Mellanox Technologies, Ltd., a supplier of high-performance, end-to-end smart interconnect solutions for data centre servers and storage systems, announced in collaboration with NEC Corporation support for the newly announced SX-Aurora TSUBASA systems with Mellanox® ConnectX®InfiniBand adapters.
A typical Aurora server platform includes from one to four InfiniBand adapters. The top-of-the-line Aurora platform utilizes 32 ConnectX adapters to support 64 vector engines in a single system. The NEC SX-Aurora TSUBASA systems leverage general-purpose vector-based NEC coprocessors and Mellanox in-network computing interconnect accelerators to achieve the highest application performance and scalability.
“We appreciate the performance, efficiency and scalability advantages that Mellanox interconnect solutions bring to our platform,” said Shigeyuki Aino, assistant general manager system platform business unit, IT platform division, NEC Corporation. “The in-network computing and PeerDirect capabilities of InfiniBand are the perfect complement to the unique vector processing engine architecture we have designed for our SX-Aurora TSUBASA platform.”
“Mellanox is proud to work with NEC to enable a next-generation computational platform for high-performance computing, machine learning, cloud and more,” said Gilad Shainer, vice president of marketing at Mellanox Technologies. “The combination of Mellanox ConnectX adapters, in-network computing, and acceleration engines, with NEC vector processing, provides our users with a world-leading compute platform that enables the highest application performance and the best return on investment.”
Mellanox InfiniBand solutions deliver the highest efficiency for high performance, artificial intelligence, cloud, storage and more infrastructures. InfiniBand accelerates all of the compute architectures – X86, Power, GPU, ARM, FPGA and Vector-based compute and storage platforms – delivering highest flexibility and best return on investment.
Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow
Read more here:: www.m2mnow.biz/feed/
Cradlepoint announced the release of a new Cradlepoint Business Intelligence Report, “The State of IoT 2017-2018”, which reveals the current IT practices, perceptions and future plans surrounding global Internet of Things (IoT) deployments. The findings of the underlying study revealed that even though over 69% of organisations have adopted, or plan to adopt, IoT solutions within the next year, 40% of companies have serious concerns around cybersecurity.
Conducted by Spiceworks, the study surveyed 400 IT professionals in the U.S., Canada and the UK at companies with at least 500 employees across 22 industries. Respondents are all involved with IoT strategies and decisions at their organisations.
While cybersecurity remains the top concern (40%), it is a desire for increased physical security that is the top driver for IoT adoption (32%), followed by improved operational processes (23%), reduced operational costs (21%) and simplified management (20%). Approximately 71% of respondents who already use IoT technologies say they’re using it for building security, often through security cameras.
Recent botnet attacks have infected millions of IoT devices. However, despite the growing security threat associated with IoT, the research shows that about half of the organisations surveyed are deploying IoT solutions on their existing enterprise network and 57% prefer to manage their own IoT device security.
“Following the spread of IoT botnets like Reaper and Mirai, which infected millions of internet-connected security cameras, routers, and digital video recorders, it’s evident that insecure IoT devices, even connected security devices, are putting organisations more at risk,” said Peter Tsai, senior technology analyst at Spiceworks.
“Before deploying network-connected devices that create more entry points for hackers to exploit, organisations should vet the security of all IoT devices they plan to introduce and ensure their company can adequately protect these devices from potential threats.”
“Our new ‘State of IoT’ report highlights a looming issue within commercial IoT deployments – cross-contamination. Companies that deploy IoT devices on their existing enterprise networks are significantly expanding their attack surface and creating new vulnerabilities to IoT-specific threats that traditional security tools are not equipped to handle,” said Ken Hosac, vice president of IoT business development at Cradlepoint.
“The good news, however, is that companies can leverage software-defined perimeter technology to spin-up virtual overlay networks, without trained specialists, that isolate IoT devices from existing networks—and other IoT devices, control access and shield them from being Internet-addressable.”
Additional resources can be found here.
Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow
The post Global study reveals IoT adoption is at 69% despite security concerns appeared first on IoT Now – How to run an IoT enabled business.
