(ipv6 and security) -ipv4

Silicon Labs to acquire smart home technology company Sigma Designs for $282M

Silicon Labs, a semiconductor company that manufactures products for the Internet of Things, Internet infrastructure, and industrial automation use cases announced last week that it will acquire Sigma Designs for a cash transaction valued at approximately $282M.

In case Sigma fails to meet certain financial conditions, the deal will still go ahead as planned for a reduced amount of $240M.

The deal is based on Sigma’s per share price of $7.05, a 26 percent premium over Sigma Designs’ closing price of $5.60 per share on Dec. 6, 2017. Sigma Designs is a smart home company that provides Z-Wave, a leading Internet of Things (IoT) technology for smart home solutions.

The acquisition of Sigma Designs will help Silicon Labs to expand its offerings in the smart home wireless connectivity market. “The connected home represents one of the largest market opportunities in the IoT. Today, there is no single dominant wireless technology for home automation, and protocols include Wi-Fi, Bluetooth®, Zigbee®, Thread, and proprietary,” said Tyson Tuttle, CEO of Silicon Labs. Additionally, the deal will allow Sigma to expand into Smart TV market.

Read more here:: feeds.feedburner.com/iot

Partnerships Can Enhance Security in Connected Health and Beyond

By Bethany Corbin

This article was co-authored by Bethany A. Corbin, an associate in Wiley Rein’s Telecom, Media & Technology (TMT), Health Care, and Privacy & Cybersecurity practices, and Megan L. Brown, a partner in the firm’s TMT and Privacy & Cybersecurity practices.

Like the poetic prose of Bob Dylan, the reality of modern technology cannot be ignored: “the times they are a-changin’.” [1] Transitioning from the novelty of the Internet, society is embracing connected technology as the new digital frontier. Dominated by the Internet of Things (“IoT”), the future will be one of increased interconnection of wireless and computing devices in everyday objects, allowing these devices to send and receive personal data. IoT’s limits appear boundless, extending from physical devices and home appliances to vehicles and medical implants. By 2020, the value of this industry is expected to reach $1.29 trillion. [2] However, as the United States enters this increasingly digitized era, cybersecurity is rapidly presenting itself as a major national security challenge.

Recognizing possible vulnerabilities associated with connected devices, policymakers have proposed regulatory solutions. Recent legislative drafts include the Warner/Gardner IoT Cybersecurity Improvement Act of 2017, [3] the Wicker/Costello IoT Consumer ALERT Act of 2017, and the Lieu/Markey Cyber Shield Act of 2017.[4] By proposing top-down regulation, these bills have the potential to stifle innovation and creativity in this developing industry. This article argues against hard and fast regulatory controls, and explains why a public-private stakeholder approach — like the one proposed in the Internet of Medical Things (“IoMT”) Resilience Partnership Act [5] — is crucial to cybersecurity and industry success.

Presented with new and complicated security threats, legislatures may naturally turn to regulatory solutions. To date, the majority of IoT legislative initiatives seek to impose regulatory controls on an industry that is still in its infancy. The Cyber Shield Act of 2017, for example, proposes labeling IoT devices that meet security standards and establishing a best-practices advisory committee to develop industry guidelines and standards. [6] Similarly, the IoT Cybersecurity Improvement Act seeks to ensure, through written certification, that connected devices purchased by the U.S. government have no known security vulnerabilities or defects, and would impose several new obligations on the sellers of such devices to the government. [7]

While these bills signify that lawmakers are taking an increasing interest in IoT security, the technology industry is a poor candidate for a top-down regulatory approach for at least three reasons. First, the time-consuming legislative process does not match the fast-paced progression of the technology sector. This mismatch results in obsolete benchmarks and guidance, and leaves newly developed cybersecurity risks unaddressed. For this model of federal bureaucracy and regulation to succeed, the rate of IoT innovation must slow considerably, which is unlikely.

