challenges that remain in today’s applications. Moreover, ex-ploring these current barriers may be able to infer future applications capable of being deployed on a global scale
The core of the development of the consumer Internet of Things is to improve user experience, cultivate usage habits, enhance user stickiness, and then obtain more valuable user data and realize data value-added.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Venäjän tuonninkorvausohjelma - Uhka vai mahdollisuus? Team Finland Future Wa...Team Finland Future Watch
Venäjän tuonninkorvausohjelman keskeinen tavoite on vähentää tuontiriippuvuutta, edistää teollisuuden modernisointia ja vähentää strategisten toimialojen haavoittuvuutta. Team Finland Future Watch selvitys kokoaa yhteen ohjelmaa koskevan oleellisimman lainsäädännön ja perehtyy Venäjän teollisuus- ja kauppaministeriön laatimiin toimialakohtaisiin ohjelmiin, joissa määritellään tuotantoalakohtaiset tavoitteet ulkomaalaiset tuotteiden korvaamisesta kotimaisilla tuotteilla vuoteen 2020 mennessä.
Many African governments speak highly about role of innovation and SMEs as necessities to take Africa forward. High unemployment levels and lack of corporate employment opportunities also force people look opportunities in becoming entrepreneurs. Many NGOs and funds have invested a lot in creating a wide variety of actions around “innovation” yet concrete results – besides bunch of seminars, events and programmes – seem to be lacking.
Smart Grids: Growth business in Indian energy sector’ session brought together specialists from business and research institutions to discuss about the future business opportunities in Indian smart grid markets. In the session, were also defined the major barriers for the market entry and ‘ground rules’ to successful in energy business in India. This document summarizes the outcomes of the session.
Business with Impact – BEAM Summary Report of Future Watch Session, Team Finl...Team Finland Future Watch
Achieving Business Impact in Sub-Saharan Africa workshop brought together specialists from business, public, non-governmental and research organizations to discuss about the future business and collaboration opportunities in Sub-Saharan Africa. Discussion was organized around nine themes: urbanization, water management, education, financial services, collaboration in Africa, mobile Africa, energy, health and adding higher local value.
Opportunities for Finnish companies in the bio-based chemical and materials m...Team Finland Future Watch
Team Finland Market Opportunities/Future Watch report of emerging business models and opportunities in bio-based chemical and materials market. Presentation from the event held in 2nd November 2016.
MyHealth – Future Health Solutions in Emerging Market Service (India), Team F...Team Finland Future Watch
Main questions of My Health investigations are: 1) How cultural and geographical contexts effect on acceptance of new health products, services and solutions and what are the motivations behind different choices? 2) What kind of consumer and customer understanding do Finnish enterprises need in order to success in emerging markets 3) What kind of cultural or customer behavior changes would be anticipated in emerging markets in future?
Yritysten joukkorahoituskampanjat ovat yleistyneet nopeasti. Tämä käytännönläheinen opas avaa joukkorahoitusmuotojen hyötyjä ja riskejä ja antaa vinkkejä kampanjaa suunnitteleville.
Esittelemme Suomessa käytetyimmät joukkorahoituksen muodot: tuotepohjaisen, osakepohjaisen ja lainapohjaiseen joukkorahoituksen. Suomen varainkeruulaki kieltää toistaiseksi lahjoituksen eli vastikkeettoman joukkorahoituskampanjan ilman erityislupaa. Siksi emme tässä keskity siihen, vaikka se on kansainvälisesti merkittävä joukkorahoituksen muoto.
India Smart Grids Future Session and Report Update, Team Finland Future Watch...Team Finland Future Watch
Intian energiasektori uudistuu ja älykkään sähköverkon markkinat (mittarit, ICT-järjestelmät, sähkönsiirtoverkko) kehittyvät nopeasti tarjoten uusia liiketoimintamahdollisuuksia. Intiassa on suuri tarve uusille tavoille tuottaa, kuluttaa, varastoida ja vaihtaa energiaa entistä joustavammin ja resurssitehokkaammin. Uudenlaisia palveluja tarvitaan sähkön kuluttajille ja tuottajille.
