IoT and the Implications for Security Inside and Outside the Enterprise. Richard Boyer CISO & Chief Architect, Security
|
|
- Hector Albert Higgins
- 6 years ago
- Views:
Transcription
1 IoT and the Implications for Security Inside and Outside the Enterprise Richard Boyer CISO & Chief Architect, Security
2
3 INTERNET OF THINGS
4 THAT S GREAT BUT 4
5 ALL THINGS ARE NOT ALL EQUAL PERVASIVE NOT ALWAYS CONNECTED UNDERPOWERED AND SECURITY IS AN AFTERTHOUGHT
6 PERVASIVENESS OF IoT Creates New Infrastructure Dynamics IoT is on its way to being everywhere Especially in other people s infrastructures where you cannot control, modify or hold them accountable. Welcome to the EXONET The scope of IoT pervasiveness is bigger than the traditional Internet boundaries of internal and external and is a fundamental part of IoT. It exists in this greater exonet
7 WHY IS THIS IMPORTANT? LET S DO THE MATH Gartner 22,000,000,000 - IoT in 2017 * 50% = 11,000,000,000 - Enterprise IoT * 10% = 1,100,000,000 - Sensitive data/mission Critical * 10% = 110,000,000 - In the Exonet HP * 70% = 77,000,000 - IoT w/ security flaws in the Exonet 5,000,000 - Enterprise size companies Assumption Assumption Assumption TOTAL Vulnerable IoT in the Exonet PER ENTERPRISE Other places in the enterprise
8 NOT NECESSARILY ALWAYS CONNECTED, YET CREATING MORE DATA, SOME OF WHICH WILL BE HIGHLY SENSITIVE
9 HOPELESSLY UNDERPOWERED Many IoT devices are low power, low memory, and slow processors Existing security software is too heavy IoT devices may exist in environments where security cannot impact existing infrastructure Existing security paradigms are incompatible IoT devices may have intermittent connectivity Many existing security concepts require significant bandwidth and are always on
10 SECURITY IS AN AFTERTHOUGHT A large percentage of the current IoT, even in the enterprise, is driven by consumer market thinking.* * If you are worried about selling you the next thing, why would I care about the existing thing? According to Gartner, we ll have 20B additional IoT devices in the enterprise in the next three years 1. According to HP, 70% of existing products have security flaws 2.
11 IN IoT, PERHAPS, OUR OLD PARADIGMS NEED RETHINKING
12 WHAT GUIDANCE DO WE HAVE? 5.1 Network Segmentation and Segregation... Network segmentation and Segregation is one of the most effective architectural concepts that an organization can implement to protect its ICS There are four common themes that implement the concept of defense-in-depth Technologies at more than just the network layer. 2. Least privilege and need-to-know. 3. Separate information and infrastructure 4. Implement whitelisting 5.3 Firewalls... Firewalls can further restrict ICS inter-subnet communications between functional security subnets and devices. By employing firewalls to control connectivity to these areas, an organization can prevent unauthorized access to the respective systems and resources within the more sensitive areas. Firewalls for intra-site communications Is this practical in an Exonet world? Absolutely, in some cases. In many cases, probably not
13 A STRATEGIC CHANGE IN IOT SECURITY THINKING DISTRIBUTED TRUST MUTABILITY AUTONOMY DISPOSABILITY
14 IoT NEEDS TO HAVE DISTRIBUTED TRUST BUT FIRST, HOW DOES HIERARCHICAL TRUST WORK? Root Certificate Authority Issues Certificate That is embedded in Browser Issues root certificate to lower level authority The browser then can verify the whole chain and trust the connection to the server Intermediate certificate authorities Web Server Issues root certificate to lower level authority Issues certificate to web server Lower level authorities Even Lower level authorities Issues root certificate to lower level authority Any point of compromise in the trust chain, compromises everything below it Now imagine this when you operate 10,000 s of iot devices 14
15 IoT NEEDS TO HAVE DISTRIBUTED TRUST DISTRIBUTED TRUST ALIGNS WITH DISTRIBUTED IOT Any compromise to any authority Does not compromise the certificates Or any other authority End point receives all parts and assembles certificate. And we already use variations of this commonly in places like P2P networks and things like the space shuttle and aircraft avionics And we can have authorities anywhere 3 or more trust authorities generate part of the certificate and provide to end point 15
16 IoT NEEDS TO HAVE DISTRIBUTED TRUST With IoT distributed trust lays the foundation for identity everywhere in IoT: The more sensitive the data of an IoT device, the more assurance we need that the data is valid and from the expected source (proof of identity) The more inside exonet we are, the greater the risk of communication disruption, reachability and verification. And the more devices we have, the greater our need for devices to perform confident validation between themselves at the edge and beyond. 16
