Conferencia Blockchain/ Madrid 2017. Una jornada para descubrir más sobre la tecnología blockchain en españa, los casos de uso y startups que están trabajando en el ecosistema español. Autor: Manuel Machado, Responsable Global de soluciones blockchain, WorldLine.
Major applications of blockchains, their different functional characteristics and some example use cases, security and trust mechanisms on which blockchains, containing regulated data, depend.
Author : David Watrin, Head of Security and Intelligence, Swisscom
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
What do you get if you combine two over-hyped subjects, blockchain and IOT? At the Trusted IOT Alliance founders meeting, the answer was a surprisingly level headed conversation, and demonstrations of how IOT projects are currently being secured by blockchain.
Presentation outline:
- What is blockchain & distributed ledger technology? Why is it useful? (no hype overview)
- The work of the Trusted IOT Alliance (www.trusted-iot.org)?
- Stories about how blockchain is being used
The relation of the two concepts of ‘blockchain’ and ‘security’ - whether blockchain is redefining cybersecurity, what new challenges are, how we build a virtuous circle between blockchain and security
Author : Dr Mark Moir, Oracle Labs
Blockchain applications demand standard testing such as functional performance, integration, and security testing. In addition, testing teams must have these specialized testing capabilities including Smart Contracts testing and Node Testing. know how differently each industry is influencing Blockchain Testing capabilities.
Major applications of blockchains, their different functional characteristics and some example use cases, security and trust mechanisms on which blockchains, containing regulated data, depend.
Author : David Watrin, Head of Security and Intelligence, Swisscom
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
What do you get if you combine two over-hyped subjects, blockchain and IOT? At the Trusted IOT Alliance founders meeting, the answer was a surprisingly level headed conversation, and demonstrations of how IOT projects are currently being secured by blockchain.
Presentation outline:
- What is blockchain & distributed ledger technology? Why is it useful? (no hype overview)
- The work of the Trusted IOT Alliance (www.trusted-iot.org)?
- Stories about how blockchain is being used
The relation of the two concepts of ‘blockchain’ and ‘security’ - whether blockchain is redefining cybersecurity, what new challenges are, how we build a virtuous circle between blockchain and security
Author : Dr Mark Moir, Oracle Labs
Blockchain applications demand standard testing such as functional performance, integration, and security testing. In addition, testing teams must have these specialized testing capabilities including Smart Contracts testing and Node Testing. know how differently each industry is influencing Blockchain Testing capabilities.
We build on past work proposing the use of Linked Pedigrees in a semantic technology framework to propose the use of blockchain technology to solve part of the trust issues in the agri-food supply chain.
Industry leaders believed that blockchain is the remedy for making the IoT industry and network more robust. So, sure, the presence of blockchain can overcome many of the issues and risks faced by the IoT industry. visit>>>https://www.bitdeal.net/blockchain-in-iot
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
In this keynote, delivered at the Blockchain Forum of BPM 2019, I summarized and reflected on research on BPM and blockchain over the last four years, including model-driven engineering, process execution, and analysis and process mining. I also covered selected use cases and applications, as well as recent insights on adoption. The keynote closed with a discussion of open research questions.
Overview Of Blockchain Technology And Architecture Powerpoint Presentation Sl...SlideTeam
Enhance your audiences knowledge with this well researched complete deck. Showcase all the important features of the deck with perfect visuals. This deck comprises of total of thirty two slides with each slide explained in detail. Each template comprises of professional diagrams and layouts. Our professional PowerPoint experts have also included icons, graphs and charts for your convenience. All you have to do is DOWNLOAD the deck. Make changes as per the requirement. Yes, these PPT slides are completely customizable. Edit the colour, text and font size. Add or delete the content from the slide. And leave your audience awestruck with the professionally designed Overview Of Blockchain Technology And Architecture Powerpoint Presentation Slides complete deck. https://bit.ly/3cJ7GmX
Blockchain, Predictive Analytics and HealthcareRuchi Dass
Episode-of-care payment and comprehensive care payment systems can help providers prevent health problems; prevent the occurrence of acute episodes among individuals who have health conditions; prevent poor outcomes during major acute episodes, such as infections, complications, and hospital readmissions; and reduce the costs of successful treatment.
Using cryptography to keep exchanges secure, blockchain provides a decentralized database, or “digital ledger”, of transactions that everyone on the network can see. This network is essentially a chain of computers that must all approve an exchange before it can be verified and recorded.
Learn more about Blockchain in healthcare here.
