airstation ipv6

Field services operations bullish on emerging technologies, finds Red Hat global survey

By Zenobia Hegde

For many industries, from transportation to utilities, manufacturing and more, field workers are pivotal to the success of business operations, the satisfaction of customers, and the growth of the bottom line.

Field workers are now at the forefront of digital transformation where artificial intelligence (AI), smart mobile devices, the Internet of Things (IoT) and business process management (BPM) technologies have created new opportunities to better streamline and transform traditional workflows and workforce management practices.

To better understand how these technologies are being applied and the impact they are having in the enterprise, Red Hat commissioned research firm Vanson Bourne to survey 300 IT decision makers from organisations in the U.S., Europe and Asia that employ a significant field workforce. The survey examined investment trends, current and future adoption patterns, use cases and implementation challenges.

According to the results, strong technology investment is expected by respondents with an average increase of 25% through November 2018, reflecting the importance of technology in transforming field service operations. Top business factors identified as influencing this investment include increasing field worker productivity (46%), streamlining or optimising field operations and processes (40%), and improving customer service (37%).

When we consider the current trends that are broadly driving conversations in the tech industry, AI is one of the leading topics. While still an emerging category—currently implemented by only 24% of respondents—we believe the technology has great potential across a variety of industries and use cases. It comes as little surprise that an additional 30% of respondents plan to implement AI in 2018, aligning with an average anticipated increase in investment of 26% for certain respondents over the same period.

The AI umbrella encompasses a number of specific technologies for those respondents that have either implemented already or plan to implement to address more specialised uses cases, including:

Predictive analytics (55%)
Machine learning (46%)
Chatbots or virtual digital assistance (45%)
Robotic Process Automation (44%)

Despite being more established technologies, mobile, BPM and IoT seem to defy their relative maturity in the market with respondents indicating double-digit growth across the board in both investment and implementations through November 2018. While 67% of respondents have already implemented mobile apps for field service operations, an additional 19% plan to implement new mobile apps, supported by a 20% average expected increase in investment by certain respondents.

The outlook for BPM and IoT is similar. Respondents expect implementations to grow from 61 to 81% for BPM and from 53 to 73% for IoT, fueled by 20 and 24% average expected increase in investment by certain respondents, respectively.

However, along with the appetite for technology investment and implementation growth, respondents are keenly aware of the technical challenges their organisations face in developing and implementing applications for field workforce management. Access to timely and relevant data is critical for field workers in remote locations, harsh environments, or areas of low network connectivity, as is the ability to protect that data as it flows between the field and back-end systems.

As a result, securing data access was the top challenge identified in the survey at 34%, followed by:

The pace […]

The post Field services operations bullish on emerging technologies, finds Red Hat global survey appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Sensors in the security & surveillance market expected to reach US$12bn by 2023, Frost & Sullivan believes

By Zenobia Hegde

The Internet of Things (IoT) is bringing about a new era of connectivity in the digital age, say analysts Frost & Sullivan. It is connecting critical business sectors through a network of secure data flow, analytics, and management. It is also bringing numerous opportunities for sensor participants through security technologies required for remote services and enhanced accessibility of devices.

The total sensors market in security and surveillance applications was worth $6,267.9 million (€5112.16 million) in 2016, with image sensors holding the largest market share at 23%. The market is expected to reach $12,012.1 million (€9797.19 million) by 2023.

North America and EMEA dominate the market, driven by aging infrastructures, but APAC is the fastest growing due to rapid infrastructure development, strong economic growth, and favourable government regulations. However, challenges for sensor manufacturers and suppliers include increased competition, leading to pricing pressures, lack of product differentiation, and lack of common global standards.

The growth of IoT is contributing to rapidly evolving security requirements, with the areas of robotics and biometric and RFID sensors offering the greatest opportunities. Robotics is expected to be the future of security and surveillance, with considerable investments in research and development in this space. In addition, the demand for drones and AGVs remains strong, especially in defense, commercial, and institutional spaces.

Frost & Sullivan’s recent analysis report, Sensors in Security & Surveillance, Global Forecast to 2023, covers global trends for sensors used in security and surveillance applications across industries such as industrial, commercial, institutional, building automation, infrastructure, and security and defence. The analysis also explores the impact of the Internet of Things (IoT) and Industrial Internet of Things (IIoT) on security and surveillance.

