iphone application development

Update on the Root KSK Rollover Project

The ICANN org is today announcing that it will not roll the root zone KSK in the first quarter of 2018.

We have decided that we do not yet have enough information to set a specific date for the rollover. We want to make clear, however, that the ICANN org is committed to rolling the root zone KSK and we will continue to discuss this important process with the community, gather their feedback and give all interested parties advance notice of at least one calendar quarter when we set the date for the rollover.

Furthermore, we are soliciting input from the community to help determine, if possible, appropriate objective criteria to measure the possible negative impact of the root KSK rollover on Internet users, and acceptable values for those criteria before a rollover. This is in accordance with the bottom-up, multi-stakeholder model that has been so successful for ICANN policy development.

On 27 September 2017, the ICANN org announced it was postponing the root zone KSK rollover for at least one quarter, leaving open the possibility the root KSK rollover might occur in the first quarter of 2018. We have since realized that our analysis and preparation will require additional time.

In a previous post, we described our analysis of recursive resolver trust anchor configuration information reported using the protocol defined in RFC 8145, Signaling Trust Anchor Knowledge in DNS Security Extensions (DNSSEC). Our analysis revealed that about 4% of the approximately 12,000 DNSSEC-validating resolvers reporting during the month of September 2017 were configured with only KSK-2010 (the shorthand for the current root KSK) and would have been unable to resolve DNS queries after the rollover occurred.

The ICANN org’s decision to postpone the rollover was based on the concern that we did not understand why those resolvers were not properly configured, and we needed time to investigate.

Since then, we have attempted to contact the operators of 500 addresses that had reported a resolver configuration with only KSK-2010 instead of the correct configuration of both KSK-2010 and the new KSK, KSK-2017. Ideally, that investigation would have revealed a set of clear causes for the improper configuration, allowing further communication and actions to be targeted at addressing those specific issues. But in the end, the analysis was not as conclusive as we would have hoped.

In our initial attempt, we received a response from operators of approximately 20% of the 500 addresses. Of those addresses whose operators we could contact, 60% came from address ranges known to host devices with dynamic addresses, such as routers of home broadband users and ephemeral virtual machines, making these resolvers extremely difficult (if not impossible) to track down. About 25% of the addresses corresponded to a resolver forwarding on behalf of another resolver that was reporting only KSK-2010. Since the address of the device reporting the incorrect configuration was not the actual source resolver, it is extremely difficult (if not impossible) to identify the true source address of the resolver that was reporting only KSK-2010.

To proceed with the root KSK rollover, the ICANN org must have confidence that the rollover will not have an unacceptable negative impact on Internet users. The challenge we have encountered since we began to analyze the RFC 8145 trust anchor configuration reports from resolvers is assessing the impact on users.

We can make a number of assumptions: for example, it is unlikely that a recursive resolver running at a dynamic address could support a large number of users since it does not offer a stable address for any devices to send queries to for resolution. But ultimately, determining potential user impact based on the data available to us is difficult and we are therefore soliciting the community’s input.

Input and discussion on acceptable criteria for proceeding with the KSK roll will take place on an existing email list that is already being used for discussion of the root KSK rollover. We encourage anyone interested in contributing to join the mailing list by visiting the web page here.

The ICANN org will monitor this mailing list and beginning on 15 January 2018, we will develop a draft plan for proceeding with the root KSK roll based on the input received and discussion on the mailing list. The plan will be published by 31 January 2018 and undergo a formal ICANN public comment process to gather further input. We will hold a session at ICANN61 in San Juan, Puerto Rico, to discuss the plan and hear from the community in person. Our intent is to have a revised plan available for community review and public comment prior to ICANN62 in Panama City, Panama, with a final plan published soon thereafter.

Throughout the process we’ll continue to keep the community updated on the root KSK rollover project’s progress.

Read more here:: www.icann.org/news/blog.rss

Phishing for Bitcoin

By Jeff John Roberts

It had to happen sooner or later: The two biggest tech stories of 2017–foreign cyber attacks and bitcoin–have come together perfectly in a single story. Namely, it looks like the infamous North Korean hacking outfit, The Lazarus Group, is running a spear-phishing campaign aimed at executives of cryptocurrency companies.

