Blockchain > Cryptocurrency > Digital

Total Page:16

File Type:pdf, Size:1020Kb

Blockchain > Cryptocurrency > Digital > Blockchain > Cryptocurrency > Digital Transformation > Internet of Things JANUARY 2020 www.computer.org Keep Your Career Options Open Upload Your Resume Today! Whether your enjoy your current position or you are ready for change, the IEEE Computer Society Jobs Board is a valuable resource tool. Take advantage of these special resources for job seekers: JOB ALERTS TEMPLATES CAREER RESUMES VIEWED ADVICE BY TOP EMPLOYERS No matter your career WEBINARS level, the IEEE Computer Society Jobs Board keeps you connected to workplace trends and exciting new career prospects. www.computer.org/jobs IEEE COMPUTER SOCIETY computer.org • +1 714 821 8380 STAFF Editor Publications Portfolio Managers Cathy Martin Carrie Clark, Kimberly Sperka Publications Operations Project Specialist Publisher Christine Anthony Robin Baldwin Production & Design Senior Advertising Coordinator Carmen Flores-Garvey Debbie Sims Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th Floor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice +1 714 821 8380; fax +1 714 821 4010; IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036. Postmaster: Send address changes to ComputingEdge-IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage Paid at New York, New York, and at additional mailing offices. Printed in USA. Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in ComputingEdge does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style, clarity, and space. Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own Web servers without permission, provided that the IEEE copyright notice and a full citation to the original work appear on the first screen of the posted copy. An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copy-editing, proofreading, and formatting added by IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html. Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or [email protected]. Copyright © 2020 IEEE. All rights reserved. Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the per- copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. Unsubscribe: If you no longer wish to receive this ComputingEdge mailing, please email IEEE Computer Society Customer Service at [email protected] and type “unsubscribe ComputingEdge” in your subject line. IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html. IEEE Computer Society Magazine Editors in Chief Computer IEEE Intelligent Systems IEEE Pervasive Computing Jeff Voas, NIST V.S. Subrahmanian, Dartmouth Marc Langheinrich, Università College della Svizzera italiana Computing in Science & Engineering IEEE Internet Computing IEEE Security & Privacy Lorena A. Barba (Interim), George Pallis, University David Nicol, University of Illinois George Washington University of Cyprus at Urbana-Champaign IEEE Annals of the History IEEE Micro IEEE Software of Computing Lizy Kurian John, University Ipek Ozkaya, Software Gerardo Con Diaz, University of of Texas at Austin Engineering Institute California, Davis IEEE MultiMedia IT Professional IEEE Computer Graphics Shu-Ching Chen, Florida Irena Bojanova, NIST and Applications International University Torsten Möller, Universität Wien www.computer.org/computingedge 1 JANUARY 2020 • VOLUME 6, NUMBER 1 From Geographic From Dealing With One Collocation Domain at a Time To Worldwide RE Distribution To Dealing With Everywhere Multiple Domains THEME HERE From Wishing for Experienced End Cross- RE With Users Domain RE Everyone To Empowering Newbies Ubiquitous RE From Focusing on From Wishing for Software Well-Understood To Holistically Taking Processes RE for Open RE Into Consideration Everything To Accepting People, Things, and 27Openness 36Services 41 Automated RE From Direct Interaction With Legend: Cryptocurrencies: UbiquitousRepresentative End Users The IoT Gray Rectangles: Barriers Colored Boxes: Required Transformations To Indirect Interaction With a TransparencyCircles: Dimensions of Ubiquity RequirementsCrowd and Digital versus Privacy Engineering: A Transformation: Paradigm Shift that Toward the Data- Aff ects Everyone Driven Enterprise Blockchain 8 On the Origins and Variations of Blockchain Technologies ALAN T. SHERMAN, FARID JAVANI, HAIBIN ZHANG, AND ENIS GOLASZEWSKI 15 BLOCKCHAIN GEORGE STRAWN Cryptocurrency 18 A Service-Oriented Perspective on Blockchain Smart Contracts FLORIAN DANIEL AND LUCA GUIDA 27 Cryptocurrencies: Transparency versus Privacy NIR KSHETRI Digital Transformation 31 Skills and Competencies for Digital Transformation STEPHEN J. ANDRIOLE 36 Ubiquitous Requirements Engineering: A Paradigm Shift that Aff ects Everyone KARINA VILLELA, EDUARD C. GROEN, AND JOERG DOERR Internet of Things 41 The IoT and Digital Transformation: Toward the Data-Driven Enterprise ALEXANDER A. PFLAUM AND PHILIPP GOLZER 46 Extending Patient-Chatbot Experience with Internet of Things and Background Knowledge: Case Studies with Healthcare