Bosch and Red Hat join initiative to develop cloud-based IoT platform components

GUY DANIELS | October 26, 2016

article image
The Eclipse Foundation open source community is collaborating with Bosch Software Innovations, Red Hat and Eurotech to develop interoperable IoT components that can be deployed to a Cloud platform. We are constantly reminded that IoT is all about the ecosystem, but such extensive industry networks are only as valuable as their ability to work together and interoperate without unnecessary complications.

Spotlight

5G Networks

5G Networks is joint venture having offices in UAE, Singapore, Hong Kong, Sri Lanka, Canada, Greece, Pakistan and Seychelles. 5Gnetworks is considering expanding footprint to Africa and Europe. We have invested heavily in our technology infrastructure and our OSS/BSS capabilities are unmatched. Our data centers in Canada and Singapore run on carrier grade telephony servers, supported by Dell, ALOE Systems and Alaris Labs.

OTHER ARTICLES

Breaking Down IoT Standards and Protocols

Article | March 10, 2020

The Internet of Things has given rise to a host of new standards and protocols. Still more protocols that originally existed for other purposes but are well suited to new IoT applications have been adopted by device manufacturers and application creators. Though in some senses IoT devices are the same as any other internet-connected device, the bandwidth, power, and transmission distance constraints inherent in many IoT applications require novel new solutions to the fundamental actions of connectivity, data transfer, device discovery, and communication. This article will serve as a brief glossary of terms related to IoT communication protocols and standards. Click here for a more complete introduction to connectivity options.

Read More

The $6trn importance of security standards and regulation in the IoT era

Article | March 16, 2020

We live in an era of digital transformation where more and more devices are connecting to bring new and innovative levels of service and efficiency. This transformation spans across all markets and the rate of progress is breath-taking, says David Maidment, director, secure device ecosystem at Arm.This change brings huge benefits, but it also brings threats in the shape of an expanding cybercrime footprint. Every connected device is a hack potential. Rather than attacking traditional IT equipment, the cybercrime threats start to move to all aspects of our lives. It is predicted that by 2021 there will already be US$6 trillion (€5.37 trillion) of cybercrime damage (Source: Cybersecurity Ventures Official Annual Cybercrime Report), which is a staggering number pinned against financial loss for businesses, without considering the damage to reputation and other harder-to-measure statistics.

Read More

How to Leverage IoT to Protect Your Workers

Article | March 20, 2020

Workers in construction, agriculture and manufacturing are reported to have the highest incident rates, according to the 2018 research of the US Bureau of Labor Statistics. Medical expenses for work-related injuries are scoring millions of dollars each year. In recent years, businesses have increasingly opted for industrial IoT solutions that offer advanced monitoring capabilities designed to predict and prevent incidents. In many situations, smart monitoring can save lives in the event of equipment misuse or failure, inefficient safety regulations and health-threatening sites.

Read More

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

Spotlight

5G Networks

5G Networks is joint venture having offices in UAE, Singapore, Hong Kong, Sri Lanka, Canada, Greece, Pakistan and Seychelles. 5Gnetworks is considering expanding footprint to Africa and Europe. We have invested heavily in our technology infrastructure and our OSS/BSS capabilities are unmatched. Our data centers in Canada and Singapore run on carrier grade telephony servers, supported by Dell, ALOE Systems and Alaris Labs.

Events