Recent Blog Posts

Intel IoT Delivers the “Ultimate Store Experience” to Retailers at NRF15

Attendees at the National Retail Federation (NRF) Big Conference in New York this month saw first-hand how Intel has become a world leader in delivering a personalized retail experience based on Internet of Things solutions. From the hugely popular Memory … Read more >

The post Intel IoT Delivers the “Ultimate Store Experience” to Retailers at NRF15 appeared first on IoT@Intel.

Read more >

Mobile Allows Doctors to Answer, ‘How Did You Do This Week?’

Mobile devices and technology have allowed clinicians to gather patient data at the point-of-care, access vital information on the go, and untether from traditional wired health IT infrastructures. One hidden benefit of mobile capability is how doctors can gain access to data which analyzes their own performances.

In the video above, Jeff Zavaleta, MD, chief medical officer at Graphium Health and a practicing anesthesiologist in Dallas, shares his insight on how mobile devices offer a new opportunity for practitioners to self-evaluate, answer the question, “how did you do this week?,” and see key performance indicators such as their average patient recovery times and on-time appointment starts.


Watch the short video and let us know what questions you have about the future of mobile health IT and where you think it’s headed. How are you using mobile technology to improve your practice?


Also, be on the lookout for new blogs from Dr. Zavaleta, who will be a guest contributor to the Intel Health & Life Sciences Community.


Read more >

Intel Supports Innovative Payment Reform for Healthcare Services

By Alice Borrelli, director of Global Heath Policy for Intel Intel recognizes the importance of innovative payment models as a way to improve the US healthcare system and applauds Secretary Burwell’s announcement that the Department of Health and Human Services … Read more >

The post Intel Supports Innovative Payment Reform for Healthcare Services appeared first on Policy@Intel.

Read more >

Teamwork, IOT Technology Lead to Real-World Smart Building Success

With approximately 47,000 buildings in Manhattan alone, it’s easy to contemplate how smart building solutions—a combination of elements including Building Management Systems (BMS), sensors, control systems, and big data that improves productivity and efficiency in large properties—can create huge value … Read more >

The post Teamwork, IOT Technology Lead to Real-World Smart Building Success appeared first on IoT@Intel.

Read more >

Maximize Your 2015 New Year’s Resolution Success with an Intel-Powered Tablet

With 2015 in full swing, many of us are holding onto our resolutions, promising we will at least carry them into February. In recent years, technology has played a more central role in helping us keep our resolutions. From fitness … Read more >

The post Maximize Your 2015 New Year’s Resolution Success with an Intel-Powered Tablet appeared first on Technology@Intel.

Read more >

More Secure Programming – Where to Begin with Static Code Analysis

Code.jpgIdentifying and correcting security vulnerabilities in applications has become more increasingly vital with Static Code Analysis tools in conjunction with manual code reviews. Static Code Analysis includes an automated software tool that examines a program’s source code without actually executing it. This type of analysis is used to identify different kinds of security issues, obscure logic problems, bugs and defects, and more. Even more importantly, it is becoming common to have an organizational policy that includes the requirement. It is already a compliance requirement for organizations that must comply with Payment Application Data Security Standard (PCI PADSS).


There are a plethora of vendors with static code analysis tools that we won’t be comparing here but rest assured the most common development languages are supported. These tools can be very helpful in determining adherence to secure coding standards. But one of the biggest challenges to getting started is the shock of a report after an initial codebase is analyzed. There could be tens of thousands of issues found when an analysis is completed for a large codebase that has never been scanned before. Going through the static code analysis report can be beneficial in helping to identify high risk security areas but can also be time consuming to research what may result in false alarms. Either way, the effort must be made to review such a report as it helps demonstrate due diligence by documenting the review of potential vulnerabilities. For the software engineer being asked to address issues found in a large legacy code base, it can present more stress added on to the workload for developing the next release.