“In commercial and residential applications, biometric recognition used in access control systems is also witnessing a gradual increase in interest,” said Ram Ravi. “In addition, cloud networking, a revolutionary two-way interactive service delivery platform, is expected to create a technological explosion in the homes and buildings services market, particularly in commercial and residential security applications. This will enable homes and buildings participants to adopt new business models to provide attractive cloud-based services through a secured network.”

Three big predictions for sensors in the global security and surveillance market:

Internet of Things (IoT) is paving the way for industry convergence and enabling machine-to-machine (M2M) communications for better business decisions. Sensors form the physical layer of the IoT architecture;
Development of new communication protocols will ensure interoperability and provide standardisation, particularly in applications for perimeter security, intrusion detection, and access control systems; and
Retail, healthcare, and finance are all expected to offer considerable growth opportunities for sensors in biometrics.

Sensors in Security & Surveillance, Global Forecast to 2023, is a part of Frost & Sullivan’s Measurement & Instrumentation Growth Partnership Service programme.

For more information on this analysis, please click here.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Sensors in the security & surveillance market expected to reach US$12bn by 2023, Frost & Sullivan believes appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

China’s Pursuit of Public International Cybersecurity Law Leadership

By Anthony Rutkowski

There are relatively few venues today for the development of public international cybersecurity law among Nation States. One was the United Nations Group of Governmental Experts (UNGGE) at which the U.S. several months ago announced its de facto withdrawal with some concern expressed. A much older, well-established venue is newly assuming considerable significance — the Expert Group on the International Telecommunication Regulations (EG-ITRs). The EG-ITRs activity has the ability to shape the evolution of public international cybersecurity law that has existed over many decades to which most of the nations of the world accede and generally abide by. Indeed, within that treaty provision ensemble, it was the 1988 version of the ITRs that enabled datagram internets to be lawfully implemented across borders globally when the provisions came into effect in July 1990.

China has rarely undertaken a role in developing public international cybersecurity law over the many years the provisions have existed. Only once did it submit a formal proposal — fifteen years ago to the 2002 Plenipotentiary Conference where it introduced a resolution concerning “rapid Internet growth [that] has given rise to new problems in communication security.” Thus, a China formal submission to the upcoming third EG-ITRs meeting on 17-19 January 2018 in Geneva is significant in itself.

Furthermore, what China did submit represents a cogent, visionary focus on the key challenges of cybersecurity today, and it deals with the most critical issues facing every nation. Additionally, the participation from China in the EG-ITRs includes knowledgeable senior staff from its key Ministry of Industry and Information Technology (MIIT), with a supporting submission from China Telecom.

The action suggests that China seems now willing and able to assume leadership in the evolution of public international cybersecurity law. The step also is also bolstered by its investing more resources globally in collaborating on related technical specifications in multiple international industry activities than any other nation over the past decade.

The principal focus of the China EG-ITRs submission is cybersecurity — with so-called Over the Top (OTT) virtual services as the prime example. China notes that “the safety and security of the world telecommunications/ICT networks have become a global concern in respect of sovereignty, security and development interests of all nations.” It goes on to observe that “there’s a severe lack of [public international cybersecurity law] provisions…in relation to the governance of the international telecommunications/ICT network security.”

The OTT exterritoriality example that China chose is compelling. OTT implementations present some of the most difficult public international law challenges today because they enable any arbitrary party from outside a Nation State’s jurisdiction to autonomously engage in an unfettered array of network-based actions within that Nation State, including deployment of software agents and management of IoT devices. Some of those actions are commercial in nature or otherwise benign, albeit within the remit of most countries to control as public offerings. Other actions are frequently criminal and cause significant harm on remote systems or devices through malware.

OTT implementations through encrypted tunnels — which frequently occur — are especially problematic. The concern was underscored by statistics provided at a recent international meeting in Singapore by a leading cybersecurity vendor which noted that half of all the attacks today are implemented using these methods. New OTT vendor transmission protocols like QUIC and Transport Layer Security 1.3 exponentially exacerbate the cybersecurity challenges and expand the threat surface. The encrypted OTT attack vectors include recent Russian meddling in the U.S. national elections highlighted by the U.S. Director of National Intelligence.

