Enterprise organizations spends a lot of time and money on establishing trust when shared date is presented to others and might rely on third parties. Blockchain technology helps organizations to solve this problem without the need for third parties. Blockchain depends on cryptography, distributed ledgers and consensus protocols to establish the trust between participating entities. Permissioned Blockchain offers features that suits the enterprise environment like accountability where all actions are traceable and privacy where the details of the actions are visible to authorized parties only. Permissioned Blockchain platforms are the toolkits that helps in building new applications that implement new business models or enhance old workflows based on Blockchain technology. By the end of this tutorial, attendees will be able to setup development environment and build quick proof of concept projects based on two open source permissioned Blockchain platforms (namely Hyperledger Fabric and Corda).
{"title":"Hands-on Permissioned Blockchain Platforms","authors":"Mahmoud M. Abdallah","doi":"10.1145/3531056.3542760","DOIUrl":"https://doi.org/10.1145/3531056.3542760","url":null,"abstract":"Enterprise organizations spends a lot of time and money on establishing trust when shared date is presented to others and might rely on third parties. Blockchain technology helps organizations to solve this problem without the need for third parties. Blockchain depends on cryptography, distributed ledgers and consensus protocols to establish the trust between participating entities. Permissioned Blockchain offers features that suits the enterprise environment like accountability where all actions are traceable and privacy where the details of the actions are visible to authorized parties only. Permissioned Blockchain platforms are the toolkits that helps in building new applications that implement new business models or enhance old workflows based on Blockchain technology. By the end of this tutorial, attendees will be able to setup development environment and build quick proof of concept projects based on two open source permissioned Blockchain platforms (namely Hyperledger Fabric and Corda).","PeriodicalId":191903,"journal":{"name":"Proceedings of the Federated Africa and Middle East Conference on Software Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127776947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 2019, the failure rate of startups was 90%. Technology Startups (aka. Tech Startups) had the highest rate of failures at 63%. One of the causes of this high failure rate in technology startups is the wrong technical decisions and practices taken and adopted by these companies. This tutorial describes 6 technical tips that can help technology startups truly become “Lean” to pave the way for success. The 6 technical tips will cover areas such as programming languages, development platforms, cloud-native architectures, testing and big data.
{"title":"6 Technical Tips for Tech Startups","authors":"A. Misbah","doi":"10.1145/3531056.3542758","DOIUrl":"https://doi.org/10.1145/3531056.3542758","url":null,"abstract":"In 2019, the failure rate of startups was 90%. Technology Startups (aka. Tech Startups) had the highest rate of failures at 63%. One of the causes of this high failure rate in technology startups is the wrong technical decisions and practices taken and adopted by these companies. This tutorial describes 6 technical tips that can help technology startups truly become “Lean” to pave the way for success. The 6 technical tips will cover areas such as programming languages, development platforms, cloud-native architectures, testing and big data.","PeriodicalId":191903,"journal":{"name":"Proceedings of the Federated Africa and Middle East Conference on Software Engineering","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Open source Software (OSS) ecosystems have had a tremendous impact on computing and society, while their sustainability poses great challenges to both practitioners and researchers. We utilize vast collections of open data produced by distributed version control and social media to discover the mechanisms by which such ecosystems form and operate, which we call open source software sociology.