Second, prescriptive and stringent regulations may stifle innovation in developing industries. IoT, while quickly growing, is still in its infancy and requires creative innovation to flourish. Imposing regulations on a newly developed industry risks driving innovation out of that sector due to heightened costs associated with regulatory compliance. Startup companies and tech giants may devote their resources to other industries if IoT becomes heavily regulated before its foundational framework has been constructed. In this manner, regulation may prematurely kill innovation and the IoT industry.

Third, there are limits to the government’s technical skill and knowledge to develop best practices for IoT cybersecurity. Industry actors are more intimately involved in network security efforts and are aggressively working to secure next-generation technologies. The private sector, therefore, is better positioned to develop network and cybersecurity standards to protect Internet services. Top-down regulatory efforts may inadvertently ignore the realities associated with properly securing IoT devices, in turn, making those devices unsafe.

Given these considerations, it is critical that the public and private sectors collaborate on cybersecurity. Public-private partnerships are necessary to ensure that the IoT industry develops securely without stifling innovation. Cybersecurity policy must emphasize proactive risk-management and avoid prescriptive regulation associated with top-down legislative proposals. Collaboration achieves these goals by integrating diverse perspectives and resources to develop creative cybersecurity solutions that can quickly adapt to technological change. Voluntary risk management can provide unparalleled insights into the challenges facing IoT developers, and may promote dialogue on improved security measures. In addition, collaboration guards against uncoordinated government efforts that interfere with network deployment and product development. Under the collaboration model, the government will continue to play a central role in cybersecurity by supporting a strategic solution that combines public and private resources.

The IoMT Resilience Partnership Act provides a framework for how such collaboration may be structured. Establishing a public-private partnership, the Act seeks to develop voluntary guidelines for preventing cyberattacks and increasing the resilience of networked medical devices. [8] The Food and Drug Administration, in consultation with the National Institute of Standards and Technology, will create a working group comprised of representatives from 6 agency/regulatory groups and 30 representatives from the private sector (3 representatives each from 10 different private sector categories). [9] The working group will identify security gaps and devise actionable solutions to prevent potential cyber-attacks as the IoT industry evolves. [10]

Leveraging the experience of both the public and private sectors, the IoMT Resilience Partnership Act capitalizes on each sector’s strengths to accomplish a mutually beneficial goal. The private sector, for example, controls critical infrastructure and networks that are vulnerable to medical cyberattacks. Industry organizations are intimately familiar with system operations, and private sector employees have expertise in responding to security threats. The government, on the other hand, is poised to handle the identification of cyber threats, and prosecution of criminals. Further, the government can promote workforce development of necessary competencies and advance consistent cybersecurity policies to the international community. Therefore, the IoMT Resilience Partnership Act allows the government and private sector to collaborate and develop workable standards that can be implemented without stifling innovation.

While the IoMT Resilience Partnership Act is one example of how public-private stakeholder collaboration can develop, it remains to be seen whether any of the cybersecurity bills will become law. The road to digital resilience and security is still being paved, but innovation should not be regulated out of fear. To address vulnerabilities associated with connected devices, it is crucial to leverage the public and private sectors to develop workable and time-sensitive solutions capable of matching the rapid evolution of the technology industry. To defend against security attacks and manage risk, collaboration is essential.

[1] Bob Dylan, The Times They Are a-Changin’ (Columbia 1964).

[2] Internet of Things Spending Forecast to Grow 17.9% in 2016 Led by Manufacturing, Transportation, and Utilities Investments, According to New IDC Spending Guide, IDC (Jan. 4, 2017); Natalie Gagliordi, IoT Spending to Top $1.29 Trillion by 2020, Says IDC, ZDNet (Jan. 4, 2017).

[3] IoT Cybersecurity Improvement Act of 2017, S. 1691, 115th Cong. (1st Sess. 2017).

[4] Cyber Shield Act of 2017, S. 2020, 115th Cong. (1st Sess. 2017).