Looking ahead, the real ultimate “new trend” is the implementation of fully virtualized NFV-SDN architectures across national borders. Massive industry efforts occurring worldwide to bring this about are coming to fruition. Initial mobile network 5G implementations partially using NFV-SDN have been introduced. The platforms enable entire virtual network architectures of multiple datagram internets to be orchestrated from cloud data centers and altered at-will using temporary addresses among any desired endpoints. However, nations will be reticent to allow the orchestration of these capabilities across their national borders from other nations without effective public international cybersecurity provisions. The alternative is complete Balkanization where NFV-SDNs are only allowed domestically which transnational providers would be forced to replicate repeatedly in each national jurisdiction. The stakes here are high for the enormous number of major industry participants. China seems to be positioning itself to take leadership in facilitating the global NFV-SDN marketplace through enabling public international cybersecurity law. The step is measured and visionary by any measure – in a world where multilateral solutions and knowledgeable leadership are badly needed.

By contrast, at the same third meeting of the EG-ITRs, the U.S. position is a traditional one over the past two decades – rejecting “the rationale for a treaty addressing [the provision and operation of international telecommunication services and the] potential effects.” It further eschews any treatment of “new trends” asserting that doing so would “render [the provisions] obsolete.”

The problem here is that cybersecurity is not exactly a “new trend,” nor are many of the basic network developments underway worldwide. A position of doing nothing is untenable for many reasons. International telecommunication via networks in different national jurisdictions are under absolute sovereign control of those jurisdictions. Transporting traffic to and from endpoints in different countries inherently requires global cooperation. Every nation has a sovereign right to inspect and stop foreign communication traffic — the very first public international cybersecurity provision agreed when the first networks were interconnected in 1850 and reaffirmed at every treaty conference since. Over the decades, stable, enduring public international cybersecurity law has grown in importance — especially in today’s interconnected global information-based economy. Transnational providers of network-based services today are vitally dependent on effective public international law arrangements that enable providers to engage in their own commercial agreements to transport and terminate traffic.

The obliviousness to new trends position of the U.S. seems unlikely to head off further dialogue on essential new public international cybersecurity law, and stands in stark contrast to pleas by major global IT enterprises like Microsoft at international forums calling for a Digital Geneva Convention on cybersecurity to facilitate the global market for their increasingly data centre based offerings.

The U.S. views on public international cybersecurity law and facilitating intergovernmental organizations like the International Telecommunication Union (ITU) are extremely varied and have witnessed wild swings over the decades. Even today, the U.S. strongly supports radio-related, mass media, and transport layer security activities while depreciating those dealing with telecommunications and datagram internets. The latter views largely arose from a U.S. strategic decision in the 1990s to abandon its previous support for secure OSI internet platforms and facilitate the DARPA internet ones in an unfettered global marketplace. Stable, enduring global multilateral venues like the ITU were abandoned and the obligations ignored in the process.

History shows that many of the key existing public international cybersecurity law provisions were first articulated and significantly advanced by the U.S. after both World Wars, as well as when they were essential to introducing new global communication platforms. Indeed, after the Harding Administration rejected such provisions in the early 1920s for the new global cybersecurity challenges of radio communication, the Herbert Hoover Administration completely reversed course near the end of that decade and led the world to institute innovative cybersecurity treaty provisions and the subsequent creation of the ITU.

Times change. Today, the virtualization of network infrastructures represented by OTT offerings and NFV-SDNs, together with exponential IoT device proliferation, are rather dramatic developments from an international cybersecurity law perspective. However, they are quite similar to challenges once faced with the introduction of global radiocommunication internets a century ago. That technology enabled the orchestration of virtual networks anywhere in the world that were capable of causing significant harm in other national jurisdictions. The creative, necessary public international cybersecurity legal solutions developed then, may well be applicable today. In any case, effective solutions are essential today.

The pursuit of a leadership role in public international cybersecurity law by China today is one once manifested by the U.S. to facilitate the global introduction of new technologies. Doing nothing is not really an adequate answer, and bilateral agreements among 193 countries or inventing another body to accomplish the same objectives are arguably even worse avenues. The U.S. and its allies, as well as major industry representatives, should take a fresh look at the institutional options today. Evolving existing enduring multilateral law and institutional mechanisms seem like a pragmatic and sensible step.

