Recent Blog Posts

IoT and Big Data Analytics Pilot Bring Big Cost Savings to Intel Manufacturing

As billions of new and legacy devices become connected in the Internet of Things (IoT), manufacturers need solutions that make sense of disparate data sources and deliver a holistic picture of factory health to solve key challenges and generate new … Read more >

The post IoT and Big Data Analytics Pilot Bring Big Cost Savings to Intel Manufacturing appeared first on IoT@Intel.

Read more >

Quick Q & A: Safer Highways, Smarter Cities, and Fewer Traffic Jams

It’s fascinating to think about how innovations in transportation, including the trend toward Internet of Things implementations, can enhance the quality of life for people across the globe. Indeed, technology can help us address significant challenges around really important aspects … Read more >

The post Quick Q & A: Safer Highways, Smarter Cities, and Fewer Traffic Jams appeared first on IoT@Intel.

Read more >

Accelerating the Adoption of Web Technologies in the Automotive Industry

The mass market for self-driving vehicles hasn’t yet arrived. But as automakers continue to integrate in-vehicle infotainment (IVI), and race down the path toward autonomous driving, there is no doubt that automotive cockpits are becoming increasingly defined by software. Data … Read more >

The post Accelerating the Adoption of Web Technologies in the Automotive Industry appeared first on IoT@Intel.

Read more >

Protecting Consumer Information: NCR and Intel Team Up for a New Approach

One of the most relevant—and challenging—aspects of using technology in the retail and financial services space is how to ensure the protection of personal data on open platforms. In the guest blog post below, Chris Lybeer, Vice President of Strategic … Read more >

The post Protecting Consumer Information: NCR and Intel Team Up for a New Approach appeared first on IoT@Intel.

Read more >

Intel Labs’ Orion Races In-Vehicle Infotainment Onto the IoT

My colleague Ignacio Alvarez, Research Scientist, Systems Prototyping & Infrastructure, Intel Labs, works closely with software and hardware engineers, user experience researchers, and designers to prototype concepts in the field of intelligent transportation. In his blog post below, Ignacio writes … Read more >

The post Intel Labs’ Orion Races In-Vehicle Infotainment Onto the IoT appeared first on IoT@Intel.

Read more >

Year in Review: Top 10 Intel IoT Blog Posts on the Internet of Things

Each week, the Intel IoT blog brings you Internet of Things stories and news that inspire, create excitement, and share best practices. Today, we’re highlighting 10 “can’t miss” blog posts from 2014—whether you’re reading them again or catching them for the first … Read more >

The post Year in Review: Top 10 Intel IoT Blog Posts on the Internet of Things appeared first on IoT@Intel.

Read more >

Empowering Your Workforce Through Mobile Collaboration

With mobility slated to top enterprise CIO priorities in 2015, clear internal communication strategies and robust collaboration platforms are crucial for continued success. As enterprise companies continue to heavily invest in IT infrastructure that enables their employees to untether from their desks and work remotely, collaboration software like Microsoft* Lync and Skype enable workers to remain productive and responsive — even out of the office.

Intel_SSG Lync and Skype Image_3-01.png

As companies have developed mobility strategies, many have invested in hardware such as tablets and smartphones in order to provide employees a modicum of flexibility. CIOs have discovered that due to their mobility strategies:


…employees in the field complete mission-critical tasks in real-time; they no longer gather information in one place, and then return to an office to transcribe what they learned on the road. Because workers are constantly connected, they’re always able to communicate, and are more likely to keep working even during off-hours.


Though it has proven to be an invaluable strategy across the increasingly complex enterprise landscape, the increase in productivity through mobility is still evolving.


Refining Mobility in 2015



Mobility is no longer a “nice to have” for employees — it’s expected. However, as the enterprise continues to adopt mobile technology, flaws are starting to appear. As BYOD and mobility have evolved, cross-platform collaboration has been somewhat limited by compatibility issues between operating systems.


Collaboration platforms like Microsoft* Lync* and Skype* have apps for most popular mobile operating systems, but functionality across some of these mobile platforms may be significantly limited compared to the desktop client.


For example, Microsoft* recently announced support for unified Lync & Skype communication (meaning Lync users can call and message Skype users, and vice versa). However, this functionality is limited to desktop clients for both devices. This feature, as well as many others, has been a major stumbling block for companies trying to promote robust collaboration efforts in conjunction with their mobility strategies.


Companies looking to refine their mobility strategy should consider the range of cross-platform compatibility issues and productivity limitations when looking to invest in any new device or strategy. A recent Principled Technologies test report compared Microsoft* Lync and Skype* performance on three popular mobile devices: an Apple* iPad* Air, Samsung* Galaxy* Note 10.1, and Microsoft* Surface* Pro 3.


The feature set and performance for the apps on the iPad* and Galaxy* Note was significantly limited compared to the Surface* Pro 3. Since the Surface* Pro 3 runs the full desktop version of Windows* 8.1 Pro, as opposed to a mobile operating system like the iPad* and Galaxy* Note.


Click here to read the full Principled Technologies test report.


*Other names and brands are property of others

Read more >

Better, Faster 802.11ac Wi-Fi is Here — Shouldn’t It Be In Your New PC?

