APPLICATIONS OF BLOCKCHAIN TECHNOLOGY TO BANKING AND FINANCIAL SECTOR IN INDIA

Overall, the PoC provided a good demonstration of the use-cases and helped to broaden the understanding of the technology and its potential to other real-life applications. BLOCKCHAIN, a seemingly unassuming data structure, and a suite of related protocols, have recently taken the worlds of Finance and Technology by storm through its groundbreaking application in the modern crypto-currency Bitcoin, and more so because of the disruptive innovations it promises. While Bitcoin has been the most talked about application of the Blockchain technology to date, new applications such as Smart Contracts have tried to exploit more abstract nature of the platform. In this , we explore Blockchain similarly – as White Paper an abstract data structure and development platform to solve generic problems in FinTech.

Spotlight

Semmle

Semmle believes security is a shared responsibility. Our mission is to secure all software by bringing the security and development communities together. Our technology scales any organization's security expertise using QL to quickly explore any codebase to discover zero-days and all variants of vulnerabilities. We empower product security teams to deliver variant analysis results to development teams using LGTM to ship safe code and protect their customers. Together, Semmle's platform enables the security community to collaborate and share their expertise in the field of variant analysis and security research.

OTHER WHITEPAPERS
news image

White Paper:Intelligent Networking, AI and Machine Learning

whitePaper | June 7, 2022

Telecoms need to be able to incorporate new technologies and next-generation connectivity such as 5G to customers and end users. To achieve these ambitious goals, they need to optimize their networks – make them more intelligent if you will. Some of the tools needed include artificial intelligence (AI), machine learning (ML) and artificial intelligence operations (AIOps). This document will explore what intelligent networking means to telecoms, vendors and customers, and how AI and ML technologies and tools can be used, the cultural shifts the industry needs to make it a success, and what to bear in mind when deploying machine learning across a telecom network.

Read More
news image

Artificial Intelligence in the corporate world

whitePaper | November 25, 2019

In 2020, artificial intelligence will no longer be a vision of the future, but a tangible reality: language agents such as Siri, Cortana or Alexa are already pervading our everyday lives. The smart assistants play our favorite music, make restaurant suggestions, recommend films, identify the fastest route to our destination and steer our car better into the parking lot than we could. We use artificially intelligent systems that are becoming more and more a matter of course both at home and at work. AI systems have slipped into our everyday lives and they are here to stay.

Read More
news image

A PERSPECTIVE ON IT COST MANAGEMENT

whitePaper | August 10, 2020

2020 has posed significant, unexpected challenges to the world – and to IT departments in most organizations. Work practices have shifted rapidly and, given the volatile economic climate, many organizations are looking to protect against uncertainty and ensure business continuity by implementing cost savings initiatives. As an IT leader, you and your team are uniquely positioned to deliver added value to the organization by leveraging Technology Intelligence data to find these additional cost savings opportunities.

Read More
news image

A Blueprint for Equity and Inclusion in Artificial Intelligence

whitePaper | June 28, 2022

Artificial intelligence (AI) has been accelerating across sectors. It has great potential to benefit society but the technology’s full potential can only be realized if it includes the diversity of the populations it represents throughout every step of its development. With growing concerns about bias, data privacy and lack of representation, it is critical to re-evaluate the way in which AI is both designed and deployed to ensure that all affected stakeholders and communities reap the benefits of the technology, rather than any harm.

Read More
news image

Machine Learning on Arm Cortex-M Microcontrollers

whitePaper | January 20, 2022

Machine learning (ML) algorithms are moving to the IoT edge due to various considerations such as latency, power consumption, cost, network bandwidth, reliability, privacy and security. Hence, there is an increasing interest in developing neural network (NN) solutions to deploy them on low-power edge devices such as the Arm Cortex-M microcontroller systems. To enable that, we present CMSIS-NN, an open-source library of optimized software kernels that maximize the NN performance on Cortex-M cores with minimal memory footprint overhead. We further present methods for NN architecture exploration, using image classification on CIFAR-10 dataset as an example, to develop models that fit on such constrained devices.

Read More
news image

The Commonsense Path to Simple and Secure Remote Worker IT Management

whitePaper | July 28, 2022

Many businesses have recently evolved to support large remote or hybrid workforces. This initial transition was imagined to be temporary, relying on home networks to provide the connectivity needed for work. Now, two years later, companies are contemplating technology improvements to address a more permanent remote workforce.

Read More

Spotlight

Semmle

Semmle believes security is a shared responsibility. Our mission is to secure all software by bringing the security and development communities together. Our technology scales any organization's security expertise using QL to quickly explore any codebase to discover zero-days and all variants of vulnerabilities. We empower product security teams to deliver variant analysis results to development teams using LGTM to ship safe code and protect their customers. Together, Semmle's platform enables the security community to collaborate and share their expertise in the field of variant analysis and security research.

Events