[5] Internet of Medical Things Resilience Partnership Act of 2017, H.R. 3985, 115th Cong. (1st Sess. 2017).

[6] S. 2020, §§ 3, 4.

[7] S. 1691, § 3.

[8] H.R. 3985, § 2.

[9] Id.

[10] Id.

Written by Bethany Corbin, Associate Attorney at Wiley Rein LLP

Follow CircleID on Twitter

More under: Internet Governance, Internet of Things, Policy & Regulation

Read more here:: feeds.circleid.com/cid_sections/blogs?format=xml

Partnerships Can Enhance Security in Connected Health and Beyond

By News Aggregator

By Bethany Corbin

This article was co-authored by Bethany A. Corbin, an associate in Wiley Rein’s Telecom, Media & Technology (TMT), Health Care, and Privacy & Cybersecurity practices, and Megan L. Brown, a partner in the firm’s TMT and Privacy & Cybersecurity practices.

Like the poetic prose of Bob Dylan, the reality of modern technology cannot be ignored: “the times they are a-changin’.” [1] Transitioning from the novelty of the Internet, society is embracing connected technology as the new digital frontier. Dominated by the Internet of Things (“IoT”), the future will be one of increased interconnection of wireless and computing devices in everyday objects, allowing these devices to send and receive personal data. IoT’s limits appear boundless, extending from physical devices and home appliances to vehicles and medical implants. By 2020, the value of this industry is expected to reach $1.29 trillion. [2] However, as the United States enters this increasingly digitized era, cybersecurity is rapidly presenting itself as a major national security challenge.

Recognizing possible vulnerabilities associated with connected devices, policymakers have proposed regulatory solutions. Recent legislative drafts include the Warner/Gardner IoT Cybersecurity Improvement Act of 2017, [3] the Wicker/Costello IoT Consumer ALERT Act of 2017, and the Lieu/Markey Cyber Shield Act of 2017.[4] By proposing top-down regulation, these bills have the potential to stifle innovation and creativity in this developing industry. This article argues against hard and fast regulatory controls, and explains why a public-private stakeholder approach — like the one proposed in the Internet of Medical Things (“IoMT”) Resilience Partnership Act [5] — is crucial to cybersecurity and industry success.

Presented with new and complicated security threats, legislatures may naturally turn to regulatory solutions. To date, the majority of IoT legislative initiatives seek to impose regulatory controls on an industry that is still in its infancy. The Cyber Shield Act of 2017, for example, proposes labeling IoT devices that meet security standards and establishing a best-practices advisory committee to develop industry guidelines and standards. [6] Similarly, the IoT Cybersecurity Improvement Act seeks to ensure, through written certification, that connected devices purchased by the U.S. government have no known security vulnerabilities or defects, and would impose several new obligations on the sellers of such devices to the government. [7]

While these bills signify that lawmakers are taking an increasing interest in IoT security, the technology industry is a poor candidate for a top-down regulatory approach for at least three reasons. First, the time-consuming legislative process does not match the fast-paced progression of the technology sector. This mismatch results in obsolete benchmarks and guidance, and leaves newly developed cybersecurity risks unaddressed. For this model of federal bureaucracy and regulation to succeed, the rate of IoT innovation must slow considerably, which is unlikely.

Second, prescriptive and stringent regulations may stifle innovation in developing industries. IoT, while quickly growing, is still in its infancy and requires creative innovation to flourish. Imposing regulations on a newly developed industry risks driving innovation out of that sector due to heightened costs associated with regulatory compliance. Startup companies and tech giants may devote their resources to other industries if IoT becomes heavily regulated before its foundational framework has been constructed. In this manner, regulation may prematurely kill innovation and the IoT industry.

Third, there are limits to the government’s technical skill and knowledge to develop best practices for IoT cybersecurity. Industry actors are more intimately involved in network security efforts and are aggressively working to secure next-generation technologies. The private sector, therefore, is better positioned to develop network and cybersecurity standards to protect Internet services. Top-down regulatory efforts may inadvertently ignore the realities associated with properly securing IoT devices, in turn, making those devices unsafe.