Applications AMIT SHETH, HONG YUNG YIP, AND SAEEDEH SHEKARPOUR Departments 4 Magazine Roundup 7 Editor’s Note: Blockchain to the Rescue 46 Conference Calendar 72 Extending Patient-Chatbot Experience with Internet of Things and Background Subscribe to ComputingEdge for free at Knowledge www.computer.org/computingedge. CS FOCUS Magazine Roundup of this article from the Septem- ber/October 2019 issue of Com- puting in Science & Engineering eliminate the speed-limiting charge iteration in MD with a novel extended-Lagrangian scheme. The extended-Lagrang- ian reactive MD (XRMD) code drastically improves energy con- he IEEE Computer furry friends. The authors of this servation while substantially Society’s lineup of 12 article from the September 2019 reducing time-to-solution. Fur- T peer-reviewed tech- issue of Computer report on an thermore, the authors introduce nical magazines covers cut- empirical study investigating a new polarizable charge equili- ting-edge topics ranging from the user perceptions of a popu- bration (PQEq) model to accu- software design and computer lar dog activity tracker. Results rately predict atomic charges and graphics to Internet comput- show that these trackers have a polarization. ing and security, from scien- positive impact on owners’ moti- tifi c applications and machine vation to increase their physical IEEE Annals of the intelligence to visualization activities with their dogs. History of Computing and microchip design. Here are highlights from recent issues. Computing in Science & Founding and Growing Engineering Adobe Systems, Inc. Computer Founded in 1982, Adobe Sys- Scalable Reactive tems heralded several of the Log My Dog: Perceived Molecular Dynamics technological innovations nec- Impact of Dog Activity Simulations for essary to precipitate the emer- Tracking Computational Synthesis gence of desktop publishing as The pet industry is catching up Reactive molecular dynamics well as many features of modern in the wearables market, and (MD) simulation is a power- offi ce computing, digital media, pet activity and location track- ful research tool for describing and graphic arts. In this article ers are increasingly worn by our chemical reactions. The authors from the July–September 2019 4 January 2020 Published by the IEEE Computer Society 2469-7087/20 © 2020 IEEE issue of IEEE Annals of the His- to tune two algorithms for char- posing signifi cant complications tory of Computing, Adobe found- acterizing satellite detections of for system and algorithm design. ers Charles Geschke and John wildfi res. In this article from the May/June Warnock cover their professional 2019 issue of IEEE Internet Com- history, the conception of Adobe IEEE Intelligent Systems puting, the authors present a Systems, and its growth. They also dynamic global manager selection explain the technology behind the Using Social Media to Detect algorithm to minimize energy con- advances in computer printing, Socio-Economic Disaster sumption cost by fully exploiting electronic fi le transfer, and digital Recovery the system diversities in geogra- art and photography. Adobe, its There has been growing interest phy and variation over time. The products, and its engineers played in harnessing
Recommended publications
  • Data in the Digital Age
    March 2019 Data in the Digital Age The growing interactions between data, algorithms and big data analytics, connected things and people are opening huge new opportunities. But they are also giving rise to issues around “data governance” at the national and international levels. These include questions around the management of data availability, accessibility, usability, integrity and security, as well as concerns about ownership, impacts on trade and competition, implications for personal privacy, and more. Policy makers across government are grappling with these issues. The use of digital technologies and data underpins digital transformation across all sectors of economies and societies, meaning that any policy decisions on data can have wide effects. Instilling trust in the use of data is a pre-condition for fully realising the gains of digital transformation. This in turn calls for policy makers to better understand and account for the heterogeneity of data, to take a strategic approach to its governance and ensure all policy objectives are considered, and to upgrade their own capabilities to harness data for better policy making. Key policy directions Recognise that there are different types of data, and measure the economic and social value of data and data flows. Many different types of data are collected and used, and their purpose and value can differ widely. Without recognising these different kinds of data, governments will not be able to effectively address issues such as personal data protection or competition. Better measurement of data and data flows and their role in production and value chains will also help support policy making. Develop national data strategies.
