Presented at the BMI Conference, October 3-5, 2018, Tivat, Montenegro. The theme for the conference was "Blockchain: the New Architecture of the World"
TagItWine pilot system implemented in the context of H2020 TagItSmart projectTomo Popovic
The document summarizes a pilot project called TagItWine that was implemented using smart tags and blockchain technology to address the problem of counterfeiting in the wine industry. The project was done in the context of the H2020 TagItSmart project and involved a partnership between the University of Donja Gorica and a wine company. The pilot used dual-state NFC tags with photochromic ink and QR codes to allow product authentication and tracking via a cloud-based system and human sensor network.
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSStylight
In this talk, I'm presenting how to create a simple prototype of supply chain management system built on the blockchain to enable quick traceability.
We'll use a NodeMCU device (ESP8266), a MFRC522 RFID reader, MQTT protocol on Azure, BigchainDB (IPDB with websockets), and VueJS (with vuex, vue-router and elementUI) for the user interface.
Partnering for Innovation, Metadata: increasing the value of digital contentalex_stanhope
This document discusses opportunities for innovation in metadata to increase the value of digital content. It notes the growth of consumer internet traffic and online ad spending as opportunities. A £5 million competition on metadata will open in September 2010 and close submissions in October, aiming to maximize the value of digital content through better identification, provenance, searchability, and machine readability of metadata. The document outlines the scope of the competition and various UK government programs and funding opportunities related to digital industries and metadata innovation.
[DSC Europe 23] Srdjan Krco - Blending IoT and AI – experiences from the “kit...DataScienceConferenc1
This document discusses DunavNET's experiences blending IoT and AI technologies to create turnkey solutions for enterprises. Some key points:
- DunavNET has been operating since 2006 and has invested over 5 million euros developing their own intellectual property in IoT and AI domains.
- They have created several IoT solutions for sectors like agriculture, logistics, and manufacturing working with companies like Microsoft, Henkel, Heineken and Carlsberg.
- One example is their poultryNET solution which monitors environmental conditions, estimates weight of chickens, counts them and detects issues using edge AI and sensors.
- They are also working on projects around supply chain transparency, irrigation optimization, rural connectivity and
The document proposes a solution called DigID that uses blockchain technology to create a digital identity for IoT devices. This would reduce costs and improve security and interconnectivity by providing a single platform to connect devices, instead of the current centralized model. Users would create a DigID profile to log into devices, and usage data and preferences would be stored and shared securely on the blockchain. The business model involves subscription fees for connecting more than 10 devices. This convergence of blockchain identity and IoT could enable applications across many industries.
Will the highly hyped technologies change telco and media industries? - Presented by Bertrand Copigneaux, IDATE at London Breakfast Club on 11 Sep 2018
*** SHARED WITH PERMISSION ***
This document discusses the DEMETER project, which aims to increase transparency in food supply chains using blockchain and knowledge graph technologies. It provides an overview of DEMETER and its goals of integrating data from multiple stakeholders in a decentralized knowledge graph to provide verifiable claims about data integrity and provenance. The document outlines challenges in the food sector around obtaining farm data to support sustainability claims and achieving radical transparency and trust. It also describes how DEMETER pilots will integrate datasets from across supply chains and support querying of both the data and integrity proofs on the knowledge graph.
TagItWine pilot system implemented in the context of H2020 TagItSmart projectTomo Popovic
The document summarizes a pilot project called TagItWine that was implemented using smart tags and blockchain technology to address the problem of counterfeiting in the wine industry. The project was done in the context of the H2020 TagItSmart project and involved a partnership between the University of Donja Gorica and a wine company. The pilot used dual-state NFC tags with photochromic ink and QR codes to allow product authentication and tracking via a cloud-based system and human sensor network.
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSStylight
In this talk, I'm presenting how to create a simple prototype of supply chain management system built on the blockchain to enable quick traceability.
We'll use a NodeMCU device (ESP8266), a MFRC522 RFID reader, MQTT protocol on Azure, BigchainDB (IPDB with websockets), and VueJS (with vuex, vue-router and elementUI) for the user interface.
Partnering for Innovation, Metadata: increasing the value of digital contentalex_stanhope
This document discusses opportunities for innovation in metadata to increase the value of digital content. It notes the growth of consumer internet traffic and online ad spending as opportunities. A £5 million competition on metadata will open in September 2010 and close submissions in October, aiming to maximize the value of digital content through better identification, provenance, searchability, and machine readability of metadata. The document outlines the scope of the competition and various UK government programs and funding opportunities related to digital industries and metadata innovation.
[DSC Europe 23] Srdjan Krco - Blending IoT and AI – experiences from the “kit...DataScienceConferenc1
This document discusses DunavNET's experiences blending IoT and AI technologies to create turnkey solutions for enterprises. Some key points:
- DunavNET has been operating since 2006 and has invested over 5 million euros developing their own intellectual property in IoT and AI domains.