{"title":"Open Source Software Digital Sociology: Engineering Open Source Software Ecosystem for Impact and Sustainability","authors":"Minghui Zhou","doi":"10.1145/3531056.3542767","DOIUrl":"https://doi.org/10.1145/3531056.3542767","url":null,"abstract":"Open source Software (OSS) ecosystems have had a tremendous impact on computing and society, while their sustainability poses great challenges to both practitioners and researchers. We utilize vast collections of open data produced by distributed version control and social media to discover the mechanisms by which such ecosystems form and operate, which we call open source software sociology.","PeriodicalId":191903,"journal":{"name":"Proceedings of the Federated Africa and Middle East Conference on Software Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125882395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is limited availability of mobile money transaction datasets from Sub-Saharan Africa for research because transaction data records are sensitive in nature and therefore raise privacy concerns. This has in turn hindered the potential to study fraudulent patterns in mobile money transactions so as to propose realistic mitigation measures based on Machine Learning Approaches to the prevailing financial fraud challenges in the region. This research presents mobile money scenarios that should be considered in order to implement a simulator that can harness synthetic datasets for mobile money transactions from Sub-Saharan Africa so as to carry out fraud detection research. These scenarios include the definition of a mobile money ecosystem with processes used by actors such as mobile money agents, clients, merchants and banks to interact with each other in mobile money operations. There is also a need for a real mobile money dataset to extract statistical information and diverse fraudulent behaviours of actors and fraud examples in mobile money markets. This research uses the design considerations to examine process-driven techniques such as numerical simulation, agent-based modeling, and data-driven techniques such as neural networks that can be leveraged to generate synthetic datasets for mobile money transactions. Common data generation toolkits like PaySim, AMLSim, RetSim and ABIDES that are based on these techniques have been examined. The design considerations are used to design a realistic model known as MoMTSim based on real mobile money processes and agent-based modeling techniques that can be implemented to generate synthetic transaction datasets for mobile money with fraud instances. This will facilitate fraud detection research. The synthetic datasets eliminate data privacy risks, are easy and faster to obtain, and are cheap to experiment with. With the proposed model, different research groups can move to the implementation stage to realise a model for synthetic data generation for mobile money transactions from the Sub-Saharan region.
{"title":"Scenario-based Synthetic Dataset Generation for Mobile Money Transactions","authors":"Denish Azamuke, Marriette Katarahweire, Engineer Bainomugisha","doi":"10.1145/3531056.3542774","DOIUrl":"https://doi.org/10.1145/3531056.3542774","url":null,"abstract":"There is limited availability of mobile money transaction datasets from Sub-Saharan Africa for research because transaction data records are sensitive in nature and therefore raise privacy concerns. This has in turn hindered the potential to study fraudulent patterns in mobile money transactions so as to propose realistic mitigation measures based on Machine Learning Approaches to the prevailing financial fraud challenges in the region. This research presents mobile money scenarios that should be considered in order to implement a simulator that can harness synthetic datasets for mobile money transactions from Sub-Saharan Africa so as to carry out fraud detection research. These scenarios include the definition of a mobile money ecosystem with processes used by actors such as mobile money agents, clients, merchants and banks to interact with each other in mobile money operations. There is also a need for a real mobile money dataset to extract statistical information and diverse fraudulent behaviours of actors and fraud examples in mobile money markets. This research uses the design considerations to examine process-driven techniques such as numerical simulation, agent-based modeling, and data-driven techniques such as neural networks that can be leveraged to generate synthetic datasets for mobile money transactions. Common data generation toolkits like PaySim, AMLSim, RetSim and ABIDES that are based on these techniques have been examined. The design considerations are used to design a realistic model known as MoMTSim based on real mobile money processes and agent-based modeling techniques that can be implemented to generate synthetic transaction datasets for mobile money with fraud instances. This will facilitate fraud detection research. The synthetic datasets eliminate data privacy risks, are easy and faster to obtain, and are cheap to experiment with. With the proposed model, different research groups can move to the implementation stage to realise a model for synthetic data generation for mobile money transactions from the Sub-Saharan region.","PeriodicalId":191903,"journal":{"name":"Proceedings of the Federated Africa and Middle East Conference on Software Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134415420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Hamza, Yasser Ghanim, A. Nabih, Ahmed S. Elsheikh, Sherif S. Ibrahim
Digital transformation is achieved through heavily relying on information technology. It is becoming a global trend in all sectors and businesses. Education is a critical sector for the sustainable development and it has a great potential to achieve valuable and strategic outcomes by adopting technology and digital transformation strategies. Trends in this direction include smart schools, smart universities, and smart education in general. In response to these global trends and as part of its role as a catalyst for the technology in Egypt and as a software house for many standards and industry best practices, SECC launched an initiative for smart universities in Egypt. The initiative aims at defining a standard reference architecture for smart universities in Egypt under the name of Smart Universities Reference Architecture (SURA). SURA is typical example for enterprise architecture reference models applied to the universities business. It covers the four EA domains: business, data, applications and technology within a university specific architecture. The reference architecture is evolvable and is targeted to be continually updated to cope with recent and up-to-date advances in technology and educational standards and best practices. TOGAF9 is the primary framework applied in managing this initiative. Other complementary frameworks include COBIT5 for IT Governance and IT4IT for IT Management. This paper introduces SECC vision for the smart universities, the proposed capabilities that constitute the smart university vision, and the suggested reference architecture. SURA targets being a roadmap for digitally transforming universities in Egypt but it can be useful reference for any university around the world. As part of its strategic vision, SECC is studying the model applicability and needed customization for adoption in schools which have many similarities with universities from the perspective of targeting smart education services.