Digitalisaatioesimerkkejä teollisuudelle. Team Finland Future Watch -raportti...Team Finland Future Watch
Digitalisaatioesimerkkejä teollisuudelle -raportti sisältää 8 case-kuvausta digitalisaation hyödyntämisestä teollisuuskontekstissa.
Esimerkkien tavoitteena on auttaa suomalaisia pk-teollisuusyrityksiä ymmärtämään digitalisaation tarjoamia mahdollisuuksia sekä antaa yrityksille uusia ideoita liiketoimintansa kehittämiseen.
Sensor Technology for Smart Nation and Industry 4.0 by colin kohColin Koh (許国仁)
Sensors play a critical role as they provide contextual data to the emerging IoT and Big Data application. The challenges remain in term of cost, reliability, accuracy and standardisation. Collaboration of all stakeholders is the key to ensure the sensors technology can meet and overcome the issues facing the users.
Internet of Things ( IoT ) will be all in the future, are we ready for this 4th revolution ? My presentation will show the main topics regarging IoT, including the history, the applications and some arguments behind it, including criticism and controversies.
The scope of the report includes a detailed study of global and regional markets on IoT Chip Market with the reasons given for variations in the growth of the industry in certain regions.
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...Lounge47
“Internet of Things (IoT) – Where is the Money?” - This talk highlighted the need for innovative business and technical models. Top 5 key takeaways from the session: 1) Analyze business models from the perspective of targeting “control points” (allows disproportionate share of value e.g. platform), “network externalities” (users generate more users e.g. facebook) and “virtuous cycle” (self-propogating value system e.g. Twitter: tweets generating more, value, tweeters and users) 2) Fog computing (solutions at the edge of the network) should be considered for "time sensitive" or "mission critical" solutions 3) IoT Stats 2013: $1.7B funding, 186 deals, 30% up YOY, 75% up on exits, largely in platforms; Cisco estimates 50B connected devices by 2020, economic value of 19 trillion added in next decade 4) Manufacturing and Smart Cities most immediate opportunities in Enterprise space 5) Key Challenges are security and time-sensitive networking. In summary, IoT Startups focused in a hot space need to pick clever business models relative to the competition.
Future Watch summary: Future growth opportunities in global biobanks marketTeam Finland Future Watch
This Future Watch report compares the current status of forerunning biobanks in Finland, Denmark, Sweden, UK and USA, analyze the needs and views of key biobank customer segments as well as offer key recommendations for Finnish biobank to gain a larger footprint in the biobank market.
ASEAN is increasingly becoming a vital economic force in Asia and a driver of global growth with a young, abundant workforce. Simultaneously, the region is witnessing significant productivity improvement in sectors such as manufacturing, retail, telecommunications and transportation.
The presentation is a summary presentation from a study Situational Awareness Solutions which collects together use cases for situational awareness capabilities and prioritizes these in context of user perception and readiness, availability and accessibility of technology, ease and likelihood of adoption, as well as regulations and competing substitutes. Finally it analyzes the relevance of assessed use cases to United States, Germany and Japan. The application areas discussed cover, amongst other, ecology and environment, disaster management, logistics and transport as well as critical infrastructure management.
Recent technology developments in the information technology space have opened new horizons for the maritime industry. "Digital ports" refers to application of digital technologies of digital technologies such as machine learning, data analytics, visualization, cloud and advanced wireless communications technology to the Port Ecosystem that are driving innovations and enabling business efficiency.
A recent Future Watch study on consumer trends in South Korea explores and analyzes key consumer trends that are shaping South Korean society and how these trends are likely to evolve over the next three to five years. The study is echoing future consumer trends not only in Asia but also in Europe. It is now clear that mobile and online shopping will become the main retail channel, and technologies like virtual reality (VR), augmented reality (AR), artificial intelligence (AI) and big data are changing the retail landscape.
Healthcare as an industry is transforming. The concept of wellbeing is increasing in importance. Living environments are evolving, including smart homes, assisted living and robotics. Technologies and innovations are having major impacts to individual’s life. Individuals are taking more control and recognizing also their responsibility.