China’s closing metaphor on emerging public international cybersecurity law seems chosen to describe a long-term leadership role in international cybersecurity law with unusual, elegant poetry at the end of its submission. “China believes, the whole process will go forward continuously like a wave on the sea, high and low at different times, but it will make progress along with the new telecom development trends, and it will, of course, pave the way for the good development and security of the telecom industry…”

Written by Anthony Rutkowski, Principal, Netmagic Associates LLC

Follow CircleID on Twitter

More under: Cybersecurity, Internet Governance, Policy & Regulation

Read more here:: feeds.circleid.com/cid_sections/blogs?format=xml

CircleID’s Top 10 Posts of 2017

By CircleID Reporter

Wolfgang Kleinwächter

It is once again time for our annual review of posts that received the most attention on CircleID during the past year. Congratulations to all the 2017 participants for sharing their thoughts and making a difference in the industry. 2017 marked CircleID’s 15th year of operation as a medium dedicated to all critical matters related to the Internet infrastructure and services. We are in the midst of historic times, facing rapid technological developments and there is a lot to look forward to in 2018.

Top 10 Featured Blogs from the community in 2017:

#1 Internet Governance Outlook 2017: Nationalistic Hierarchies vs. Multistakeholder Networks?Wolfgang Kleinwächter – Jan 06, 2017
Viewed 37,265 times
#2 Slovaks Worry About the Future of Their Country’s .SK TLDOndrej Jombík – Aug 02, 2017
Viewed 12,441 times
#3 Neil Schwartzman Sorry, Not Sorry: WHOIS Data Must Remain PublicNeil Schwartzman – Apr 27, 2017
Viewed 12,323 times
#4 John Levine The Hack Back Bill in Congress is Better Than You’d ExpectJohn Levine – Oct 23, 2017
Viewed 11,878 times
#5 Steven Bellovin Preliminary Thoughts on the Equifax HackSteven Bellovin – Sep 17, 2017
Viewed 11,827 times
#6 The Darkening Web: Is there Light at the end of the Tunnel?Wolfgang Kleinwächter – Oct 15, 2017
Viewed 11,627 times
#7 Anthony Rutkowski Legal Controls on Extreme End-to-End Encryption (ee2ee)Anthony Rutkowski – Oct 24, 2017
Viewed 11,378 times
#8 Martin Unger The IoT Needs a Paradigm Shift from Security to Safety of Connected DevicesMartin Unger – Aug 23, 2017
Viewed 11,373 times
#9 Niel Harper 8 Reasons Why Cybersecurity Strategy and Business Operations are InseparableNiel Harper – May 13, 2017
Viewed 11,279 times
#10 Michael J. Oghia Shedding Light on How Much Energy the Internet and ICTs ConsumeMichael J. Oghia – Mar 21, 2017
Viewed 10,988 times

Top 10 News in 2017:

#1 CircleID Reporter Security Researchers are Warning About a New IoT Botnet Storm BrewingOct 31, 2017
Viewed 11,496 times
#2 CircleID Reporter IBM Launches Quad9, a DNS-based Privacy and Security Service to Protect Users from Malicious SitesNov 16, 2017
Viewed 11,215 times
#3 CircleID Reporter Domain Registries to Discuss Possibility of ICANN Fee Cuts in Private Meeting This MonthSep 05, 2017
Viewed 11,055 times
#4 CircleID Reporter New Wave of Ransomware Spreading Rapidly Through Russia, Ukrain and Other NationsOct 24, 2017
Viewed 10,610 times
#5 CircleID Reporter Equifax Breach Blamed on Open-Source Software FlawSep 11, 2017
Viewed 9,868 times
#6 CircleID Reporter EFF Resigns from World Wide Web Consortium (W3C) over EME DecisionSep 19, 2017
Viewed 9,504 times
#7 CircleID Reporter Cyberattacks Against Abortion Clinics on the RiseOct 05, 2017
Viewed 9,331 times
#8 CircleID Reporter China to Create National Cyberattack DatabaseSep 15, 2017
Viewed 8,873 times
#9 CircleID Reporter Equifax Hacked, Nearly Half of US Population AffectedSep 07, 2017
Viewed 8,722 times
#10 CircleID Reporter Russian Behind Massive LinkedIn, Dropbox Hack Subject of Extradition Fight Between US and RussiaNov 26, 2017
Viewed 8,720 times