{"title":"SECC Smart University Reference Architecture","authors":"H. Hamza, Yasser Ghanim, A. Nabih, Ahmed S. Elsheikh, Sherif S. Ibrahim","doi":"10.1145/3531056.3542771","DOIUrl":"https://doi.org/10.1145/3531056.3542771","url":null,"abstract":"Digital transformation is achieved through heavily relying on information technology. It is becoming a global trend in all sectors and businesses. Education is a critical sector for the sustainable development and it has a great potential to achieve valuable and strategic outcomes by adopting technology and digital transformation strategies. Trends in this direction include smart schools, smart universities, and smart education in general. In response to these global trends and as part of its role as a catalyst for the technology in Egypt and as a software house for many standards and industry best practices, SECC launched an initiative for smart universities in Egypt. The initiative aims at defining a standard reference architecture for smart universities in Egypt under the name of Smart Universities Reference Architecture (SURA). SURA is typical example for enterprise architecture reference models applied to the universities business. It covers the four EA domains: business, data, applications and technology within a university specific architecture. The reference architecture is evolvable and is targeted to be continually updated to cope with recent and up-to-date advances in technology and educational standards and best practices. TOGAF9 is the primary framework applied in managing this initiative. Other complementary frameworks include COBIT5 for IT Governance and IT4IT for IT Management. This paper introduces SECC vision for the smart universities, the proposed capabilities that constitute the smart university vision, and the suggested reference architecture. SURA targets being a roadmap for digitally transforming universities in Egypt but it can be useful reference for any university around the world. As part of its strategic vision, SECC is studying the model applicability and needed customization for adoption in schools which have many similarities with universities from the perspective of targeting smart education services.","PeriodicalId":191903,"journal":{"name":"Proceedings of the Federated Africa and Middle East Conference on Software Engineering","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131769040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Financial services industry is one of the highly impacted industries with what is currently happening in the digital economy due to the “Digital Transformation” wave derived by the rapid evolution of the “Disruptive Emerging Technologies”. “FinTech” is the current dominating trend describing the role played by these technologies in the financial services industry. Although all financial sectors are affected, the insurance sector had been much disrupted due to not only the severe competition but also due to its data sensitivity and dependability. This makes insurance companies in an urgent need for the transparency and trust as well as the need to be “Data-Driven Enterprises” that competes through a “Data-Centric Strategy” that utilizes the power of “Big Data”. This made the “InsurTech” to become a standalone trend recently. The Blockchain technology can provide transparency and trust. However, having an "Enterprise-Wide Analytics" capability is the key strategic enabler to this needed data-centric strategy to make informed decisions that are inspired by data. Not to mention the competitive advantage that results from the synergistic effect of building a "Blockchain Analytics" capability specifically. Furthermore, many digital transformation initiatives are chaotic, Blockchain technology is under critical development and analytics is so time and money consuming. Traceability to strategic objectives are missing or implicit and no standardization is available. Something is needed to navigate these challenges and achieve this ambitious transformative vision. This paper will explain how “Value-Driven Enterprise Architecture”, with the “TOGAF” and the “Capability-Based Planning” technique, as a discipline and the “ArchiMate” as a modelling framework can provide a master blueprint for designing a “Blockchain Analytics" solution within an "Enterprise Wide Analytics" capability following the latest standards of the “Enterprise Data Lakes”. This blueprint will make the traceability to the strategic objectives explicit and provide the basis for the needed standardization. This paper cab be considered as a positioning paper that try to propose a vision for new research lines about this topic, which can be validated, enhanced, and extended through further empirical research projects in the future.