Business Finland and Future Watch commissioned a study on the landscape of developments that will impact the delivery of Health & Wellbeing, to better understand the anticipated transformations, impacts and opportunities to support its strategy for ensuring Finland is well positioned to take advantage of such trends and to help drive better decision making for all stakeholders in Finland. Results of the study are published and discussed with stakeholders and companies in Business Finland’s Smart Life Finland program webinars.
The Hong Kong government supports smart city operations and smart lamp post related actions. Smart lamp posts together with 5G can encompass various industries and thus can offer opportunities also for Finnish companies. Hong Kong aims to become a “world class smart city”. In ”Hong Kong Smart City Blueprint” smart lamp posts are mentioned as one action point and 50 smart lamp posts should be in use by the summer of 2019. The figure is set to rise to 400, and during 2019, a tender will likely be opened for the remaining 350 smart lamp posts. Smart lamp posts can serve several different functions and these are currently experimented in Science Park and the Smart City Pilot Area.
Japan is the second-largest retail market globally. For decades Japanese consumer’s preferences and cultural trends have been influential trend setting phenomenona. To understand how global consumer trends are transforming, it is important to look Japanese consumers behavior and attitudes towards consuming. Today we see behavior shifting. The change of Japanese consumers is not only about what people in Tokyo buy, but also how and what they think when they make decisions for purchases.
Future Watch report and analysis of consumer trends and lifestyles in Japan was done in collaboration with Euromonitor International’s Tokyo office researchers.
A new policy on energy transition was commenced in Taiwan to phase out nuclear power and to introduce substantial power generation capacity from renewable sources by 2025. This transition of energy source and structure represents not only great challenges for Taiwan but also immense business opportunities for industrial developed countries.
A recent Future Watch study identifies and describes future consumer trends in Mainland China and Hong Kong over the next 2-10 years. These trends are likely to impact the products and services these consumers buy and the marketing they respond to. It aims to identify significant trends that are specific to China’s unique market.
Central to the forecasting is identifying 12 consumer roles that represent key China trends. Each role has an accompanying case study which explains how brands are starting /planning to tap into these nascent trends.
Both India's Space and Cyber Defence areas contain gaps to keep up with global development. India’s space defence program is guided by policies to counter the capabilities of China and Pakistan. While India has made long strides with cost effective mission to Mars and a successfully launching record number of satellites, there are several gaps in its space defence. While in the space communication arena, at present, India has extremely limited space-based COMINT (Communications Intelligence) capabilities. Cyber security of satellite communications is another arena for potential collaboration between countries. Also, to achieve complete control of satellite communications & intelligence C4ISR, India needs to have a constellation of satellites in the space with extreme communication technology at disposal. In the Space Situational Awareness area India needs radar-independent tracking methods such as lasers, coherent infrared sensors and space systems with a sole purpose of tracking the functional capabilities of suspected/rogue satellites with military connect.
In cyber-security area, according to Gartner, cyber-security in India is growing to be a $1.5 bn market by 2019 & forecasted to grow over 19% during 2018-2023. Average spend on cyber security is currently at ~3% compared to a global average of 10-15% of the IT budget. India would need a trained pool of million professionals in cyber-security by 2025.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. Technology trends discussed at Startup Village 2014, Skolkovo, Moscow:
1. Who creates the new materials and how do they do it?
2. Supercomputers for everyone
3. Connected World
4. Brain and Creativity
5. Applications for UAV: Russian and International practice
6. Digital Retail
7. High-tech Startups in Wearables & Augmented Reality
8. IT Security
9. Cell Technologies and Regenerative Medicine
10. Brain Computer Interface
11. Impact of the New Technological Developments on the Hydrocarbons Market
12. Impact of New Technological Developments on the Russian Electric Power Market
3. Who creates the new materials and how do they do it?
Drivers: In XXI century new materials result from programming desired properties, not trial-and-error search as before. “Hack” of traditional physics and chemistry, such as nanotechnology and chemistry of ultra-high pressure. Working software algorithms available for design of material properties.
Trends: Metamaterials - artificial materials engineered to have properties that are not found in nature. Previously inexistent properties: e.g. negative refraction index, negative dielectric coefficient, light compression, “invisibility”, etc.