Top 10 Industry News in 2017 (sponsored posts):

#1 Internet Commerce Association The Rise and Fall of the UDRP Theory of ‘Retroactive Bad Faith’Internet Commerce Association – May 08, 2017
Viewed 6,966 times
#2 Internet Commerce Association Why the Record Number of Reverse Domain Name Hijacking UDRP Filings in 2016?Internet Commerce Association – Jun 14, 2017
Viewed 6,628 times
#3 Verisign 2016 Year in Review: The Trending Keywords in .COM and .NET Domain RegistrationsVerisign – Mar 10, 2017
Viewed 6,193 times
#4 Verisign Verisign Releases Q4 2016 DDoS Trends Report: 167% Increase in Average Peak Attack from 2015 to 2016Verisign – Feb 13, 2017
Viewed 6,035 times
#5 Radix A Look at How the New .SPACE TLD Has Performed Over the Past 2 YearsRadix – Feb 15, 2017
Viewed 5,874 times
#6 Verisign Global Domain Name Registrations Reach 329.3 Million, 2.3 Million Growth in Last Quarter of 2016Verisign – Feb 28, 2017
Viewed 5,587 times
#7 Radix Google Buys Business.Site Domain for ‘Google My Business’Radix – Aug 22, 2017
Viewed 5,125 times
#8 Afilias 5 Afilias Top Level Domains Now Licensed for Sale in ChinaAfilias – Apr 06, 2017
Viewed 5,048 times
#9 Internet Commerce Association UDRP: Better Late than Never – ICA Applauds WIPO for Removing Misguided ‘Retroactive Bad Faith’Internet Commerce Association – May 24, 2017
Viewed 5,022 times
#10 Radix Radix Announces Largest New gTLD Sale with Casino.OnlineRadix – Mar 27, 2017
Viewed 4,997 times

Written by CircleID Reporter

Follow CircleID on Twitter

More under: Access Providers, Cyberattack, Cybercrime, Cybersecurity, DDoS, DNS, DNS Security, Domain Names, ICANN, Internet Governance, Internet of Things, Law, Net Neutrality, Policy & Regulation, Privacy, New TLDs, UDRP, Whois

Read more here:: feeds.circleid.com/cid_sections/blogs?format=xml

Mining businesses identify IoT as essential to gaining a competitive edge, finds Inmarsat

By Zenobia Hegde

Businesses in the mining industry are backing the Internet of Things (IoT) to help them retain their market share, as competition in the sector intensifies, the quality of seams decreases and profit margins are put under pressure.

According to the latest research from Inmarsat, the Internet of Things (IoT) will play a critical role in helping mining businesses to increase the level of automation and improve production efficiency, enabling them to compete with rivals operating in lower cost markets.

Market research specialist Vanson Bourne interviewed respondents from 100 large mining companies across the globe for Inmarsat’s ‘The Future of IoT in Enterprise’ report, and found that 70% of mining businesses agreed that IoT would give them a significant edge against their competitors.

Mining operators further identified how IoT would help them to bolster this competitive edge, with 41% reporting that they would use IoT to increase the automation of business processes, and 44% saying that it would help them to identify cost saving and efficiency opportunities.

Joe Carr, director of mining at Inmarsat, commented on the findings: “It is no surprise to see that mining businesses are looking to IoT to help them gain a competitive advantage. Mining businesses across the world are under constant pressure to produce the same product at a lower price than their rivals. At the same time, it is becoming harder to find high quality deposits in lower sovereign risk countries.

“This pressure is amplified in developed economies, such as Canada and Australia, where labour costs are much higher than in emerging markets, leaving operators in these territories at a significant competitive disadvantage. These businesses must drive down operating costs and improve productivity to remain competitive, and the most effective way to do this is the adoption of IoT and automation.

“Using automation to reduce labour requirements can make a big difference to an operator’s bottom line. For example, an Australian open pit mine might employ 100 truck drivers each earning AUD$200,000+ per annum (€130144.19+ per annum), which is then replicated on staff working on the trains, and the maintenance personnel.”