- They have created several IoT solutions for sectors like agriculture, logistics, and manufacturing working with companies like Microsoft, Henkel, Heineken and Carlsberg.
- One example is their poultryNET solution which monitors environmental conditions, estimates weight of chickens, counts them and detects issues using edge AI and sensors.
- They are also working on projects around supply chain transparency, irrigation optimization, rural connectivity and
The document proposes a solution called DigID that uses blockchain technology to create a digital identity for IoT devices. This would reduce costs and improve security and interconnectivity by providing a single platform to connect devices, instead of the current centralized model. Users would create a DigID profile to log into devices, and usage data and preferences would be stored and shared securely on the blockchain. The business model involves subscription fees for connecting more than 10 devices. This convergence of blockchain identity and IoT could enable applications across many industries.
Will the highly hyped technologies change telco and media industries? - Presented by Bertrand Copigneaux, IDATE at London Breakfast Club on 11 Sep 2018
*** SHARED WITH PERMISSION ***
This document discusses the DEMETER project, which aims to increase transparency in food supply chains using blockchain and knowledge graph technologies. It provides an overview of DEMETER and its goals of integrating data from multiple stakeholders in a decentralized knowledge graph to provide verifiable claims about data integrity and provenance. The document outlines challenges in the food sector around obtaining farm data to support sustainability claims and achieving radical transparency and trust. It also describes how DEMETER pilots will integrate datasets from across supply chains and support querying of both the data and integrity proofs on the knowledge graph.
How will we prove our idnetities in the future 2050?_ContegoContego
From retina scans to voice recognition, identity verification has changed beyond recognition in recent years – so what will it look like 35 years from now? Janet Hughes of the Government Digital Service, Matt Law of Contego and Stephan Peters of private credit bureau Schufa provide the expert voices to the discussion.
Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...Katy Slemon
Checkout top 08 IoT trends in 2020 to accelerate digital transformation, unlock revenue streams, improve business efficiency and drive innovation in your business.
TagItSmart! is a Smart Tags driven service platform for enabling ecosystems of connected objects. TagItSmart sets out to redefine the way we think of everyday mass-market objects not normally considered as part of an IoT ecosystem. These new smarter objects will dynamically change their status in response to a variety of factors and be seamlessly tracked during their life cycle. This will change the way users-to-things interactions are viewed.
Combining the power of functional inks with the pervasiveness of digital (e.g. QR-codes) and electronic (e.g. NFC tags) markers, objects will embed cheap sensing capabilities thus being able to capture new contextual information. Beside this, the ubiquitous presence of smartphones with their cameras and NFC readers will create the perfect bridge between everyday users and their objects. This will create a completely new flow of crowdsourced information, which extracted from the objects and enriched with user data, can be exploited by new services.
Corda DLT implementation case study. Double spend fraud prevention in factoring/bill of exchange discounting/advance invoice payment using distributed ledger technology. Data integrity, business process improvement, universal and scalable architecture, baseline for further service deployment from participating banks. Lessons learned from the real Corda DLT implementation.
Presented on June 11, 2018 in Łódź, Poland during Blockchain Business meet up https://www.meetup.com/pl-PL/Blockchain-Business-Lodz/
The document outlines a plan for presenting on the topic of the Internet of Things (IoT). It begins with defining IoT as the network of physical objects embedded with sensors that can collect and exchange data over existing network infrastructure. It then lists the following key points that will be covered in the presentation: how IoT works by leveraging technologies like RFID, sensors, and embedded processing; the current status and future prospects of IoT; how IoT can help turn data into wisdom through knowledge management; potential applications of IoT in various industries; technological challenges facing IoT development; and criticisms around privacy, security, and control issues with a ubiquitous IoT network.
The future of digital identity 2019 future agendaFuture Agenda
How we prove that we are who or what we say we are during digital transactions and interactions is set to become one of the defining features of the next stage of the human digital transformation. Today, we are living with early attempts to solve the problem that are no longer fit for purpose. At best, the multitude of different ways we login, confirm our identities, and establish trust in claims made during digital exchanges, has become profoundly inconvenient. At worst, they have left us in a connected world which is neither safe nor secure, and in which we seem to have completely lost control of our most personal information. The next generation solutions to the digital identity challenge could change all of this.
In the short term, new solutions are likely to move us towards the promise of a single Digital ID that allows us to simply, safely and securely navigate a connected world.
Looking further forward, the changes could be even more profound. The ways that we digitally manage, share and verify our personal information could well come to completely redefine the human digital experience. Current digital business models that seem immutable could collapse. Centres of digital power might shift radically. And the current personal data ‘land grab’ could be replaced by a new digital norm in which individuals can finally make meaningful claims to data ownership and control.