You may remember this gang from previous outrages such as the WannaCry ransomware outbreak, the hacking of Sony, and the $81 million cyber-heist from the Bangladesh Central Bank. Their latest scam, identified by Secureworks, involves sending emails about a Chief Financial Officer position that contain an infected Microsoft Word document.

As ZDNet reports, clicking on the document triggers a piece of malware that allows the attacker access to the victim’s computer. It’s unclear if any of the targeted executives have fallen for the phish or if the scheme has yielded the Lazarus Group any bitcoins. Let’s hope not–in part because crypto-currency companies know the risk of cyber-threats better than most, and should not be hiring people who click on random Word documents.

More broadly, the idea of North Korea phishing for bitcoin is intriguing because the phenomenon is at once so new and so old. It’s new because countries until very recently didn’t even take bitcoin seriously–and now, as the price of a bitcoin tops $18,000, rogue nations are telling their militaries to go forth and steal it.

At the same time, though, North Korea’s phishing antics can also be seen as a twist on the centuries-old military tactic known as privateering. Once upon a time, this tactic took the form of kings and queens granting letters of marque that allowed privateers to roam the oceans and plunder booty from enemy merchant ships. Today, North Korea is allowing its hackers to operate as digital privateers in search of crypto plunder like bitcoin.

This modern version of privateering is not as exciting as grand naval battles with cannons and cutlasses, but no doubt it’s just as lucrative. Have a good weekend.

Jeff John Roberts

@jeffjohnroberts

jeff.roberts@fortune.com

Welcome to the Cyber Saturday edition of Data Sheet, Fortune’s daily tech newsletter. You may reach Robert Hackett via Twitter, Cryptocat, Jabber (see OTR fingerprint on my about.me), PGP encrypted email (see public key on my Keybase.io), Wickr, Signal, or however you (securely) prefer. Feedback welcome.

THREATS

Bailing on Blockchain: In theory, it sounds great to create a coalition and build a distributed ledger tool for everyone. The reality is more messy: more than 15 members of the Hyperledger Project recently bailed and/or cut off their funds to the much-hyped blockchain project. This follows a similar break-up at R3, the blockchain-for-banks consortium.

Cutting off Kaspersky: The popular anti-virus product is tangled up with a good part of the US government’s IT systems–a big problem since the software maker is strongly suspected of ties to the Kremlin. The White House has hurried up efforts to cashier Kaspersky with an order banning its use anywhere in the government.

Creepy Keyboards: Key-logging software, which lets a third party record what you type, is a popular tool among spies and hackers–it’s not something you want pre-installed on your new computer. Yet that’s what HP did with hundreds of lap-top models. A security researcher discovered that anyone with administrative privileges could activate it. HP is working on a fix.

Easy there, Anderson: The normally bland Twitter account of CNN host Anderson Cooper spat out a string of abuse at Donald Trump in a tweet this week. The network portrayed it as a hack, pointing out that Anderson was in a different city from where the tweet was sent–the latest is that Anderson’s aide left a phone with the Twitter account unattended at the gym.

Feds Nail Mirai Miscreants: Remember that nasty botnet composed of hijacked IoT devices that took down servers across the east cost last year? Well, it turns out Brian Krebs was right: a Rutgers student running a Minecraft scam was responsible for the botnet havoc. The student and two others pled guilty and say they’re sorry.

Share today’s Data Sheet with a friend:

http://fortune.com/newsletter/datasheet/

Looking for previous Data Sheets? Click here.

ACCESS GRANTED

“If you feed the beast, that beast will destroy you,” Palihapitiya advised his audience. “The short-term, dopamine-driven feedback loops that we have created are destroying how society works. No civil discourse, no cooperation, [but] misinformation, mistruth.”

Facebook’s former head of user growth, Chamath Palihapitiya, recently offered a contrite and frightening account of what the company has built. David Meyer has a nice summary of his remarks.

ONE MORE THING

The best holiday movie ever? It’s decided. Wonderful holiday classics include It’s a Wonderful Life and A Christmas Carol, but some (including me) believe the best of the bunch is a little action film called Die Hard. Objectors have claimed Die Hard isn’t a Christmas movie but now a prominent head of state has settled the question. Thanks, Justin Trudeau, and Ho ho ho!