Light-based (quantum) computers to replace Si-based computing and enhance calculation capacity up to 105 times.
Russian outlook: Russian Quantum Center. Quantum simulators for new materials (metamaterials). New algorithms allowing computer to design materials (crystal structures) with theoretically predicted properties.
4. Supercomputers for everyone Drivers: Supercomputers (SC) are internationally recognized as main instrument in winning the global market competition. Approach to innovation has changed from theory and experiments to computer models and simulation. Computing is omnipresent in every single economy sector. Pampers and Pringles designed/produced with the help of SC. Modeling, simulation, analytics, data processing – all requires expanding calculation capacities. Energy issue: annual operation expenses are comparable to the SC cost itself. Pricy: startups in SC are so far possible only in software. Trends: In 10-15 years notebooks will have the power of SC. There are 3 mln GPU cores in Top 1 supercomputer now. Cognitive computing - solution to make SCs more intuitive to use. Fourth generation approach in innovation: Theory+Experiment+Simulation+Bigdata. Private cloud computing. SC merging with cloud computing. Computers comparable with human brain capacity by 2025. Issue: information noise also grows very fast. Massive component integration into complex aggregated systems. Open standards. Quantum computing. Energy efficient (green) computing. Russian outlook: Gap between Russia and developed countries is growing now. Local supercomputers developed by: SKIF, Quant, Rosatom, RSC Group. Dozen of Russian supercomputers have made it to top 500 rating. Russia has #46 place in Green 500 energy-efficient SC.
5. Connected World (Internet of Things) Drivers: In 2008, the number of devices connected to the Internet, exceeded the number of people on Earth
•By 2020, there will be 50billion connected devices
•Beyond 2016, IoT will be of >$3tln in value creation potential Technology trends, enabling the Internet of Things:
•Sensors in everything
•Networks everywhere
•Measurment/analisys of everything
•Wearables: by 2020 40-50 bln devices, 10 wearable connected devices per each human being. First “validations” of IoT: Driverless car (e.g. Google); Fleet Management (e. g. Fleetmatic); Smart Building Energy Management Systems (e.g. Schneider); $3.2 Billion Thermostat by Nest (Apple); Wearable devices (wearables market is projected to reach $6-$12 Billion by 2018). Russian outlook: For IoT penetration of Internet is critical => in Russia broadband connection will be delivered to all localities populated by over 250 people. Where first disruptive IoT applications are possible in Russia?
•RFID-type technology for public and private transport.
•Modernization of the Russian Post – logistics optimization (joint project with Rosnano)
6. Brain and creativity
Drivers: Development of microscopy and scanning (MRI, PET, etc) techniques. Brain scans are so far expensive ($600). Promising brain function research in isolated population groups. Brain-computer interface already real, chips being implanted in brain.
Trends: Brain mapping technologies in 3D to monitor activity, function and diseases. ENIGMA – first global human brain scans database, for brain mapping, drug discovery, etc. Information offload from brain to external storage (computer, cloud), all brain memory is only 10 ccm in size. Concept of brain almost liberated from information storage function by 2045. XXI century is human-centric technology century, technologies are build for and around human beings.
Russian outlook: Microanalysis lab in Skolkovo – 3D modeling of brain tissues.
7. Drivers
•Penetration of mobile phones: 1,2 bn of devices in 2014
•Development of IoT: 40-80 bn connected objects by 2020
•Developing market of consumer robotics: 390 bn by 2017
•Crowdsourcing and low barriers to entry into the market Trends
•Applications for wearables: wearable cameras; sports & activity trackers; smart clothing & textiles; smart glasses; smart watches; entertainment & gaming
•The industry of wearable devices is still actively looking for customer appealing use-cases
•Privacy is an important issue: wearable devices produce a lot of personal data that is sensitive
•Product design and user education play important role
•Applications for AR: medicine, education, industrial – defense, architecture, manufacturing and repair; public service; transport; gaming and entertainment, travel
•Both industries are not startups any more with big players such as Intel and CISCO involved. Russian Outlook
•Use of AR in Education and social networks
•Use of AR for industrial applications
•Transition from applications and software to hardware products
•Time-saving technologies for consumers and indusry
High-tech Startups in Wearables & Augmented Reality
Wearables global market size
2014 - $5 bn
2018 forecast – $12,6 bn
AR global market size
2011 - $181 mln
2018 forecast - $5 bn
8. Applications for UAV: Russian and International practice Drivers and world market for UAV technologies:
•Military-initiated UAVs development accelerate civil applications.