However, there are a number of potentially calamitous pitfalls to navigate along the way. Some of these could lead to whole new kinds of digital dystopia.
At the end of 2018, Future Agenda undertook a major project exploring the Future of Digital Identity. With the generous support of Mastercard, the Future Agenda team ran a series of expert workshops in different locations around the world that explored the key factors that are likely to shape the future of digital identity. The programme began with an initial perspective as a provocation. Participants in the workshops then gave us new, more fully formed, insights which were in turn explored further during one-to-one interviews with major stakeholders and thinkers in the space.
As always, we consider our reports to be the start point for further conversations, and would welcome further input. If you would like to join the conversation, you can join our LinkedIn Group here. If you have any further questions or would like to have a conversation about how your organisation can best make use of our
Privacy has quickly risen to the top of the list, predominantly driven by Zoom’s rise in popularity as their user base has grown as the world entered lockdown.
Their 90 day push for increased security on their platform has highlighted how digital services can adopt blockchain technology to facilitate end-to-end encryption.
This coincides with WeChat’s (Tencent Holdings) announcement that they will be investing nearly $70 Billion in fintech development, including blockchain, to mirror Beijing’s call for new (digital) infrastructure.
Regardless of investments in digital infrastructure, in response to a rise in demand, applied blockchain continues to find its place in large consumer facing products.
The Italian government has demonstrated its faith in blockchain technology, through a $16.2 million investment to combat counterfeit “Made in Italy” products. This project outlines the value blockchain can deliver to provide a secure ledger of intellectual property rights and the authentication of goods and raw materials through the supply chain.
Whilst this project deals in more tangible products, it demonstrates blockchain’s ability to protect the intellectual property of a brand.
And lastly, the World Economic Forum have produced a timely toolkit designed to help enterprise plan and deploy a blockchain solution. The toolkit has been created from lessons learned from over +40 global supply chain use cases –Giving readers an idea of how many use cases are already in play.
The document discusses using blockchain identity and self-sovereign identity protocols to securely verify credentials in real-world scenarios. It proposes demonstrating this on a Raspberry Pi by creating a single sign-on application that can validate a user's credentials through the Pi and trigger real-world actions. A potential demo case is described for carsharing, accessing locations, or using age-restricted vending machines through verified digital identity.
A real use case of Provenance tracking using BlockchainFabio Gatti
Here is the slides presented during IOT Intel Dev Fest III about the project aiming to track the Provenance of a good of marble or stone manifactured in the north Tuscany, Carrara area. The video is available at the following link:
https://youtu.be/sP2ex1WrmEg
App developers & eCommerce | Sales and Syntax: How app developers will reshap...★ MIKE SHUR
When you pair trends in consumer behavior with the emerging sophistication and elegance of AIDC systems, it’s easy to envision a future where ‘discovery’ with a mobile device is second nature, as simple as looking and listening. When technology is both innately easy to use and reliably accurate, the possibilities for engagement, interaction and monetization are big and bold. However, success will hardly fall into the laps of brands and developers. Rather, the movement beckons true innovators to shed the technologies of yesteryear and produce easy, intuitive mobile experiences that subtly augment our
natural connection with the physical world, while profoundly impacting our relationship to it.
IoT Trends to Drive Innovation for Business 2019-2020Takayuki Yamazaki
This document outlines 9 major Internet of Things trends for 2019-2020. It discusses how IoT will be empowered by artificial intelligence, the continued rise of industrial IoT and digital twin technology, and how complex IoT solutions will involve other innovations like blockchain and WebRTC. It also notes that social, legal, and ethical issues around data privacy and security will grow in importance as IoT devices collect more personal data.
How Smart Products Transform Brand Relationships, Business Operations and Ser...MarTech Conference
From the MarTech Conference in London, UK, October 20-21, 2015. SESSION: The Third Age of Marketing Technology – How IoT Gives Products A Voice. PRESENTATION: How Smart Products Transform Brand Relationships, Business Operations and Service Experiences - Given by Andy Hobsbawm - @AndyHobs - Founder & CMO - EVRYTHING. #MarTech DAY1
FinTech is more important than ever when it comes to keeping up in the rapidly changing financial industry. Technologies such as cloud computing, data analytics, Artificial Intelligence (AI) and the Internet of Things (IoT) have the potential to cut costs, retain customers and protect against cyberthreats, as long as organizations are willing to invest in them.
See more: http://ms.spr.ly/6005pvK4x
FinTech and InsuranceTech case studies digitally transforming Europe's future with BigData and AI
The new data-driven industrial revolution highlights the need for big data technologies to unlock the potential in various application domains. The insurance and finance services industry is rapidly transformed by data-intensive operations and applications. FinTech and InsuranceTech combine very large datasets from legacy banking systems with other data sources such as financial markets data, regulatory datasets, real-time retail transactions, and more, improving financial services and activities for customers.
