Cybernetica

Menu

Blog

UXP Facilitates the Establishment of Data Fabric in the Digital Society

What is Data Fabric?

Gartner defines data fabric as a design concept that serves as an integrated layer (fabric) of data and connecting processes. A data fabric utilises continuous analytics over existing, discoverable and inferenced metadata assets to support the design, deployment and utilisation of integrated and reusable data across all environments, including hybrid and multi-cloud platforms.

Improving Marine Situational Awareness in One of the World’s Biggest Ports - Jebel Ali

Cybernetica delivered a state-of-the-art port radio communication system to the port of Jebel Ali , a TOP 10 ranking container port in the world and the biggest in the Middle East region. Port radio communication systems are an intrinsic constituent of critical infrastructure for vessel traffic management, and they represent a distinguished competence in system integration provision. Our comprehensive radio communication solution included the supply and installation of dedicated infrastructure for coastal VHF radio communication system and the provision of required radio equipment.

Digital Identity and Blockchain – What is the Problem to Be Solved?

The first two parts of this short series touched on a couple of newer ideas about digital identity, namely, Decentralised Public Key Infrastructure (DPKI) and Self-Sovereign Identity (SSI). Both of these ideas look to improve upon the more traditional ways of working related to PKI, and reduce reliance on central figures in services, like the Certificate Authorities (CA) that act as the root of trust. In an attempt to replace the trust offered by CAs, DPKI and SSI both look towards blockchain technology as the key to solving this puzzle. I use the word “puzzle”, because “problem” doesn’t seem appropriate. In summing up this series, this final post will be focused on that word and the question, “what is the problem that needs to be solved?”.

Digital Identity and Blockchain – Its Place in Newer Identity Models

In the first part of this series, we introduced the idea that traditional PKI-based digital identity solutions can potentially benefit from blockchain technology. We also touched on how blockchain is effectively a database tech that has properties which make it excellent for ensuring that data cannot be deleted or manipulated over time. Though we mentioned that one of the drawbacks of blockchain technology was related to the time it took for changes or transactions to be made, there is significant effort being made in this space, so we’ll ignore this potential downside, going forward.

Digital Identity and Blockchain – Should They Work Together?

As we move towards greater use of online services, and these services increase in value, we find ourselves interacting online in ways that involve sharing sensitive data or making transactions that have the potential for significant consequences. These kinds of interactions, that previously required in-person engagement and the presentation of government-approved photo identification, need equivalent methods of engagement that provide the same level of assurance online. When we can’t present our real-world identity to the service provider, we must present our digital twin, along with proof we are, in fact, the same person.

Self-Sovereign Identity and Government – Data Exchange

The previous post focused on identity as a single topic, pulling it away from the data exchange component where it has recently become muddled up. In terms of identity, self-sovereign identity (SSI) and traditional public key infrastructure (PKI) based offerings are, for the most part, on the same page. They put control in the hands of the user, mostly differing around trust, its levels, and where it comes from. For this post, the focus is on data exchange, where both SSI and PKI put much of the responsibility for privacy.

Self-Sovereign Identity and Government – Identity

There’s been a lot of talk recently on self-sovereign identity (SSI), as it appears to be the next “new thing” in the digital identity sphere, especially in the context of possibly replacing the traditional public key infrastructure (PKI) based offerings. Here, I aim to pull apart the kinds of identities we use every day; those in government-led society and those online, and find where self-sovereign identity might fit and where it’s not appropriate. I also want to discuss two aspects of SSI that often get bundled together and cloud the conversation - identity and data exchange. Since SSI relies on data exchange to simply identify ourselves, these two offerings get talked about as one, leading to misconceptions and limited opportunities. I’ll start with identity and uncover what’s important, where. In the second post, I’ll dive into data exchange, highlighting what needs to be considered to achieve a balance of transparency and trust, privacy, control, and security.

Increasing Maritime Safety in Indonesia - From Perilous Waters and Pirates to Modern Radio Communication

Cybernetica worked on a large-scale implementation of radio communication system for major Indonesian ports from 2012-2018. Over the course of the period, we completed over 60 installations and integrated different sites to provide central control and supervision of the system’s performance. The deployment was in compliance with Global Maritime Distress and Safety System (GMDSS), which is an integrated maritime communication system that uses terrestrial and satellite radio communication systems. The GMDSS ensures that ships can receive maritime safety information and send alarms regardless of their location.