Point%20of%20View_edited.jpg

OUR SOLUTIONS

What we offer

ICON0_edited_edited_edited.jpg

REUSE 

Single-use disposable plastic bags are suffocating the planet, with 60,000 plastic bags being consumed in the U.S. every 5 seconds. They do not break down in landfill sites. Over time they release dangerous chemicals and become food for marine species.

ICON2_edited_edited_edited.jpg

RECYCLE

Recycling plastic bottles reduces pollution and lowers greenhouse gas emissions. Making plastic out of recycled resources uses about two-thirds less energy than making new plastic.  Turning recycled aluminum cans into new ones uses 95% less energy than what making new ones would take.

ICON3_edited_edited_edited.jpg

REFILL

Americans buy 29 billion water bottles a year. For every six bottles people buy, only one is recycled. Water bottles do not biodegrade, but rather photodegrade. This means that it takes at least up to 1,000 years for every single bottle to decompose, leaking microplastics and pollutants into our ecosystem.

ICON6_edited_edited.jpg

REPURPOSE

US fashion apparel is roughly a $800 billion market with an estimated $120 billion of leftover, unused and perfectly good fabric goes to waste annually. These raw materials could easily be repurposed in a variety of ways.

ICON4_edited_edited.jpg

REDUCE

Buildings account for 39% of energy-related carbon dioxide emissions annually. New buildings typically are not designed to optimize energy performance, and most existing buildings have not been upgraded with even the most basic and affordable energy efficiency strategies.

ICON5_edited_edited_edited.jpg

RENEW

U.S. Energy Information Administration (EIA) agreed to cut its greenhouse gas emissions by 26-28% by 2025 and 80% by 2050. As more businesses committing to renewable energy, the cybersecurity risk is increasingly higher stake for renewable energy producers to integrate with the main power grid.

HOW WE POWER THESE SOLUTIONS

With tens of billions of IoT devices connected and generating data is there a way to use data to create a better world?

By leveraging IoT data and edge computing, businesses can gain actionable insights to optimize resource usage, and accelerate the transition to renewable, reusable, non-toxic materials and energy throughout the supply chain. We believe that data is the key that will unlock numerous opportunities for businesses to create a more sustainable world.

 

Our mission at 99Bridges is to connect IoT data, providing a trusted data bridge and monetization system to enable a sustainable future. We designed our system from the ground up as a distributed system to enable data privacy, data trust, and data sharing. The result is a TRUSTED IOT DATA EXCHANGE SYSTEM that companies and their business partners can reply on for digital business transformation.

 

We called our system TG62.

 

TG62 is a distributed data exchange system designed to be a trusted system for business-to-business (B2B) Internet of Things (IoT) data sharing without compromising data privacy, security, and control.

 

Every business today has IoT data being generated at the edge of its operations. Be it a branch of a bank, a factory of a manufacturer, a store of a retailer, a refinery of an oil producer, or an airport of a city, the edge sensors and devices are all generating volume of IoT data. The data is siloed to each of the device’s own processing and storage ecosystem, making it difficult for the business to derive critical insights only possible by correlating all the data from all the edge sensors and devices.

 

In addition, extracting and normalizing the IoT data streams from sensors and devices are labor-intensive and time-consuming. Once processed, the data must be stored somewhere which increases the chance of exposing the data to privacy and security risks. Businesses and organizations want complete control of their IoT data. They want to own it and control who gets access to the data at a granular level.

Lastly, no business exists today without an ecosystem of suppliers and business partners. The ability for a business to share IoT data across the value-chain complying to the appropriate level of data privacy and security regulations is paramount. It enables the entire value-chain to be informed and adapt to business conditions in ways that can never be done before.

 

TG62 is an end-to-end system that enables a multi-party secure data exchange. Unlike other approaches, TG62 is completely distributed which means that data are not stored in our cloud but are indexed in the form of a data catalog which is then published and shared among the involved parties. The actual data remain in each business owner’s possession, where it belongs.

 

TG62 consists of three components:

 

Edge Data Guardian

 

Edge Data Guardian is a software module installed on an edge IoT gateway device. Its function is to establish connections to IoT sensors and devices at the edge. An auto-discovery process is triggered at installation and again at a user-definable schedule. Once connected, it collects data from the sensors and devices, normalizes the data following the defined data dictionary, encrypts the data for security protection, and entrusts the data via TG62’s Blockchain ledger. Finally, the data is stored on an edge storage device for approved applications and user access. At a user-definable schedule, the stored data is replicated and forwarded to the business’ data center, typically the corporate data lake.

 

Edge Data Port

 

Edge Data Port is a software module installed on a computer server. Its function is to extract the data forwarded by the Edge Data Guardian and automatically anonymizes the data based on the data privacy policy defined by the business. The anonymized data is then stored at the Edge Data Port for external party consumption. Edge Data Port authenticates an access request based on a security key issued by the Edge Data Bridge. It keeps track of an audit trail and accounting for data access.

 

Edge Data Bridge

 

Edge Data Bridge is a cloud-based software module. Its function is to manage data subscription, accounting, and billing, administration of data requests via secured access keys. Also, it manages the data catalog published by data owners in the distributed data exchange system. Once a data request is granted the application or user that requested the access will access the data directly through the Edge Data Port.