Mr. Patipon Ponparee,
Design unit Team leader, ACA PACIFIC
I am the design unit team leader at ACA Pacific Group Co., Ltd. and was a machine designer & products analyst for technical clarification – having experiences as industrial automation designer, robot system designer, product life cycle management and pneumatic/hydraulic system designer. I provided technologies via automation and support in spare part management to Thailand industries 6 years in global company
Professor Dr. Thanaruk Theeramunkong,
President of Artificial Intelligence Associaition of Thailand
Dr. Kobkrit Viriyayudhakorn,
Committee Artificial Intelligence Associaition of Thailand
and CEO of iApp Technology Co., Ltd.
Mr. Somkiat Angsirikulthamrong
Regional Sales Manager
Entrust Datacard Asia Pacific Limited
New normal for Authentication, it’s time to go Passwordless and Touchless.
Mr. Ratchapon Jantana
ACA Pacific Group Co.,Ltd.
Ratchapon Jantana Experience in co-operating Sales and Engineer to manage a project, Improve Sales team with provide Product/Technical training, Providing Solution based-on Network Infrastructure and Network Security.
It is difficult to deny that mobile phone is the major factor in our living with many purposes – communication, entertainment, or even work. Many companies provide mobile phone for their employees, but how to make sure that the company could secure the valuable data of the organization on their mobile phones? Meanwhile, privacy preservation is the important thing to consider. Find out the answer together with the great solution from Lookout in our session.
Mr. Norihiko MAEDA
Director of CEO Office at FFRI Security, Inc and director of JNSA (Japan Network Security Association, NPO)
Director of CEO Office at FFRI Security, Inc. based on Japan, also the Chair of
Survey and Research Committee of JNSA(Japan Network Security
Association, NPO) and a fellow of ISOG-J (Information Security Operation
providers Group Japan) as well.
Norihiko has over 13 years career of The Internet technology and cyber
security, started his career as a network and UNIX server engineer at an
ISP in Japan. After that, dived into cyber security world at Kaspersky
Lab from 2007 as a researcher and evangelist about cyber security
technology and policy, and he joined in FFRI Security, Inc. from 2019.
For many years and nowadays he is interested in and focusing on malware,
incident response, network security, and the relationship between cyber
and physical world.
B.A. in Political Science and Economics, Waseda University, Japan.
How to use VR/AR solutions and possibilities in training for organizations
What is computer vision?
Any type of technology in which a computer is tasked with digitizing an image, processing the data it contains and taking some kind of action. The field of computer science that focuses on replicating parts of the complexity of the human vision system and enabling computers to identify and process objects in images and videos in the same way that humans do. Until recently, computer vision only worked in limited capacity
Artificial intelligence (AI) and innovations in deep learning and neural networks, the field has been able to take great leaps in recent years and has been able to surpass humans in some tasks related to detecting and labeling objects.
Computer vision in used:
Computer vision In Facial Recognition
Computer vision also plays an important role in facial recognition applications, the technology that enables computers to match images of people’s faces to their identities. Computer vision algorithms detect facial features in images and compare them with databases of face profiles. Consumer devices use facial recognition to authenticate the identities of their owners. Social media apps use facial recognition to detect and tag users. Law enforcement agencies also rely on facial recognition technology to identify criminals in video feeds.
In recent years the SEA Region has become the focus for international companies expansion plans. The newest “e-Conomy SEA” Report by Google, Temasek and Bain & Company foresees a 300 Billion USD internet economy market by 2025. However many global companies have failed, often due to the lack of ‘regionalization’. Uber would be one of the most prominent and recent examples. It is therefore important to understand the “Why” and “How” current global trends have developed, to explain not only “What” the current trends are, but also “Which” of these trends have potential to be successful in South East Asia.
ปัจจุบันการค้าขายออนไลน์มีบทบาทมากขึ้น ลูกค้าสามารถสั่งซื้อสินค้าได้ตลอดเวลา แม้ในยามค่ำคืน Chatbot สำหรับการค้าขายจึงมีส่วนสำคัญในการช่วยปิดการขายของลูกค้าได้ จึงเหมาะสมกับ SME ที่มีสินค้าที่ขายออนไลน์ได้มาศึกษาเรียนรู้ในการสร้าง Chatbot อย่างง่ายด้วยตัวเอง
ด้วยเทคโนโลยี Internet of Thing พบกับกรณีศึกษาการปรับปรุงกระบวนการผลิต ในโรงงานอุจสาหกรรมแปรรูปอาหารจนถึงวิสาหกิจชุมชน สร้างแนวคิด ปรับเปลี่ยน ลดต้นทุน เพิ่มกำไร เพื่อเข้าสู่การบริหารจัดการในยุค 4.0
ABFinder enables indoor location of things and people visible. It can be utilized to free-addressed offices, construction sites and factories to see where things and others currently are located. We introduce how it works and show our new device that can be used in our service
Since 2004, he has been working in the field of new technologies for education. Expert in edTech products and multimedia. Graduated two faculties in University of Economics in Wroclaw (Management & Logistics) and attended one-year post Diploma Course (International Trade) Holmes Institute in Sydney. A member of the Polish Accreditation Committee at the Ministry of National Education and lecturer at several Universities. Has experience in operations on foreign markets at 5 continents.
