India's largest platform and marketplace for GCC & AI leaders and professionals

Sign in

India's largest platform and marketplace for GCC & AI leaders and professionals

3AI Digital Library

Hospitals are using Distributed Ledger in the vaccine rollout

3AI January 24, 2021

Two British hospitals are using a distributed ledger to track the cold storage of sensitive COVID-19 vaccines

Picture from freepik.com

    3AI Trending Articles

  • Left Shift Decisioning – a Paradigm Shift and a Key Differentiator for Banks in Recessionary Environment

    Featured Article: Author: Aditya Khandekar, President, Corridor Platforms India Left Shift – A software development concept The core concept of left shifting started from testing, where we shift the testing phase to earlier phases in the software life cycle. The goal is to test early, fix bugs close to source of issue and prevent backloading […]

  • A hacker broke into a Florida Water Treatment Plant

    A hacker broke into a Florida water treatment plant and ordered it to increase the amount of lye to extremely dangerous levels, officials said. . A hacker broke into a Florida water treatment plant and ordered it to increase the amount of lye in the water to extremely dangerous levels, officials said Monday. The plant […]

  • Role of Generative AI in the Realm of Generative AI

    Featured Article: Author: Ramana Kompally, Director – Data & Analytics, Cloudsufi Generative Artificial Intelligence (AI) has taken the world by storm and every organization is looking forward to having a pie in the cake and augmenting the portfolio. While a plethora of applications is being envisaged using Generative AI (Gen AI), there is one niche […]

  • Using AI to Outwit Malicious AI

    Robust Intelligence is among a crop of companies that offer to protect clients from efforts at deception. IN SEPTEMBER 2019, the National Institute of Standards and Technology issued its first-ever warning for an attack on a commercial artificial intelligence algorithm. Security researchers had devised a way to attack a Proofpoint product that uses machine learning to identify spam emails. The system produced email headers […]