How to Apply Blockchain to Supply-Chain ManagementFluence.sh
Today, supply chains are inherently complex. They sometimes face difficulties in terms of cost, speed, or quality. Still, the benefits of the supply-chain system are obvious, and there are certain ways to improve its efficiency with the blockchain technologies.
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Ingo Weber
Software Architecture and Business Process Management research by the AAP team, Data61, CSIRO (Sydney Australia):
1. Architectural concerns of developing applications around Blockchain
2. Model-driven development for blockchain smart contracts
3. Business process execution on blockchain (details on one case of 2.)
Potential of blockchain into industry 4.0 TechXpla
MGM’s College of Engineering and Technology (MGMCET) at Kamothe, Navi Mumbai has organized a National Conference on theme of “Industry 4.0”.
Dept. of Electronics & Tele communication Engineering, Mechanical Engineering and Computer Engineering jointly organised this.
This is presentation of Blockchain into Industry 4.0
Application of blockchain in manufacturing industryCeline George
The adoption of blockchain technology in Manufacturing is revolutionizing the way the industry is performing. From operational excellence to product authenticity, consumer experience to quality of care.
Blockchain can be used across the whole manufacturing industry to address all different types of projects and stakeholders. Its value to the manufacturing vertical is promising as Industry 4.0 continues to grow.
Meeting of the Blockchain Community and discussion about the cryptocurrency b...recheck
How many people actually know a thing or two about the blockchain? Won't you agree that cryptocurrencies are the future and we have to discuss the possibility of a collapse or burst? Whatever you need to know about the blockchain technology and cryptocurrencies are in the presentation.
Blockchain: the solution for transparency in product supply chainsJamie Sandhu
We live in the world we buy into. How brand and supply chain transparency will enable conscious consumerism ethical business practices to thrive and how blockchain technology can make it happen. A summary of the whitepaper by Provenance.org.
When consumer products get switched on, brands will be able to deploy new IoT-based applications and services throughout the full product lifecycle. But what role will blockchains play in this, and is the hype about its potential justified?
This white paper will show you which use cases are best suited to blockchains and how to assess whether a blockchain-based solution is really needed.
We build on past work proposing the use of Linked Pedigrees in a semantic technology framework to propose the use of blockchain technology to solve part of the trust issues in the agri-food supply chain.
Industry leaders believed that blockchain is the remedy for making the IoT industry and network more robust. So, sure, the presence of blockchain can overcome many of the issues and risks faced by the IoT industry. visit>>>https://www.bitdeal.net/blockchain-in-iot
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
In this keynote, delivered at the Blockchain Forum of BPM 2019, I summarized and reflected on research on BPM and blockchain over the last four years, including model-driven engineering, process execution, and analysis and process mining. I also covered selected use cases and applications, as well as recent insights on adoption. The keynote closed with a discussion of open research questions.
Overview Of Blockchain Technology And Architecture Powerpoint Presentation Sl...SlideTeam
Enhance your audiences knowledge with this well researched complete deck. Showcase all the important features of the deck with perfect visuals. This deck comprises of total of thirty two slides with each slide explained in detail. Each template comprises of professional diagrams and layouts. Our professional PowerPoint experts have also included icons, graphs and charts for your convenience. All you have to do is DOWNLOAD the deck. Make changes as per the requirement. Yes, these PPT slides are completely customizable. Edit the colour, text and font size. Add or delete the content from the slide. And leave your audience awestruck with the professionally designed Overview Of Blockchain Technology And Architecture Powerpoint Presentation Slides complete deck. https://bit.ly/3cJ7GmX
Blockchain, Predictive Analytics and HealthcareRuchi Dass
Episode-of-care payment and comprehensive care payment systems can help providers prevent health problems; prevent the occurrence of acute episodes among individuals who have health conditions; prevent poor outcomes during major acute episodes, such as infections, complications, and hospital readmissions; and reduce the costs of successful treatment.
Using cryptography to keep exchanges secure, blockchain provides a decentralized database, or “digital ledger”, of transactions that everyone on the network can see. This network is essentially a chain of computers that must all approve an exchange before it can be verified and recorded.
Learn more about Blockchain in healthcare here.
How to Apply Blockchain to Supply-Chain ManagementFluence.sh
Today, supply chains are inherently complex. They sometimes face difficulties in terms of cost, speed, or quality. Still, the benefits of the supply-chain system are obvious, and there are certain ways to improve its efficiency with the blockchain technologies.
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Ingo Weber
Software Architecture and Business Process Management research by the AAP team, Data61, CSIRO (Sydney Australia):
1. Architectural concerns of developing applications around Blockchain
2. Model-driven development for blockchain smart contracts
3. Business process execution on blockchain (details on one case of 2.)
Potential of blockchain into industry 4.0 TechXpla
MGM’s College of Engineering and Technology (MGMCET) at Kamothe, Navi Mumbai has organized a National Conference on theme of “Industry 4.0”.