Given these considerations, it is critical that the public and private sectors collaborate on cybersecurity. Public-private partnerships are necessary to ensure that the IoT industry develops securely without stifling innovation. Cybersecurity policy must emphasize proactive risk-management and avoid prescriptive regulation associated with top-down legislative proposals. Collaboration achieves these goals by integrating diverse perspectives and resources to develop creative cybersecurity solutions that can quickly adapt to technological change. Voluntary risk management can provide unparalleled insights into the challenges facing IoT developers, and may promote dialogue on improved security measures. In addition, collaboration guards against uncoordinated government efforts that interfere with network deployment and product development. Under the collaboration model, the government will continue to play a central role in cybersecurity by supporting a strategic solution that combines public and private resources.

The IoMT Resilience Partnership Act provides a framework for how such collaboration may be structured. Establishing a public-private partnership, the Act seeks to develop voluntary guidelines for preventing cyberattacks and increasing the resilience of networked medical devices. [8] The Food and Drug Administration, in consultation with the National Institute of Standards and Technology, will create a working group comprised of representatives from 6 agency/regulatory groups and 30 representatives from the private sector (3 representatives each from 10 different private sector categories). [9] The working group will identify security gaps and devise actionable solutions to prevent potential cyber-attacks as the IoT industry evolves. [10]

Leveraging the experience of both the public and private sectors, the IoMT Resilience Partnership Act capitalizes on each sector’s strengths to accomplish a mutually beneficial goal. The private sector, for example, controls critical infrastructure and networks that are vulnerable to medical cyberattacks. Industry organizations are intimately familiar with system operations, and private sector employees have expertise in responding to security threats. The government, on the other hand, is poised to handle the identification of cyber threats, and prosecution of criminals. Further, the government can promote workforce development of necessary competencies and advance consistent cybersecurity policies to the international community. Therefore, the IoMT Resilience Partnership Act allows the government and private sector to collaborate and develop workable standards that can be implemented without stifling innovation.

While the IoMT Resilience Partnership Act is one example of how public-private stakeholder collaboration can develop, it remains to be seen whether any of the cybersecurity bills will become law. The road to digital resilience and security is still being paved, but innovation should not be regulated out of fear. To address vulnerabilities associated with connected devices, it is crucial to leverage the public and private sectors to develop workable and time-sensitive solutions capable of matching the rapid evolution of the technology industry. To defend against security attacks and manage risk, collaboration is essential.

[1] Bob Dylan, The Times They Are a-Changin’ (Columbia 1964).

[2] Internet of Things Spending Forecast to Grow 17.9% in 2016 Led by Manufacturing, Transportation, and Utilities Investments, According to New IDC Spending Guide, IDC (Jan. 4, 2017); Natalie Gagliordi, IoT Spending to Top $1.29 Trillion by 2020, Says IDC, ZDNet (Jan. 4, 2017).

[3] IoT Cybersecurity Improvement Act of 2017, S. 1691, 115th Cong. (1st Sess. 2017).

[4] Cyber Shield Act of 2017, S. 2020, 115th Cong. (1st Sess. 2017).

[5] Internet of Medical Things Resilience Partnership Act of 2017, H.R. 3985, 115th Cong. (1st Sess. 2017).

[6] S. 2020, §§ 3, 4.

[7] S. 1691, § 3.

[8] H.R. 3985, § 2.

[9] Id.

[10] Id.

Written by Bethany Corbin, Associate Attorney at Wiley Rein LLP

Follow CircleID on Twitter

More under: Internet Governance, Internet of Things, Policy & Regulation

Read more here:: feeds.circleid.com/cid_sections/blogs?format=xml

The post Partnerships Can Enhance Security in Connected Health and Beyond appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

Number of consumers considering Artificial Intelligence–enabled devices for holiday shopping doubles

By Zenobia Hegde

SAP SE announced that nearly four out of 10 consumers who own in-home assistants are considering using them for holiday shopping this year — to purchase gifts for others (16%), research deals and savings for gifts (15%), and for their own purchases (7%). These findings derive from a survey commissioned by SAP of 1,000 U.S. consumers, researching usage of artificial intelligence (AI)–powered smart devices for holiday shopping.