If a threat model was completed during the design phase of the application development, it can help to describe the security objectives or privacy requirements for the application and how those objectives mitigate threats in possible misuse or abuse cases. The main focus should have been on protecting the system and the information being processed. Furthermore, an attack surface analysis helps with defining how an external adversary may attempt to attack the application and focuses more on the high risk areas where there may be more exposure such as Internet connected interfaces. If these tools were not used during the development phase, maybe other types of risk based approaches provided the same result. But if not, it’s advisable to start having these conversations with all stakeholders so that the security objectives and attack surface mitigations can be well defined. It’s likely that an Advance Persistent Threat (APT), albeit with limited knowledge of the system, would use similar tools when attempting to identify an application’s potential weaknesses for the purpose of exploiting them.


Requirement for static code analysis has become more commonly integrated into an organizations secure application development processes and it helps with adherence to ISO 27034. It’s also advisable to integrate Threat Modeling and Attack Surface Analysis into the lifecycle as well. These tools are helpful in prioritization efforts so that identified issues in static code analysis reports can be focused on the most important security features of an application first. This will undoubtedly help the security reviewer gain traction on an effort that may seem overwhelming at first.



Find Andy on LinkedIn

See previous content from Andy_Good 

Start a conversation with Andy on Twitter




Read more >

Safeguarding the Smart City of the Future

This is the second installment of a four part series on Smart Cities with Dawn Olsen (#2 of 4).

Click here to read blog #1

Click here to read blog #3

Dawn5.jpgIn the age of smart cities, it’s an unavoidable truth that although technology can deliver new and amazing capabilities, it can also potentially be a disruptive force. That’s why security is a major focus within the development of Internet of Things.  It is important to use integrated technologies to address some of the security challenges that can emerge in connected cities.

While social media has evolved the experience of events (both big and small) by virtually connecting people, new potential threats have surfaced as a result. When the world’s eyes are on major events like,  the 2012 Olympic Games in London or the 2014 World Cups in Rio de Janeiro, protest groups may try to make the most of this global attention.

It’s not just major world events that are susceptible to such disturbances.  An unfortunate Dutch teenager found this out when their not-so-sweet 16th birthday party crashed by 3,000 people after the event announcement went viral on Facebook. This small event invitation spread wider and wider on social media, resulting in large crowds gathering and eventually police arriving to the scene in riot gear.  Cases like this are rare, but I mention it because city authorities and security services have learned lessons from it. Intel is working with authorities to safeguard against threats like these. We’re bringing together new tools, connected to the Internet of Things. From the devices in our hands and the sensors on our streets to the gateways, servers and cloud-based management platforms used to orchestrate complex security networks, innovative tech is developing on behalf of city security It’s certainly a far cry from traditional measures like simple CCTV networks. By combining inputs from different sources and various types of tech acquisitions in real time, Intel is pioneering “joined-up” security solutions. As mentioned, social media can be part of the solution as well as the challenge.  By gathering data from public networks like Twitter and FourSquare, police forces can now track situations as they unfold. And support for these measures exists: an Intel survey found that 61 percent of Americans believe it’s worthwhile for a connected city to gather anonymous information about people – that is, if the data is then used to benefit the area.

Dawn3.pngIn this way, authorities in command centers now have access to this up-to-date intelligence.  The ability to use Big Data analytics can be used to predict where trouble may occur so that preventative measures can be taken ahead of time. The technology is already showing results in pilots around the world. In one city in Europe, for example, Intel is working with local authorities to police a 400 meter strip with around 50 bars that attract20,000+ visitors each weekend. Using a system that integrates social media monitoring, light sensors, and sound-monitoring technologies, Intel is harnessing the full IoT ecosystem to help the city improve safety, reduce security and lower maintenance costs and turn a thriving event into an even more economically and viable phenomenon for the city.

As smart cities grow, security remains the number one priority for city leaders. By supplying the necessary tools and the expertise, Intel is helping these cities harness the Internet of Things to keep city dwellers safe.

This is the second installment of a four part series on Smart Cities (#2 of 4).  Click here to read blog #1.

To continue the conversation, let’s connect on Twitter @DawnOlsen

Dawn Olsen

Global Sales Director

Government Enterprise, Intel

Read more >