A session by Interim Area Chair, Strategy & Statistics Area William J. Loschert Endowed Chair in Entrepreneurship, Fordham University on the topic of 'Blockchain, Smart Contracts & IoT' at InterCon USA 2019, held at Caesars Palace, Las Vegas on 18-20 June, 2019.
Transcending the Hype: A Transformative IoT EmergesCognizant
The document discusses several examples of companies implementing Internet of Things (IoT) technologies in pilots and early projects. It describes pilots by a food and beverage company to remotely monitor and manage beverage vending machines, an oilfield services company connecting submersible pumps to remotely update software, and a fast food chain retrofitting fryers with sensors to monitor cooking processes. It also mentions a healthcare provider creating a remote patient monitoring system and an insurance company prototyping a wearable device system for claims adjusters. The document advocates starting with small, targeted IoT projects to explore opportunities before attempting to think too broadly about implementation.
Electronic ID for Education Internet Society Eduard Tric.Vfinaletric
Edu.ID: Providing Global ID for Education World
Eduard Tric, President, Internet Society Romania
- Diploma mills: The fraud rate in the education world is big, it’s a global issue
- Eduid, Electronic diplomas and verifications address this need
- Deployment with Agence Universitaire de la Francophonie (800 universities in 88 countries)
- Ethical charter of utilisation
The document discusses the growth of the Internet of Things (IoT) market and Alleantia's solution for connecting heterogeneous IoT devices. By 2020, the global IoT impact is projected to be $4.5 trillion and between $2.5-6 trillion by 2025. Alleantia has developed a platform called X-PANGO that can "virtualize" and map IoT devices to enable them to connect and interact with each other and cloud applications out of the box. Alleantia currently has over 150 deployed systems with 2,500 connected devices across two product lines in Italy.
Legal Risks and Preventive Measures in ChatGPT Applicationsijtsrd
In November 2020, OpenAI officially launched their new generation of generative artificial intelligence, ChatGPT, based on large language models. ChatGPT garnered the attention and usage of over a billion people in less than two months, making it the fastest consumer level application to reach this milestone. As a generative AI, ChatGPT not only achieved remarkable success in the market but also contributed to the advancements in the field of generative AI, with its representation of 2022s top ten scientific breakthroughs in the international reputable journal, Science. Generative artificial intelligence is having a profound impact on our lives and work, with one of the most critical aspects being its algorithms. These algorithms directly influence the learning performance of the entire intelligent system and the quality of recommendations. However, with the widespread application of algorithms and the continuous evolution of artificial intelligence, a series of regulatory and management issues have arisen. Many countries worldwide are continually strengthening algorithm oversight to ensure transparency, fairness, and security. This project, part of a university student innovation training program, will primarily focus on researching personal information security risks among the potential risks associated with generative artificial intelligence. The following will provide an introduction to what generative artificial intelligence is, the personal information security risks and preventive measures involved in generative artificial intelligence. Chen Jiaqi | Zhen Yunuo | Guo Simeng "Legal Risks and Preventive Measures in ChatGPT Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-6 , December 2023, URL: https://www.ijtsrd.com/papers/ijtsrd60109.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/60109/legal-risks-and-preventive-measures-in-chatgpt-applications/chen-jiaqi
Towards an IoT solution for anti-counterfeiting protection in wine industryTomo Popovic
The document proposes an IoT solution using TagItSmart technologies to create an anti-counterfeiting system for the wine industry. A team from the University of Donja Gorica and wine company Plantaže aims to address the problems of counterfeiting, which affects winemakers' reputation and economies. Their focus is on brand protection using photo-chromatic ink and a mobile app to authenticate products. The proposed system would help stakeholders like winemakers, distributors, retailers and consumers combat the estimated 4-5% counterfeit wine market.
Living sensors in precision mariculture and ecological monitoringTomo Popovic
This document describes a research project using living sensors (mussels) to monitor water quality and detect environmental stressors in real-time. The project is a collaboration between researchers in Montenegro and Russia, coordinated through the University of Montenegro's new Centre of Excellence. Sensors will monitor mussel heart rate and valve movement over one year to identify physiological and behavioral responses to changes in factors like salinity, light, and water quality. The aim is to develop biosensors for applications like ecological monitoring, aquaculture management, and industrial control using a non-invasive Internet of Living Things approach.
More Related Content
Similar to TagItWine system based on H2020 TagItSmart technology: A blockchain enabled solution for counterfeit prevention in wine industry
How will we prove our idnetities in the future 2050?_ContegoContego
From retina scans to voice recognition, identity verification has changed beyond recognition in recent years – so what will it look like 35 years from now? Janet Hughes of the Government Digital Service, Matt Law of Contego and Stephan Peters of private credit bureau Schufa provide the expert voices to the discussion.
Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...Katy Slemon
Checkout top 08 IoT trends in 2020 to accelerate digital transformation, unlock revenue streams, improve business efficiency and drive innovation in your business.
TagItSmart! is a Smart Tags driven service platform for enabling ecosystems of connected objects. TagItSmart sets out to redefine the way we think of everyday mass-market objects not normally considered as part of an IoT ecosystem. These new smarter objects will dynamically change their status in response to a variety of factors and be seamlessly tracked during their life cycle. This will change the way users-to-things interactions are viewed.
Combining the power of functional inks with the pervasiveness of digital (e.g. QR-codes) and electronic (e.g. NFC tags) markers, objects will embed cheap sensing capabilities thus being able to capture new contextual information. Beside this, the ubiquitous presence of smartphones with their cameras and NFC readers will create the perfect bridge between everyday users and their objects. This will create a completely new flow of crowdsourced information, which extracted from the objects and enriched with user data, can be exploited by new services.
Corda DLT implementation case study. Double spend fraud prevention in factoring/bill of exchange discounting/advance invoice payment using distributed ledger technology. Data integrity, business process improvement, universal and scalable architecture, baseline for further service deployment from participating banks. Lessons learned from the real Corda DLT implementation.
Presented on June 11, 2018 in Łódź, Poland during Blockchain Business meet up https://www.meetup.com/pl-PL/Blockchain-Business-Lodz/
The document outlines a plan for presenting on the topic of the Internet of Things (IoT). It begins with defining IoT as the network of physical objects embedded with sensors that can collect and exchange data over existing network infrastructure. It then lists the following key points that will be covered in the presentation: how IoT works by leveraging technologies like RFID, sensors, and embedded processing; the current status and future prospects of IoT; how IoT can help turn data into wisdom through knowledge management; potential applications of IoT in various industries; technological challenges facing IoT development; and criticisms around privacy, security, and control issues with a ubiquitous IoT network.
The future of digital identity 2019 future agendaFuture Agenda
How we prove that we are who or what we say we are during digital transactions and interactions is set to become one of the defining features of the next stage of the human digital transformation. Today, we are living with early attempts to solve the problem that are no longer fit for purpose. At best, the multitude of different ways we login, confirm our identities, and establish trust in claims made during digital exchanges, has become profoundly inconvenient. At worst, they have left us in a connected world which is neither safe nor secure, and in which we seem to have completely lost control of our most personal information. The next generation solutions to the digital identity challenge could change all of this.
In the short term, new solutions are likely to move us towards the promise of a single Digital ID that allows us to simply, safely and securely navigate a connected world.
Looking further forward, the changes could be even more profound. The ways that we digitally manage, share and verify our personal information could well come to completely redefine the human digital experience. Current digital business models that seem immutable could collapse. Centres of digital power might shift radically. And the current personal data ‘land grab’ could be replaced by a new digital norm in which individuals can finally make meaningful claims to data ownership and control.
However, there are a number of potentially calamitous pitfalls to navigate along the way. Some of these could lead to whole new kinds of digital dystopia.
At the end of 2018, Future Agenda undertook a major project exploring the Future of Digital Identity. With the generous support of Mastercard, the Future Agenda team ran a series of expert workshops in different locations around the world that explored the key factors that are likely to shape the future of digital identity. The programme began with an initial perspective as a provocation. Participants in the workshops then gave us new, more fully formed, insights which were in turn explored further during one-to-one interviews with major stakeholders and thinkers in the space.
As always, we consider our reports to be the start point for further conversations, and would welcome further input. If you would like to join the conversation, you can join our LinkedIn Group here. If you have any further questions or would like to have a conversation about how your organisation can best make use of our
Privacy has quickly risen to the top of the list, predominantly driven by Zoom’s rise in popularity as their user base has grown as the world entered lockdown.
Their 90 day push for increased security on their platform has highlighted how digital services can adopt blockchain technology to facilitate end-to-end encryption.
This coincides with WeChat’s (Tencent Holdings) announcement that they will be investing nearly $70 Billion in fintech development, including blockchain, to mirror Beijing’s call for new (digital) infrastructure.
Regardless of investments in digital infrastructure, in response to a rise in demand, applied blockchain continues to find its place in large consumer facing products.
The Italian government has demonstrated its faith in blockchain technology, through a $16.2 million investment to combat counterfeit “Made in Italy” products. This project outlines the value blockchain can deliver to provide a secure ledger of intellectual property rights and the authentication of goods and raw materials through the supply chain.
Whilst this project deals in more tangible products, it demonstrates blockchain’s ability to protect the intellectual property of a brand.
And lastly, the World Economic Forum have produced a timely toolkit designed to help enterprise plan and deploy a blockchain solution. The toolkit has been created from lessons learned from over +40 global supply chain use cases –Giving readers an idea of how many use cases are already in play.