•Development of artificial intelligence, navigation, flight control systems. Industry trends and Issues
•Civil market is at very early stage, currently being formed.
•Need to join the efforts of military and civil UAV developers
•Aviation robots. New applications: telecom, agriculture, logistics
•More regulation and control in the future => Needed to ensure safety in airspace
•Use of geo-information systems for analysis and interpretation of data, received from UAVs
•Monitoring important objects. Civil reconaissance, for example Arctic see ice conditions. Russia: 3% - civil use; 97% - military use (Ministry of Defense, Ministry of Emergency Situations, border control). Existing legislation is not adequate (pending amendments to the Russian Air Code). Volume of Russia’s market for UAV technologies: EUR ~300 mln, civil share is only ~ 1mln . In the last 2-3 years, Russian UAV market demonstrated annual growth of 150%. Two main directions of civil use in Russia: Monitoring of oil/gas and energy complex facilities and aerial cartography. Emergency situations (forest fires, flood, etc) monitoring is rising. Number of companies in the industry (Russia) so far 10-12.
UAV Market Breakdown:
•North America – 72%
•Russia – 7%
•Europe – 7%
•Asia – 7%
•Middle East – 5%
•Latin America – 2% 2013 - $6 bin 2020 forecast - $7.1 bln
9. Digital Retail Drivers: Sales of non-food consumer goods actively moving into online sphere. Growing role of digital marketing. Nowadays, audience leads the market. The rise of social networks marketing and reference services. Trends:
•Wider adoption of mobile payments and introduction of biometrics-based payments
•Supply chain – further optimization of logistics
•Transition to cloud technologies
•Synergies with social networks
•Use of omnichannel sales to create consistent customer experience
•Closer integration with mobile services
•Real-time and Big Data analytics (social media, customer loyalty programs, mobile operators)
•Introduction of new RFID-based types of identifiers in retail: NFC tags in product labeling and UHF tags in retail logistics Russian outlook:
•In 2014, digital retail will account for 50% of all retail sales
•Russia is 4th market in Europe in digital retail (annual turnover – 2 bn Euro)
•Every 2nd dollar earned in digital retail in Russia is earned by Yandex
•Russian online audience is 2nd in the world after Israel on time spent in soc. networks
10. IT Security Drivers: Development of Internet of Things expands security needs. Increased attack surface (exponentially growing volume of data) and threat diversity. Security in IoT is on the level of IT security was in the 90’s. Trends:
•Scalable trustworthy systems
•Enterprise-level metrics
•System evaluation lifecycle
•Combating insider threats
•Combating malware and botnets
•Global scale identity management
•Survivability of time-critical systems
•Provenance and Usability
•Privacy-aware security
•Situational understanding & Attack attribution Russian outlook: Russian Academy of Sciences developed “Cybersecurity 2030” strategy document.
11. Cell Technologies and Regenerative Medicine
Drivers: Rapidly growing bio-data banks, Google is #1 bioinformatics source. Aging population dictates for increase in productive lifespan. US national debt due to Medicare/Medicade programs independently evaluated as high as $300 tln (instead of official $17 tln) – healthcare cuts are critical. 80% of healthcare expenses currently goes to the last 2 years of patients life – bad healthcare model. Aging is not defined as a disease, hence procedures of ant-age drug development are undeveloped.
Trends: Ageless generation. Healthcare paradigm change from “last mile” treatment to prevention and lifetime extension. Spread healthcare expenses over lifetime more evenly.
Translational research. Traditional pharma reached its limits, breakthrough technologies are required. IT, merging with healthcare, will provide for longer lifetime in the next 10-15 years. It will mostly contribute in risks reduction (such as personal diagnostics).