Read more here:: www.m2mnow.biz/feed/
One Identity, a proven leader in helping organisations get identity and access management (IAM) right, released new global research that exposes widespread poor practices when it comes to managing privileged accounts.
Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening research findings are that nine in 10 (88%) respondents admit to facing challenges when it comes to managing privileged passwords, and one in five (18%) still use a paper-based logbook to manage privileged accounts.
These findings are significant considering that privileged accounts grant virtually unlimited access to nearly every component of a company’s IT infrastructure, essentially handing over the keys to a company’s most critical and sensitive systems and data.
The survey also exposed three key areas where distressingly inferior practices for privileged account management occur, including:
Management platforms and tools: In addition to 18% of respondents admitting to using paper-based logs, a surprising 36% are using equally inadequate spreadsheets for tracking privileged accounts. The survey also found that two-thirds (67%) of companies are relying on two or more tools to manage these accounts — indicating widespread inconsistency in privileged access management (PAM).
Monitoring and visibility: The majority of IT security professionals (57%) admit to only monitoring some privileged accounts, or not monitoring privileged access at all. Even worse, 21% of respondents confessed they are unable to monitor or record activity performed with admin credentials, while 32% said they cannot consistently identify individuals who perform admin activities.
Password management and change: An overwhelming 86% of organisations are not consistently changing the password on their admin accounts after each use. Further, 40% of IT security professionals don’t take the basic best practice of changing a default admin password. By not adhering to these best practices, privileged accounts are vulnerable to open the door to data exfiltration or worse, if compromised.
“When an organisation doesn’t implement the very basic processes for security and management around privileged accounts, they are exposing themselves to significant risk. Over and over again, breaches from hacked privileged accounts have resulted in astronomical mitigation costs, as well as data theft and tarnished brands,” said John Milburn, president and general manager of One Identity.
“These survey results indicate that there are an alarmingly high percentage of companies that don’t have proper procedures in place. It is crucial for organisations to implement best practices regarding privileged access management without creating new roadblocks for work to get done.”
Avoiding primitive management
A recent Forrester Report states that eight out of 10 breaches that occur involve privileged credentials, highlighting just how much of a target privileged accounts are for hackers. Cybercriminals know that gaining access to privileged accounts is the easiest and fastest way to obtain a company’s critical data and systems, which is why organisations can no longer rely on old practices, such as paper records or Excel logbooks, to manage these priority accounts.
One Identity understands that when it comes to managing and monitoring these privileged accounts, continuously controlling access and governing credentials […]
Read more here:: www.m2mnow.biz/feed/
Vodafone entered the Internet of Things (IoT) consumer market with the launch of “V by Vodafone” enabling consumers to connect millions of home and leisure electronics products to the Group’s dedicated global IoT network – the largest of its kind in the world.
IoT technologies bring Internet-connected network intelligence to a wide range of devices at work, home and on the move. Analyst estimates suggest that by 2020 there will be more than 370 million consumer electronics and smart home devices capable of connection to mobile IoT networks in the countries in which Vodafone operates, up from around 50 million today.
“V by Vodafone” is a new, simple system for consumers to connect and manage IoT devices and a product range that includes a connected car dongle, a 4G security camera, a pet location and activity tracker and a bag location tracker.
Vodafone’s consumer IoT strategy will build upon the company’s extensive track record in developing and implementing enterprise IoT technologies. The Group is the mobile world leader in IoT, with
59 million IoT connections and an international network and services platform for a wide range of business-critical applications.
The new, simple way for consumers to connect IoT devices
“V by Vodafone” comprises:
the dedicated IoT “V-Sim by Vodafone”. The Sim card will be shipped as standard with IoT-enabled consumer electronics products sold by Vodafone from today. “V-Sim by Vodafone” will be also offered by third-party retailers next year;
the “V by Vodafone” smartphone app, providing customers with a single and intuitive overview of all IoT-enabled products registered to their account. Setting up each product is simple: customers scan a QR code on the product packaging to register it and add the monthly fee to their existing Vodafone mobile account;
automatic straight-out-of-the-box connection to the international Vodafone IoT network in any of 32 countries. Customers benefit from a straightforward means of managing all of their connected devices from a single interface wherever they are, and wherever they travel. Unlike Wi-Fi-enabled devices, “V by Vodafone” products are constantly connected wherever there is a mobile signal;
a single, affordable fixed monthly price plan for each product connected with a “V-Sim by Vodafone”, making it easy for consumers to use multiple IoT-enabled products; and
during 2018, Vodafone will launch a new online product marketplace open to IoT developers that will greatly extend the product choice for customers.