The document discusses using blockchain identity and self-sovereign identity protocols to securely verify credentials in real-world scenarios. It proposes demonstrating this on a Raspberry Pi by creating a single sign-on application that can validate a user's credentials through the Pi and trigger real-world actions. A potential demo case is described for carsharing, accessing locations, or using age-restricted vending machines through verified digital identity.
A real use case of Provenance tracking using BlockchainFabio Gatti
Here is the slides presented during IOT Intel Dev Fest III about the project aiming to track the Provenance of a good of marble or stone manifactured in the north Tuscany, Carrara area. The video is available at the following link:
https://youtu.be/sP2ex1WrmEg
App developers & eCommerce | Sales and Syntax: How app developers will reshap...★ MIKE SHUR
When you pair trends in consumer behavior with the emerging sophistication and elegance of AIDC systems, it’s easy to envision a future where ‘discovery’ with a mobile device is second nature, as simple as looking and listening. When technology is both innately easy to use and reliably accurate, the possibilities for engagement, interaction and monetization are big and bold. However, success will hardly fall into the laps of brands and developers. Rather, the movement beckons true innovators to shed the technologies of yesteryear and produce easy, intuitive mobile experiences that subtly augment our
natural connection with the physical world, while profoundly impacting our relationship to it.
IoT Trends to Drive Innovation for Business 2019-2020Takayuki Yamazaki
This document outlines 9 major Internet of Things trends for 2019-2020. It discusses how IoT will be empowered by artificial intelligence, the continued rise of industrial IoT and digital twin technology, and how complex IoT solutions will involve other innovations like blockchain and WebRTC. It also notes that social, legal, and ethical issues around data privacy and security will grow in importance as IoT devices collect more personal data.
How Smart Products Transform Brand Relationships, Business Operations and Ser...MarTech Conference
From the MarTech Conference in London, UK, October 20-21, 2015. SESSION: The Third Age of Marketing Technology – How IoT Gives Products A Voice. PRESENTATION: How Smart Products Transform Brand Relationships, Business Operations and Service Experiences - Given by Andy Hobsbawm - @AndyHobs - Founder & CMO - EVRYTHING. #MarTech DAY1
FinTech is more important than ever when it comes to keeping up in the rapidly changing financial industry. Technologies such as cloud computing, data analytics, Artificial Intelligence (AI) and the Internet of Things (IoT) have the potential to cut costs, retain customers and protect against cyberthreats, as long as organizations are willing to invest in them.
See more: http://ms.spr.ly/6005pvK4x
FinTech and InsuranceTech case studies digitally transforming Europe's future with BigData and AI
The new data-driven industrial revolution highlights the need for big data technologies to unlock the potential in various application domains. The insurance and finance services industry is rapidly transformed by data-intensive operations and applications. FinTech and InsuranceTech combine very large datasets from legacy banking systems with other data sources such as financial markets data, regulatory datasets, real-time retail transactions, and more, improving financial services and activities for customers.
A session by Interim Area Chair, Strategy & Statistics Area William J. Loschert Endowed Chair in Entrepreneurship, Fordham University on the topic of 'Blockchain, Smart Contracts & IoT' at InterCon USA 2019, held at Caesars Palace, Las Vegas on 18-20 June, 2019.
Transcending the Hype: A Transformative IoT EmergesCognizant
The document discusses several examples of companies implementing Internet of Things (IoT) technologies in pilots and early projects. It describes pilots by a food and beverage company to remotely monitor and manage beverage vending machines, an oilfield services company connecting submersible pumps to remotely update software, and a fast food chain retrofitting fryers with sensors to monitor cooking processes. It also mentions a healthcare provider creating a remote patient monitoring system and an insurance company prototyping a wearable device system for claims adjusters. The document advocates starting with small, targeted IoT projects to explore opportunities before attempting to think too broadly about implementation.
Electronic ID for Education Internet Society Eduard Tric.Vfinaletric
Edu.ID: Providing Global ID for Education World
Eduard Tric, President, Internet Society Romania
- Diploma mills: The fraud rate in the education world is big, it’s a global issue
- Eduid, Electronic diplomas and verifications address this need
- Deployment with Agence Universitaire de la Francophonie (800 universities in 88 countries)
- Ethical charter of utilisation
The document discusses the growth of the Internet of Things (IoT) market and Alleantia's solution for connecting heterogeneous IoT devices. By 2020, the global IoT impact is projected to be $4.5 trillion and between $2.5-6 trillion by 2025. Alleantia has developed a platform called X-PANGO that can "virtualize" and map IoT devices to enable them to connect and interact with each other and cloud applications out of the box. Alleantia currently has over 150 deployed systems with 2,500 connected devices across two product lines in Italy.