The survey affirms growing interest in relying on AI technologies for commerce and that companies already considering chatbots and voice-enabled assistants in their omnichannel strategy are on the right track.

More consumers trust AI to do their shopping

Voice-enabled speakers such as Amazon Echo, Google Home and Sonos One will be installed in 55% of U.S. households by the year 2022, according to research from Juniper Research. The smart assistants are seeing an uptick in adoption by U.S. consumers, who are increasingly using them for a variety of applications — from streaming music and making lists, to hearing the news, and even making purchases.

When it comes to holiday shopping specifically, the survey found that just 17% of consumers that own an in-home assistant said they used it last year. The increased interest in using the devices for holiday shopping in 2017 — more than double compared to the prior year — demonstrates a growing interest in relying on AI-powered technologies for commerce. The top reason for using an in-home assistant to purchase gifts is convenience, with more than 18% of respondents citing this as a key benefit.

“As retailers look to meet shoppers’ expectations for convenience and personalisation, artificial intelligence is playing a crucial role in the customer journey,” said Johann Wrede, global vice president of strategic marketing for SAP Hybris solutions at SAP.

“Chatbots and voice-enabled assistants deliver a convenient, hands-free experience, removing even more barriers to customer engagement. These technologies will not be successful on their own, however — they will need a rich set of customer data in order to make relevant recommendations and be truly helpful.”

Barriers prevent further adoption of smart devices for commerce

While AI is becoming more accepted for helping with holiday purchases, there are still many skeptics who haven’t gotten on board with using their in-home assistants for commerce. Only 28% of respondents feel that their device understands them well enough to recommend gift ideas.

Additionally, smart speaker owners report the top two limitations of the assistants as:

Can’t determine visual product quality (20%) — shoppers want to be confident in their purchases and know what they look and feel like
Requires too much guidance (19%) — consumers are looking for a seamless experience and want their devices to understand their needs and foster convenience

SAP® Hybris® solutions are being developed with a commitment to furthering AI and machine learning (ML) innovation and helping organisations overcome barriers to adoption. A ML co-innovation program has been launched with the goal of partnering with customers to embed new capabilities into SAP Hybris Sales Cloud and SAP Hybris Service Cloud solutions.

Additionally, SAP Hybris solutions offer components or features with embedded ML […]

The post Number of consumers considering Artificial Intelligence–enabled devices for holiday shopping doubles appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Number of consumers considering Artificial Intelligence–enabled devices for holiday shopping doubles

By News Aggregator

By Zenobia Hegde

SAP SE announced that nearly four out of 10 consumers who own in-home assistants are considering using them for holiday shopping this year — to purchase gifts for others (16%), research deals and savings for gifts (15%), and for their own purchases (7%). These findings derive from a survey commissioned by SAP of 1,000 U.S. consumers, researching usage of artificial intelligence (AI)–powered smart devices for holiday shopping.

The survey affirms growing interest in relying on AI technologies for commerce and that companies already considering chatbots and voice-enabled assistants in their omnichannel strategy are on the right track.

More consumers trust AI to do their shopping

Voice-enabled speakers such as Amazon Echo, Google Home and Sonos One will be installed in 55% of U.S. households by the year 2022, according to research from Juniper Research. The smart assistants are seeing an uptick in adoption by U.S. consumers, who are increasingly using them for a variety of applications — from streaming music and making lists, to hearing the news, and even making purchases.

When it comes to holiday shopping specifically, the survey found that just 17% of consumers that own an in-home assistant said they used it last year. The increased interest in using the devices for holiday shopping in 2017 — more than double compared to the prior year — demonstrates a growing interest in relying on AI-powered technologies for commerce. The top reason for using an in-home assistant to purchase gifts is convenience, with more than 18% of respondents citing this as a key benefit.

