Thaitrade.com is being groomed as the
national e-marketplace platform of Thailand. This will serve as an avenue for
local sellers to increase their reach and be able to sell their quality goods
in an international setting.
The Smart Medical Cybersecurity Guide establishes a safe environment for medical IT security officers and device developers to work with smart medical device, while the Smart Transport Security Guide promotes internalisation of security for companies and users of smart transport-related products and services.
been placed 10th in the latest Reuters Top 75: Asia Pacific’s Most Innovative
Universities rankings, moving up one place from last year.
NIST’s lightweight cryptography initiative aims to develop cryptographic algorithm standards that can work within the confines of a simple electronic device. The ultimate goal is to develop lightweight encryption standards that benefit the entire marketplace.
Malware-Free Networks is a cyber threat detection and disruption service offered to a broad range of New Zealand’s nationally significant organisations.
On 7 June, GovTech’s annual Smart Nation & Digital Government Industry Briefing was attended by around 1,000 attendees from industry, academia and public agencies.
Coding Thailand is an online learning platform created to promote digital technologies, computer science and systematic thinking among Thai youths.
DSI’s expertise in non-volatile memory, disk drive design and systems, and data centre network technologies, will continue to contribute Singapore’s priorities such as future of manufacturing, AI, industrial IoT and cybersecurity.
A new technology that is being tested on
two research farms has shown promise of providing widespread Wi-Fi coverage.
Depending on where it is installed, the trial showed results of providing farm
signal of up to 2kms on through thick bush and up to 10kms when installed on a
higher location, a water tower.
EXCLUSIVE – Cloud, Security, BYOD and Virtualisation -Peter Reichstädter CIO for the Austrian Prime Minister’s office shares all
We follow a proven methodology that has served us over the past years for developing secure applications and services. We carry out the business analysis with the support of external consultants. We engage by using to levels of controls, that of operational and strategic.