Legal Risks and Preventive Measures in ChatGPT Applicationsijtsrd
In November 2020, OpenAI officially launched their new generation of generative artificial intelligence, ChatGPT, based on large language models. ChatGPT garnered the attention and usage of over a billion people in less than two months, making it the fastest consumer level application to reach this milestone. As a generative AI, ChatGPT not only achieved remarkable success in the market but also contributed to the advancements in the field of generative AI, with its representation of 2022s top ten scientific breakthroughs in the international reputable journal, Science. Generative artificial intelligence is having a profound impact on our lives and work, with one of the most critical aspects being its algorithms. These algorithms directly influence the learning performance of the entire intelligent system and the quality of recommendations. However, with the widespread application of algorithms and the continuous evolution of artificial intelligence, a series of regulatory and management issues have arisen. Many countries worldwide are continually strengthening algorithm oversight to ensure transparency, fairness, and security. This project, part of a university student innovation training program, will primarily focus on researching personal information security risks among the potential risks associated with generative artificial intelligence. The following will provide an introduction to what generative artificial intelligence is, the personal information security risks and preventive measures involved in generative artificial intelligence. Chen Jiaqi | Zhen Yunuo | Guo Simeng "Legal Risks and Preventive Measures in ChatGPT Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-6 , December 2023, URL: https://www.ijtsrd.com/papers/ijtsrd60109.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/60109/legal-risks-and-preventive-measures-in-chatgpt-applications/chen-jiaqi
Similar to TagItWine system based on H2020 TagItSmart technology: A blockchain enabled solution for counterfeit prevention in wine industry (20)
Towards an IoT solution for anti-counterfeiting protection in wine industryTomo Popovic
The document proposes an IoT solution using TagItSmart technologies to create an anti-counterfeiting system for the wine industry. A team from the University of Donja Gorica and wine company Plantaže aims to address the problems of counterfeiting, which affects winemakers' reputation and economies. Their focus is on brand protection using photo-chromatic ink and a mobile app to authenticate products. The proposed system would help stakeholders like winemakers, distributors, retailers and consumers combat the estimated 4-5% counterfeit wine market.
Living sensors in precision mariculture and ecological monitoringTomo Popovic
This document describes a research project using living sensors (mussels) to monitor water quality and detect environmental stressors in real-time. The project is a collaboration between researchers in Montenegro and Russia, coordinated through the University of Montenegro's new Centre of Excellence. Sensors will monitor mussel heart rate and valve movement over one year to identify physiological and behavioral responses to changes in factors like salinity, light, and water quality. The aim is to develop biosensors for applications like ecological monitoring, aquaculture management, and industrial control using a non-invasive Internet of Living Things approach.
Open source u Crnoj Gori - izazovi i mogućnosti (Infofest 2016, Budva, Monten...Tomo Popovic
ABSTRACT - Porast u korišćenju Open Source softvera širom svijeta je primjetan u gotovo svim oblastima: internet, operativni sistemi, baze podataka, aplikacije, itd. Podrška razvoju i implementaciji Open Source softvera je višedimenzionalna. Razvojem ovih rješenja, sa jedne strane, umanjuje se zavisnost institucija i društva od komercijalnih platformi, tj. vlasničkih softverskih rješenja, a sa druge strane omogućava se širokoj zajednici ICT stručnjaka da se uključe i daju doprinos kvalitetu razvoja softverskih rješenja.
Razvijene zemlje svijeta su odavno prepoznale prednosti Open Source rješenja kroz implementaciju u najvažnijim bezbjednosnim sistemima kao i migracijom korisničkih računara u državnim i lokalnim institucijama na operativne sisteme zasnovane na open source tehnologijama.
Crna Gora je, prateći savremene trendove u razvoju ICT rješenja, još 2011. godine usvojila "Strategiju korišćenja Open Source tehnologija u Crnoj Gori". U cilju popularizacije i unapređenja korišćenja ovih tehnologija, u junu ove godine, usvojen je akcioni plan koji uključuje aktivnosti u oblasti obrazovanja, promocije i primjene open source rješenja u društvu.
U okviru prezentacije biće predstavljeni izazovi sa kojima se državni organi suočavaju u odabiru i implementaciji Open Source rješenja kao i mogućnosti koje treba prepoznati i valorizovati. Biće riječi i o mogućnostima koje su prepoznate u cilju podizanja nivoa opšteg znanja i stepena korišćenja open source softvera u obrazovnom sistemu koji predstavlja polaznu osnovu za razvoj budućih ICT stručnjaka iz ove oblasti.
Sa druge strane, prezentacija će ukazati na trenutno stanje u svijetu i Crnoj Gori i predstaviti aktivnosti koje sprovodi lokalna Open Source zajednica u cilju jačanja open source inicijative u Crnoj Gori. U okviru prezentacije ukazaće se na važna pitanja: ko su sve korisnici Open Source softvera i na koji način se ostvaruju benefiti iz korišćenja Open Source-a. Biće riječi i o legalnim aspektima i licenciranju, procjeni zrelosti softvera kao i ključnim rizicima i izazovima.