“As retailers look to meet shoppers’ expectations for convenience and personalisation, artificial intelligence is playing a crucial role in the customer journey,” said Johann Wrede, global vice president of strategic marketing for SAP Hybris solutions at SAP.

“Chatbots and voice-enabled assistants deliver a convenient, hands-free experience, removing even more barriers to customer engagement. These technologies will not be successful on their own, however — they will need a rich set of customer data in order to make relevant recommendations and be truly helpful.”

Barriers prevent further adoption of smart devices for commerce

While AI is becoming more accepted for helping with holiday purchases, there are still many skeptics who haven’t gotten on board with using their in-home assistants for commerce. Only 28% of respondents feel that their device understands them well enough to recommend gift ideas.

Additionally, smart speaker owners report the top two limitations of the assistants as:

Can’t determine visual product quality (20%) — shoppers want to be confident in their purchases and know what they look and feel like
Requires too much guidance (19%) — consumers are looking for a seamless experience and want their devices to understand their needs and foster convenience

SAP® Hybris® solutions are being developed with a commitment to furthering AI and machine learning (ML) innovation and helping organisations overcome barriers to adoption. A ML co-innovation program has been launched with the goal of partnering with customers to embed new capabilities into SAP Hybris Sales Cloud and SAP Hybris Service Cloud solutions.

Additionally, SAP Hybris solutions offer components or features with embedded ML […]

The post Number of consumers considering Artificial Intelligence–enabled devices for holiday shopping doubles appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post Number of consumers considering Artificial Intelligence–enabled devices for holiday shopping doubles appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

.WED Placed in Emergency Back-End Registry Operator (EBERO) Program

Los Angeles – 7 December 2017 – The Internet Corporation for Assigned Names and Numbers (“ICANN”) today designated an emergency interim registry operator for the generic top-level domain (gTLD) .WED.

An Emergency Back-End Registry Operator (EBERO) may be temporarily activated if a gTLD registry operator reaches an emergency threshold of downtime for any of the five critical registry functions. These functions are: domain name system (DNS) resolution for registered domain names, operation of the shared registration system, operation of Registration Data Directory Services (e.g., WHOIS), registry data escrow deposits and maintenance of a properly signed zone in accordance with DNS Security Extensions (DNSSEC) requirements.

Registry operator, Atgron, Inc., which operates gTLD .WED, experienced a Registration Data Directory Services failure, and ICANN designated EBERO provider Nominet as emergency interim registry operator. Nominet has now stepped in and is restoring service for the TLD.

The EBERO program is designed to be activated should a registry operator require assistance to sustain critical registry functions for a period of time. The primary concern of the EBERO program is to protect registrants by ensuring that the five critical registry functions are available. ICANN’s goal is to have the emergency event resolved as soon as possible.

About ICANN

ICANN’s mission is to help ensure a stable, secure and unified global Internet. To reach another person on the Internet, you need to type an address – a name or a number – into your computer or other device. That address must be unique so computers know where to find each other. ICANN helps coordinate and support these unique identifiers across the world. ICANN was formed in 1998 as a not-for-profit public-benefit corporation with a community of participants from all over the world.

Read more here:: www.icann.org/news.rss

.WED Placed in Emergency Back-End Registry Operator (EBERO) Program

Los Angeles – 7 December 2017 – The Internet Corporation for Assigned Names and Numbers (“ICANN”) today designated an emergency interim registry operator for the generic top-level domain (gTLD) .WED.

An Emergency Back-End Registry Operator (EBERO) may be temporarily activated if a gTLD registry operator reaches an emergency threshold of downtime for any of the five critical registry functions. These functions are: domain name system (DNS) resolution for registered domain names, operation of the shared registration system, operation of Registration Data Directory Services (e.g., WHOIS), registry data escrow deposits and maintenance of a properly signed zone in accordance with DNS Security Extensions (DNSSEC) requirements.