    [Show full text]
  • Knowledge Extraction by Internet Monitoring to Enhance Crisis Management
    El Hamali Knowledge Extraction by Internet Monitoring to Enhance Crisis Management Knowledge Extraction by Internet Monitoring to Enhance Crisis Management El Hamali Samiha Nadia Nouali-TAboudjnent, Omar Nouali National School for Computer Science ESI, Research Center of Scientific and Technique Algiers, Algeria Information CERIST, Algeria [email protected] {nnouali, onouali}@cerist.dz ABSTRACT This paper presents our work on developing a system for Internet monitoring and knowledge extraction from different web documents which contain information about disasters. This system is based on ontology of the disasters domain for the knowledge extraction and it presents all the information extracted according to the kind of the disaster defined in the ontology. The system disseminates the information extracted (as a synthesis of the web documents) to the users after a filtering based on their profiles. The profile of a user is updated automatically by interactively taking into account his feedback. Keywords Crisis management, internet monitoring, knowledge extraction, ontology, information filtering. INTRODUCTION Several crises and disasters happened in the last decades. After the southern Asian tsunami, the Katrina hurricane in the United States, and the Kashmir earthquake, people throughout the world used the Web as a source of information and a means of communication. In the hours and days immediately following a disaster, a lot of information becomes available on the web. With a single Google search, 17 millions “emergency management” sites and documents have been listed (Min & Peishih, 2008). The user finds a lot of information which comes from different sources, for instance : during the first 3 days of tsunami disaster in south-east Asia, 4000 reports were gathered by the Google News service, and within a month of the incident, 200000 distinct news reports from several online sources (Yiming, et al., 2007 IEEE).
    [Show full text]
  • Injection of Automatically Selected Dbpedia Subjects in Electronic
    Injection of Automatically Selected DBpedia Subjects in Electronic Medical Records to boost Hospitalization Prediction Raphaël Gazzotti, Catherine Faron Zucker, Fabien Gandon, Virginie Lacroix-Hugues, David Darmon To cite this version: Raphaël Gazzotti, Catherine Faron Zucker, Fabien Gandon, Virginie Lacroix-Hugues, David Darmon. Injection of Automatically Selected DBpedia Subjects in Electronic Medical Records to boost Hos- pitalization Prediction. SAC 2020 - 35th ACM/SIGAPP Symposium On Applied Computing, Mar 2020, Brno, Czech Republic. 10.1145/3341105.3373932. hal-02389918 HAL Id: hal-02389918 https://hal.archives-ouvertes.fr/hal-02389918 Submitted on 16 Dec 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Injection of Automatically Selected DBpedia Subjects in Electronic Medical Records to boost Hospitalization Prediction Raphaël Gazzotti Catherine Faron-Zucker Fabien Gandon Université Côte d’Azur, Inria, CNRS, Université Côte d’Azur, Inria, CNRS, Inria, Université Côte d’Azur, CNRS, I3S, Sophia-Antipolis, France I3S, Sophia-Antipolis, France
    [Show full text]
  • Handling Semantic Complexity of Big Data Using Machine Learning and RDF Ontology Model
    S S symmetry Article Handling Semantic Complexity of Big Data using Machine Learning and RDF Ontology Model Rauf Sajjad *, Imran Sarwar Bajwa and Rafaqut Kazmi Department of Computer Science & IT, The Islamia University Bahawalpur, Bahawalpur 63100, Pakistan; [email protected] (I.S.B.); [email protected] (R.K.) * Correspondence: [email protected]; Tel.: +92-62-925-5466 Received: 3 January 2019; Accepted: 14 February 2019; Published: 1 March 2019 Abstract: Business information required for applications and business processes is extracted using systems like business rule engines. Since the advent of Big Data, such rule engines are producing rules in a big quantity whereas more rules lead to more complexity in semantic analysis and understanding. This paper introduces a method to handle semantic complexity in rules and support automated generation of Resource Description Framework (RDF) metadata model of rules and such model is used to assist in querying and analysing Big Data. Practically, the dynamic changes in rules can be a source of conflict in rules stored in a repository. It is identified during the literature review that there is a need of a method that can semantically analyse rules and help business analysts in testing and validating the rules once a change is made in a rule. This paper presents a robust method that not only supports semantic analysis of rules but also generates RDF metadata model of rules and provide support of querying for the sake of semantic interpretation of the rules. The results of the experiments manifest that consistency checking of a set of big data rules is possible through automated tools.