Read more here:: fortune.com/tech/feed/

Idemia and FlexiGroup to launch Australia’s first MOTION CODETM credit card

By Zenobia Hegde

IDEMIA, the provider in trusted identities for an increasingly digital world, announced its partnership with FlexiGroup, Australia’s market supplier in Point of Sale consumer and commercial finance to launch Australia’s first MOTION CODE credit card.

Developed by IDEMIA (formerly known as OT-Morpho), the MOTION CODE credit card is a high-tech payment card with a dynamic security code (CVV2) that automatically changes hourly. Instead of a static security code printed on the back of a bank card, the MOTION CODE CVV2 is displayed on an e-paper “mini-screen”.

The security code automatically refreshes to a random security code every hour. This solution has no impact on the cardholder journey for safer online transactions: if compromised, this dynamic data becomes rapidly unusable.

As online shopping becomes increasingly popular, the cases of online fraud have escalated with online fraud in Australia rampant at $417 m(€354.07 m) last year and growing 15% per year, according to the Australian Payments Network. FlexiGroup will be the first company to launch MOTION CODE credit cards in Australia in the first half of 2018.

“The security of our customers’ payment details is tremendously important to us and the levels of security are constantly evolving with the increasing use of online payments. The addition of this dynamic security feature means FlexiGroup will be able to offer customers advanced safeguarding when making online purchases.”

“We continually strive to deliver innovative and tailored financial solutions for our customers and we are excited to partner with IDEMIA to be the first to bring MOTION CODE technology to Australians”, said Symon Brewis-Weston, CEO of FlexiGroup.

“We are thrilled about this exclusive launch of MOTION CODE here as it is the first product of its kind in Australia and has the potential to significantly impact the online payments industry by reducing fraud. But more importantly, MOTION CODE can create better customer experience for shoppers as well as provide a strong sense of comfort and security for buyers to go online”, said Mark Garvie, Asia Pacific managing director for Financial Institutions activities at IDEMIA. FlexiGroup is also partnering with Mastercard to bring this new MOTION CODE card to market.

“Safety and security is one of Mastercard’s global priorities, so we’re incredibly excited to partner with FlexiGroup to enable the launch of this Australian-first technology. We believe this technology will help shape the future of fraud prevention in Australia to make payments more secure, convenient and reliable for both businesses and consumers”, said Matt Barr, senior vice president: Core, Digital and New Payment Flows.

FlexiGroup will announce further details on a new product offering featuring MOTION CODE technology closer to launch in 2018.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Idemia and FlexiGroup to launch Australia’s first MOTION CODETM credit card appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

ICANN to Participate at the 12th Internet Governance Forum 2017 in Switzerland

This month, members of the ICANN community, Board, and organization will be in Geneva, Switzerland, participating in the 12th annual meeting of the Internet Governance Forum (IGF). It seems only fitting to point out that Geneva is where the first phase of the World Summit on the Information Society (WSIS) – which initiated the IGF – took place back in 2003. It is also the home of the IGF Secretariat.

The event will take place from 18 to 21 December 2017 at the Palais de Nations.

Since its inception, the IGF has evolved to become a unique and important platform for global dialogue on the development of the Internet, involving stakeholders from the wider Internet community. The IGF will afford ICANN an opportunity for bilateral discussions with a range of stakeholders from around the world.

This year, as in previous years, ICANN will engage in dialogue through a number of sessions, either as participants or through organized ICANN sessions. Key topics of discussion will be:

  • General Data Protection Rights (GDPR)
  • Multistakeholder governance in the Domain Name System (DNS)
  • Emerging identifier technologies and how they may play a role in the evolution of the Internet, including in the proliferation of the Internet of Things (IOT)
  • Voice of civil society in ICANN

We will hold our customary ICANN Open Forum, which I encourage you to attend. Göran Marby, ICANN CEO and President, and Cherine Chalaby, Chair of the ICANN Board, will brief participants on areas ICANN is addressing. These include the community’s preparatory work for a potential new application process for generic top-level domains (gTLDs) and an update on the effect of the implementation of GDPR legislation in Europe. This will be an interactive session where IGF participants will be able to engage in an open dialogue and exchange views with ICANN’s leadership.