“IoT will be critical in enabling mine operators to reduce the amount of manual extraction and transportation of raw materials, as it will allow for the introduction of more autonomous infrastructure, such as fleets of unmanned trucks and trains. Autonomous technology can also enable an around-the-clock, 365 days-a-year operation, removing the need for shift change and improving safety by removing the person from the environment, further increasing productivity.”

Carr concluded: “We are currently working with some of the mining industry’s largest operators to deliver increased automation, which in turn results in increasing speed across the mining process, helping to reduce average cycle times and improving productivity. Mining technologists are increasingly aware of the importance of satellite connectivity in their mines, understanding that IoT solutions cannot function without reliable connectivity to gather and transmit data from connected sensors and devices to control rooms.”

With many mines located outside terrestrial or cellular network coverage, satellite communication networks can offer more reliable connectivity that is central […]

The post Mining businesses identify IoT as essential to gaining a competitive edge, finds Inmarsat appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Number of consumers considering Artificial Intelligence–enabled devices for holiday shopping doubles

By Zenobia Hegde

SAP SE announced that nearly four out of 10 consumers who own in-home assistants are considering using them for holiday shopping this year — to purchase gifts for others (16%), research deals and savings for gifts (15%), and for their own purchases (7%). These findings derive from a survey commissioned by SAP of 1,000 U.S. consumers, researching usage of artificial intelligence (AI)–powered smart devices for holiday shopping.

The survey affirms growing interest in relying on AI technologies for commerce and that companies already considering chatbots and voice-enabled assistants in their omnichannel strategy are on the right track.

More consumers trust AI to do their shopping

Voice-enabled speakers such as Amazon Echo, Google Home and Sonos One will be installed in 55% of U.S. households by the year 2022, according to research from Juniper Research. The smart assistants are seeing an uptick in adoption by U.S. consumers, who are increasingly using them for a variety of applications — from streaming music and making lists, to hearing the news, and even making purchases.

When it comes to holiday shopping specifically, the survey found that just 17% of consumers that own an in-home assistant said they used it last year. The increased interest in using the devices for holiday shopping in 2017 — more than double compared to the prior year — demonstrates a growing interest in relying on AI-powered technologies for commerce. The top reason for using an in-home assistant to purchase gifts is convenience, with more than 18% of respondents citing this as a key benefit.

“As retailers look to meet shoppers’ expectations for convenience and personalisation, artificial intelligence is playing a crucial role in the customer journey,” said Johann Wrede, global vice president of strategic marketing for SAP Hybris solutions at SAP.

“Chatbots and voice-enabled assistants deliver a convenient, hands-free experience, removing even more barriers to customer engagement. These technologies will not be successful on their own, however — they will need a rich set of customer data in order to make relevant recommendations and be truly helpful.”

Barriers prevent further adoption of smart devices for commerce

While AI is becoming more accepted for helping with holiday purchases, there are still many skeptics who haven’t gotten on board with using their in-home assistants for commerce. Only 28% of respondents feel that their device understands them well enough to recommend gift ideas.

Additionally, smart speaker owners report the top two limitations of the assistants as:

Can’t determine visual product quality (20%) — shoppers want to be confident in their purchases and know what they look and feel like
Requires too much guidance (19%) — consumers are looking for a seamless experience and want their devices to understand their needs and foster convenience

SAP® Hybris® solutions are being developed with a commitment to furthering AI and machine learning (ML) innovation and helping organisations overcome barriers to adoption. A ML co-innovation program has been launched with the goal of partnering with customers to embed new capabilities into SAP Hybris Sales Cloud and SAP Hybris Service Cloud solutions.

Additionally, SAP Hybris solutions offer components or features with embedded ML […]

The post Number of consumers considering Artificial Intelligence–enabled devices for holiday shopping doubles appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

ICANN to Participate at the 12th Internet Governance Forum 2017 in Switzerland

This month, members of the ICANN community, Board, and organization will be in Geneva, Switzerland, participating in the 12th annual meeting of the Internet Governance Forum (IGF). It seems only fitting to point out that Geneva is where the first phase of the World Summit on the Information Society (WSIS) – which initiated the IGF – took place back in 2003. It is also the home of the IGF Secretariat.

The event will take place from 18 to 21 December 2017 at the Palais de Nations.