17 MUTABILITY CHANGE THE IoT GAME Question to the audience How many people here apply software patches to their phones and laptops moment they become available? How about in our data centers? Cloud Applications?? Simple answer we don t, the risks are too great. Why is that? 17
18 MUTABILITY CHANGE THE IoT GAME We ve been very good at building fragile applications How many applications are running in the data center UPDATE that restating them takes a 100 step procedure. If we have have a data corruption and have to recover well that s just a disaster Can t we do something different in IoT while a great many of our devices are still simple? 18
19 MUTABILITY CHANGE THE IoT GAME One potential way to address this is to build in mutability from the beginning and operationalize it. Every so often (Monthly? Weekly? Daily?) blow away the software and the firmware and maybe even add or remove functions regularly, operationally. As as we go along and make IoT complex, if we keep this up, we ve now solved so many security and operational risks. 19
20 AUTONOMY THINGS NEED THEIR OWN SPACES Thing Thing Thing Bad guys and malware need to reach your things to do most of their work. Being in a completely separate cryptographic communications space closes many holes. Thing Thing 20
21 DISPOSABILITY In all of security, remediation is probably the hardest task. How do we get back to where we were? How do we fix our problems? How do we do that quickly? Things are not desktops, or servers, or SaaS or any of those traditional human -oriented systems. We need to build many of our things with the assumption, they are, indeed disposable. When something happens, rip and replace. In fact, maybe we should even do this periodically as standard operating procedure
22 BRING IT TOGETHER DISTRIBUTED TRUST MUTABILITY AUTONOMY DISPOSABILITY Distribute Trust so IoT devices can manage identity from anywhere. Make IoT devices mutable so that we can update constantly Put IoT devices inside their own separate security networks separated from their physical network presence with existing low cost protocols. Dispose and replace at the first sign of issue as a standard practice 22
23 BRING IT TOGETHER SAID ANOTHER WAY KNOW IF IDENTITY CHANGES CONSTANTLY UPDATE TO LIMIT ATTACKS KEEP OUR THINGS SEPARATE Make Identity easy and everywhere that way we know compromise occurs By constantly updating and replacing, we limit the scope (or stop) the attack BUILD TO DISPOSE AND REPLACE Devices completely separated from the wild west of our internal and public networks you limit or remove the ability to compromise, what you cannot reach cannot be attacked. Operationalizing hacking is expensive, repeating that success is cheap. When we are able to dispose & replace cheaper than the bad guy, we tilt the costs back into our favor. 23
24 ACCELERATING THE TRANSFORMATION OF IDEAS FROM LAB TO MARKET
Securing IoT in the Enterprise
Securing IoT in the Enterprise Daniel Miessler May 2017 Securing IoT in the Enterprise Daniel Miessler, IOActive May 2017 About - Infosec for around 18 years - Mostly technical testing and enterprise consulting
More informationF5 Network Security for IoT
OVERVIEW F5 Network Security for IoT Introduction As networked communications continue to expand and grow in complexity, the network has increasingly moved to include more forms of communication. This
More informationNetworks of Things. J. Voas Computer Scientist. National Institute of Standards and Technology
Networks of Things J. Voas Computer Scientist National Institute of Standards and Technology 1 2 Years Ago We Asked What is IoT? 2 The Reality No universally-accepted and actionable definition exists to
More informationFirmware Security: Hot Topics to Watch
presented by Firmware Security: Hot Topics to Watch Spring 2018 UEFI Seminar and Plugfest March 26-30, 2018 Presented by Dick Wilkins (Phoenix Technologies, Ltd.) Agenda Introduction UEFI and the IoT Security
More informationIoT Strategy Roadmap
IoT Strategy Roadmap Ovidiu Vermesan, SINTEF ROAD2CPS Strategy Roadmap Workshop, 15 November, 2016 Brussels, Belgium IoT-EPI Program The IoT Platforms Initiative (IoT-EPI) program includes the research
More informationThe Art of Low-Cost IoT Solutions
The Art of Low-Cost IoT Solutions 13 June 2017 By Igor Ilunin, DataArt www.dataart.com 2017 DataArt Contents Executive Summary... 3 Introduction... 3 The Experiment... 3 The Setup... 4 Analysis / Calculations...