Registry operator, Atgron, Inc., which operates gTLD .WED, experienced a Registration Data Directory Services failure, and ICANN designated EBERO provider Nominet as emergency interim registry operator. Nominet has now stepped in and is restoring service for the TLD.

The EBERO program is designed to be activated should a registry operator require assistance to sustain critical registry functions for a period of time. The primary concern of the EBERO program is to protect registrants by ensuring that the five critical registry functions are available. ICANN’s goal is to have the emergency event resolved as soon as possible.

About ICANN

ICANN’s mission is to help ensure a stable, secure and unified global Internet. To reach another person on the Internet, you need to type an address – a name or a number – into your computer or other device. That address must be unique so computers know where to find each other. ICANN helps coordinate and support these unique identifiers across the world. ICANN was formed in 1998 as a not-for-profit public-benefit corporation with a community of participants from all over the world.

Read more here:: www.icann.org/news.rss

New fanless COM Express module for rugged and HPEC applications announced by Eurotech

By Zenobia Hegde

Eurotech, a long-time provider of embedded systems and a global provider in Internet of Things (IoT) enablement, announced a new fanless COM Express module for rugged and HPEC applications. The CPU-162-23 is a rugged COM Express Basic (125x95mm) Type 7 board that brings the computational performance and RAM capacity of a server to the field: it is based on the Intel Xeon/Pentium D-1500 processors and supports up to 4x DDR4 SO-DIMM modules with or without ECC for a total capacity of 64GB.

The board comes with many high-speed interfaces, such as up to x32 PCI Express lanes, 2x 10Gbps and 1x 10/100/1000Mbps Ethernet ports. Other interfaces include 2x SATA 3.0, 4x USB 3.0 and 4x USB 2.0.

With a variety of high performance CPU configurations and a large memory capacity, the CPU-162-23 is designed to deliver supercomputing processing and data center grade networking to the edge in a very compact module that can be embedded in rugged and fanless systems.

Furthermore, the CPU-162-23 is a reliable building block for Industrial and Transportation applications, enabling server class workloads and high-end embedded IoT edge computing, thanks to its extended operating temperature range (-40°C to +85°C), Error Correcting Code (ECC) memory, soldered down CPU and long-life cycle.

With this new board, Eurotech expands its COM Express product portfolio, ranging from the CPU-161-18, a Xeon D-1500 Compact Type 6 module, to the CPU-163-15 Mini Type 10 with the Intel E3800 CPU.

“The CPU-162-23 is the latest entry in our COM Express catalog, adding more options to customers who require a unique combination of computational performance and ruggedness”, said Pierfrancesco Zuccato, Eurotech senior product manager, “It allows delivering unprecedented performance to a wide range of traditional and novel applications in the field.”

The CPU-162-23 is Everyware Software Framework (ESF) ready, a commercial, enterprise-ready edition of Eclipse Kura, the open source Java/OSGi edge computing platform for the development of IoT applications. Distributed and supported by Eurotech, ESF adds advanced security, diagnostics, provisioning, remote access and full integration with Everyware Cloud (EC), Eurotech IoT integration platform (separately available).

The CPU-162-23 supports Yocto Linux and CentOS 7. Other operating systems, including Windows 10 Enterprise and RTOS, are available through Eurotech Professional Services, which also include BIOS personalisation, carrier board design, system development and production. Deep module customisation, such as feature changes are also available.

The CPU-162-23 will be available for orders Q2’18.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post New fanless COM Express module for rugged and HPEC applications announced by Eurotech appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

New fanless COM Express module for rugged and HPEC applications announced by Eurotech

By News Aggregator

By Zenobia Hegde

Eurotech, a long-time provider of embedded systems and a global provider in Internet of Things (IoT) enablement, announced a new fanless COM Express module for rugged and HPEC applications. The CPU-162-23 is a rugged COM Express Basic (125x95mm) Type 7 board that brings the computational performance and RAM capacity of a server to the field: it is based on the Intel Xeon/Pentium D-1500 processors and supports up to 4x DDR4 SO-DIMM modules with or without ECC for a total capacity of 64GB.

