#Fiscal_Digital performs election audits using blockchains to create inmutable versions of official election results documents and then leveraging crowdsourced OCR to compare with official results. Initially begun in Guatemala as a response to the june 2019 general election fiasco, now #Fiscal_Digital aims to spread worldwide starting with Latin America due to regional similarities in (1) voting table election results procedures and (2) paper ballot systems.
Visit our web: http://www.globaliim.com/
The objective of the Global Institute for IT Management (GIIM) is to impart a complete, flexible, and immediately actionable set of best practices by an international group of over 300 prominent academics, practitioners, and management consultants, to prepare IT thought leaders and business executives for the challenges and opportunities that lie ahead. The institute provides a comprehensive set of 32 IT management certificates (over 130 courses).
After launching its initial offerings in 2012 with about 100 students, GIIM is primed to have over 1,000 candidates participating in programs this year. GIIM participants range from university students to CEOs from around the globe. The sweet spot for GIIM Certificates are IT professionals with 10+ years of experience.
The Dhonor blockchain allows people to sign up anonymously on the platform and in the event of an accident, their organs can be used to save the lives of people on the organ wait list. The technology uses DNA information to perform smart matches, consent management and verifies the providence/chain of custody of the organs. The technology also facilitates the distribution of aid for families that qualify based on the hardship resulting from the death of the donor.
SIMBA Chain Inc. is a cloud-based, blockchain-as-a-service (BaaS) platform, enabling users across a variety of skill sets to implement dapps (decentralized applications). These apps allow direct connections between users and providers, eliminating third parties. The platform is tailored for both government and enterprise networks.
Everyone acknowledges that passwords are a weak link in enterprise security. You can lose them, share them, and crack them. Biometric authentication can strengthen legacy systems by adding an additional layer of security. With our technology, a company can deploy biometrics to replace tokens or passwords altogether. Either way, you can now truly verify the identity of the end user.