{"title":"Blockchain Analytics Reference Architecture for FinTech - A Positioning Paper: Advancing FinTech with Blockchain, Data Analytics, and Enterprise Architecture","authors":"Ahmed S. Elsheikh","doi":"10.1145/3531056.3531068","DOIUrl":"https://doi.org/10.1145/3531056.3531068","url":null,"abstract":"Financial services industry is one of the highly impacted industries with what is currently happening in the digital economy due to the “Digital Transformation” wave derived by the rapid evolution of the “Disruptive Emerging Technologies”. “FinTech” is the current dominating trend describing the role played by these technologies in the financial services industry. Although all financial sectors are affected, the insurance sector had been much disrupted due to not only the severe competition but also due to its data sensitivity and dependability. This makes insurance companies in an urgent need for the transparency and trust as well as the need to be “Data-Driven Enterprises” that competes through a “Data-Centric Strategy” that utilizes the power of “Big Data”. This made the “InsurTech” to become a standalone trend recently. The Blockchain technology can provide transparency and trust. However, having an \"Enterprise-Wide Analytics\" capability is the key strategic enabler to this needed data-centric strategy to make informed decisions that are inspired by data. Not to mention the competitive advantage that results from the synergistic effect of building a \"Blockchain Analytics\" capability specifically. Furthermore, many digital transformation initiatives are chaotic, Blockchain technology is under critical development and analytics is so time and money consuming. Traceability to strategic objectives are missing or implicit and no standardization is available. Something is needed to navigate these challenges and achieve this ambitious transformative vision. This paper will explain how “Value-Driven Enterprise Architecture”, with the “TOGAF” and the “Capability-Based Planning” technique, as a discipline and the “ArchiMate” as a modelling framework can provide a master blueprint for designing a “Blockchain Analytics\" solution within an \"Enterprise Wide Analytics\" capability following the latest standards of the “Enterprise Data Lakes”. This blueprint will make the traceability to the strategic objectives explicit and provide the basis for the needed standardization. This paper cab be considered as a positioning paper that try to propose a vision for new research lines about this topic, which can be validated, enhanced, and extended through further empirical research projects in the future.","PeriodicalId":191903,"journal":{"name":"Proceedings of the Federated Africa and Middle East Conference on Software Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132872994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Ogenrwot, Geoffrey Olok Tabo, Kevin Aber, J. Nakatumba-Nabende
The capstone project is a fundamental part of almost all science and engineering degrees. It is not only a requirement for the partial fulfillment of an accredited university programme but also a method of assessing the students’ general mastery of concepts, critical thinking, problem-solving, and transferable skills. Annually, final-year undergraduate students offering computing programmes in Uganda build innovative software solutions to real-world problems within and outside their community. Anecdotal evidence indicates that most of those innovations have the potential for commercialization and transformation into technology-based businesses. However, limited progress has been made to commercialize students’ projects, and promising solutions are “buried” within academic reports. To this end, our research aims to explain the challenges and opportunities in the commercialization of students’ capstone projects across two (2) undergraduate computing programmes (Bachelor of Science in Computer Science and Bachelor of Information Technology) offered at Gulu University in Uganda. Using exploratory research design, we reviewed eighty-six (86) capstone projects, curricula, and a facilitated students & stakeholders’ workshop report. This paper articulates factors hindering the commercialization of undergraduate software capstone projects and recommends mitigating measures. It also proposes a framework for extending capstone course design from a traditional curriculum structure to an inclusive industry and community-oriented approach capable of turning ideas into business start-ups. The findings from this research are expected to inform higher institutions of learning in Africa in developing novel pedagogical approaches for orchestrating (software) capstone project courses that are inclusive and profitable beyond the academic setting.
{"title":"From Undergraduate (Software) Capstone Projects to Start-ups: Challenges and Opportunities in Higher Institutions of Learning","authors":"Daniel Ogenrwot, Geoffrey Olok Tabo, Kevin Aber, J. Nakatumba-Nabende","doi":"10.1145/3531056.3542775","DOIUrl":"https://doi.org/10.1145/3531056.3542775","url":null,"abstract":"The capstone project is a fundamental part of almost all science and engineering degrees. It is not only a requirement for the partial fulfillment of an accredited university programme but also a method of assessing the students’ general mastery of concepts, critical thinking, problem-solving, and transferable skills. Annually, final-year undergraduate students offering computing programmes in Uganda build innovative software solutions to real-world problems within and outside their community. Anecdotal evidence indicates that most of those innovations have the potential for commercialization and transformation into technology-based businesses. However, limited progress has been made to commercialize students’ projects, and promising solutions are “buried” within academic reports. To this end, our research aims to explain the challenges and opportunities in the commercialization of students’ capstone projects across two (2) undergraduate computing programmes (Bachelor of Science in Computer Science and Bachelor of Information Technology) offered at Gulu University in Uganda. Using exploratory research design, we reviewed eighty-six (86) capstone projects, curricula, and a facilitated students & stakeholders’ workshop report. This paper articulates factors hindering the commercialization of undergraduate software capstone projects and recommends mitigating measures. It also proposes a framework for extending capstone course design from a traditional curriculum structure to an inclusive industry and community-oriented approach capable of turning ideas into business start-ups. The findings from this research are expected to inform higher institutions of learning in Africa in developing novel pedagogical approaches for orchestrating (software) capstone project courses that are inclusive and profitable beyond the academic setting.","PeriodicalId":191903,"journal":{"name":"Proceedings of the Federated Africa and Middle East Conference on Software Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122306894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed tracing traces requests as they flow between services. It has been widely accepted and practiced in industry as an important means to achieve observability in microservice architecture for various purposes such as anomaly detection and root cause localization. However, trace analysis in an industrial microservice system is often challenging due to the huge number of traces produced by the system and the difficulties in combining traces with other types of operation data such as logs and metrics. In this talk, I will first analyze the background and describe the industrial practice of distributed tracing and trace analysis. Then I will introduce our explorations on large-scale trace analysis for microservice anomaly detection and root cause localization.
