Conserving Endangered Wildlife by Creating Digital Twins
Wild animals are hunted illegally on a large scale, with millions of individual animals of thousands of species being killed or captured in their home areas worldwide. This poaching poses a growing threat to elephants, rhinos and other extraordinary species. Future generations should be allowed to enjoy this biodiversity and recognize the unshakable importance of wildlife for our well-being and environment.
Only a rigorous conservation effort can help to reduce poaching and protect wildlife habitats.
“Conserving endangered wildlife is an expensive, time consuming job, but new technology may make protecting animals, and catching the poachers who threaten them, easier,” Rachel Nuwer wrote on BBC.
As an advocate of innovative IT solutions, we are committed to deliver innovative, state-of-the-art and secure software to our customers and partners. We tasked ourselves with the question, how we at Traversals can contribute with our knowledge, experience and possibilities. A first step is by connecting the various worlds together.
Published on August 9, 2019
Moving Target Defense Security
Moving Target Defense (MTD) is considered today to be the most effective innovation in the field of cyber security.
Until now, IT infrastructures were regarded as unchangeable and stationary. A great deal of effort has been invested in protecting these infrastructures by identifying, preventing and eliminating threats. MTD is a completely new paradigm in the arena. MTD creates a dynamic attack surface for moving targets, thus creating asymmetric disadvantages for the attacker. The playing field between defender and attacker becomes more even.
A possible implementation of MTD is done by using
Software Defined Networking. As described by Cyel, this
continuously changes the attack interface. Attackers will find it difficult to identify and track targets in the first place as their targets seem to hop around in the colosseum.
This white paper can be seen as the starting point of MTD for Traversals’ Data Fusion Platform. The ideas described herein will be constantly further developed to increase the cyber security of Traversals’ solutions.
Published on August 9, 2019
How Artificial Intelligence and GraphQL Powers Traversals’ Federated Search
Artificial Intelligence (AI), Machine Learning and Deep Learning are topics of great interest to any company today. The big breakthrough of these technologies came with the insight that high performance graphics cards can be used to train models and that large companies like Google are sitting on an incredible amount of data being ideal for machine learning.
For a layman, executive or CEO, however, it is becoming increasingly difficult to recognize and interpret the technical differences between various AI solutions.
Executives want to know whether a technological or algorithmic approach will improve the business, provide a better customer experience and achieve operational efficiencies such as speed, cost savings and greater accuracy.
This white paper uses the Federated Search, a core feature of Traversals’ Data Fusion Platform (DFP), to show where machine learning has proven to be useful.
Published on July 24, 2019
Data Fusion Platform
Isolated data islands with valuable information emerge rapidly within organizations. These islands may hold diverse information and may be comprised of structured data such as access control data, log data and process data or they can hold unstructured data such as images, videos and documents.
When organizations want to find valuable information by holistic analysis, it becomes impossible with continuous growth and addition of new data islands. It might take days, if not months, to find the critical information on which the organizations have to act. Even if there is only one data island within an organization, representation and packing of the data might prevent uncovering the information
Published on July 17, 2019
Introducing: Cyber Threat Monitoring Platform
Identify potential security vulnerabilities, detect threats and prevent data leaks.
The average time it takes to identify a cyber security incident is 197 days, according to the 2018 Cost of a Data Breach Study by the Ponemon Institute, funded by IBM. Companies that identify and combat an incident within 30 days have a significant advantage over their less responsive competitors and save an average of $1 million in containment costs.
Collected data should be pre-evaluated and, if relevant, confirmed or re-evaluated by an analyst. The aim is to provide realisable insights. Detected threats can indicate various risks within the company. The best protection is to combine the intelligence of qualified investigators and AI to effectively transform raw data into actionable intelligence.
The Traversals Cyber Threat Monitoring Platform is aimed at all companies seeking active protection.
“Employing dark web monitoring solutions that allow the use of focused filters to identify key phrases, such as your brand and product names, that may contain information that can negatively affect your organization is a good start in your effort to glean useful intelligence from the dark web…”
Published on July 9, 2019
A Secure Software Supply Chain to Deal With Cyber Threats, Technical Debt and License Violations
— by Tim Riffer and supervised by Dirk Kolb
The continuous introduction and implementation of the DevOps concept and the associated automation of software creation and delivery has made the software supply chain a business-critical unit in companies. What many publications and blog posts that deal with DevOps rarely mention, is that traditional software delivery pipelines do not address security issues, license violations or technical debt. Considering how often complex software systems are used in critical infrastructures, it would be negligent to ignore these issues in the DevOps environment.
We tasked ourselves to build a secure software supply chain for our Data Fusion Platform. As an advocate of innovative IT solutions, we are committed to deliver innovative, state-of-the-art and secure software to our customers and partners.
Published on July 5, 2019
Building a React Library with a Cesium Component
— by Prasanna Mahadevaswamy and supervised by Dirk Kolb
In this article, we will show you how to build a shared React component library with Cesium and Resium using Webpack. We tasked ourselves to build a UI component library that can be used for various solution implementations provided by our Data Fusion Platform.
Published on May 8, 2019