ipv6 info

Osram Lasers promote adoption of autonomous and semi-autonomous vehicles

By Zenobia Hegde

At this year’s North American International Auto Show’s AutoMobili-D 2018, Osram Opto Semiconductors is demonstrating how its high-power infrared pulse lasers are helping speed the adoption of autonomous vehicles and advanced driver assistance systems (ADAS).

AutoMobili-D is a dedicated expo focused on the rapidly evolving global automotive and mobility landscapes. Attendees can experience Osram’s highly efficient 905 nm lasers in action in booth #AD14 at AutoMobili-D from January 14 to January 21.

Pulse laser diodes from Osram Opto Semiconductors have been featured in cars for more than 10 years for time-of-flight (TOF) measurements in adaptive cruise control (ACC) systems and automatic braking systems.

At AutoMobili-D, Osram will showcase its laser and LEDs in a number of innovative applications for autonomous vehicles and ADAS, including:

An industry-first long range infrared 4D camera concept from Vergence Automation uses 190 Osram infrared LEDs. 4D imaging, when applied to autonomous vehicle use, will be a boon to computer vision, machine learning, and deep learning.
The GazeT Driver Monitoring Global Shutter Image Sensor Demo System from ON Semiconductor uses Osram’s 940 nm infrared LEDs.

Rajeev Thakur

Osram lasers dedicated to LIDAR applications are based on the company’s extremely efficient, high-power infrared pulse laser with 905 nm wavelength. The laser’s short pulse length allows systems operating at high optical power levels to realise large detection ranges, while still being safe for the naked eye.

“Osram is pleased to be working with leading companies to enable widespread adoption of autonomous vehicles and ADAS, which will change the future of driving,” said Rajeev Thakur, regional marketing manager at Osram Opto Semiconductors. “Joining forces with companies like Vergence Automation and ON Semiconductor is a testament to Osram’s leadership in the development and future of autonomous vehicles.”

“Osram is a great technology partner for developing our 4D camera that utilises a patented 4D pixel to perform 3D image creation,” said Jamie Retterath, chief product officer at Vergence. “The 4D pixel has the potential to displace TOF for all future 3D imaging applications.”

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Osram Lasers promote adoption of autonomous and semi-autonomous vehicles appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Beesion Releases Next Generation of Low-Code Telecom Commissions…

Software release has functionality to calculate sales commissions for IoT and 5G services, like connected cars.

(PRWeb December 21, 2017)

Read the full story at http://www.prweb.com/releases/2017/12/prweb15035574.htm

Read more here:: www.prweb.com/rss2/technology.xml

Comcast Showcases Redesigned X1 Voice Remote

By Cablefax Staff

Comcast revealed the newly designed voice remote for its X1 platform on Monday. Like its predecessor, which won an Emmy, the remote was designed and developed by Comcast and manufactured by Universal Electronics. Comcast is Universal’s largest customer, accounting for 21% of its net sales ($36.8mln) in 3Q17.

The main hardware change is a relocated microphone button. New functions—available on both the original and new X1 remotes—include the ability to fast forward or rewind by a specific increment of time, music recognition technology, new commands for IoT devices and better AI for Spanish-language searches.

The post Comcast Showcases Redesigned X1 Voice Remote appeared first on Cablefax.

Read more here:: feeds.feedburner.com/cable360/ct/operations?format=xml

ICANN to Participate at the 12th Internet Governance Forum 2017 in Switzerland

This month, members of the ICANN community, Board, and organization will be in Geneva, Switzerland, participating in the 12th annual meeting of the Internet Governance Forum (IGF). It seems only fitting to point out that Geneva is where the first phase of the World Summit on the Information Society (WSIS) – which initiated the IGF – took place back in 2003. It is also the home of the IGF Secretariat.

The event will take place from 18 to 21 December 2017 at the Palais de Nations.

Since its inception, the IGF has evolved to become a unique and important platform for global dialogue on the development of the Internet, involving stakeholders from the wider Internet community. The IGF will afford ICANN an opportunity for bilateral discussions with a range of stakeholders from around the world.