{"title":"Large-Scale Trace Analysis for Microservice Anomaly Detection and Root Cause Localization","authors":"Xin Peng","doi":"10.1145/3531056.3542765","DOIUrl":"https://doi.org/10.1145/3531056.3542765","url":null,"abstract":"Distributed tracing traces requests as they flow between services. It has been widely accepted and practiced in industry as an important means to achieve observability in microservice architecture for various purposes such as anomaly detection and root cause localization. However, trace analysis in an industrial microservice system is often challenging due to the huge number of traces produced by the system and the difficulties in combining traces with other types of operation data such as logs and metrics. In this talk, I will first analyze the background and describe the industrial practice of distributed tracing and trace analysis. Then I will introduce our explorations on large-scale trace analysis for microservice anomaly detection and root cause localization.","PeriodicalId":191903,"journal":{"name":"Proceedings of the Federated Africa and Middle East Conference on Software Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yasser Ghanim, Soha Safwat Labib, Ahmed Bahgat ElSeddawy
Digital Transformation (DX) is achieved through utilizing digital technology in enabling innovative business models and creating new experiences for beneficiaries and end-users. It is becoming a global trend in all business domains and all sizes of business. DX is becoming increasingly crucial in entrepreneurship and in creating successful startups. The paper aims to set a research framework for studying the role of digital technologies and digital capabilities in enabling the performance of entrepreneurial startups. Based on prior studies, the paper explores research results on the impact of startups’ digital orientation and digital capability adoption that includes data collected from different sectors and business domains from different parts of the world. Literature review shall help identify the key variables related to digital transformation adoption, as well as setting a framework for measuring startups’ performance and growth as a dependent variable. The paper has the ultimate objective of applying the research framework to the Egyptian market. The global findings are compared with the literature related to the Egyptian technology entrepreneurs.
{"title":"Setting a Research Framework for Digital Transformation Role in Enabling Successful Entrepreneurship in Egypt","authors":"Yasser Ghanim, Soha Safwat Labib, Ahmed Bahgat ElSeddawy","doi":"10.1145/3531056.3531069","DOIUrl":"https://doi.org/10.1145/3531056.3531069","url":null,"abstract":"Digital Transformation (DX) is achieved through utilizing digital technology in enabling innovative business models and creating new experiences for beneficiaries and end-users. It is becoming a global trend in all business domains and all sizes of business. DX is becoming increasingly crucial in entrepreneurship and in creating successful startups. The paper aims to set a research framework for studying the role of digital technologies and digital capabilities in enabling the performance of entrepreneurial startups. Based on prior studies, the paper explores research results on the impact of startups’ digital orientation and digital capability adoption that includes data collected from different sectors and business domains from different parts of the world. Literature review shall help identify the key variables related to digital transformation adoption, as well as setting a framework for measuring startups’ performance and growth as a dependent variable. The paper has the ultimate objective of applying the research framework to the Egyptian market. The global findings are compared with the literature related to the Egyptian technology entrepreneurs.","PeriodicalId":191903,"journal":{"name":"Proceedings of the Federated Africa and Middle East Conference on Software Engineering","volume":"24 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128301066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This is a tutorial session on building professional IoT Applications Development training programs utilizing IoT Educational and Innovation Labs. This is an excellent information sharing tutorial utilizing our long experience and successful program for building Egypt IoT Labs and various IoT training curriculums. In this session, audience will learn what should be in an IoT Lab to provide professional training programs for IoT Application Developers, IoT System Integration Engineers and IoT Solution Architects as well as providing a quick executive management live training with live demos and live use cases for smart cities. In this tutorial we will explain and detail all IoT Value Chain components that should be available inside a professional IoT Educational and Innovation