Many manufacturers are still putting outdated 802.11bgn wireless technology in new devices despite the fact that the technology is almost 8 years old and has since been replaced by 802.11ac Wi-Fi, which is 3x faster and more stable. Since this … Read more >

The post Better, Faster 802.11ac Wi-Fi is Here — Shouldn’t It Be In Your New PC? appeared first on Technology@Intel.

Read more >

Identifying Your Mobile Device Management Strategy

Not all roads lead to BYOD.


Business paths diverge when it comes to mobile device management (MDM) strategy; as consumerization and mobility have become more prevalent within the enterprise, so has the variety in both corporate and customer requirements. According to Hyoun Park, “The proliferation of mobile devices has led to a similar proliferation of enterprise mobility support models. As your organization considers how to move forward to support mobile devices, applications, data, content, and unified communications, keep in mind how enterprise mobility is currently supported within your organization.”

Park states that the blanket term of BYOD can be broken down into eight specific categories that better represent specific strategies and objectives for the business.


Eight Ways to Structure Your MDM


COLD: Corporate Owned, Locked Down

Provides both a secure device and secure gateway, with rigorous policies surrounding lost or stolen devices. “In today’s world, this model has only become even more secure with the encryption of voice calls, multifactor authentication, content and application virtualization to prevent improper sharing, and sandboxes used to isolate applications and content.”

diff devices.jpg

COBRA: Corporate Owned, Business Ready Applications

New employees are given corporate devices pre-loaded with applications geared towards the mobile worker. “This might be as simple as including Dropbox, Box, or Evernote. This could also include mobile CRM and ERP applications, help desk applications, and productivity enablers.”

COPE: Corporate Owned, Personally Enabled

All devices are compartmentalized into corporate-owned and personally-owned. “This can be done by dedicating an enterprise-specific portion of the device to the applications and documents used in the workplace, while dedicating the rest of the device to Facebook, Angry Birds, personal e-mail accounts, and whatever else the employee wants to put on the device.”

CAPO: Corporate Approved, Personally Obtained

Devices are purchased by employees, but must meet corporate guidelines. “These standards can be as simple as supporting the company’s security or mobile device management standards or as complex as defining specific policies to shut off nearfield communications, camera, and other functions.”

EQUAL: EQuipment Under Approved List

EQUAL is a version of CAPO; all devices or operating systems are company ordained. “This allows companies to focus on the devices and operating systems they support without being overwhelmed by the evolution of mobility across every possible platform. However, the focus comes at the potential cost of creating a new version of shadow IT from unsupported devices.”

PEER: Personally Equipped, Enterprise Ready

PEER is a version of the COPE model; rather than the company funding the device, the employee makes the purchase instead. “The PEER model allows companies to put business applications, security, and governance onto a personally owned device. Employees agree to give businesses the control needed to transmit and support these applications.”

POOR: Personally Owned, Office Required

A somewhat controversial model that dictates employees must fund a device (sans employer compensation) in order to fulfill job requirements. “POOR is expected to become more troublesome as states increasingly see class action lawsuits that, like Cochran, are created based on a combination of state labor laws and BYOD requirements.”

CHAOS: Corporate Handles All Operating Systems

Often IT’s least favorite BYOD option, this means corporate supports all operating systems regardless of platform. “From an operational perspective, this approach often results in users falling through the cracks as IT is unable to provide employees with enterprise applications because vendors have never developed them for a specific platform. And from a support perspective, IT is constantly on the phone with additional support staff to troubleshoot unfamiliar devices.”


As the device market continues to evolve, remember to refresh your strategy and policies often to keep pace with our ever-changing world.


To continue this conversation, please follow us at @IntelITCenter or use #ITCenter.

Read more >

The New Free Cyber Warfare Range is Open to the Public

I am excited for the opening of the free Cyber Warfare Range. I had the pleasure of meeting the team at Arizona Cyber Warfare Range (ACWR) and getting an exclusive tour of their virtual warfare range. During this guide of their internal architecture, I was able to get some insights into controls which protect their cyber warfare environment.  It is vital the activities which occur inside the range do not get loose and directly impact the real world.

800 (2).jpg

So what is a virtual warfare range?

A virtual warfare range is an open-source, virtual location where security professionals can test their skills and programs in a simulated environment. You can conduct dangerous activities in a safe, isolated, and controlled space.  You can think of it like a cybersecurity gun range or paintball arena. For example, users are encouraged to hack the servers, compromise networks, break software, test the robustness of products, and even play with toxic malware (in specialized ranges).  Customized environments can be created to attack or defend.  All of which are important learning experiences for security professionals.


It’s no secret that security professionals need practical, real-world experience. However, it is never recommended to do dangerous activities on production, personal, or work networks as it is a recipe for harmful unintended consequences.  As a vitally important resource, the warfare range provides a free, internet accessible, and safe place where  novices and experts alike can learn and test their skills while conducting more specific activities – such as testing products, evaluating malware, etc…


The ACWR is simply a safe environment for learning by doing. Hacking, testing, war games, malware practice, product evaluations, and real opponent challenges help security professionals hone their skills in an isolated setting. Beginner and advanced ranges provide teaching challenges, customizable environments, analysis, and metrics. The site encourages users to go wild, ‘burn systems to the ground’, and do whatever it takes to learn and improve.


No more excuses, time to get learning.


- Matthew Rosenquist


To find out more visit the Arizona Cyber Warfare Range Website:

Twitter: @Matt_Rosenquist

IT Peer Network: My Previous Posts


My Blog: Information Security Strategy

Read more >