This year, as in previous years, ICANN will engage in dialogue through a number of sessions, either as participants or through organized ICANN sessions. Key topics of discussion will be:

  • General Data Protection Rights (GDPR)
  • Multistakeholder governance in the Domain Name System (DNS)
  • Emerging identifier technologies and how they may play a role in the evolution of the Internet, including in the proliferation of the Internet of Things (IOT)
  • Voice of civil society in ICANN

We will hold our customary ICANN Open Forum, which I encourage you to attend. Göran Marby, ICANN CEO and President, and Cherine Chalaby, Chair of the ICANN Board, will brief participants on areas ICANN is addressing. These include the community’s preparatory work for a potential new application process for generic top-level domains (gTLDs) and an update on the effect of the implementation of GDPR legislation in Europe. This will be an interactive session where IGF participants will be able to engage in an open dialogue and exchange views with ICANN’s leadership.

Below are the main ICANN sessions at the IGF.

Date Time Title
17 December 15:00–16:30 How Digital activists are shaping the evolution of the Internet: the voice of civil society in ICANN
17 December 16:30–18:00 The DNS and Emerging Identifiers (including DOA)
19 December 09:00–10:30 Multistakeholder governance of the Domain Name System, lessons learned for other IG issues (WS76) – CCWG IG Session.
19 December 16:10–17:10 ICANN Open Forum: ICANN – Looking ahead: – Challenges and Opportunities (OF50)

ICANN community members have organized or will take part in other workshops, forums, and sessions. For more information, see the IGF website.

On the ground, the Government Engagement team, led by Tarek Kamel, will be coordinating the involvement of ICANN in this significant event.

We look forward to seeing you there soon!

Read more here:: www.icann.org/news/blog.rss

Nearly three-quarters of retail orgs lack a breach response plan

By Zenobia Hegde

With more than 174 million Americans shopping over the Thanksgiving holiday weekend, it’s looking to be a busy holiday season for retailers this year. As shoppers continue hunting for the perfect gift over the next couple weeks, it’s important to remember that cyber criminals will likely be on the hunt as well. How prepared are retailers to deal with an attack?

In an effort to answer that question, Tripwire surveyed IT security professionals working in retail organisations about their experiences and attitudes towards factors affecting IT security. The results found that a large majority are not fully prepared for data breaches this holiday season.

Of the respondents, only 28% of respondents said they have a fully tested plan in place in the event of a security breach. 21% said their organisation doesn’t have a plan at all, and the same proportion of respondents said they didn’t have the means to notify customers of a data breach within 72 hours, a requirement specified by the General Data Protection Regulation (GDPR).

“Considering the amount of high-profile data breaches that have occurred recently, plus the continued discussion around GDPR, it is surprising and concerning that many retailers do not have a tested plan in the event of a security breach,” said Tim Erlin, vice president of product management and strategy at Tripwire. “It’s encouraging that most respondents think they can meet the 72-hour notification window as set out in the upcoming GDPR, but if they haven’t tested their plans, I don’t know how confident they should be in that assumption.”

Only a small minority of the retail industry felt fully secure in their incident response capabilities. 23% of respondents said they were “fully prepared” to absorb potential financial penalties. Even fewer professionals (15%) said they were fully prepared to manage customer and press communications following an incident.

Not all the survey’s findings were discouraging, however. The results did provide some hope that the industry is moving in the right direction. More than half of respondents (57%) said that their organisation’s ability to detect and respond to a security breach has improved in the past year and a half. With the holiday season in full swing, organisations should make sure they have proper security safeguards in place.

“It’s really critical that organisations have a good view of what’s on their network at all times, that they harden their systems with secure configuration and vulnerability management, and that they are able to continuously monitor for change and are alerted to any drift outside the established security and compliance policies,” said Erlin.

There are a number of effective and established security control frameworks available to guide organisations, such as the CIS Critical Security Controls. Implementing even the most basic security controls can go a long way in improving an organisation’s security posture.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Nearly three-quarters of retail orgs lack a breach response plan appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

CHTF 2017, Lighting Up the Smart City Dream

By IoT – Internet of Things

The Smart City Exhibition under the umbrella of the China Hi-Tech Fair, being held from November 16 to November 21, 2017, at Shenzhen Convention and Exhibition Center, features Smart City solutions, products, frontier technologies and innovative ideas in the sector. It aims to make news related to the sector available to everyone. The Smart City Pavilion flies the […]

The post CHTF 2017, Lighting Up the Smart City Dream appeared first on IoT – Internet of Things.