Russian outlook: Absence of a legal regulation for cell technologies in Russia. Probably will appear by 2015. Very few labs in Russia, grey market for rich people. Have international level researchers, such as by Alex Zhavoronkov who runs Biogerontology Research Foundation, a UK-based think tank for aging research.
12. Brain computer interface
Drivers: Neuroimaging technologies for brain function and activity mapping. Development of robotics, including surgery robots and computer-guided prosthetics for disabled. US Brain initiative with first $100mln allocated for research. Optogenetics - breakthrough technology allowing control of neurons, genetically sensitised to light. Monkeys already able to manipulate robots through brain-computer-robot interface.
Trends: Humans enter virtual world, they will cease to physically directly operate objects. Direct brain-computer interfaces without intermediary action such as typing or speech. Interface that allow to operate computers just with power of mind. Next generation smart home operated by power of mind. Brain-computer-robot integration. Access to the mind of disabled persons (like Stephen Hawking). Optogenetics allows for maximum brain integration with minimal trauma.
Russian outlook: Already existing prototypes by professor Kaplan with people typing on computer only using head surface electrodes, 15 words/min at 95% accuracy. Neuro- photonics and brain laser technologies lab in Kurchatov institute, Russia.
13. Drivers
•Growing excellence of national oil & gas companies
•Growing demand and production in oil & gas
•Decreasing volumes of oil extraction, Increasing complexity of recovery
•Shift to hard-to-recover reserves and unconventional recovery (shale oil, Arctic and deep sea mining)
•Increasing expenditures on exploration with focus on new regions
•Shortage in qualified workforce Technological Trends
•Fundamental research becoming increasingly important
•Expertise in integrated technological solutions becomes as important as product expertise
•Technological innovations developed by industry-wide partnerships to address the issues of increased complexity of recovery
•MNCs approach to innovations differ drastically and evolve
•Technologies moving down the maturity curve with increased speed
•Growing role of innovations in business processes
•Proliferation of “intellectual oil filed” systems Russian Outlook and Government Priorities
•Focus on more efficient exploration, inc. exploration of Arctic offshore
•Development of deeper oil refining, esp. black products and their secondary and tertiary use
•Petrochemical sector: increase volume of primary processing and increase depth of processing
Impact of the New Technological Developments on Russian Hydrocarbons Market
14. Drivers Proliferation and further development of small distributed power production (smart grid). Generally decreasing demand for energy (due to energy efficient technologies), except for industry of electric cars. Development of energy storage technologies. Technological Trends: Russian Outlook “Energy Strategy of the Russian Federation until 2035” priority areas in the electrical power industry are: efficient and powerful gas turbines of 300-350MW; high-efficiency combined cycle power plants of 500-800MW working on natural gas; cogeneration heat sources using gas turbines of medium and low capacity; clean coal condensing units; coal gasification technology; distributed generation in the form of non-conventional power plants; use of progressive conductors made of new composite materials; high-temperature superconductor (HTS) materials and devices; inexpensive and reliable electricity storage of different types at all levels; distributed control systems; controlled electric networks on flexible AC transmission systems; technologies for repairs and modernization of power lines.
Impact of New Technological Developments on Russian Electric Power Market
Generation
•Growth in efficiency of traditional technology (up to 60%)
•Renewable energy
•New types of energy generation: fuel cells
Transmission
•Direct current
•Digital substations
•Adaptive network
Consumption
•Energy-efficient appliances and gadgets
•Intelligent energy consumption control systems
•Autonomous power supply systems
Sales
•Intellectual systems for information collection and analysis
•Advanced billing
•Online services
•New payment methods
15. Domestic competences
Market presence
Super Computers
New Materials
Brain- Computer interface
Connected World (IoT)
Digital retail
IT Security
UAV
Wearables
New Tech for Oil&Gas
Cell Tech
New Tech for Energy
16. Interested to know more?
Contact us
Future Watch Team in Helsinki
Heli Karjalainen (heli.karjalainen at tekes.fi)
Laura Nurmi (laura.nurmi at tekes.fi)
Future Watch Team in Russia
Virpi Herranen (virpi.herranen at tekes.fi)
Pavel Cheshev (pavel.cheshev at tekes.fi)
This material is prepared in cooperation with Skolkovo Foundation