Below are the main ICANN sessions at the IGF.

Date Time Title
17 December 15:00–16:30 How Digital activists are shaping the evolution of the Internet: the voice of civil society in ICANN
17 December 16:30–18:00 The DNS and Emerging Identifiers (including DOA)
19 December 09:00–10:30 Multistakeholder governance of the Domain Name System, lessons learned for other IG issues (WS76) – CCWG IG Session.
19 December 16:10–17:10 ICANN Open Forum: ICANN – Looking ahead: – Challenges and Opportunities (OF50)

ICANN community members have organized or will take part in other workshops, forums, and sessions. For more information, see the IGF website.

On the ground, the Government Engagement team, led by Tarek Kamel, will be coordinating the involvement of ICANN in this significant event.

We look forward to seeing you there soon!

Read more here:: www.icann.org/news/blog.rss

Nearly three-quarters of retail orgs lack a breach response plan

By Zenobia Hegde

With more than 174 million Americans shopping over the Thanksgiving holiday weekend, it’s looking to be a busy holiday season for retailers this year. As shoppers continue hunting for the perfect gift over the next couple weeks, it’s important to remember that cyber criminals will likely be on the hunt as well. How prepared are retailers to deal with an attack?

In an effort to answer that question, Tripwire surveyed IT security professionals working in retail organisations about their experiences and attitudes towards factors affecting IT security. The results found that a large majority are not fully prepared for data breaches this holiday season.

Of the respondents, only 28% of respondents said they have a fully tested plan in place in the event of a security breach. 21% said their organisation doesn’t have a plan at all, and the same proportion of respondents said they didn’t have the means to notify customers of a data breach within 72 hours, a requirement specified by the General Data Protection Regulation (GDPR).

“Considering the amount of high-profile data breaches that have occurred recently, plus the continued discussion around GDPR, it is surprising and concerning that many retailers do not have a tested plan in the event of a security breach,” said Tim Erlin, vice president of product management and strategy at Tripwire. “It’s encouraging that most respondents think they can meet the 72-hour notification window as set out in the upcoming GDPR, but if they haven’t tested their plans, I don’t know how confident they should be in that assumption.”

Only a small minority of the retail industry felt fully secure in their incident response capabilities. 23% of respondents said they were “fully prepared” to absorb potential financial penalties. Even fewer professionals (15%) said they were fully prepared to manage customer and press communications following an incident.

Not all the survey’s findings were discouraging, however. The results did provide some hope that the industry is moving in the right direction. More than half of respondents (57%) said that their organisation’s ability to detect and respond to a security breach has improved in the past year and a half. With the holiday season in full swing, organisations should make sure they have proper security safeguards in place.

“It’s really critical that organisations have a good view of what’s on their network at all times, that they harden their systems with secure configuration and vulnerability management, and that they are able to continuously monitor for change and are alerted to any drift outside the established security and compliance policies,” said Erlin.

There are a number of effective and established security control frameworks available to guide organisations, such as the CIS Critical Security Controls. Implementing even the most basic security controls can go a long way in improving an organisation’s security posture.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Nearly three-quarters of retail orgs lack a breach response plan appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

On the Road Again: Highlights from ARIN’s Outreach

By Susan Hamlin

We are celebrating our 20th anniversary this December and have found ourselves reflecting over these last two wonderful decades. One of the most important organizational objectives we have here at ARIN is our community outreach efforts. We make it a priority to reach out to you, our community, to provide the tools and advice you need when it comes to Internet number resources. We have hosted and attended an incredible number of events over the years, and thought it would be fun to look back and share where we’ve been and what we’ve accomplished with our community.

What kind of outreach do we do?

Each year, we host or attend a number of different events. Twice annually we hold our Public Policy and Members Meetings in the second and fourth quarters in various locations throughout our region. These meetings provide an opportunity for the entire Internet community to engage in policy discussions, network with colleagues, and attend workshops and tutorials. Everyone with an interest in Internet number resources is welcome to attend the Public Policy & Members Meetings and registration is free!