Read more here:: iot.do/feed

Launch of £5 million UK hardware security Institute at Queen’s University Belfast

By Zenobia Hegde

What:

A £5 million (€5.62 million) multi-university Research Institute to improve hardware security and reduce vulnerability to cyber threats will be launched at the Centre for Secure Information Technologies, Queen’s University.
Where:

Centre for Secure Information Technologies,
ECIT,

Queen’s University Belfast,
Northern Ireland Science Park,
Queen’s Road,
Queen’s Island,
Belfast,
BT3 9DT

When:

Wednesday 22 November
Key media opportunity 11am – 11.30am
Event runs from 9am – 3pm (full itinerary attached)

Media opportunities:

Media are welcome to attend the full event but there will be a key media opportunity between 11am – 11.30am.

From 11am – 11.10am there will be a photo opportunity and from 11.10am there will be media interviews with professor Máire O’Neill and Dr Mathias Wagner, chief security technologist, NXP.

Bids should be forwarded to Emma Gallagher in the Communications Office by Tuesday 21 November.

Attachments:

Event itinerary

Media inquiries to Emma Gallagher at Queen’s Communications Office on Tel: (028) 9097 5384 or email emma.gallagher@qub.ac.uk

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Launch of £5 million UK hardware security Institute at Queen’s University Belfast appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Global study reveals IoT adoption is at 69% despite security concerns

By Zenobia Hegde

Cradlepoint announced the release of a new Cradlepoint Business Intelligence Report, “The State of IoT 2017-2018”, which reveals the current IT practices, perceptions and future plans surrounding global Internet of Things (IoT) deployments. The findings of the underlying study revealed that even though over 69% of organisations have adopted, or plan to adopt, IoT solutions within the next year, 40% of companies have serious concerns around cybersecurity.

Conducted by Spiceworks, the study surveyed 400 IT professionals in the U.S., Canada and the UK at companies with at least 500 employees across 22 industries. Respondents are all involved with IoT strategies and decisions at their organisations.

While cybersecurity remains the top concern (40%), it is a desire for increased physical security that is the top driver for IoT adoption (32%), followed by improved operational processes (23%), reduced operational costs (21%) and simplified management (20%). Approximately 71% of respondents who already use IoT technologies say they’re using it for building security, often through security cameras.

Recent botnet attacks have infected millions of IoT devices. However, despite the growing security threat associated with IoT, the research shows that about half of the organisations surveyed are deploying IoT solutions on their existing enterprise network and 57% prefer to manage their own IoT device security.

“Following the spread of IoT botnets like Reaper and Mirai, which infected millions of internet-connected security cameras, routers, and digital video recorders, it’s evident that insecure IoT devices, even connected security devices, are putting organisations more at risk,” said Peter Tsai, senior technology analyst at Spiceworks.

“Before deploying network-connected devices that create more entry points for hackers to exploit, organisations should vet the security of all IoT devices they plan to introduce and ensure their company can adequately protect these devices from potential threats.”

“Our new ‘State of IoT’ report highlights a looming issue within commercial IoT deployments – cross-contamination. Companies that deploy IoT devices on their existing enterprise networks are significantly expanding their attack surface and creating new vulnerabilities to IoT-specific threats that traditional security tools are not equipped to handle,” said Ken Hosac, vice president of IoT business development at Cradlepoint.

“The good news, however, is that companies can leverage software-defined perimeter technology to spin-up virtual overlay networks, without trained specialists, that isolate IoT devices from existing networks—and other IoT devices, control access and shield them from being Internet-addressable.”

Additional resources can be found here.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Global study reveals IoT adoption is at 69% despite security concerns appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Widespread mismanagement of privileged accounts and access revealed in One Identity global survey

By Zenobia Hedge

One Identity, a proven leader in helping organisations get identity and access management (IAM) right, released new global research that exposes widespread poor practices when it comes to managing privileged accounts.

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening research findings are that nine in 10 (88%) respondents admit to facing challenges when it comes to managing privileged passwords, and one in five (18%) still use a paper-based logbook to manage privileged accounts.

