Menu
Sep 10

How To Make Your Smart Bin Smarter With IBM Bluemix

By Shyam Purkayastha | Cloud Computing , Internet of Things

Have you ever wondered how does an IoT-enabled smart bin works? If not then this blog post will show you exactly how to build one for yourself and you can use it too.

These days, there is a huge impetus on smart city initiatives across the world. One of the popular use cases of Smart City is the concept of Smart Bin. As we all know, efficient waste management is a growing challenge in urban areas. Hence, this Smart Bin concept has also drawn a lot of attention as part of automating the public infrastructure across cities.

Continue reading

Learn Raspberry Pi Hardware Programming with Python CHECK IT OUT

blockchain-comparison
Sep 06

Eight Blockchain platforms for rapid prototyping

By Shyam Purkayastha | Cloud Computing

Blockchain, the brainchild of a person or a group of people known by the pseudonym, Satoshi Nakamoto, was developed as a secured distributed database in 2008. Since then, it has found many applications in securing and streamlining distributed ledger and transaction based applications across the world. In this post, we explore eight  popular Blockchain platforms that you can try out to quickly build a prototype application.   

Continue reading
Blockchain for Agri Supply Chain
Sep 02

How Blockchain can Revolutionize Agricultural Supply Chain – Part 1

By Shyam Purkayastha | Cloud Computing

Information sharing has become the cornerstone of our daily activity. It has many modes like in the case of sharing information between two different companies, departments within an organization or among a group of individuals. When this information sharing becomes a requirement as part of a business process, it becomes all the more necessary to nurture it effectively. This greatly assists in improving the efficiency of the process and conducting audits when the need arises. Blockchain is one of those emerging technologies which is finding newer applications every day and many of these applications are addressing the problem of authentic information sharing.

Continue reading
>