My interview with John Neil Conkle on the topic of APIs and developer evangelism is now live over here.
Recent Blog Posts
My interview with John Neil Conkle on the topic of APIs and developer evangelism is now live over here.
Attendees at the National Retail Federation (NRF) Big Conference in New York this month saw first-hand how Intel has become a world leader in delivering a personalized retail experience based on Internet of Things solutions. From the hugely popular Memory … Read more >
The post Intel IoT Delivers the “Ultimate Store Experience” to Retailers at NRF15 appeared first on IoT@Intel.
Mobile devices and technology have allowed clinicians to gather patient data at the point-of-care, access vital information on the go, and untether from traditional wired health IT infrastructures. One hidden benefit of mobile capability is how doctors can gain access to data which analyzes their own performances.
In the video above, Jeff Zavaleta, MD, chief medical officer at Graphium Health and a practicing anesthesiologist in Dallas, shares his insight on how mobile devices offer a new opportunity for practitioners to self-evaluate, answer the question, “how did you do this week?,” and see key performance indicators such as their average patient recovery times and on-time appointment starts.
Watch the short video and let us know what questions you have about the future of mobile health IT and where you think it’s headed. How are you using mobile technology to improve your practice?
Also, be on the lookout for new blogs from Dr. Zavaleta, who will be a guest contributor to the Intel Health & Life Sciences Community.
As developers harness the possibilities of Intel® RealSense™ technology, there is plenty to explore. Along with the Intel RealSense SDK, they are exposed to a new kind of “camera”. The first… Read more
This week is the start of the 2015 AHR Expo in Chicago, the world’s largest HVACR (heating, venting, air conditioning, and refrigeration) conference that connects industry peers and showcases the latest in HVACR tech and equipment trends. In this guest … Read more >
The post Smart Building Manufacturers Demo Latest IoT Solutions at AHR Expo appeared first on IoT@Intel.
Over the past few years Intel has collaborated on a number of projects to raise awareness and catalyze action to expand education and technology access for girls and women. Our latest collaboration is Intel’s sponsorship of the upcoming 3-part documentary … Read more >
The post A Path Appears: Moving from Challenges to Solutions appeared first on CSR@Intel.
By Alice Borrelli, director of Global Heath Policy for Intel Intel recognizes the importance of innovative payment models as a way to improve the US healthcare system and applauds Secretary Burwell’s announcement that the Department of Health and Human Services … Read more >
The post Intel Supports Innovative Payment Reform for Healthcare Services appeared first on Policy@Intel.
With approximately 47,000 buildings in Manhattan alone, it’s easy to contemplate how smart building solutions—a combination of elements including Building Management Systems (BMS), sensors, control systems, and big data that improves productivity and efficiency in large properties—can create huge value … Read more >
The post Teamwork, IOT Technology Lead to Real-World Smart Building Success appeared first on IoT@Intel.
With 2015 in full swing, many of us are holding onto our resolutions, promising we will at least carry them into February. In recent years, technology has played a more central role in helping us keep our resolutions. From fitness … Read more >
The post Maximize Your 2015 New Year’s Resolution Success with an Intel-Powered Tablet appeared first on Technology@Intel.
I’m always in awe of great photographers. You see, I’m the kind of guy who just sets his camera on AUTO and hopes for the best. I keep meaning to sign up for that photography class but it never seems … Read more >
CES 2015 has come and gone. If you were lucky enough to be there and see the amazing Intel booth, you probably heard a lot about user experience, or “UX” for short. That’s because Intel is searching for ways to … Read more >
According to the Brookings Institute, 90 percent of Americans drive to work, a statistic that helps me understand why I seem to be stuck in traffic all the time. The numbers might be slightly lower globally, but it’s safe to … Read more >
The post New IoT Study Explores Security Solutions for ADAS appeared first on IoT@Intel.
Identifying and correcting security vulnerabilities in applications has become more increasingly vital with Static Code Analysis tools in conjunction with manual code reviews. Static Code Analysis includes an automated software tool that examines a program’s source code without actually executing it. This type of analysis is used to identify different kinds of security issues, obscure logic problems, bugs and defects, and more. Even more importantly, it is becoming common to have an organizational policy that includes the requirement. It is already a compliance requirement for organizations that must comply with Payment Application Data Security Standard (PCI PADSS).
