Author: Alexandru Gavrilovici

0

Nerve Tracts for the Smart City

The Smart City is one of today’s major hypes. Everything is to become more progressive, more efficient, cleaner. A lot of projects are working towards this goal. What is lacking, however, is a comprehensive platform that lets a broad range of municipal applications work together. In the European ALMANAC project, Fraunhofer FIT is working with international partners to develop a prototype of such a platform. A key component of this platform is a service-oriented middleware that enables heterogeneous resources, devices and services to cooperate at the semantic level.

0

Bigbelly Smart Waste and Recycling Revolutionizes Waste Management in the UK

Bigbelly, Inc., the leader in smart waste and recycling management, announces that across the UK people benefit from Bigbelly bins on the high street. The smart, cloud-connected Bigbelly system intelligently gathers, consolidates, and analyzes data from connected waste and recycling units for a complete waste management solution that beautifies public spaces and increases operational efficiency.

0

Neptune Assists Water Utilities in Drought Management with NGO™ and NVIEW™ Software Applications

The drought that has gripped much of the western United States continues unabated across California, Nevada, Oregon, Washington, and Idaho. Long-term moderate drought conditions are now occurring in such disparate areas as Arizona, Georgia, and Connecticut. As dry conditions persist, Neptune Technology Group continues providing answers to counter the drought, including the latest in metering software applications.

0

First Fully Automated EMV Fuzzing Solution from MWR InfoSecurity

Automated security evaluation helps eliminate potential vulnerabilities from terminal-smartcard authentication procedures.
Cyber security consultancy MWR InfoSecurity today confirmed its research team has taken the first step towards creating a fully automated EMV fuzzing solution for POS and ATM transactions. As vulnerabilities can be introduced into the terminal-smartcard authentication procedure [during development], there is a need for structured and formal security evaluation to eliminate unexploited threats that exist in current devices used world-wide.