Dept. of Electronics & Tele communication Engineering, Mechanical Engineering and Computer Engineering jointly organised this.
This is presentation of Blockchain into Industry 4.0
Application of blockchain in manufacturing industryCeline George
The adoption of blockchain technology in Manufacturing is revolutionizing the way the industry is performing. From operational excellence to product authenticity, consumer experience to quality of care.
Blockchain can be used across the whole manufacturing industry to address all different types of projects and stakeholders. Its value to the manufacturing vertical is promising as Industry 4.0 continues to grow.
Meeting of the Blockchain Community and discussion about the cryptocurrency b...recheck
How many people actually know a thing or two about the blockchain? Won't you agree that cryptocurrencies are the future and we have to discuss the possibility of a collapse or burst? Whatever you need to know about the blockchain technology and cryptocurrencies are in the presentation.
Blockchain: the solution for transparency in product supply chainsJamie Sandhu
We live in the world we buy into. How brand and supply chain transparency will enable conscious consumerism ethical business practices to thrive and how blockchain technology can make it happen. A summary of the whitepaper by Provenance.org.
When consumer products get switched on, brands will be able to deploy new IoT-based applications and services throughout the full product lifecycle. But what role will blockchains play in this, and is the hype about its potential justified?
This white paper will show you which use cases are best suited to blockchains and how to assess whether a blockchain-based solution is really needed.
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
There's a lot of buzz around Blockchain, Is Blockchain the next” Big Thing" in the IT industry? It certainly looks to have a huge impact in finance, but it could also have far reaching effect in many other industries as well
Organizations are looking for secure and robust platforms to transparently share the information and build absolute trust for the end user.
Blockchain can help organizations maintain transparency through Decentralization with added security.
Adopting Blockchain can have certain challenges such as high energy consumption, integration issues, privacy and security issues.To overcome these challenges blockchain testing is important to implement
Blockchain as the Backbone of Digital Supply Chains | Challenges for Supply C...Fluence.sh
The digital supply chain is one of the most popular methods of organization for resources, assets, people, and inventory transfers. But what challenges does supply chain face and how they can be solved with the blockchain technology?
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)Amazon Web Services
Recent interest in leveraging distributed ledgers across multiple industries has elevated blockchain from mere theory and into the spotlight of real world use. Learn why some partners have a vested interest in it and how blockchain can be used with AWS. In this session, we explore the AWS services needed for a successful deployment and dive deep into a partner's blockchain journey on AWS.
The Blockchain Wave in 2019 and BeyondAhmed Banafa
We’re still in the early days of Blockchain as a technology, and so we’re yet to see the full impact that it will have on the world that we live in. Still, it’s already showing potential across a range of industries and started to enter the public consciousness, so the real question is what will happen when Blockchain technology starts to mature.
• Intelligent objects introduce a new vision for strengthening communication, relationship and business. Each system must be able to communicate with humans and non humans and its capabilities bring scalability, adaptability, flexibility and greater efficiency.
• IoT generates a big growth of complexity and a new method is necessary to correctly design app.
• We have developed on the field the method Here&Now to permit to manage contextual, liquid, intelligent and connected applications. This means designing software with a level of new cognitive artificial intelligence able to deploy applications that have a level of understanding depending on context; it learns from events and have some level of autonomy with respect to routine activities.
This is the first webinar about an IoT design method that we have created during these months.
• Intelligent objects introduce a new vision for strengthening communication, relationship and business. Each system must be able to communicate with humans and non humans and its capabilities bring scalability, adaptability, flexibility and greater efficiency.
• IoT generates a big growth of complexity and a new method is necessary to correctly design app.
• We have developed on the field the method Here&Now to permit to manage contextual, liquid, intelligent and connected applications. This means designing software with a level of new cognitive artificial intelligence able to deploy applications that have a level of understanding depending on context; it learns from events and have some level of autonomy with respect to routine activities.
The year 2018 is the year of blockchain applications with several ongoing use-cases coming to realization and the vendor landscape also gained more depth and a better structure after years of press and vendor hype, fueled equally by commercial self-interest and a genuine desire for innovation.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
[Image of person doubting] Why would somebody choose a BSH appliance against everything offered by competitors? Is it its design, the last connected functionality presented, the ecological impact of the product, The price? All that impacts on the final decision, but what if we could create a service that could shift the balance dramatically towards BSH?