More informationSecurity of the Internet of Things
Danish Internet Day Security of the Internet of Things Mitigating infections spread through immunisation techniques Farell FOLLY, Ph.D Researcher folly.farell@unibw.de Copenhague, October 1st.!1 Agenda
More informationInternet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012
Internet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012 Outline 1. Principles of IOT : What and how? 2. Realization of IOT : Framework and design 2 Principles
More informationFOR IOT-DRIVEN & BUSINESS
FOR IOT-DRIVEN & BUSINESS INDUSTRIE TRANSFORMATION 4.0 WITH ARIS DR. JULIAN KRUMEICH SENIOR PRODUCT MANAGER ARIS NOVEMBER 13 TH, 2018 INTERNET OF THINGS WHY IT MATTERS? A majority of business processes
More informationIOT TECHNOLOGY AND ITS IMPACT
Presentation at the ABA National IOT Institute, Jones Day, Washington DC March 30, 2016 IOT TECHNOLOGY AND ITS IMPACT DR. VIJAY K. MADISETTI PROFESSOR OF ELECTRICAL AND COMPUTER ENGINEERING GEORGIA TECH
More informationITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Y.4552/Y.2078 (02/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET
More informationadministration access control A security feature that determines who can edit the configuration settings for a given Transmitter.
Castanet Glossary access control (on a Transmitter) Various means of controlling who can administer the Transmitter and which users can access channels on it. See administration access control, channel
More informationIERC Standardization Challenges. Standards for an Internet of Things. 3 and 4 July 2014, ETSI HQ (Sophia Antipolis)
www.internet-of-things-research.eu Standardization Challenges Standards for an Internet of Things 3 and 4 July 2014, ETSI HQ (Sophia Antipolis) Workshop co-organized by EC DG Connect and ETSI Dr. Ovidiu
More informationDRIVING REVENUE FROM THE INTERNET OF THINGS
DRIVING REVENUE FROM THE INTERNET OF THINGS There is a significant amount of information available around the subject of The Internet of Things (IoT) or The Internet of Everything (IoE). The UK Government
More informationBuilding Your DLP Strategy & Process. Whitepaper
Building Your DLP Strategy & Process Whitepaper Contents Introduction 3 DLP Planning: Organize Your Project for Success 3 DLP Planning: Clarify User Profiles 4 DLP Implementation: Phases of a Successful
More informationSecuring the Internet of Things Survey
A SANS Analyst Survey Written by John Pescatore Advisor: Gal Shpantzer January 2014 Sponsored by Norse 2014 SANS Institute Executive Summary The Internet of Things has been attracting a lot of buzz the
More informationSmart Cities A sua cidade está preparada para um ataque cibernético? Prof. Dr. Fabiano Hessel
Smart Cities A sua cidade está preparada para um ataque cibernético? Prof. Dr. Fabiano Hessel fabiano.hessel@pucrs.br Smart City: Which one? Why? Source: CISCO New Ecosystem The IoT chip market size, in
More informationIoT Technical foundation and use cases Anders P. Mynster, Senior Consultant High Tech summit DTU FORCE Technology at a glance
IoT Technical foundation and use cases Anders P. Mynster, apm@force.dk Senior Consultant High Tech summit DTU 2017 FORCE Technology at a glance Internet of Things devices everywhere! Gartners Hype cycle
More informationFour steps to IoT success
Introduction Businesses are using the Internet of Things (IoT) to connect the unconnected. By taking all their electro-mechanical assets and applying a digital layer a layer enabled by the Internet of
More informationDESIGN PHILOSOPHY We had a Dream...
DESIGN PHILOSOPHY We had a Dream... The from-ground-up new architecture is the result of multiple prototype generations over the last two years where the experience of digital and analog algorithms and
More informationDM Scheduling Architecture
DM Scheduling Architecture Approved Version 1.0 19 Jul 2011 Open Mobile Alliance OMA-AD-DM-Scheduling-V1_0-20110719-A OMA-AD-DM-Scheduling-V1_0-20110719-A Page 2 (16) Use of this document is subject to
More informationIoT Evidence Acquisition Issues and Challenges
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 1285-1293 Research India Publications http://www.ripublication.com IoT Evidence Acquisition Issues and Challenges
More informationTHE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO
THE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO APRIL 2017 No manufacturer, regardless of size or ingenuity, is immune to technology disruption. The question companies need to ask themselves isn t whether
More informationEx Libris Rosetta Privacy Impact Assessment
Ex Libris Rosetta Privacy Impact Assessment March 2018 1 - Table of Contents 1 - Table of Contents... 2 2 - Disclaimer... 3 3 - Purpose of this document... 4 4 - Main Findings and Conclusions... 4 5 -
More informationATND Series White Paper
Direct to Dante Protocol Why Dante Consultants, contractors, and end users have long been aware that when they ask for more out of their AV systems, they can expect the cost to rise usually exponentially.