We also host many ARIN on the Road events around our region throughout the year. These free events provide local communities with the latest news from ARIN, covering everything from requesting IP addresses and Autonomous System Numbers (ASNs) to the status of IPv6 adoption, to current policy discussions, and updates about our technical services. Did you know that you can request an ARIN on the Road in your city, town, or metro area? I encourage you to send an email to info@arin.net if you believe your local Internet community would be interested in participating.

While we do discuss IPv6 at ARIN on the Road, that is not the only way we continue to spread the word in support of IPv6 deployment. Our message has evolved since we started actively promoting IPv6 in 2007, when we set up our TeamARIN site and began exhibiting at major industry shows. Today we exhibit at fewer tradeshows, but we do send speakers to many events across a wide range of industries, where we encourage organizations to prepare for the future by enabling IPv6 on their websites.

Additionally, members of our team attend community events around the world. Whether it be other RIR meetings, Internet Governance events, or partners such as NANOG or CARIBNOG, we believe it’s important to show our support to the wider Internet community. For a full list of events we host or attend, check out our events page.

Where was our first meeting?

Our first members meeting took place in Chantilly, Virginia on 20 March 1998. Since then, we’ve held a total of 40 meetings over the last 20 years!

Where was our first AOTR?

Our first ARIN on the Road event was held in Phoenix, Arizona on 17 August 2010. Since then we have held an additional 46 AOTR events and counting!

How can you get involved?

Phew! As you can see, we’ve done a lot over the last 20 years, but we’ve only just begun. We plan to continue expanding our outreach efforts around our region, including a continued focus on the Caribbean, and it is all possible thanks to our wonderful community.

There are so many ways you can continue to get involved with ARIN, including:

  • Subscribe to our mailing lists to discuss Internet number resource policy development and keep up with ARIN services and activities
  • Attend an ARIN meeting – We have great remote participation capabilities if needed
  • Don’t forget you can apply for a fellowship! We are accepting fellowship applications to ARIN 41 in Miami 15-18 April 2018
  • Attend our ARIN on the Road events
  • Member organizations, get involved in our election process

The post On the Road Again: Highlights from ARIN’s Outreach appeared first on Team ARIN.

Read more here:: teamarin.net/feed/

Vodafone and Huawei live trial extends range of pre-standard 5G in Milan

By Zenobia Hegde

Vodafone and Huawei have completed a trial on a full end-to-end (E2E) network of a technique to improve the range of high frequency spectrum that can in future be used to deliver 5G to its customers. Italy’s Ministry for Economic Development has made frequencies available to Vodafone so that it can trial pre-standard 5G in Milan. An E2E test network has been built for that purpose.

High frequency bands can connect many users at the same time, but broadcast over a more limited distance than lower frequencies. However, Vodafone, working with Huawei, has pioneered a new approach to improve the coverage range of that high frequency spectrum.

Instead of using a single frequency band to communicate between a smartphone and the network, the two telecoms companies tested using different frequency bands for downlink and uplink transmissions.

The downlink is used to receive data from the network – like news read on a smartphone – and the uplink is used to send data through the network – like emails or posts on social media.

The trials compared two scenarios using Vodafone’s 5G test network sending Gigabits of data. In scenario one, the same high frequency band was used for both the downlink and uplink. In scenario two, a high frequency band was used for the downlink, while a low frequency band was used for the uplink.

This capability — known technically as uplink & downlink decoupling — is currently being standardised by 3GPP, a leading organisation through which industry-wide standards are agreed for the implementation of new telecoms technology.

Vodafone measured up to a 10 decibel coverage range improvement in the uplink when also utilising the low band. That means that using the technique, customers would get a stronger signal even in areas where 5G coverage is limited.

Francisco Martin, head of Radio Product for Vodafone Group, said: “This test of pre-standard 5G uplink and downlink decoupling will help us to deploy the technology efficiently to support our customers as soon as we launch services.”

Yang Chaobin, president of Huawei 5G product line, said: “With the acceleration of the 3GPP 5G standard, the first phase of 3GPP Release 15 is expected to be completed by the end of this year, and it will support eMBB application that will bring significant improvement to user experience and even greater enhancement to capacity.

Huawei and Vodafone have successfully completed the verification of the uplink and downlink decoupling solution based on the end-to-end 5G network, including RAN, core network and terminals. Huawei will jointly work with industry partners and make 5G a global success.”