The “V by Vodafone” concept and product range were developed with insights from comprehensive research involving more than 15,000 consumers in Germany, Italy, Spain and the UK.
Vodafone has focused on four product categories at launch. Other categories will follow in 2018.
The products will be available for purchase by current Vodafone mobile customers from today in selected Vodafone stores in Germany, Italy, Spain and the UK. They can also be purchased online at v.vodafone.com.
V-Auto by Vodafone uses the same IoT technologies developed by Vodafone for some of the world’s most advanced connected cars. The “plug and drive” dongle can be added to most vehicles on European roads manufactured since 2002. The “V-Auto by Vodafone” dongle is fitted to […]
Read more here:: www.m2mnow.biz/feed/
Cambridge Broadband Networks (CBNL), the provider of licensed point-to-multipoint (PMP) microwave and millimetre wave, has today announced the results of its ‘UK Enterprise Broadband Index’. The survey of 200 businesses, conducted by market research firm Mobilesquared, highlights the gap between enterprise connectivity demands and the services they receive. Almost unanimously, 89% of UK businesses said they would consider switching to wireless broadband. This is coupled with the fact all respondents admitted poor broadband has negatively impacted their performance over the last two years, but more than half (56%) have not changed provider.
These striking statistics highlight the challenges UK businesses face in sourcing and switching providers, along with the significant market opportunity that exists for disruptive wireless carriers.
“It’s clear that a growing number of businesses find their connectivity requirements are growing faster than many broadband services can keep up with,” said Lionel Chmilewsky, CEO, CBNL. “To promote economic growth, it is essential that businesses have access to a greater range of agile broadband solutions which can scale more effectively with demand. This trend is likely to see operators drive more innovation into networks over the coming years, leverage emerging technology and develop 5G fixed wireless services.”
CBNL’s survey highlights that almost half of UK businesses (47%) are not receiving the broadband speeds advertised by their provider. Additionally, one in three businesses (35%) said that they have been negatively impacted by slow broadband speeds, while 34% experienced significant periods of network downtime. This new data clearly shows businesses are looking for faster and more reliable broadband options, yet half (56%) choose to remain with their current providers.
When asked why they opt to stay, one in three (32%) wanted to avoid disruption, 23% were tied into lengthy contracts, while 16% were restricted to services provided as part of a building lease. Moreover, one in ten (10%) suggested they would change at the earliest opportunity, demonstrating an appetite for viable alternatives.
The research highlights the significant market opportunity for disruptive carriers, with 89% of companies stating they would consider moving to wireless services if the speed and reliability was comparable to, or greater than, their existing broadband. With pre-5G fixed wireless commercially available, carriers have an immediate opportunity to leverage more agile and cost effective solutions that can quickly address this demand.
The need for more efficient infrastructure is illustrated by the fact that over half (56%) of businesses spend less than 30% of their IT budget on connectivity. More importantly, less than half of all respondents plan to increase expenditure over the next 12 months. This divergence between enterprises’ connectivity expectations and their connectivity expenditure highlights the importance to operators of innovation, in order to sustain and improve long-term network profitability.
CBNL CEO Lionel Chmilewsky concluded, “This data shows the vital role high capacity wireless can play, providing a more attractive business case to connect under-served businesses and quickly scale existing networks to multi-gigabit speeds.
“More specifically, the data shows the benefits that 26GHz can bring to the UK enterprise market and the value of Ofcom’s decision to […]
The post Nine in ten UK businesses would consider switching to wireless broadband appeared first on IoT Now – How to run an IoT enabled business.
Read more here:: www.m2mnow.biz/feed/
e-peas, a startup that has developed energy-harvesting and low power consumption ICs and microcontrollers raised $4.2M venture funding led by Partech Ventures. Other investors that participated in the funding round include Airbus Ventures, JCDecaux Holding, Semtech, SRIW and Vives.