Lab including IoT Innovation Kits, Commercial IoT Devices, IoT Gateways for various wireless technologies (including SigFox, LoRaWan, BLE, WiFi, etc.) as well as IoT Application Enablement Platform that represents the most important component for application developers and system integrators and we will explain how those components are all gathered together in an educational environment for learning as well as a commercial live environment for live demonstration. A professional IoT Educational and Innovation Lab enables both of the training service provider organization and educational organization (Hi-Tech institutions or universities) to offer list of IoT Professional training curriculum courses including: Hands-on IoT applications development offered through Expert IoT lab. - IoT Value chain (devices, LPWAN wireless technologies, gateways, carrier networks, application enablement platforms, analytics platforms, device management platforms) - IoT Applications Development utilizing MasterOfThings IoT AEP (MQTT protocol understanding, device authentication, application development practices, access rights management, data visualization, etc.) - IoT Lab hands-on devices (practice the use and configuration of various IoT devices and innovation kits, configuring the IoT Gateways, complement end to end solution) Developing applications for Autonomous/self-driving cars offered through Advanced IoT lab - Self driving cars applications development (remotely monitoring and controlling the cars) - Advanced IoT Applications development utilizing MasterOfThings IoT AEP (customizing your backend events on the cloud) IoT Device prototyping and development (for computer engineering only). - Introduction to embedded systems - IoT Prototyping and development boards - Developing IoT device prototype
{"title":"Professional IoT Applications Development training utilizing IoT Educational and Innovation Labs: End-To-End IoT Value Chain for IoT Applications Development Training","authors":"Bassem Boshra Ghebrial","doi":"10.1145/3531056.3542763","DOIUrl":"https://doi.org/10.1145/3531056.3542763","url":null,"abstract":"This is a tutorial session on building professional IoT Applications Development training programs utilizing IoT Educational and Innovation Labs. This is an excellent information sharing tutorial utilizing our long experience and successful program for building Egypt IoT Labs and various IoT training curriculums. In this session, audience will learn what should be in an IoT Lab to provide professional training programs for IoT Application Developers, IoT System Integration Engineers and IoT Solution Architects as well as providing a quick executive management live training with live demos and live use cases for smart cities. In this tutorial we will explain and detail all IoT Value Chain components that should be available inside a professional IoT Educational and Innovation Lab including IoT Innovation Kits, Commercial IoT Devices, IoT Gateways for various wireless technologies (including SigFox, LoRaWan, BLE, WiFi, etc.) as well as IoT Application Enablement Platform that represents the most important component for application developers and system integrators and we will explain how those components are all gathered together in an educational environment for learning as well as a commercial live environment for live demonstration. A professional IoT Educational and Innovation Lab enables both of the training service provider organization and educational organization (Hi-Tech institutions or universities) to offer list of IoT Professional training curriculum courses including: Hands-on IoT applications development offered through Expert IoT lab. - IoT Value chain (devices, LPWAN wireless technologies, gateways, carrier networks, application enablement platforms, analytics platforms, device management platforms) - IoT Applications Development utilizing MasterOfThings IoT AEP (MQTT protocol understanding, device authentication, application development practices, access rights management, data visualization, etc.) - IoT Lab hands-on devices (practice the use and configuration of various IoT devices and innovation kits, configuring the IoT Gateways, complement end to end solution) Developing applications for Autonomous/self-driving cars offered through Advanced IoT lab - Self driving cars applications development (remotely monitoring and controlling the cars) - Advanced IoT Applications development utilizing MasterOfThings IoT AEP (customizing your backend events on the cloud) IoT Device prototyping and development (for computer engineering only). - Introduction to embedded systems - IoT Prototyping and development boards - Developing IoT device prototype","PeriodicalId":191903,"journal":{"name":"Proceedings of the Federated Africa and Middle East Conference on Software Engineering","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}