There are a plethora of vendors with static code analysis tools that we won’t be comparing here but rest assured the most common development languages are supported. These tools can be very helpful in determining adherence to secure coding standards. But one of the biggest challenges to getting started is the shock of a report after an initial codebase is analyzed. There could be tens of thousands of issues found when an analysis is completed for a large codebase that has never been scanned before. Going through the static code analysis report can be beneficial in helping to identify high risk security areas but can also be time consuming to research what may result in false alarms. Either way, the effort must be made to review such a report as it helps demonstrate due diligence by documenting the review of potential vulnerabilities. For the software engineer being asked to address issues found in a large legacy code base, it can present more stress added on to the workload for developing the next release.
If a threat model was completed during the design phase of the application development, it can help to describe the security objectives or privacy requirements for the application and how those objectives mitigate threats in possible misuse or abuse cases. The main focus should have been on protecting the system and the information being processed. Furthermore, an attack surface analysis helps with defining how an external adversary may attempt to attack the application and focuses more on the high risk areas where there may be more exposure such as Internet connected interfaces. If these tools were not used during the development phase, maybe other types of risk based approaches provided the same result. But if not, it’s advisable to start having these conversations with all stakeholders so that the security objectives and attack surface mitigations can be well defined. It’s likely that an Advance Persistent Threat (APT), albeit with limited knowledge of the system, would use similar tools when attempting to identify an application’s potential weaknesses for the purpose of exploiting them.
Requirement for static code analysis has become more commonly integrated into an organizations secure application development processes and it helps with adherence to ISO 27034. It’s also advisable to integrate Threat Modeling and Attack Surface Analysis into the lifecycle as well. These tools are helpful in prioritization efforts so that identified issues in static code analysis reports can be focused on the most important security features of an application first. This will undoubtedly help the security reviewer gain traction on an effort that may seem overwhelming at first.
Find Andy on LinkedIn
See previous content from Andy_Good
Start a conversation with Andy on Twitter
PP14 adopted two new Decisions and 20 new Resolutions. Three existing Decisions and 51 Resolutions were modified and seven Resolutions were suppressed. The final acts are available here. While there were rumors leading up to the meeting that there might … Read more >
This is the second installment of a four part series on Smart Cities with Dawn Olsen (#2 of 4).
In the age of smart cities, it’s an unavoidable truth that although technology can deliver new and amazing capabilities, it can also potentially be a disruptive force. That’s why security is a major focus within the development of Internet of Things. It is important to use integrated technologies to address some of the security challenges that can emerge in connected cities.
While social media has evolved the experience of events (both big and small) by virtually connecting people, new potential threats have surfaced as a result. When the world’s eyes are on major events like, the 2012 Olympic Games in London or the 2014 World Cups in Rio de Janeiro, protest groups may try to make the most of this global attention.
It’s not just major world events that are susceptible to such disturbances. An unfortunate Dutch teenager found this out when their not-so-sweet 16th birthday party crashed by 3,000 people after the event announcement went viral on Facebook. This small event invitation spread wider and wider on social media, resulting in large crowds gathering and eventually police arriving to the scene in riot gear. Cases like this are rare, but I mention it because city authorities and security services have learned lessons from it. Intel is working with authorities to safeguard against threats like these. We’re bringing together new tools, connected to the Internet of Things. From the devices in our hands and the sensors on our streets to the gateways, servers and cloud-based management platforms used to orchestrate complex security networks, innovative tech is developing on behalf of city security It’s certainly a far cry from traditional measures like simple CCTV networks. By combining inputs from different sources and various types of tech acquisitions in real time, Intel is pioneering “joined-up” security solutions. As mentioned, social media can be part of the solution as well as the challenge. By gathering data from public networks like Twitter and FourSquare, police forces can now track situations as they unfold. And support for these measures exists: an Intel survey found that 61 percent of Americans believe it’s worthwhile for a connected city to gather anonymous information about people – that is, if the data is then used to benefit the area.
In this way, authorities in command centers now have access to this up-to-date intelligence. The ability to use Big Data analytics can be used to predict where trouble may occur so that preventative measures can be taken ahead of time. The technology is already showing results in pilots around the world. In one city in Europe, for example, Intel is working with local authorities to police a 400 meter strip with around 50 bars that attract20,000+ visitors each weekend. Using a system that integrates social media monitoring, light sensors, and sound-monitoring technologies, Intel is harnessing the full IoT ecosystem to help the city improve safety, reduce security and lower maintenance costs and turn a thriving event into an even more economically and viable phenomenon for the city.
As smart cities grow, security remains the number one priority for city leaders. By supplying the necessary tools and the expertise, Intel is helping these cities harness the Internet of Things to keep city dwellers safe.
This is the second installment of a four part series on Smart Cities (#2 of 4). Click here to read blog #1.
To continue the conversation, let’s connect on Twitter @DawnOlsen
Global Sales Director
Government Enterprise, Intel