[Program logo] BSH Smart Buyer Program would propose BSH customers to:
[Connect all HA] Connect all BSH HA own by a customer to BSH HA remote service and Smart Buyer Programs.
[Monitor Technical Functioning] Provide remote monitoring to all of them, facilitating remote maintenance, fast and efficient interventions and reducing costs and off-time.
[Monitor Cycles for Consumables] Monitor working cycles so that new appliance consumable requirements, such as dishwasher tabs, can be estimated
[Monitor groceries in Fridge] Monitor groceries in the Fridge to estimate when new purchases of which product are required
[Define Purchasing Profile] It is not the last thing to do but one of the most important.
[Generate Smart Shopping List] Populate a smart shopping list with all recommendations.
[Search automatically best provider] for
[Learn from Behavior] Learning progressively from the purchasing behavior to recommend the purchase of other non-monitored products such as home supplies or groceries out of the fridge.
Explanatory text: BSH is a leader in the connected appliance market but it faces two clear challenges, as the rest of its competitors, that may impact its market growth potential:
Despite constant investment on innovation, how to make customers perceive BSH as the right choice when facing an ocean of functional and connectivity innovation among the different brands.
Once you have a customer how to increase the relationship with them (buy more appliances, increase the services used in between purchases, etc.)
Our proposed approach: provide a service perceived by customers as:
Truly differential in the short and long term.
That will facilitate enormously their daily life, providing more value the more it is used.
That will strengthen naturally the relationship with the brand, motivating them to buy more products and services from BSH.
A nice collateral effect would be to develop a new business line that may end up being bigger than the current one (moving from customers buying the object to buying the service it provides).
[Image of person doubting] Why would somebody choose a BSH appliance against everything offered by competitors? Is it its design, the last connected functionality presented, the ecological impact of the product, The price? All that impacts on the final decision, but what if we could create a service that could shift the balance dramatically towards BSH?
[Program logo] BSH Smart Buyer Program would propose BSH customers to:
[Connect all HA] Connect all BSH HA own by a customer to BSH HA remote service and Smart Buyer Programs.
[Monitor Technical Functioning] Provide remote monitoring to all of them, facilitating remote maintenance, fast and efficient interventions and reducing costs and off-time.
[Monitor Cycles for Consumables] Monitor working cycles so that new appliance consumable requirements, such as dishwasher tabs, can be estimated
[Monitor groceries in Fridge] Monitor groceries in the Fridge to estimate when new purchases of which product are required
[Define Purchasing Profile] It is not the last thing to do but one of the most important.
[Generate Smart Shopping List] Populate a smart shopping list with all recommendations.
[Search automatically best provider] for
[Learn from Behavior] Learning progressively from the purchasing behavior to recommend the purchase of other non-monitored products such as home supplies or groceries out of the fridge.
[Focus on customer satisfaction] The program main focus needs to be customer satisfaction, and everything is done to increase customer perception of this focus:
Designed to facilitate daily life but keeping customer in control of what, where and when is purchased.
Independent ecosystem not controlled by a sole company. BSH is the ecosystem sponsor and the main protector of customers’ interest and privacy.
Total transparency on processes.
[Security]:
All players in this ecosystem need to be approved before participating.
Total privacy protection (data used to improve service not to be sold).
Secure and fast transactions among ecosystem members.
[Common core platform] A common core platform to be deployed worldwide and customized locally in terms of
Localization (user and supplier frontends adapted to the local language, legislation, and cultural requirements)
Functionalities and business lines active in the local market.
The local players (suppliers, transport, service providers, etc) approved to participate in that market.
The range of products and services intended to be targeted by this use cases are the following, in order of priority:
Key range: HA consumables (ex: washing machine powder) and groceries linked to the monitoring capacity of a connected fridge.
Medium term range: home related services such as home supplies, security, domotics, connected insurance, utilities optimization, etc. They would not necessarily be linked to the monitoring of a specific HA.
Long term range: any other service or product that may provide value to BSH HA owners (i.e. travel offers, family activities, etc.) and that may interest companies providing them because of the future important size of the BSH Smart Buyer community.
The estimation of the quantity and quality of elements to be ordered by the HA will be calculated by an algorithm that will take into account the monitoring of the HA activity (i.e. number of cycles), balance of consumables bought against cycles done, purchasing profile filled by the HA owner and some machine learning applied to consumption behavior and ecosystem responsiveness to orders.
Shared Publicly: servers, or nodes, maintain the entries (blocks). Every node sees the transaction data stores in the blocks when created.
Decentralized: no central authority required to approve transactions and set rules. Each block is created when multiple nodes agree and validate the transactions.