The Belgian Co-founders Geoffroy Gosset and Julien De Vos run the startup as CEO and CTO respectively.
The startup promises to extend battery lifetime of wireless devices by harvesting photovoltaic, thermal, vibration or RF energy via its ICs called power Management Integrated Circuits (PMIC). For instance, its photovoltaic ICs harvest energy from various light sources such as sun, bulbs, and natural indoor lighting. Similarly, the thermal IC can harvest energy using human heat, motor heat, and waste heat present in an environment.
The other product line of e-peas is a general purpose microcontroller based on a 32-bit ARM architecture. It contains internal communication peripherals, embedded memory, communication modules, and timers. The controller consumes less energy in active and standby mode compared to traditional microcontrollers used in sensor systems.
The startup plans to market the product line to companies developing wireless sensors, wearables, industrial nodes and other IoT systems.
The key industry verticals it plans to sell its product to include retail, security, smart agriculture, and e-Health.
The idea of getting rid of batteries by sucking needed energy from ambient environment is not new, however, few startups are successful at delivering a product at a commercial scale. In March this year Tryst Energy launched its crowdfunding campaign on Kickstarter. It promised to launch energy harvesting hardware intended for IoT devices, though the project never materialized and was canceled.
e-peas launched in 2014 by securing local government grants and private seed investment funding. It used the capital to bring AEM10940 energy harvesting chip to market. The startup plans to use the latest funding proceeds to hire engineers and expand globally via partnerships.
Read more here:: feeds.feedburner.com/iot
The IPv6 protocol introduced very few changes to its IPv4 predecessor. The major change was of course the expansion of the size of the IP source and destination address fields in the packet header from 32-bits to 128-bits. There were, however, some other changes that apparently were intended to subtly alter IP behaviour. One of these was the change in treatment of packet fragmentation.
Read more here:: labs.ripe.net/RSS
There are 12 fundamental steps ISPs can take to enable IPv6 on their networks. I have pulled together a brief executive summary on how ISPs can achieve native IPv6 support and the maintenance of IPv4 as a transparent service (not including services like DNS, web, email, etc.).
12 Steps to IPv6 for ISPs
- Determine how many customers (home+corporate) your network has and the expected growth in the short/medium term. If the total is smaller than 50,000 customers, we recommend you to request a /32 from your RIR, a /31 if you have up to 100,000 customers, a /30 for up to 200,000 customers, and so on. If you already got a /32 and have more than 50,000 customers, you can request an upgrade of your actual prefix. (Note: This example does not apply to the ARIN region. Please see either our Quick Guide or our Requesting Resources page to learn more.
- Audit your network, as you need to know what equipment has the right IPv6 support or what needs to be updated or replaced. It is important to have a detailed inventory from your upstream connections to the customer’s CPEs. If your vendors don’t provide the right support, you should push them to do so. Generally, the market is big and free…
- Get professional training with companies that have a demonstrated experience in IPv6 deployment in ISPs. IPv6 is not more difficult, but IPv4 and IPv6 are different, and the difficulty may be changing your mindset. It is necessary to “unlearn” IPv4 to correctly understand IPv6. Possibly it could be convenient that you agree on a consultancy service together with the training. It may seem excessive, however, you will save a lot of time. As the transition to IPv6 becomes more urgent, that time will cost much more in terms of business losses and problems with IPv4, than the cost of that training and consultancy.
- Confirm with your upstream providers that they have IPv6 support and enable it in your BGP with them. Same for CDNs, caches and IXs. If the actual upstream providers don’t have IPv6 support, you really need to look for better partners. This part of your network must be dual-stack. In the worst case, if there is no way to get dual-stack from one or several of your upstreams, you may need to use a tunnel, typically by means of 6in4 (protocol 41, manually configured) or GRE, but you should consider this only as a temporary bypass.
- Review your security policies. They should be equivalent to what you apply with IPv4, but remember that you should not filter ICMP with IPv6, among other related details that will avoid the correct flow of traffic across your network. Review also the IPv6 prefix filtering in your BGP peers; again, those are policies conceptually equivalent to what you already know for IPv4, but with a different protocol.