More informationDigital Pathology, The Heart of the Lab, The Birmingham Heartlands Experience. Dr Bruce Tanchel Heart of England NHS Foundation Trust, Birmingham, UK
Digital Pathology, The Heart of the Lab, The Birmingham Heartlands Experience Dr Bruce Tanchel Heart of England NHS Foundation Trust, Birmingham, UK Disclaimer This project is a collaboration with Roche
More informationHow to Categorize Risk in IoT
How to Categorize Risk in IoT Defining use cases for IoT deployments lays the foundation for an end-to-end cybersecurity strategy that cuts across a broad and ever-changing threat landscape 2 Overview
More informationPoE: Adding Power to (IoT)
Sponsored by: PoE: Adding Power to (IoT) Sponsored by: December 20th, 2018 1 Today s Speakers Sponsored by: Steve Bell Senior Analyst - IoT Heavy Reading Mohammad Shahid Khan Chief Manager (PLM & AE),
More informationInternet of Things Conceptual Frameworks and Architecture
Internet of Things Conceptual s and Architecture 1 An IoT Conceptual Physical Object + Controller, Sensor and Actuators + Internet = Internet of Things (1.1) Source: An equation given by Adrian McEwen
More informationEx Libris. Aleph Privacy Impact Assessment
Ex Libris Aleph Privacy Impact Assessment March 2018 1 - Table of Contents 1 - Table of Contents...2 2 - Disclaimer...3 3 - Purpose of this document...4 4 - Main Findings and Conclusions...4 5 - Scope
More informationITU-T Y Functional framework and capabilities of the Internet of things
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2068 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2015) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL
More informationSecurity Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl
Security Challenges in the Internet of Things Dr. Sigrid Schefer-Wenzl Agenda Introduction Problem statement Open Internet of Things (IoT) Architecture Use Cases for Smart Cities Security Challenges Conclusions
More informationThe Pathway To Ultrabroadband Networks: Lessons From Consumer Behavior
The Pathway To Ultrabroadband Networks: Lessons From Consumer Behavior John Carey Fordham Business Schools Draft This paper begins with the premise that a major use of ultrabroadband networks in the home
More informationChapter 2. Analysis of ICT Industrial Trends in the IoT Era. Part 1
Chapter 2 Analysis of ICT Industrial Trends in the IoT Era This chapter organizes the overall structure of the ICT industry, given IoT progress, and provides quantitative verifications of each market s
More informationAlcatel-Lucent 5910 Video Services Appliance. Assured and Optimized IPTV Delivery
Alcatel-Lucent 5910 Video Services Appliance Assured and Optimized IPTV Delivery The Alcatel-Lucent 5910 Video Services Appliance (VSA) delivers superior Quality of Experience (QoE) to IPTV users. It prevents
More informationIoT Challenges & Testing aspects. Alon Linetzki, Founder & CEO QualityWize
IoT Challenges & Testing aspects Alon Linetzki, Founder & CEO QualityWize alonl@quality-wize.com 1 Alon Linetzki CEO and Founder of QualityWize 3 decades in sw engineering, testing, quality assurance and
More informationNetwork and IT Infrastructure Services for the IoT Store
Network and IT Infrastructure Services for the IoT Store Gaël Fromentoux and Nathalie Omnès (&) Orange Labs, 2 avenue Pierre Marzin, 22 300 Lannion, France {gael.fromentoux,nathalie.omnes}@orange.com Abstract.