The board comes with many high-speed interfaces, such as up to x32 PCI Express lanes, 2x 10Gbps and 1x 10/100/1000Mbps Ethernet ports. Other interfaces include 2x SATA 3.0, 4x USB 3.0 and 4x USB 2.0.

With a variety of high performance CPU configurations and a large memory capacity, the CPU-162-23 is designed to deliver supercomputing processing and data center grade networking to the edge in a very compact module that can be embedded in rugged and fanless systems.

Furthermore, the CPU-162-23 is a reliable building block for Industrial and Transportation applications, enabling server class workloads and high-end embedded IoT edge computing, thanks to its extended operating temperature range (-40°C to +85°C), Error Correcting Code (ECC) memory, soldered down CPU and long-life cycle.

With this new board, Eurotech expands its COM Express product portfolio, ranging from the CPU-161-18, a Xeon D-1500 Compact Type 6 module, to the CPU-163-15 Mini Type 10 with the Intel E3800 CPU.

“The CPU-162-23 is the latest entry in our COM Express catalog, adding more options to customers who require a unique combination of computational performance and ruggedness”, said Pierfrancesco Zuccato, Eurotech senior product manager, “It allows delivering unprecedented performance to a wide range of traditional and novel applications in the field.”

The CPU-162-23 is Everyware Software Framework (ESF) ready, a commercial, enterprise-ready edition of Eclipse Kura, the open source Java/OSGi edge computing platform for the development of IoT applications. Distributed and supported by Eurotech, ESF adds advanced security, diagnostics, provisioning, remote access and full integration with Everyware Cloud (EC), Eurotech IoT integration platform (separately available).

The CPU-162-23 supports Yocto Linux and CentOS 7. Other operating systems, including Windows 10 Enterprise and RTOS, are available through Eurotech Professional Services, which also include BIOS personalisation, carrier board design, system development and production. Deep module customisation, such as feature changes are also available.

The CPU-162-23 will be available for orders Q2’18.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post New fanless COM Express module for rugged and HPEC applications announced by Eurotech appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post New fanless COM Express module for rugged and HPEC applications announced by Eurotech appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

COME AND VISIT ARDUINO AT MAKER FAIRE ROME THIS WEEKEND!

By Arduino Team

Starting tomorrow, Friday, Dec. 1st, the Arduino team will be exhibiting at 5th annual Maker Faire Rome – The European Edition. Those heading to Rome over this weekend (December 1st -3rd) are invited to swing by our booth at Pavilion 7 (Interaction) and join us for some inspiring talks. This year Arduino is also operating the official Maker Shop with lots of products and ideas that can help you find original gifts for Christmas.

The booth

We’ve been preparing a series of demos for adults and kids at the booth to showcase the new Arduino Education products and programs and the latest developments of the MKR family boards and IoT solutions. Moreover, you’ll have the opportunity to learn more about the AUG (Arduino User Group) Program, to meet the winner of the Arduino MKR FOX 1200 Contest, and to play with an interactive installation by Supsi university!

The store

At Pavillon 7, close to Arduino Booth there will be a Maker Shop by Arduino selling most of the Arduino products (including the latest Arduino MKR WAN 1300 (Lora) and Arduino MKR GSM 1400 recently announced!). You’ll find also some other interesting kits and Christmas gift ideas for kids, makers and developers, plus a selection of Arduino goodies.

Talks

The Arduino team will join the Maker Faire Rome’s program with some unmissable talks and presentations about Arduino innovations, new products and partnership programs with the following schedule:

We look forward to seeing you all at Pavilion 7 (check out the Makerfaire MAP in PDF)!

Read more here:: blog.arduino.cc/feed/