Since its inception, the IGF has evolved to become a unique and important platform for global dialogue on the development of the Internet, involving stakeholders from the wider Internet community. The IGF will afford ICANN an opportunity for bilateral discussions with a range of stakeholders from around the world.

This year, as in previous years, ICANN will engage in dialogue through a number of sessions, either as participants or through organized ICANN sessions. Key topics of discussion will be:

  • General Data Protection Rights (GDPR)
  • Multistakeholder governance in the Domain Name System (DNS)
  • Emerging identifier technologies and how they may play a role in the evolution of the Internet, including in the proliferation of the Internet of Things (IOT)
  • Voice of civil society in ICANN

We will hold our customary ICANN Open Forum, which I encourage you to attend. Göran Marby, ICANN CEO and President, and Cherine Chalaby, Chair of the ICANN Board, will brief participants on areas ICANN is addressing. These include the community’s preparatory work for a potential new application process for generic top-level domains (gTLDs) and an update on the effect of the implementation of GDPR legislation in Europe. This will be an interactive session where IGF participants will be able to engage in an open dialogue and exchange views with ICANN’s leadership.

Below are the main ICANN sessions at the IGF.

Date Time Title
17 December 15:00–16:30 How Digital activists are shaping the evolution of the Internet: the voice of civil society in ICANN
17 December 16:30–18:00 The DNS and Emerging Identifiers (including DOA)
19 December 09:00–10:30 Multistakeholder governance of the Domain Name System, lessons learned for other IG issues (WS76) – CCWG IG Session.
19 December 16:10–17:10 ICANN Open Forum: ICANN – Looking ahead: – Challenges and Opportunities (OF50)

ICANN community members have organized or will take part in other workshops, forums, and sessions. For more information, see the IGF website.

On the ground, the Government Engagement team, led by Tarek Kamel, will be coordinating the involvement of ICANN in this significant event.

We look forward to seeing you there soon!

Read more here:: www.icann.org/news/blog.rss

Enterprise mobility management market will top $2.2billion by 2022, says Strategy Analytics

By Zenobia Hegde

The Enterprise Mobility Management (EMM) market has evolved considerably over recent years and is more competitive than ever before. The EMM software market will grow to 1.8 billion in 2017, representing total year-over-year growth of 9.0%.

Over the next five years, the market is expected to continue stable growth, reaching $2.2 billion (€1.86 billion) by 2022 according to Strategy Analytics’ latest reports, Global Enterprise Mobility Management Vendor Revenue 2016 and Forecast (2014-2022), and State of the Enterprise Mobility Management (EMM) Market – 2016 Market Leaders and 2022 Forecast.

EMM platforms are evolving from tactical device management tools to broader unified end-user computing management (UEM) platforms, crossing mobile devices, apps, and data, as well as traditional computing platforms such as laptops and PCs. As mobility grows in the enterprise, EMM solutions will become centralised control points for how employees and devices connect to enterprise data and IT resources.

Strategy Analytics latest reports analyse the EMM market, ranking the top vendors by revenue in 2016 and providing the market trends and events that helped shape the current and future market landscape.

Worldwide Enterprise Mobility Management Software Revenue Share ($M) by Vendor, 2016

According to Gina Luk, principal analyst of Mobile WorkforceStrategies at Strategy Analytics and author of the report “Mobile security and growth in BYOD (Bring your Own) devices are primary drivers behind EMM adoption. VMware AirWatch, BlackBerry/ Good Technology lead the EMM market with 19% and 18% share respectively.

Other vendors that saw strong growth in 2016 included MobileIron, Citrix and Microsoft. TheEMM market is more competitive now than ever before and we have also seen SAP, IBM, SOTI, Sophos and Symantec fighting fiercely to seize EMM marketshare”.

“EMM solutions are an important component of a GDPR-compliant security program. An enterprise that does not use EMM effectively may find it challenging to justify to authorities why it did not technical measures to mitigate the risk of data loss in cases of a breach, especially when the new European General Data Protection Regulation (GDPR) legislation will go live in May 2018”, added Andrew Brown, executive director of Enterprise Research at Strategy Analytics.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Enterprise mobility management market will top $2.2billion by 2022, says Strategy Analytics appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

UnitedHealthcare and Qualcomm integrate wearable devices from Samsung and Garmin into wellness program

By Zenobia Hegde

UnitedHealthcare and Qualcomm Incorporated, through its subsidiary Qualcomm Life, have integrated wearable devices from Samsung Electronics America Inc. and Garmin International, Inc. into UnitedHealthcare Motion™.