Vodafone expects to launch 5G services in 2020, in markets where it has appropriate spectrum, once the standard is agreed by 3GPP and compatible telecoms equipment and devices are available.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Vodafone and Huawei live trial extends range of pre-standard 5G in Milan appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Rongwen and Silver Spring Networks connect smart LED street lights in Guangzhou, China

By Zenobia Hegde

At Smart City Expo World Congress, the international event on smart cities, Guangdong Rongwen Energy Technology Group (Rongwen) and Silver Spring Networks, Inc. announced their selection to connect smart LED street lights in Guangzhou, China.

Through its go-to-market partnership with Rongwen, one of the largest smart LED street light providers and operators in China, Silver Spring is planning to network more than 30,000 LED street lights in Guangzhou. According to Rongwen, its efficient and patented LED street lights and outdoor lighting controls, combined with Silver Spring’s StreetLight.

Vision (SLV) Central Management System (CMS), will increase the city’s energy savings by more than 70%. The project is China’s first smart city project using Silver Spring’s secure, reliable, IPv6 platform and Wi- SUN® standards-based mesh technology, built on the IEEE 802.15.4g specification.

Guangzhou, which is China’s third largest economic hub and a major foreign trade port, has committed to reducing its carbon emissions up to 45% by the end of the decade.

“Rongwen is using Silver Spring’s pioneering smart city platform to provide seamless IoT connectivity to more efficiently operate existing city-wide resources to achieve immediate cost savings and speed time to value for smart city initiatives,” said Zhixiong Lee, general manager of Rongwen.

“As one of the early movers in smart street lighting system integration, Rongwen is the first company in China that adapts and deploys internationally recognised smart city technologies. We believe that the scalability and sustainability of this system will allow cities such as Guangzhou to grow their network to millions of devices in the future.”

“Guangzhou is an example of a major hub deploying an IoT network to drive sustainability, create resource efficiency and build a more livable city, which in turn draws in new investments.

Jeff Ross

We are thrilled to connect smart city devices in our first project in China, as Rongwen deploys our standards-based platform to connect street lights and establish a foundation for additional smart city services for the Guangzhou Development Zone,” said Jeff Ross, VP of Channels, Silver Spring Networks. “By working with our partners, we continue to evolve our standards-based platform’s capabilities, in an effort to address our cities’ biggest challenges, such as traffic congestion, pollution and public safety.”

Accelerating delivery of proven smart city technology with Rongwen D-ONE

Further accelerate the delivery of Silver Spring’s IPv6 platform and solution to the growing smart city industry, today Rongwen and Silver Spring also announced the availability of the Rongwen D-ONE Wireless Outdoor Lighting Controller. The D-ONE integrates Silver Spring’s network interface cards (NICs) into Rongwen’s outdoor lighting controller to help monitor and control the brightness of the lights based on pedestrian and vehicular traffic, time of day and weather.

The D-ONE utilises a standardised 7-Pin NEMA Socket and collects a variety of energy usage information including voltage, current, lamp burning hours, and temperature. The D-ONE also integrates with SLV for seamless configuration, monitoring and real-time control.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Rongwen and Silver Spring Networks connect smart LED street lights in Guangzhou, China appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Matsui MFG., DOCOMO and DOCOMO ASIA to demonstrate mobile-connected IoT platform for plastic-molding manufacturing

By Zenobia Hegde

Matsui MFG. Co., Ltd., NTT DOCOMO, INC. and NTT DOCOMO ASIA Pte. Ltd. announced that they will launch a proof-of-concept demonstration of an IoT platform for plastic-molding operations using a mold-temperature controller equipped with sensors and connected to a mobile communications network, enabling production data to be sent to a cloud server for real-time processing. Beginning November 15, the demonstration will help to confirm system accuracy and related issues for an envisioned commercial solution, expected to be the world’s first of its kind, for highly efficient plastic molding applications in Southeast Asia’s fast-growing industries for automobiles, electrical appliances and other products.

The solution will incorporate the use of a mobile-connected mold-temperature controller, built specially for the demonstration, at a plastic molding factory in Indonesia.