More informationRedwall. Technologies LLC
Redwall Technologies LLC Redwall Mobile : Secure Mobile Technology Quick Brief 2015 Redwall Technologies LLC This material is for information purposes only and does not constitute and offer to sell any
More informationInternet of Things Telecommunication operator perspective
Internet of Things Telecommunication operator perspective Pierre Rust 1 MINES Saint-Étienne, CNRS Lab Hubert Curien UMR 5516 2 Orange Labs UMR CNRS 5516 SAINT-ETIENNE Goal: Giving you overview of the perspective
More informationSUBVERSIVE MANUFACTURERS COULD RUIN YOUR BUSINESS OPERATORS FACE FINES AND SHUTDOWNS DUE TO FCC CHEAT
SUBVERSIVE MANUFACTURERS COULD RUIN YOUR BUSINESS OPERATORS FACE FINES AND SHUTDOWNS DUE TO FCC CHEAT v042717 2017 1015 Maple Street, Danville, IL 61832 800-637-2645 watchfiresigns.com CONTENTS 01 Why
More informationInternet of Things: Cross-cutting Integration Platforms Across Sectors
Internet of Things: Cross-cutting Integration Platforms Across Sectors Dr. Ovidiu Vermesan, Chief Scientist, SINTEF DIGITAL EU-Stakeholder Forum, 31 January-01 February, 2017, Essen, Germany IoT - Hyper-connected
More informationEnduring the IoT storm to unlock new paths to value. How a governance model protects you from a blizzard of IoT risk
Enduring the IoT storm to unlock new paths to value How a governance model protects you from a blizzard of IoT risk Contents In the eye of the IoT storm 2 IoT governance basics 5 Navigating through the
More informationDATA LOSS PREVENTION: A HOLISTIC APPROACH
DATA LOSS PREVENTION: A HOLISTIC APPROACH Introduction Data breach has been one of the biggest fears that organizations face today. While DLP is not a panacea to such attacks, it should certainly be in
More informationDr. Tanja Rückert EVP Digital Assets and IoT, SAP SE. MSB Conference Oct 11, 2016 Frankfurt. International Electrotechnical Commission
Dr. Tanja Rückert EVP Digital Assets and IoT, SAP SE MSB Conference Oct 11, 2016 Frankfurt International Electrotechnical Commission Approach The IEC MSB decided to write a paper on Smart and Secure IoT
More informationEvaluation: Polycom s Implementation of H.264 High Profile
Evaluation: Polycom s Implementation of H.264 High Profile WR Investigates Polycom s Claim of No-Compromise Performance Using up to 50% Less Bandwidth November 2010 Study sponsored by: Table of Contents
More informationChoosing an Oscilloscope
Choosing an Oscilloscope By Alan Lowne CEO Saelig Company (www.saelig.com) Post comments on this article at www.nutsvolts.com/ magazine/article/october2016_choosing-oscilloscopes. All sorts of questions
More informationMIDTERM EXAMINATION CS504- Software Engineering - I (Session - 6) Question No: 1 ( Marks: 1 ) - Please choose one By following modern system engineering practices simulation of reactive systems is no longer
More informationITU-T Y Specific requirements and capabilities of the Internet of things for big data
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4114 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2017) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL
More informationExplain Hacking in 10 minutes Lorenzo Grespan. OWASP Newcastle November 2017
Explain Hacking in 10 minutes Lorenzo Grespan OWASP Newcastle November 2017 The Challenge Do a live hack In front of a public audience Business students and academics Ten minutes Bonus points: in a different
More informationPrime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT
Prime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT AIIA feedback October 2017 Ground Suite B 7-11 Barry Drive Turner ACT 2612 GPO Box 573 Canberra ACT 2601 61 2 6281 9400
More informationDELL: POWERFUL FLEXIBILITY FOR THE IOT EDGE
DELL: POWERFUL FLEXIBILITY FOR THE IOT EDGE ABSTRACT Dell Edge Gateway 5000 Series represents a blending of exceptional compute power and flexibility for Internet of Things deployments, offering service
More informationWhite Paper. Video-over-IP: Network Performance Analysis
White Paper Video-over-IP: Network Performance Analysis Video-over-IP Overview Video-over-IP delivers television content, over a managed IP network, to end user customers for personal, education, and business
More informationIMPLEMENTATION OF SIGNAL SPACING STANDARDS
IMPLEMENTATION OF SIGNAL SPACING STANDARDS J D SAMPSON Jeffares & Green Inc., P O Box 1109, Sunninghill, 2157 INTRODUCTION Mobility, defined here as the ease at which traffic can move at relatively high
More informationPERFACTORY Rapid Prototyping System. Troubleshooting Guide. PERFACTORY Machine
PERFACTORY Rapid Prototyping System Troubleshooting Guide PERFACTORY Machine Envisiontec GmbH Elbestraße 10 D-46768 Marl Germany Phone:+49 2365 915460 Email:support@envisiontec.de Disclaimer This troubleshooting
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 01 Introduction to IoT-Part 1 So, the first lecture
More informationOEM Basics. Introduction to LED types, Installation methods and computer management systems.