    [Show full text]
  • A Comparison of Knowledge Extraction Tools for the Semantic Web
    A Comparison of Knowledge Extraction Tools for the Semantic Web Aldo Gangemi1;2 1 LIPN, Universit´eParis13-CNRS-SorbonneCit´e,France 2 STLab, ISTC-CNR, Rome, Italy. Abstract. In the last years, basic NLP tasks: NER, WSD, relation ex- traction, etc. have been configured for Semantic Web tasks including on- tology learning, linked data population, entity resolution, NL querying to linked data, etc. Some assessment of the state of art of existing Knowl- edge Extraction (KE) tools when applied to the Semantic Web is then desirable. In this paper we describe a landscape analysis of several tools, either conceived specifically for KE on the Semantic Web, or adaptable to it, or even acting as aggregators of extracted data from other tools. Our aim is to assess the currently available capabilities against a rich palette of ontology design constructs, focusing specifically on the actual semantic reusability of KE output. 1 Introduction We present a landscape analysis of the current tools for Knowledge Extraction from text (KE), when applied on the Semantic Web (SW). Knowledge Extraction from text has become a key semantic technology, and has become key to the Semantic Web as well (see. e.g. [31]). Indeed, interest in ontology learning is not new (see e.g. [23], which dates back to 2001, and [10]), and an advanced tool like Text2Onto [11] was set up already in 2005. However, interest in KE was initially limited in the SW community, which preferred to concentrate on manual design of ontologies as a seal of quality. Things started changing after the linked data bootstrapping provided by DB- pedia [22], and the consequent need for substantial population of knowledge bases, schema induction from data, natural language access to structured data, and in general all applications that make joint exploitation of structured and unstructured content.
    [Show full text]
  • Six-Gear Roadmap Towards the Smart Factory
    applied sciences Review Six-Gear Roadmap towards the Smart Factory Amr T. Sufian 1,*, Badr M. Abdullah 1 , Muhammad Ateeq 1 , Roderick Wah 2 and David Clements 2 1 Faculty of Engineering and Technology, Liverpool John Moores University, Liverpool L3 3AF, UK; [email protected] (B.M.A.); [email protected] (M.A.) 2 Beverston Engineering Ltd., Prescot L34 9AB, UK; [email protected] (R.W.); [email protected] (D.C.) * Correspondence: a.t.sufi[email protected] Featured Application: This work is beneficial to bridge the gap between advanced technologies and their applications in the manufacturing industry, especially for SMEs. Abstract: The fourth industrial revolution is the transformation of industrial manufacturing into smart manufacturing. The advancement of digital technologies that make the trend Industry 4.0 are considered as the transforming force that will enable this transformation. However, Industry 4.0 digital technologies need to be connected, integrated and used effectively to create value and to provide insightful information for data driven manufacturing. Smart manufacturing is a journey and requires a roadmap to guide manufacturing organizations for its adoption. The objective of this paper is to review different methodologies and strategies for smart manufacturing implementation to propose a simple and a holistic roadmap that will support the transition into smart factories and achieve resilience, flexibility and sustainability. A comprehensive review of academic and industrial literature was preformed based on multiple stage approach and chosen criteria to establish existing knowledge in the field and to evaluate latest trends and ideas of Industry 4.0 and smart manufacturing technologies, techniques and applications in the manufacturing industry.