The controller collects data via sensors and then communicates the data via a mobile network for real-time visualisation and analysis. IoT-dedicated software will connect the sensors to a public cloud via a mobile network, or potentially a low-power wireless access (LWPA) system. Manufacturers are expected to use the platform to reduce machine downtime due to various malfunctions, prevent production defects and improve production processes.

Through the demonstration, the three partners will determine the possibilities of acquiring and visualising data suitable for extra-efficient plastic-molding production. In the future, machine learning and artificial intelligence are expected to be incorporated in the platform for increasingly efficient production operations.

In preparation for an envisioned commercial launch, Matsui will continue to enhance its mold-temperature controller, sensors and related know-how, DOCOMO will develop practical IoT services for Southeast Asian industries and DOCOMO ASIA will continue to enhance the IoT-solution platform for deployment in Southeast Asia.

Factors such as mold-temperature control, screw speed, pressure, etc. greatly affect the quality of plastic molding, creating the need for high-precision IoT-based production platforms.

The demand for plastics in Southeast Asia’s manufacturing industry is expected to show robust growth due to factors including regional population growth, expanding operations by Japanese automotive, electric, and other manufacturers, and ongoing efforts to reduce product weights and production costs.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Matsui MFG., DOCOMO and DOCOMO ASIA to demonstrate mobile-connected IoT platform for plastic-molding manufacturing appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Hazelcast Jet 0.5 – New high-level API increases developer productivity for real-time IoT, big data applications

By Zenobia Hegde

Hazelcast, the open source in-memory data grid (IMDG) with tens of thousands of installed clusters and over 39 million server starts per month, announced the 0.5 release of Hazelcast Jet – an application embeddable, distributed computing platform for fast processing of big data sets.

New functionality in Hazelcast Jet 0.5 includes the Pipeline API for general purpose programming of batch and stream processing, and fault tolerance using snapshotting with the integrated Hazelcast IMDG.

The overall focus of the latest release is to increase developer productivity via an extremely simple and intuitive API. Jet is a single library with no dependencies which is therefore easily embedded and deployed, removing the need for multiple systems. Typical application use cases include online trades, sensor updates in IoT architectures, real-time fraud detection, system log events, in-store e-commerce systems and social media platforms.

The Pipeline API is the primary programming interface of Hazelcast Jet for batch and stream processing, making it more appealing to a wider Java audience. This is a major enhancement to the Hazelcast Jet low-level Core API which uses directed acyclic graphs (DAG) to model data flow – allowing detailed DAG assembly of processing jobs.

The new Pipeline API is easier to use and provides developers with tools to compose batch computations from building blocks such as filters, aggregators and joiners. The Java 8 Stream API is also available in Hazelcast Jet 0.5, a well-known and popular API in the Java community which supports functional-style operations on streams of elements. The key point is that ANY Java developer will find the new Pipeline API familiar and productive.

Greg Luck, CEO of Hazelcast, said: “Since its first release Jet has put the Fast in Fast Big Data with performance up to 15 times faster than Spark and Flink. In this release we have been working on bringing Hazelcast’s legendary programming simplicity to Jet, which we think we have now achieved with the Pipeline API. Programmers, start your Jet engines.”

Also new is fault tolerance using distributed in-memory snapshots – in Hazelcast Jet 0.5 snapshots are distributed across the cluster and held in multiple replicas to provide redundancy. Jet is now able to tolerate multiple faults such as node failure, network partition or job execution failure. Snapshots are periodically created and backed up.

If there is a node failure Jet uses the latest state snapshot and automatically restarts all jobs that contain the failed node as a job participant. No additional infrastructure, such as distributed file system or external snapshot storage, is necessary to ensure Hazelcast Jet is fault tolerant out of the box.

With this release, Jet is fully integrated with Hazelcast IMDG for sources, sinks and enrichment. It also has streaming as well as batch integrations. Jet benefits from being integrated with Hazelcast IMDG, accessing an elastic, in-memory storage capability. Using data already held in IMDG versus external sources gives a 5 times performance enhancement. We expect our millions of IMDG users to start leveraging Jet’s capabilities to process the data they already hold in IMDG.

Hazelcast Jet is an Apache […]

The post Hazelcast Jet 0.5 – New high-level API increases developer productivity for real-time IoT, big data applications appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/