5G era and cybersecurity
Fifth-generation mobile networks or fifth-generation wireless systems, also known as “5G,” are the proposed next telecommunications standards and are likely to appear in the market in 2020. 5G networks are going to be very heterogeneous and complex compared to the [...]
Common sense and the CS-AWARE platform: How to launch it and make the ‘great leap forward’…
There have been two articles that both appeared in Harvard Business Review and which I think are quite useful when considering the steps we need to take for exploitation and commercialization of the CS-AWARE project results.The first one is called [...]
Message Queue Engines
Queue managers are systems that reliably handle communication and data exchange between services, one of the most popular queue managers is RabbitMQ. When data traffic becomes intense or a service takes a lot of time to complete its tasks [...]
Testing the CS-AWARE Information Flow Model using Docker
To test the the CS-AWARE information flow model a prototype using the Docker Container[1] technology was implemented. The aim was to create a Docker-Compose implementation, which is a Docker framework to develop systems using multiple containers, representing the model [...]
Cybertech Europe 2018
On 26th and 27th September 2018 in Rome has been held the Cybertech conference. It was a very important conference regarding information technology and cyber security, bringing together leading multinational companies, SMEs, start-ups, private and corporate investors, venture capital companies, [...]
Biometrics technologies application for security
Biometrics technologies are nowadays emerging thanks to their potential applications in many different fields. Some examples are represented by the use of the fingerprint for mobile and laptop authentication and similarly, face recognition and iris scanning. Some of the [...]
Security transformation
Cyber threats are growing and becoming even more sophisticated in their technologies. It follows that security techniques need to grow and evolve in order to anticipate potential problems: the digital transformation cannot prescind from an increase in data security. For [...]
There is no such thing as a growth industry – and it is not me who says this… ?
The term marketing myopia is also not mine; both the term and the quote above are by Theodore Levitt who wrote what is now considered as a legendary article back in 1960 for the Harvard Business Review. It is all [...]
Visualization of System Dependencies using GraphingWiki
Since the second iteration of the workshops in the piloting cities Larissa (GR) and Rome (IT) are coming closer, the preparations are in progress. As briefly explained in Mr. Wills blog post on the 8th of May, these involve the [...]