    [Show full text]
  • CN-Dbpedia: a Never-Ending Chinese Knowledge Extraction System
    CN-DBpedia: A Never-Ending Chinese Knowledge Extraction System Bo Xu1,YongXu1, Jiaqing Liang1,2, Chenhao Xie1,2, Bin Liang1, B Wanyun Cui1, and Yanghua Xiao1,3( ) 1 Shanghai Key Laboratory of Data Science, School of Computer Science, Fudan University, Shanghai, China {xubo,yongxu16,jqliang15,xiech15,liangbin,shawyh}@fudan.edu.cn, [email protected] 2 Data Eyes Research, Shanghai, China 3 Shanghai Internet Big Data Engineering and Technology Center, Shanghai, China Abstract. Great efforts have been dedicated to harvesting knowledge bases from online encyclopedias. These knowledge bases play impor- tant roles in enabling machines to understand texts. However, most cur- rent knowledge bases are in English and non-English knowledge bases, especially Chinese ones, are still very rare. Many previous systems that extract knowledge from online encyclopedias, although are applicable for building a Chinese knowledge base, still suffer from two challenges. The first is that it requires great human efforts to construct an ontology and build a supervised knowledge extraction model. The second is that the update frequency of knowledge bases is very slow. To solve these chal- lenges, we propose a never-ending Chinese Knowledge extraction system, CN-DBpedia, which can automatically generate a knowledge base that is of ever-increasing in size and constantly updated. Specially, we reduce the human costs by reusing the ontology of existing knowledge bases and building an end-to-end facts extraction model. We further propose a smart active update strategy to keep the freshness of our knowledge base with little human costs. The 164 million API calls of the published services justify the success of our system.
    [Show full text]
  • Knowledge Extraction for Hybrid Question Answering
    KNOWLEDGEEXTRACTIONFORHYBRID QUESTIONANSWERING Von der Fakultät für Mathematik und Informatik der Universität Leipzig angenommene DISSERTATION zur Erlangung des akademischen Grades Doctor rerum naturalium (Dr. rer. nat.) im Fachgebiet Informatik vorgelegt von Ricardo Usbeck, M.Sc. geboren am 01.04.1988 in Halle (Saale), Deutschland Die Annahme der Dissertation wurde empfohlen von: 1. Professor Dr. Klaus-Peter Fähnrich (Leipzig) 2. Professor Dr. Philipp Cimiano (Bielefeld) Die Verleihung des akademischen Grades erfolgt mit Bestehen der Verteidigung am 17. Mai 2017 mit dem Gesamtprädikat magna cum laude. Leipzig, den 17. Mai 2017 bibliographic data title: Knowledge Extraction for Hybrid Question Answering author: Ricardo Usbeck statistical information: 10 chapters, 169 pages, 28 figures, 32 tables, 8 listings, 5 algorithms, 178 literature references, 1 appendix part supervisors: Prof. Dr.-Ing. habil. Klaus-Peter Fähnrich Dr. Axel-Cyrille Ngonga Ngomo institution: Leipzig University, Faculty for Mathematics and Computer Science time frame: January 2013 - March 2016 ABSTRACT Over the last decades, several billion Web pages have been made available on the Web. The growing amount of Web data provides the world’s largest collection of knowledge.1 Most of this full-text data like blogs, news or encyclopaedic informa- tion is textual in nature. However, the increasing amount of structured respectively semantic data2 available on the Web fosters new search paradigms. These novel paradigms ease the development of natural language interfaces which enable end- users to easily access and benefit from large amounts of data without the need to understand the underlying structures or algorithms. Building a natural language Question Answering (QA) system over heteroge- neous, Web-based knowledge sources requires various building blocks.
    [Show full text]
  • Application-Centric Transformation for the Digital Age APRIL 2017
    BLACK & WHITE PAPER Application-Centric Transformation for the Digital Age APRIL 2017 PREPARED FOR ©COPYRIGHT 2017 451 RESEARCH. ALL RIGHTS RESERVED. About this paper A Black & White paper is a study based on primary research survey data which assesses the market dynamics of a key enterprise technology segment through the lens of the ‘on the ground’ experience and opinions of real practitioners — what they are doing, and why they are doing it. About 451 Research 451 Research is a preeminent information technology research and advisory company. With a core focus on technology innovation and market disruption, we provide essential insight for leaders of the digital economy. More than 100 analysts and consultants deliver that insight via syndicated research, advisory services and live events to over 1,000 client organizations in North America, Europe and around the world. Founded in 2000 and headquartered in New York, 451 Research is a division of The 451 Group. © 2017 451 Research, LLC and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publi- cation, in whole or in part, in any form without prior written permission is forbidden. The terms of use regarding distribution, both internally and externally, shall be governed by the terms laid out in your Service Agreement with 451 Research and/or its Affiliates. The information contained herein has been obtained from sources be- lieved to be reliable. 451 Research disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although 451 Research may discuss legal issues related to the information technology business, 451 Research does not provide legal advice or services and their research should not be construed or used as such.