Pantavanij has been working with leading enterprise organizations to start their Digital Transformation journey with eProcurement Platform adoption. We support our customers to achieve procurement process efficiency with the effective data exchange between buyers and suppliers through our Platform. The ultimate goal is opportunity for further cost reduction through the comprehensive spend analysis.
TP-Link provides the easiest way to access and manage your Internet.
Timing and synchronization are indispensable in our increasingly digital, networked world. Precise, accurate time enables virtually all infrastructures such as Datacenters, Wired and Wireless communications, Financial exchanges, industrial networks, smart power grid, IoT and other secure communications. Wireless networks, for example, rely on highly accurate timing and synchronization for smooth cell-to-cell transfers of the mass of voice, video and mobile data deluging the networks on a daily basis. Precise timing is similarly vital for financial networks processing billions of dollars in transactions daily.
Achieving highly accurate precision time is no easy feat from a technology perspective, so it’s important to find a resource you can trust. Our end-to-end timing solutions generate, distribute and apply precise time for multiple industries, including communications, aerospace/defence, IT infrastructure, financial services, industrial and more. Our customers range from communications service providers and network equipment manufacturers to governments and their suppliers worldwide.
the internet of things will be as transformative as the industrial revolution. Literally the way that every single school, hospital, warehouse, government organization and business connects to the physical world around them, will change.
The Defender for IoT Adapter delivers enterprise-grade performance and personalized protection for vulnerable wired devices.
Placed between the network and the device, the Defender Adapter works in conjunction with the Defender Application
(a value add application on the Extreme Cloud Appliance) to secure, isolate, track and monitor IoT devices.
Applying Deep Learning AI to Cyber Security
Has the news of the looming recession made you concerned about your business? Are you anxious about the economy and feeling that you are losing control? Join the Recession-Proof Your Business session and get the survival strategies. This presentation will help you be proactive and ready for whatever comes your way in the marketplace.
Key components that together can build your organization’s back-end infrastructure to power your own digital transformation.
Suggest products. Strong points. Customer groups.
Smart city initiative is currently a hot topic with the empowerment of AI and Big Data. How do behavioral data affect us in daily life and corporations in their business opportunities?
“virtual Idol System” combine multiple technologies. It integrates instant body motion capture, finger motion capture, facial recognition control, and voice control systems into a single all-in-one solution. This system simplifies the traditional computer graphics(CG) animation production process, which typically involves actions, facial expressions, voice-over dubbing, special effects, etc., and accomplishes real-time output. While users normally need to produce CG animation by adjusting frames one by one, this system greatly reduces production effort and time. The system supports live broadcast as well as live-action images import. It allows virtual idols to perform live on stage or at events and interact instantly with the audience. It can also be used in animation production, webcasting and offline performances.
Presentation of three user cases on their objectives, challenges, and sourcing process: a commercial office, a residential clubhouse, and a school campus. Our thoughts as a vendor in promoting this kind of green IoT+IAQ PropTech in Asia region will be shared too.
In the new technologically advanced era, opportunities are everywhere. Small and Medium business operated through the internet by 1-2 people companies up to 50-200 are very common. Even though business is conducted on an advanced level, the management and operations for most of these SMEs are still relatively not streamlined and non integrated, as traditional ERPs are simply too expensive. We wish to share a fully integrated, cost effective, and new way to operate and manage your ‘smart business, all in one’.
IMGIBBLE is an online platform that allows distributed teams to provide frame-accurate, online feedback for videos.
On demand logistic
Reskill and Upskill
Competing in today’s business landscape as a young startup.
Location intelligence is achieved via visualization and analysis of geospatial data to empower understanding, insight, decision-making, and prediction. By adding layers of data—such as demographics, traffic, and weather—to a smart map, organizations gain location intelligence as they understand why things happen where they do. As part of a digital transformation, many organizations are relying on geographic information systems (GIS) technology to create location intelligence. See how businesses are using location intelligence to gain competitive advantage.