OEM Basics Introduction to LED types, Installation methods and computer management systems. v1.0 ONE WORLD LED 2016 The intent of the OEM Basics is to give the reader an introduction to LED technology.
More informationDEDICATED TO EMBEDDED SOLUTIONS
DEDICATED TO EMBEDDED SOLUTIONS DESIGN SAFE FPGA INTERNAL CLOCK DOMAIN CROSSINGS ESPEN TALLAKSEN DATA RESPONS SCOPE Clock domain crossings (CDC) is probably the worst source for serious FPGA-bugs that
More informationComments of the Authors Guild, Inc. Submitted by Mary Rasenberger, Executive Director
Before the Copyright Office Library of Congress In the Matter of ) ) Mandatory Deposit of Electronic Books Available Only Online ) Docket No. 2016-3 ) Comments of the Authors Guild, Inc. Submitted by Mary
More informationThe Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices. Beverly Kracher, Ph.D. Business Ethics Alliance
The Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices Beverly Kracher, Ph.D. Business Ethics Alliance Creighton University Omaha, Nebraska 68178 402-280-2235 beverlykracher@gmail.com
More informationRevolutionaryText delivers a SaaS-oriented, patent-pending process developed by Reesa Parker, William Weber, and Harvey Schulman.
RevolutionaryText, LLC RevolutionaryText delivers a SaaS-oriented, patent-pending process developed by Reesa Parker, William Weber, and Harvey Schulman. RevolutionaryText Leadership Reesa Parker, President
More informationIoT Strategy for CSPs Seeking Greater IoT Monetization
IoT Strategy for CSPs Seeking Greater IoT Monetization Joern Kropfgans Partner Communications Sector, IBM Services Raj Cherchattil CTO, Telecom, Media & Entertainment, IBM 2018 TM Forum 1 Beyond connectivity
More informationDETEXI Basic Configuration
DETEXI Network Video Management System 5.5 EXPAND YOUR CONCEPTS OF SECURITY DETEXI Basic Configuration SETUP A FUNCTIONING DETEXI NVR / CLIENT It is important to know how to properly setup the DETEXI software
More informationIntelsat-29e Interference Mitigation Testing. Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites
Intelsat-29e Interference Mitigation Testing Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites Introduction Networks are constantly under attack from entities
More informationInterview with Panos Panay For podcast release August 1, 2016
1 Interview with Panos Panay For podcast release August 1, 2016 KENNEALLY: In Boston, a single mile and 17 years separate two technology initiatives with the power to reshape the music industry. The first
More informationInternet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017
Internet of things (IoT) Regulatory aspects 1 Trilok Dabeesing, ICT Authority 28 June 2017 2 IoT Regulatory aspects IoT - the interconnection via the Internet of computing devices embedded in everyday
More informationMY OPENING KEYNOTE AT INTERNET OF THING S WORLD 2016
MY OPENING KEYNOTE AT INTERNET OF THINGS WORLD 2016 EPISODE 53 PODCAST TRANSCRIPT Slide 1: Welcome Slide 2: Build a better mousetrap, and the world will beat a path to your door. This quote is attributed
More informationIntelsat-29e Interference Mitigation Testing Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites
Intelsat-29e Interference Mitigation Testing Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites 7922-Inteference-Mitigation Introduction Networks are constantly
More informationWhat is TEMPEST Chapter 1
TEMPEST Engineering and Hardware Design Dr. Bruce C. Gabrielson, NCE 1998 What is TEMPEST Chapter 1 Introduction This text presents an overall introduction to classical information theory, basic communications
More informationIoThings Milano Maggio 2017 Barbara Pareglio GSMA IoT Technical Director. Mobile IoT: 3GPP standard per reti LPWA e IoT security
IoThings Milano Maggio 2017 Barbara Pareglio GSMA IoT Technical Director Mobile IoT: 3GPP standard per reti LPWA e IoT security 2 Introduction of the GSMA Content Understanding IoT and the market opportunity
More informationAXIS M30 Series AXIS M3015 AXIS M3016. User Manual
AXIS M3015 AXIS M3016 User Manual Table of Contents About this manual.......................................... 3 Product overview........................................... 4 How to access the product....................................