    [Show full text]
  • How Organizations Have Progressed in Their Digital Transformations Over the Past Two Years Executive Summary – Key Takeaways
    Digital Mastery How organizations have progressed in their digital transformations over the past two years Executive Summary – key takeaways Organizations have advanced their Talent and culture initiatives take precedence Our research has consistently found that culture is a top digital and leadership capabilities barrier to successful digital transformation. The progress over the past two years organizations have shown over the past two years is encouraging, suggesting more organizations are paying On average, 60% of organizations today say they have the attention to the importance of culture. digital capabilities and 62% say they have the leadership • For example, 67% of organizations today said they actively capabilities required for digital transformation – up 24% promote the exploration of new ideas and experimentation and 26% from 2018, respectively. We realize the scale of compared to only 35% in 2018. increase from 2018 to 2020 that our research reveals is vast. • And many more organizations today involve employees in There is no doubt that the COVID-19 pandemic has forced their digital initiatives – 63% in 2020, up from 36% in 2018. many companies to reinvent themselves and accelerate their transformation. Given this urgency for change – and Upskilling, sustainability, and purpose needs more less resistance to it – it could be that respondents are more attention enthusiastic and optimistic about the maturity of their More organizations are focused on upskilling employees in organization’s overall capabilities today. Since they were 2020 than they were in 2018, but the increase has not been as witnessing such a rapid pace of capability building in areas significant as in other areas.
    [Show full text]
  • 6 Ways Digital Transformation Is Reshaping the World
    6 Ways Digital Transformation is Reshaping the World Brought to you by the Stanford Digital Transformation Program. ONLINE Contents 1. Introduction 2. Personalized Digital Experiences 3. Business Run from the Cloud 4. Data-Driven Decision Making 5. The Internet of Things 6. Accelerated Business Processes with Automation 7. Artificial Intelligence 8. Conclusion – The Future of Digital Transformation ONLINE Introduction Digital transformation is reshaping the world. It is accelerating the pace of technical and organizational innovation, empowering new market entrants, and generating new categories of goods and services that are, in turn, altering how we live, work, and play. While the term can be defined in a variety of ways, digital transformation typically references two fundamental shifts: • a transformation in the effectiveness and sophistication of digital technologies • the adoption of new business cultures to facilitate digital transformation These shifts are being driven by the promise of increased agility and greater cost efficiencies and are enabled by a set of powerful new digital tools that include cloud computing, artificial intelligence, and predictive analytics. But they also require that organizations rethink how they use technology, people, and business processes. That is a complex undertaking and far from simple to master. It typically requires executive support and the assembly of dedicated teams trained specifically for the effort. Yet the pressures to change are immense. Digital transformation enables startup companies to develop new goods and services that can disrupt existing markets and increase customer expectations, e.g. gig economy services, self-driving automobile technologies, precision agriculture, customized 3D printed parts, and app-based payment systems.
    [Show full text]
  • A Technical Overview of Digital Credentials
    A Technical Overview of Digital Credentials Dr. Stefan Brands Credentica [email protected] February 20, 2002 Abstract Applications that involve the electronic transfer of credentials, value tokens, profiles, and other sensitive information are quickly gaining momentum. Traditional attempts to introduce electronic authentication, such as PKI and biometric verification, expose organizations to po- tentially unlimited liability, lead to consumer fear, and stifle the adoption of new systems. To overcome these barriers, innovative solutions are needed that address the entire spectrum of security and privacy interests for all parties involved. This paper is a technical overview of Digital Credentials. Digital Credentials are the digital equivalent of paper documents, plastic tokens, and other tangible objects issued by trusted parties. At the same time, they are much more powerful than their physical counterparts. For example, individuals can selectively disclose properties of the data fields in their Digital Credentials while hiding any other information. Digital Credentials also provide much greater security. As a result, they can be used to securely implement objects that traditionally are made identifiable in order to deal with certain kinds of fraud. Examples are diplomas, work permits, access cards, and drivers’ licenses. 1 Introduction Around the world, influential organizations are rushing to provide individuals with digital identity certificates that will be the sole means of participating in their systems. Among the front-runners are telecommunication organizations, health care providers, mobile service providers, financial institutions, and state and federal governments. A digital identity certificate is just a sequence of zeros and ones, and so it can be transferred electronically and can be verified with 100 percent accuracy by computers.
    [Show full text]