Looking for my next
opportunity
to make a change.
The Application way.
With my skill in Diffusion and Adoption of Technology Innovation, Future Media – Techologies and Markets, Digital media - a radical change from dedicated broadcast to IP based streaming, and Grid-Forming Inverters: Principles and Practices, in Ph.D/Diploma Courses.
Theories on diffusion of Innovation (DoI) and technology acceptance models (TAM) will be presented. The theories behind technology acceptance models, including the theory of reasoned action and the theory of planned behavior, will be examined. Furthermore, in a triangulation perspective, the socio-psychologically based theories will be combined with market oriented theories and concepts regarding switching costs, path dependence, bandwagon or network effects, etc.
The different phases of the diffusion and adoption processes and the relevant theories to explain these phases will be examined, including innovation, diffusion, adoption, implementation and domestication.
The course will primarily take its point of departure and examples from the information and communication technology area but will also include examples from other technology areas.
Media landscapes have gone through major changes throughout the history and have been undergoing fundamental changes in recent years and will continue to do so in the near future. The changes have intensified in the last two decades starting with the digitalization of broadcast infrastructures and presently with the development of streaming platforms and the development of broadband infrastructures and cloud platforms that most likely will result in the end of dedicated infrastructures for media distributions. Time shifting, place shifting, video and audio on demand, and global networks for distribution of audio visual content are just a few examples of these changes. The implications are, e.g., the disruption of the traditional media distribution and delivery forms, distribution of content markets, disruption of home video markets, disruption of the record and music industry. Furthermore, there are major changes in the usage and consumption behavior connected with terminal devices and the combination of audio visual applications and services with social networking applications.
These changes are driven by the interplay between technological developments, market developments and new business models and the policy and regulatory environment. The aim of this course is to discuss the driving forces for such changes and to examine the implications for the market, industry, users and the technological development.
Convergence
New business models
Standardization processes
Dedicated TV and radio infrastructures - the current status and future perspectives
Linear and nonlinear audio-visual services
Over the Top (OTT) and hybrid platforms
Development of fixed and mobile broadband infrastructures, including LTE and 5G as platform for audio visual services
Market developments and usage
Inverter-based generation and transmission systems are vastly used in modern power grids, driven by the sharp cost reduction of renewable energy resources and the advances of power electronics technology. To secure a stable inverter-based power system, the grid-forming control is increasingly used with grid-connected inverters, who operate as voltage sources to regulate the grid voltage and frequency. There is thus an important need to address this timely and important topic among both power electronics and power system engineers and researchers. This course intends to provide a systematic discussion on the principles and design practices of grid-forming inverters. The main topics include, but not limited to
Grid-synchronization of inverters
From synchronous generators to grid-forming inverters
Overview of virtual synchronous generators
Synchronous power control – damping, inertia and virtual impedance
Small-signal modeling and stability analysis
Design-oriented transient stability analysis
Active damping of power oscillations
This is me
Typical attacks on critical infrastructures: How hackers can abuse Internet of Things, and how attacks can be prevented and detected. Recently, methods from fault detection originated in control theory found its application in detection of cyber-attacks. In the second part of the service we will give public-key cryptosystems, which are widely used for secure data transmission. Public key cryptography aims at solving the problem of how two parties can communicate securely when they have not agreed on some secret common key, which is often the case in for example communication through the internet. It includes both public key encryption, which guarantees the secrecy of a message, and digital signatures, which provides authentication and integrity. In connection to this, we will also discuss key exchange. We will introduce some of the more classical, but still widely used, public key cryptosystems, such RSA and El Gamal/ Diffie-Hellman and we will discuss which security properties are usually required from them nowadays.
Subsequently, we will work the problem of secure multi-party computation, which company how to "compute on encrypted data": how several mutually distrustful parties can collaborate to jointly perform computations involving private data without needing to actually reveal their private information to the others.
Content Strategy Writing
Campaign Management
Branding Social Media
Events Content Fundraising Creative Initiatives
I advise companies
and NGOs in initiatives
and campaigns
Startup and Management of a Biotech Company above
Patenting of the idea
To writing a business plan
finding investors, and convince them for investing in the idea
setting up a development plan
pre-clinical testing, pharm/tox studies
GMP production of medicine
formulation, route of administration of the drug
choosing indications
managing a company and employees, and many more.
Using MS Project
Net present value (NPV) calculations
Clients &
Collaborations
Challenges in innovation management and the staging of innovative processes
Innovation as heterogeneous processes of interaction involving actors, artefacts and knowledge
Innovation as a journey characterized by uncertainty, ambiguity and complexity
Innovation between rational analytical and interpretive processes, exploitation and exploration
Innovation as networking, brokering and collaboration in and between organizations
From planning and calculation to social learning and translation of interests
‘Co-creation’ and ‘path creation’ as heterogeneous network building,
Staging and navigation of temporary spaces for innovation across knowledge boundaries