- Configure IPv6 support in all your monitoring systems. IPv6 has the same importance as IPv4, so any system that allows you to view the traffic quality, quantity, stability, visibility of your prefixes, etc. (either from inside or outside your network), must support both IPv4 and IPv6 with the same conditions.
- Design your detailed addressing plan. This is your masterpiece for a correct IPv6 deployment, very different from IPv4. For sure you will need an IPAM (IP Address Management) device or tool, as it is impossible to manage millions of IPs with the traditional text file or spreadsheet as you may have done before with IPv4.
- Deploy IPv6 in your core and distribution networks. Dual-stack may be sufficient in a first phase. In a follow-up stage, maybe you will be able to supress IPv4 in parts of those networks, so you can reuse those addresses in more relevant places of your network.
- Start a small trial in your own corporate network. Remember that /64 is the minimum for each LAN or VLAN. The golden rule is to keep dual-stack in the LANs/VLANs (even if using private IPv4 addresses) and that it’s easier to use SLAAC and RDNNS. DHCPv6 is an option, most of the time unnecessary (moreover, Android doesn’t support it). Also in this phase, it may be interesting to involve in the pilot some of your corporate customers, even some residential ones. It is not so relevant if at this stage, manual provisioning is required.
- Prepare your access network as well as the provisioning system. Your billing systems may be affected too. Now is the time to define what transition mechanism is the right one. My recommendation is 464XLAT, at least for the residential customers and cellular networks. 464XLAT is one of the most recent transition mechanisms (and the most used one, with millions of users in 3G/4G networks), which has the advantage of using IPv6-only in the access network, so the ISP doesn’t require IPv4 addresses there; despite that, it provides IPv4 private addresses to the users (by means of the CLAT), so that devices and applications still work in a transparent way. It is a must to have good support from the CPE vendors. For provisioning, the best will be to use DHCPv6-PD. Use the RIPE BCOP in order to understand how to number your customers.
- Configure PLAT (NAT64+DNS64) in your network. Don’t use CGN, as it will bring you many more problems and higher costs (not only the CGN itself, but also the logging systems). If you have a cellular network with PLAT deployment, and set up an IPv6-only APN, you will be all done for the smartphones and other 3G/LTE devices. Android and Windows come with the CLAT, while iOS/Apple only use the PLAT, because all their apps mandatorily support IPv6.
- Update the CPEs. Try again with some customers, once updated; this is the most critical and complex part of all the process. There are many ways to approach it. Once done, you’re ready for a massive IPv6 activation (maybe in phases, regions, etc.) and a commercial announcement.
Bravo, your network is ready for the future! Now, you need to start considering how to take advantage of IPv6 with new services and applications. IoT is one area, but surely you will find others as well.
Read more here:: teamarin.net/feed/
Nearly a third of C-Level directors surveyed across the UK (32%) either do not have a response plan in place to manage a cyber-attack on their business, or they are not sure whether they do. That’s the finding of a new poll of 250 C-suite members in organisations with more than 50 staff. The survey […]
Read more here:: www.m2mnow.biz/feed/
Verizon has announced that starting June 30, 2017, it will stop issuing new Public Static IPv4 addresses due to a shortage of available addresses. While customers that currently have active Public Static IPv4 addresses will be able to retain their addresses, reserving new IP addresses will require companies to convert to the Persistent Prefix IPv6 requirements and implementation of new Verizon-certified IPv6 devices.
To encourage the move to Persistent Prefix IPv6, Verizon says:
— “Unlike IPv4, which is limited to a 32-bit prefix, Persistent Prefix IPv6 has 128-bit addressing scheme, which aligns to current international agreements and standards.”
— “Persistent Prefix IPv6 will provide the device with an IP address unique to that device that will remain with that device until the address is relinquished by the user (i.e., when the user moves the device off the Verizon Wireless network).”
— “IPv4-only devices are not compatible with Persistent Prefix IPv6 addresses.”
Follow CircleID on Twitter
Read more here:: feeds.circleid.com/cid_sections/news?format=xml