Nowadays we are in digital disruption era. It’s the age where you become innovative or just disappear, no exceptional case even for B2B business. Everyone seeks for the way to improve their business. Digital transformation is the key. They all know customer centric approach is the sure way to guarantee their success. But the thing is the majority of companies don’t have a point of reference if what they are doing will drive better result in customer experience. With this section, we will introduce what is CRM and why is it important to help your B2B business grow. How to improve your sales process and bring the best result in customer satisfaction using CRM? Drive more revenue, build customer base with sustainable growth.
Many Companies/Organizations are looking forward to improve, their businesses, to reduce expenses and maximize their profit by implementing Software ERP. However, most of the project failed because of a varieties of problems. Therefore, Thailand ERP Community by Focus One Software has absolutely achieved and succeed by using an Agile implementation and platform with more than 100-customer satisfactions and experiences.
How to uses Services F1 Application to reduce mistake and improve services efficiency , and analyse data for services improvement.
Chatbots are not just the Q&A robot, This session we will bring all of you to see,
how the chatbot & human can work together and turn information from conversations into action.
Uniquely designed to suit all lifestyles of people in the digital era, SPACESHIP E-learning is an online learning platform providing an innovative path for people to embark on an exciting journey of learning.
What is ERP?
Did you have any Business Continuity Plan(BCP) in your company?
And do you know what will change to use public cloud?
Public cloud is convenience but just only IT system. Its NOT MAGICAL TOOL.
Just moving to a public cloud isn’t enough.
Let’s learning from some of customer case in incident.
If you want to implement cybersecurity at your organization. What is the first things you have to do ? Let us tell you.
Innovations and new technologies for business in digital era.
WORM (Write Once, Read Many) – When WORM is enabled, data written in this Shared Folder will remain as read-only (protected from modify/delete) until the end of the specified retention days. If a Shared Folder is enabled with WORM, this Shared Folder cannot be deleted with data still inside.
Purpose of WORM is to satisfy the demand for compliance, data archive, electronic record protection, prevent intentional and unintentional deletion of files, virus attack.
WORM is applicable for fields and industries such as Security, Education, Medical, Finance, Research facility, Patents, Government Agencies or Large Enterprises that have a high demand for data security.
Nowadays, most entrepreneurs are selling products and services by online. While the global society is entering the cashless era. To change your business and create a seamless payment experience. Is, therefore, the key to driving your online business to grow in the future.
Adezy is Marketplace that holds the largest collection of Out-Of-Home Media around the world. An alternative way to do OOH advertising with many useful features : EZY Media Planner, EZY Inventory Management, EZY Location Analysis.
The system is extremely flexible, allowing employees to clock in and out from a Fingerprint & Proximity Card Reader or a web-browser. Unlike other systems, all the clocking data, no matter what the source, is aggregated online for easy editing and reconciliation.
Lessons learned after doing enterprise software for more than 10+ years for clients in Scandinavia and Thailand.
Smart Solutions for Automobiles
Threats are forever evolving, Melissa Virus caused over a $1 Billion in damage during 1999 then Locky Ransomware became just as destructive in 2016. Years ago the primary form of attacks was what we’d now call generic malware and which today only makes up a small percentage of cyberattacks.
Various opportunity and preferential package would be explanined
Brings drastic cost reduction for system development and operations and maximizes the value of various data sources across organizations without programming.
HULFT is the system integration solution based on file and data for customers to manage important business information with efficient, high-quality, and low-cost way.
In order to utilize the data, it is necessary to understand the data.
Introducing the steps to data utilization.
Outline of service ‘kintone’- Case study about kintone
Introduction: Importance of transform text address to geolocation and fast analyzing potential areas.
Now more than ever, IT plays an increasingly important role for businesses looking to grow and stay ahead of the competition. A highly reliable and centralized IT Operations enables your IT professionals to be more productive and effective. Learn how you achieve this and start your digital journey with Hitachi JP1.
In the age of advanced threats and sophisticated malicious insiders, security teams face an uphill task. In order to detect and mitigate security incidents, organizations must revisit their security monitoring strategy and ensure that they are equipped with the right set of tools. This session talks about the latest trends in realm of security information and event management (SIEM) and why it is important to incorporate machine learning techniques by leveraging user and entity behavior analytics (UEBA).
Distributed Ledger Technology (DLT) and blockchain have captured the interest of many financial institutions and corporations due to the promise of efficiency increases stemming from increased automation and fraud reduction. By creating a way to manage digitally scarce assets, blockchain technology for the first time in human history allows the creation of decentralized digital assets and the transfer of value with no settlement risk. The potential for companies to use blockchain technology to reduce fraud, increase payment efficient, and create new financial instruments is profound and should not be underestimated.