More informationRemote Director and NEC LCD3090WQXi on GRACoL Coated #1
Off-Press Proof Application Data Sheet Remote Director and NEC LCD3090WQXi on GRACoL Coated #1 The IDEAlliance Print Properties Working Group has established a certification process for off-press proofs
More informationArchitecture of Industrial IoT
Architecture of Industrial IoT December 2, 2016 Marc Nader @mourcous Branches of IoT IoT Consumer IoT (Wearables, Cars, Smart homes, etc.) Industrial IoT (IIoT) Smart Gateways Wireless Sensor Networks
More informationAgilent I 2 C Debugging
546D Agilent I C Debugging Application Note1351 With embedded systems shrinking, I C (Inter-integrated Circuit) protocol is being utilized as the communication channel of choice because it only needs two
More informationNew forms of video compression
New forms of video compression New forms of video compression Why is there a need? The move to increasingly higher definition and bigger displays means that we have increasingly large amounts of picture
More informationEmerging IoT Technologies for Smart Cities
07.11.2017 U4IoT Contact Dr sziegler@mandint.org IoT-related International Engagement ITU-T Member Rapporteur on Research and Emerging Technologies for the Internet of Things and Smart Cities (SG20) Cybersecurity
More informationAddressing the technical challenges for enterprises deploying IoT solutions
15th-16th November 2016, Doubletree by Hilton Tower Bridge London Addressing the technical challenges for enterprises deploying IoT solutions 20+ expert speakers Including Hive, ING, Stanley Black & Decker
More informationCie L*48.57 a* b* Covering the World. Solutions for paint and coatings color management
Cie L*48.57 a* 75.62 b* 57.58 Covering the World Solutions for paint and coatings color management Color is a Difference Maker Whether establishing a corporate identity, a brand, a new product, color has
More informationP1: OTA/XYZ P2: ABC c01 JWBK457-Richardson March 22, :45 Printer Name: Yet to Come
1 Introduction 1.1 A change of scene 2000: Most viewers receive analogue television via terrestrial, cable or satellite transmission. VHS video tapes are the principal medium for recording and playing
More informationAXIS M30 Network Camera Series. AXIS M3046-V Network Camera. AXIS M3045 V Network Camera. User Manual
AXIS M3044-V Network Camera AXIS M3045 V Network Camera AXIS M3046-V Network Camera User Manual Table of Contents About this manual.......................................... 3 System overview............................................
More informationThe Internet of Things (IoT) has many potential implications for the manufacturing sector. Revolution in the making
An article from the Economist Intelligence Unit The digitisation of manufacturing holds the potential to spur a new industrial revolution, many believe. Manufacturers are still working on the foundations,
More informationHOW TO DELIVER OMNICHANNEL CUSTOMER ENGAGEMENT, TODAY! , Genesys Telecommunications Laboratories, Inc. All rights reserved.
HOW TO DELIVER OMNICHANNEL CUSTOMER ENGAGEMENT, TODAY! 1 1 2016, Genesys Telecommunications Laboratories, Inc. All rights reserved. AGENDA Why omnichannel customer engagement The vision and path to success
More informationLast Edit: 19 Feb 2018
Last Edit: 19 Feb 2018 MOBILE IoT INITIATIVE ECOSYSTEM Over 2100 GSMA Mobile IoT Innovator Company Members 47 IoT Labs In 21 countries INDUSTRY-WIDE SUPPORT Support for Mobile IoT from 98 MNOs And vendors
More informationEnhancing Performance in Multiple Execution Unit Architecture using Tomasulo Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationIOT TECHNOLOGY & BUSINESS. Format: Online Academy. Duration: 5 Modules
IOT TECHNOLOGY & BUSINESS Format: Online Academy Duration: 5 Modules IOT TECHNOLOGY & BUSINESS PROGRAMME COURSE OVERVIEW IoT is the next big thing for both operators and associated industries. However
More informationIoT Architecture for Future Building Management Embedded Lighting Controls
6 th International LED professional Symposium +Expo Sept 20-22, 2016 Bregenz IoT Architecture for Future Building Management Embedded Lighting Controls Walter WERNER Werner Management Services e.u., Dornbirn,
More informationAchieving Faster Time to Tapeout with In-Design, Signoff-Quality Metal Fill
