Slide 3

TeraFlow incorporates Machine Learning based security and Permissioned Distributed Ledgers based forensic evidence for multi-tenancy.

slide 2

TeraFlow provides transport network integration and autonomous network operations with a single point-of-entry for deployment of network resources.

Slide 1

TeraFlow delivers a new generation open source cloud-native SDN controller to provide smart connectivity services to B5G networks.

Objective 5. Accelerate the adoption and maximize the impact of the project.

The project consortium is committed to actively disseminating its vision, innovation and results, promoting its novelty and exploiting its technological advantages and business opportunities. Active and engaging dissemination, communications, technology transfer, standardization activities and outreach to open communities and technical/business liaison activities will be undertaken from the very beginning of the project. Moreover, the real-world pilots led by FISHY industrial partners are the key to proving the wider adoption of FISHY.

Deploy, validate and demonstrate the FISHY platform in heterogeneous, real-world pilots.

Heterogeneous and complementary pan-European ICT supply chain pilots are critical to proving FISHY platform useful. The pilots will primarily focus on complex ICT systems while integrating various stakeholders. The validation and benchmarking results will be primarily utilized by the European industry and will demonstrate the benefits brought by our platform solution FISHY.

Develop a metrology model and system for ICT supply chains leveraging trust among parties relying on distributed interledger technologies as well as forecasting and estimation concepts based on artificial intelligence methods.

A key component to system resilience is its traceability and metrology in terms of cyber resilience. To this end, FISHY addresses the need for accurately analysing composed ICT systems performance and trust in terms of cyber resilience and privacy effects. This is critical to mitigating the expected negative effects of cyber-attacks.