Net2DG Project Net2DG - Leveraging Networked Data for the Digital Electricity Grid
Net2DG (Leveraging Networked Data for the Digital Electricity Grid) is a joint effort by eight European partners to develop a proof-of-concept solution for leveraging measurement data from smart meters and smart inverters in low-voltage (LV) grids. The Net2DG solution correlates these data with information from existing DSO subsystems, in order to enable and develop novel LV grid observability applications for voltage quality, grid operation efficiency, and LV grid outage diagnosis.
- Details
- Written by Man Rei
Read more: Net2DG Project Net2DG - Leveraging Networked Data for the Digital Electricity Grid
TiSA Foils EU Data Protection Directive
2016 Leaks from the TiSA negotiations held in secrecy (Trade in Services Agreement) indicate that TiSA will foil the EU data protection directive of early 2016. TiSA must come under public monitoring and requires an eventual public vote!
- Details
- Written by Manfred Reitenspiess
QSIT – (Automotive) Software Testing at its Best
If you are looking for a trusted third party for software testing, stop searching - QSIT IT-Quality Assurance may be the right partner for you
- Details
- Written by Manfred Reitenspiess
[Monitored] Mobility – a Safe and Secure Experience!?
It is no longer a question, but a fact that the Internet is in the car. After discussing a number of useful mobile services in passenger cars, we have to conclude that our digital sovereignty will be lost if we do not take adequate measures.
- Details
- Written by Manfred Reitenspiess
Read more: [Monitored] Mobility – a Safe and Secure Experience!?
Secure Internet Services - more on their design
We have already shown in Architectures for Secure Internet Services, how decentralization, anonymity, and resilience can help to assure digital sovereignty (the what and why is discussed in more detail in "Digital Sovereignty - What is it?", "Digital Sovereignty – why we need it", "Giving up Digital Sovereignty?"). In this report we will introduce two more foundational and necessary architecture principles – object orientation and need-to-know principle.
Real World Role Model Offset in the Digital World
Living together in our society as well as the functioning of a corporation depend on a clear role model and people acting according to a given role at a certain point in time. A number of roles are assigned to each of us, depending upon the environment in which we are acting: mother, pilot, chancellor, software programmer, trucker,…
- Details
- Written by Manfred Reitenspiess
Secure Internet Services - how to design them
Today’s data center focused and organized Internet services are just like dinosaurs – they were very successful at their time, but eventually vanished in a continuously changing world. If services shall be successful in the future, they have to take data sovereignty of their users/consumers into account. Being decentrally organized, local operation (in personalized devices such as smart-phones, smart home servers, PC and others we currently do not even dream of), anonymity, and resilience are their immanent characteristics.
"Do Not Put All Your Eggs into One Basket"...
...an ancient proverb, which is fully applicable to Digital Sovereignty. If we want to become sovereign of our data again, we have to replace the currently predominant approach based on centrally managed data and the accumulation of a person’s information items in one place.
- Details
- Written by Manfred Reitenspiess
Data Protection: THE Business Driver for New Apps and Services
The next wave of app(lications) and Internet services will be successful because of data protection!
In Search of the Killer App
The fight for customers and market share in the digital economy is tough. The first mover advantage seems to be most important due to the relatively simple internationalization of Internet services. Well known examples are Google, Amazon, and Facebook. Very often, the market leader offers maximum functionality which is easy to use. Other qualities of the offerings such as security, data protection, Digital Sovereignty are treated only as second in line. In the best case they are perceived as unnecessary, in the worst case, they are seen as detrimental and “killing business”.
- Details
- Written by Manfred Reitenspiess
Read more: Data Protection: THE Business Driver for New Apps and Services