White Paper Achieving Faster Time to Tapeout with In-Design, Signoff-Quality Metal Fill May 2009 Author David Pemberton- Smith Implementation Group, Synopsys, Inc. Executive Summary Many semiconductor
More informationHEART ATTACK DETECTION BY HEARTBEAT SENSING USING INTERNET OF THINGS : IOT
HEART ATTACK DETECTION BY HEARTBEAT SENSING USING INTERNET OF THINGS : IOT K.RAJA. 1, B.KEERTHANA 2 AND S.ELAKIYA 3 1 AP/ECE /GNANAMANI COLLEGE OF TECHNOLOGY 2,3 AE/AVS COLLEGE OF ENGINEERING Abstract
More informationSIX DEGREES OF SEPARATION PLANNING THE IMPACT OF IOT ON YOUR FUTURE AUDITS
SIX DEGREES OF SEPARATION PLANNING THE IMPACT OF IOT ON YOUR FUTURE AUDITS AGENDA What is 6 Degrees of Separation What is IoT The Impact of IoT Risks Auditing IoT WHAT IS 6 DEGREES OF SEPARATION? The idea
More informationAnalyzing 8b/10b Encoded Signals with a Real-time Oscilloscope Real-time triggering up to 6.25 Gb/s on 8b/10b encoded data streams
Presented by TestEquity - www.testequity.com Analyzing 8b/10b Encoded Signals with a Real-time Oscilloscope Real-time triggering up to 6.25 Gb/s on 8b/10b encoded data streams Application Note Application
More informationArrangements for: National Progression Award in. Music Performing (SCQF level 6) Group Award Code: G9L6 46. Validation date: November 2009
Arrangements for: National Progression Award in Music Performing (SCQF level 6) Group Award Code: G9L6 46 Validation date: November 2009 Date of original publication: January 2010 Version 02 (September
More informationInternet of Things - IoT Training
Internet of Things - IoT Training About Cognixia Cognixia, formerly known as Collabera TACT, is a Collabera Learning Solutions Company. Being a consistently awarded Digital Technology Training Company,
More informationRequirements for the Standardization of Hybrid Broadcast/Broadband (HBB) Television Systems and Services
EBU TECH 3338 Requirements for the Standardization of Hybrid Broadcast/Broadband (HBB) Television Systems and Services Source: Project Group D/WT (Web edia Technologies) Geneva January 2010 1 Page intentionally
More informationADDRESSING THE CHALLENGES OF IOT DESIGN JEFF MILLER, PRODUCT MARKETING MANAGER, MENTOR GRAPHICS
ADDRESSING THE CHALLENGES OF IOT DESIGN JEFF MILLER, PRODUCT MARKETING MANAGER, MENTOR GRAPHICS A M S D E S I G N & V E R I F I C A T I O N W H I T E P A P E R w w w. m e n t o r. c o m INTRODUCTION Internet
More informationVideoEase HDMI 3x1 Switcher Kit (110V) Installation Guide
VideoEase HDMI 3x1 Switcher Kit 500410 (110V) Installation Guide P/N: 94-00628-A SE-000627-A Copyright Notice : Copyright 2008 MuxLab Inc. All rights reserved. Printed in Canada. No part of this publication
More informationMachina Research. INDUSTRY DAY - Welcome. Emil Berthelsen, Principal Analyst Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016
Machina Research INDUSTRY DAY - Welcome Emil Berthelsen, Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016 Some of our clients Machina Research 2 Four IoT technology vectors which are transforming markets
More informationInternet of Things (IoT) and Big Data DOAG 2016 Big Data Days
30.9.2016 DOAG 2016 Big Data Days Guido Schmutz BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENEVA HAMBURG COPENHAGEN LAUSANNE MUNICH STUTTGART VIENNA ZURICH Guido Schmutz Working for Trivadis
More informationInternet of Things (IoT) Vikram Raval GSMA
Internet of Things (IoT) Vikram Raval GSMA Introductions 2 Your objectives What do you expect to learn from this course? How is it relevant to you? 3 Themes Understanding the benefits IoT can bring Key
More informationEdgeConnect Module Quick Start Guide ITERIS INNOVATION FOR BETTER MOBILITY
EdgeConnect Module Quick Start Guide ITERIS INNOVATION FOR BETTER MOBILITY 493456301 Rev B April 2009 Table of Contents Installation... 1 Setup... 2 Operation... 4 Live Video... 4 Video Settings... 5 Network
More informationIntegrating Device Connectivity in IoT & Embedded devices
Leveraging Microsoft Cloud for IoT and Embedded Applications Integrating Device Connectivity in IoT & Embedded devices Tom Zamir IoT Solutions Specialist tom@iot-experts.net About me Tom Zamir IoT Solutions
More informationNDT Meets the Internet of Things (IoT)
NDT Meets the Internet of Things (IoT) Steve Strachan * Vice President - Sales Sensor Networks, Inc. Boalsburg, PA * Presented by Bruce Pellegrino Agenda IoT explained Everyday IoT examples IoT meets NDT
More information