These findings are significant considering that privileged accounts grant virtually unlimited access to nearly every component of a company’s IT infrastructure, essentially handing over the keys to a company’s most critical and sensitive systems and data.

The survey also exposed three key areas where distressingly inferior practices for privileged account management occur, including:

Management platforms and tools: In addition to 18% of respondents admitting to using paper-based logs, a surprising 36% are using equally inadequate spreadsheets for tracking privileged accounts. The survey also found that two-thirds (67%) of companies are relying on two or more tools to manage these accounts — indicating widespread inconsistency in privileged access management (PAM).
Monitoring and visibility: The majority of IT security professionals (57%) admit to only monitoring some privileged accounts, or not monitoring privileged access at all. Even worse, 21% of respondents confessed they are unable to monitor or record activity performed with admin credentials, while 32% said they cannot consistently identify individuals who perform admin activities.
Password management and change: An overwhelming 86% of organisations are not consistently changing the password on their admin accounts after each use. Further, 40% of IT security professionals don’t take the basic best practice of changing a default admin password. By not adhering to these best practices, privileged accounts are vulnerable to open the door to data exfiltration or worse, if compromised.

John Milburn

“When an organisation doesn’t implement the very basic processes for security and management around privileged accounts, they are exposing themselves to significant risk. Over and over again, breaches from hacked privileged accounts have resulted in astronomical mitigation costs, as well as data theft and tarnished brands,” said John Milburn, president and general manager of One Identity.

“These survey results indicate that there are an alarmingly high percentage of companies that don’t have proper procedures in place. It is crucial for organisations to implement best practices regarding privileged access management without creating new roadblocks for work to get done.”

Avoiding primitive management

A recent Forrester Report states that eight out of 10 breaches that occur involve privileged credentials, highlighting just how much of a target privileged accounts are for hackers. Cybercriminals know that gaining access to privileged accounts is the easiest and fastest way to obtain a company’s critical data and systems, which is why organisations can no longer rely on old practices, such as paper records or Excel logbooks, to manage these priority accounts.

One Identity understands that when it comes to managing and monitoring these privileged accounts, continuously controlling access and governing credentials […]

The post Widespread mismanagement of privileged accounts and access revealed in One Identity global survey appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

ETSI creates City Digital Profile group on smart cities

By Zenobia Hedge

ETSI is pleased to announce the creation of a new Industry Specification Group “City Digital Profile” (ISG CDP) that will help accelerate the delivery of integrated citizen services and provide a technology road map for city leaders who will benefit from standardised solutions from their suppliers.

In providing this technology framework and clear roadmap for technology investment and deployment, market confidence levels in the city infrastructure investments should increase and in addition this will cities the possibility to replicate those solutions across domains, between cities and on a large scale. Smart services are intended to improve the overall quality of living in the city and make them attractive to citizens, investors, business, innovators, visitors and tourists.

The City Digital Profile ISG will enable cities to procure smart solutions with confidence that those solutions will be extendable, configurable and interoperable with similar services from other cities and providers. City administrators will therefore deliver advanced services to their citizens, whilst respecting essential environmental factors, sustainability objectives and reducing the overall cost of deployment.

“I am excited that this group will enable city leaders and suppliers to work together to mass market replication of citizen centric systems that are innovative, agile and creative while also fully standards compliant, secure, resilient and cost effective,” says Paul Copping, convenor of the City Digital Profile ISG, and chief innovation officer at DG Cities Ltd in Greenwich, London.

Initial cross domain city applications will include:

Health and social care (disability entitlement; housing benefit and rent payment; housing condition, assisted living and vulnerability)
Building management and connected homes
Urban lighting
Water and waste management and energy
Transportation and mobility
Environmental issues such as pollution and resource optimisation

Other key issues such as citizen related data retention and privacy protection will also be considered, in co-operation with such groups as oneM2M, the ETSI founded partnership project and the ETSI Technical Committee Cyber.

The kick-off meeting of the ISG will take place on 20-21 November 2017 at ETSI headquarters where the group will elect its chair and vice chair and decide on the future work and priorities.

ETSI will also be a speaker at the Smart City Expo, in Barcelona from 14-16 November in Barcelona, as well as organising a dedicated session alongside the main event to present the ISG CDP concept.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post ETSI creates City Digital Profile group on smart cities appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/