Presentation was given at the Montenegrin Academy of Science and Arts in Podgorica, as well as at the Information Technology conference IT2016 in Žabljak, Montenegro.
Cloud Services for the BIO-ICT ProjectTomo Popovic
The document discusses using cloud services for the BIO-ICT project, including setting up an IoT cloud platform to support sea water monitoring and quality assessment use cases. It describes analyzing data in a private cloud and providing supporting services virtually in the cloud. The cloud infrastructure would allow upgrading systems and accessing resources important for a data-literate world.
Introduction to Open Source Software and its use for Scientific Computing followed by demonstrations of Python/IPython, Octave, SciLab, and Freemat. The presentation took place at the 20th Information Technology Conference (IT'15) in Zabljak, Montenegro.
ABSTRACT: In recent years, Python had become an extremely popular programming language. Python is becoming more and more present in education as its syntax gets out of the way and makes it easy to learn and use to introduce computer science concepts. This paper explores the inner workings of Python decorators, which is considered an advanced topic even for experienced programmers. The paper provides an insight into decorators mechanism, as well as their implementation using classes and functions. Implementation options are discussed using examples
and visualization.
[Presented at IT'15 Conference in Zabljak, Montenegro]
An Introduction to Scrum: presented at PyTexas 2012Tomo Popovic
This document provides an introduction to Scrum, an agile framework for project management. It defines key Scrum roles like the Product Owner and Scrum Master. Scrum uses short iterations called sprints to incrementally develop working software. Teams self-organize during daily stand-up meetings and track progress using artifacts like the product backlog and sprint backlog. Scrum aims to deliver business value continuously through inspection and adaptation at the end of each sprint.
Software Architecture for Automated Fault Analysis: Scalable Deployment and U...Tomo Popovic
This paper discusses architecture-significant requirements for an automated fault analysis system. The analysis utilizes substation data collected from event-triggered intelligent electronic devices (IEDs). The proposed architecture assumes generic, transparent, and robust computations that can be applied to variety of IED types and models. When defining a universal solution, the use of standards is critical to facilitating the transparency, scalability, and interoperability. The solution is typically configured to fit the end user needs, which requires configuration traceability, acceptance testing, and change management after the deployment. Another aspect of the transparency and scalability of the proposed solution is the use of open source software (OSS), both for the development and deployment of the system. The discussion includes the deployment tools selection and setup. Particularly, the experiences and benefits of using OSS when deploying a system for automated fault analysis are shared.
20 Years and Counting: Deploying a System for Automated Analysis of Transmis...Tomo Popovic
ABSTRACT: This paper describes the evolution of a system for automated analysis of transmission line faults. The analysis is based on the substation data primarily collected from digital fault recorders. The paper provides a historical overview of the implementation steps and illustrates requirements changes throughout the process. In addition, the paper shares some interesting experiences related to the usage of the system that illustrate the value and benefits of having the automated fault analysis solution in place. The encounters include events developed during hurricanes Rita and Ike, as well as events during dry weather in 2011. The solution for automated fault analysis played important role in diagnostics and system restoration process. (PRESENTED AT 2014 FDA CONFERENCE AT GEORGIA TECH)
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
TagItWine system based on H2020 TagItSmart technology: A blockchain enabled solution for counterfeit prevention in wine industry
1. TagItWine system based on H2020 TagItSmart technology
A blockchain enabled solution for counterfeit prevention in wine industry
Tomo Popović
University of Donja Gorica
Porto Montenegro, October 5, 2018
4. 4
Project Highlights
Realized by University of Donja Gorica
Done in context of TagItSmart technology (H2020
project)
Partnership with company “13. jul Plantaže”
Collaboration with with DunavNET, Durst, VTT
Smart Tags
Internet of Things, Cloud,
Mobile apps, Blockchain
5. 5
Problem
Brand protection and counterfeit prevention
Real problem, big challenges
Examples of fake wine labels
(Source: “13. jul Plantaže”)
8. 8
The Use of Smart Tags
QR code + a letter print in photochromic ink
Each product has a “digital twin” in virtual world
Tag information combined with user input
Intelligent heuristics on the Cloud
Inactive
State
Active
State
11. 11
Cloud
Smart Tag validation
Pattern recognition support (letters)
Match verification QR code vs. functional ink print
Seamless product status/state tracking
Authentification using advanced heuristics
The use of Blockchain distributed database
Additional functions (data collection, e-card)
15. 15
Approach Considerations
Use Case approach:
– Benefits to the purpose
– Clear value addition
– Starting with proof
of concept
System integration:
– Simple API
– Encapsulation model
– Tools/Infrastructure
selection
Source: Googrich et al. (2013) Data Structures and Algorithms