UnitedHealthcare Motion is a national wellness program that provides eligible plan participants access to activity trackers and enables them to earn more than $1,000 (€843.63) per year by meeting certain daily walking goals.

The Samsung Gear Fit2 Pro and the Gear Sport, as well as the Garmin vivosmart®3, have been integrated and validated with Qualcomm Life’s 2net™ platform for medical-grade connectivity that features multiple safeguards to help keep data secure. UnitedHealthcare Motion participants who already own one of these devices may be able to use them with the program.

UnitedHealthcare Motion is available to employers with self-funded and fully insured health plans nationwide.

The program enables employees to earn up to $4 (€3.37) per day in financial incentives based on achieving the F.I.T. goals:

Frequency: complete 500 steps within seven minutes six times per day, at least an hour apart);
Intensity: complete 3,000 steps within 30 minutes; and
Tenacity: complete 10,000 total steps each day).

The integrated activity trackers, which are available to plan participants at no additional charge or through upgrade options that enable people to purchase leading activity trackers at preferred prices, have been customised to enable users to see on their wrists how they are tracking against the program’s three daily F.I.T. goals. Research shows people who consistently achieve F.I.T. goals tend to improve their health and reduce their medical expenses.

All the activity trackers are available to people via a dedicated website that offers device options, including previously available activity trackers from Fitbit and Striiv.

Since UnitedHealthcare Motion launched in 2016, participants have collectively walked more than 130 billion steps and earned more than $19 million (€16.03 million) in rewards. Among eligible employees, 66% registered their devices, with more than two-thirds of those staying active with the program for more than one year.

“The enhancements to UnitedHealthcare Motion enable the program to offer companies and their employees more digital health and wellness resources that are personalised, connected and intuitive,” said Sam Ho, M.D., chief medical officer of UnitedHealthcare. “We are expanding the portfolio of available devices to make UnitedHealthcare Motion more flexible, convenient and consumer friendly.”

Qualcomm Life, a wholly owned subsidiary of Qualcomm, leverages its global connected health ecosystem and connectivity expertise to provide secure data transfer from the devices, to the Motion app and to UnitedHealthcare. Qualcomm Life also enables the BYOD model to allow the integration of more activity trackers into the 2net Platform and UnitedHealthcare Motion, providing participants with more choice.

Thomas Williams

“This program highlights the value of combing UnitedHealthcare’s pro-consumer benefit designs combined with Qualcomm Life’s expertise in providing seamless connectivity across a growing ecosystem of wearable devices to help people pursue their health and wellness goals,” said James Mault, M.D., F.A.C.S., senior vice president and chief medical officer, Qualcomm Life. “Studies have shown walking can be an effective way to help improve well-being and reduce health care costs, and we are seeing how UnitedHealthcare Motion helps people […]

The post UnitedHealthcare and Qualcomm integrate wearable devices from Samsung and Garmin into wellness program appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Wiliot raises $19M venture funding to launch battery-free IoT connectivity

Wiliot, an Israel-based startup developing battery-free Bluetooth semiconductor technology closed a $19 million Series A financing round. Qualcomm Ventures and M Ventures led the round with the former contributing $5M in the latest round.

Scaling IoT with Battery-Free Bluetooth

The company previously raised $14M in venture funding from Grove Ventures, Norwest Venture Partners, and 83North Venture Capital. Wiliot semiconductors can harvest energy from radio waves significantly reducing the size as well as energy requirement of sensors used in IoT-based solutions.

“This new technology will allow a sensor/radio/processor combination to be embedded in products, packaging, walls, and furniture so that these things can be smarter and communicate with other Bluetooth devices, including smartphones. We will enable everything to be intelligent and every place we go and anything we wear, touch or use will include sensing, connected, passive devices with an unlimited lifetime.”Wiliot CEO and co-founder Tal Tamir

The startup that splits its offices between Caesarea and San Diego, former being the R&D center in Israel and the latter as business development office in the US, will start delivering proof-of-concept devices by Q2’18. Delivery to market is slated for early 2019.

Read more here:: feeds.feedburner.com/iot