Author: admin

  • Discovering User Opinions on Automation in Social Media: The SPY Tool

    Discovering User Opinions on Automation in Social Media: The SPY Tool
    Categories:

    The fast growth of social media has dramatically transformed the interaction and communication of individuals on the Web and throughout the real world, which raised the need for advance business intelligence (BI) and advance analytics techniques to quantify in a scalable way the information coming from social media posts.   This evolution of social media […] Read more

  • Industrial Revolution 4.0: Protecting the Industrial Internet of Things in an automotive manufacturing environment.

    Industrial Revolution 4.0: Protecting the Industrial Internet of Things in an automotive manufacturing environment.
    Categories:

    As digitalization becomes a primary business issue for many organizations around the world and the fourth Industrial revolution marks an era of enormous potential for innovation and growth, the manufacturing sector witnesses an increase in cyber-related incidents. Operational and information technology are more connected now than ever, and this makes Industrial Internet of Things (IIoT) […] Read more

  • MARVEL

    Categories:

    A disruptive Edge-to-Fog-to-Cloud ubiquitous computing framework, handling, processing and delivering data from millions of devices around the world is a complex and remarkable feat that hinges on edge computing systems. Read more

  • ENERMAN

    Categories:

    With an increasing demand in energy, and thus leading to increased CO2 emissions, by the manufacturing sites all over the world, there is a growing need of an efficient energy management tool aiming at the optimization of these processes. Read more

  • The AUTOMATED VEHICLES equation – Technology as a variable, the human factor as a constant and the pandemic

    The AUTOMATED VEHICLES equation – Technology as a variable, the human factor as a constant and the pandemic
    Categories:

    ITML, as a technology provider in NewControl, is participating in the activities related to Embedded Systems, Computing Platforms and Algorithms and System Integration. In addition, ITML is leading the efforts on end-user acceptance and trust in automated driving functions relevant to ethics, safety, security, and privacy. The automotive industry during its 130-year history is facing […] Read more

  • 25 Cultural Experiences by the Age of 25

    25 Cultural Experiences by the Age of 25
    Categories:

    It is believed that the cultural heritage of one’s nation is like a tree, deeply engraved into earth’s surface with roots extending ever so majestically to withstand the fluctuations and hardships of the time. Heritage is the identity of a nation, for it comprises the critical features such as the values, legacy, and ethics that a […] Read more

  • Efficient vessel management leveraging ICT techniques

    Efficient vessel management leveraging ICT techniques
    Categories:

    Developing a framework for optimized energy efficiency, fuel consumption and emissions control incorporating the concept of Circular Economy is the main goal of Smartship. ITML, as a technology provider and specialist in Big Data technologies, will develop and deliver the Advanced Data Analytics Module, leveraging real-time analytics and machine learning techniques for real-time events detection […] Read more

  • SecureHealth

    Categories:

    The SecureHealth project aims to address skills gaps and mismatches in the healthcare sector by developing enhanced partnerships, connecting education with industry needs, improving employability and working conditions, and focusing on online training and data privacy awareness. Read more

  • Security in Human vs Cyber ecosystems

    Security in Human vs Cyber ecosystems
    Categories:

    The only perfectly secure system is one that does not communicate with any others.The overall level of security of any ecosystem is equal to that of its most vulnerable component.   In the present times of the COVID-19 pandemic outbreak, the world was forced to come to terms and exercise techniques and tactics that were till […] Read more

  • CYRENE

    Categories:

    Despite the socio-economic importance of tools and techniques for handling security threats there is still no easy, structured, standardized and trusted way to forecast, prevent and manage interrelated and propagated cybersecurity vulnerabilities and threats in a way that takes into account the heterogeneity and complexity of today’s supply chains. Read more