Public Blockchain: require computer processing power to confirm
Permission-less blockchains: users are anonymous every node has a copy of
Secure: Cryptography to register data, private key to see content of the transaction. All records are immutable & irreversable thanks to the use of cryptography and increase computer processing power. Posts to the ledger cannot be revised or tempered with, not even by the database operators.
Trusted: its distributed nature requires that nodes reach a consensus, which allows transactions to occur among unknown parties.
Automated: software is writen in a way that confliction or double transaction are not written in the data set, so transaction can occur automatically
For a new block to be included in the Blockchain
First a block candidate is created including, among others elements, the following:
A set of new transactions
The hash of previous block
Public Keys from sender & receiver)
A hash for the new Block
Hashing: A known mathematical formula that is easily applied to the data of a Block to generate a Hash. A hash is a unique sequence of letters and numbers, far shorter than the original data. If you change just one character inside the original data, its hash will change and the block and all subsequent blocks would be spotted as fake.
[Consensus Algorithm]
A consensus algorithm does two things: it ensures that the next block in a blockchain is the one and only version of the truth, and it keeps powerful adversaries from derailing the system and successfully forking the chain.
Proof of work
Every node can be a miner. Miners compete to add the next block in the chain by racing to solve a extremely difficult cryptographic puzzle. The first to solve the puzzle, wins 12.5 newly minted bitcoins – and a small transaction fee.
Disadvantage:
it requires enormous amounts of computational energy,
it does not scale well (transaction confirmation takes about 10-60 minutes) and that the majority of mining is centralized in areas where electricity is cheap
Proof of stake
The most common alternative. Here, instead of investing in expensive computer equipment in a race to mine blocks, a 'validator' invests in the coins of the system.The validators are paid extrictly a transaction fee.
All the coins exist from day one, the chance of a node to being picked to create the next block depends on the fraction of coins in the system you own (or set aside for staking). A validator with 300 coins will be three times as likely to be chosen as someone with 100 coins.
Disadvantage: the 'nothing-at-stake' problem -> what is to discourage a validator from creating two blocks and claiming two sets of transaction fees? And what is to discourage a signer from signing both of those blocks?
One answer is to require a validator to lock their currency in a type of virtual vault. If the validator tries to double sign or fork the system, those coins are slashed.
Peercoin was the first coin to implement proof of stake, followed by blackcoin and NXT. Ethereum currently relies on proof of work, but is planning a move to proof of stake in early 2018.
[Network Consensus]
Once a validator creates a block, that block still needs to be committed to the blockchain. Different proof-of-stake systems vary:
Every node in the system has to sign off on a block until a majority vote is reached,
In other systems, a random group of signers is chosen.
Good Fit:
Easy to create a rich and autonomous ecosystem of suppliers (supermarkets, small shops, delivery companies, etc.).
Fast and inexpensive transactional fees. Smart Contracts make it even more dynamic
Transparent but protecting privacy: all users see all transactions but only the concerned can see its content. If it is a permissioned BC, users can be anonymized but identifiable.
The lack of central control ensures scalability and robustness by using resources of all participating nodes and eliminating many-to-one traffic flows. This also decreases delay and overcomes the problem of a single point of failure.
Security: BC realizes a secure network over untrusted parties which is desirable in IoT with numerous and heterogeneous devices.
Challenges:
PoW implies too much processing power and response time.
Scalability: BC scales poorly as the number of nodes in the network increases. But IoT networks may contain a large number of nodes.
Storage: the BC ledger has to be stored on the
nodes themselves and it will increase in size as
time passes. That is beyond the capabilities of a
wide range of smart devices such as sensors,
which have very low storage capacity.
Good Fit:
Easy to create a rich and autonomous ecosystem of suppliers (supermarkets, small shops, delivery companies, etc.).
Fast and inexpensive transactional fees. Smart Contracts make it even more dynamic
Transparent but protecting privacy: all users see all transactions but only the concerned can see its content. If it is a permissioned BC, users can be anonymized but identifiable.
The lack of central control ensures scalability and robustness by using resources of all participating nodes and eliminating many-to-one traffic flows. This also decreases delay and overcomes the problem of a single point of failure.
Security: BC realizes a secure network over untrusted parties which is desirable in IoT with numerous and heterogeneous devices.
Challenges:
PoW implies too much processing power and response time.
Scalability: BC scales poorly as the number of nodes in the network increases. But IoT networks may contain a large number of nodes.
Storage: the BC ledger has to be stored on the
nodes themselves and it will increase in size as
time passes. That is beyond the capabilities of a
wide range of smart devices such as sensors,
which have very low storage capacity.