Recent Blog Posts
As billions of new and legacy devices become connected in the Internet of Things (IoT), manufacturers need solutions that make sense of disparate data sources and deliver a holistic picture of factory health to solve key challenges and generate new … Read more >
The post IoT and Big Data Analytics Pilot Bring Big Cost Savings to Intel Manufacturing appeared first on IoT@Intel.
It’s fascinating to think about how innovations in transportation, including the trend toward Internet of Things implementations, can enhance the quality of life for people across the globe. Indeed, technology can help us address significant challenges around really important aspects … Read more >
The post Quick Q & A: Safer Highways, Smarter Cities, and Fewer Traffic Jams appeared first on IoT@Intel.
The need for smart energy management has never been more urgent: 66% of the world’s energy is consumed by cities, and by 2025, 37 cities worldwide will have a population of more than 10 million people! Energy companies have been … Read more >
The post New Smart Energy Program Helps Maximize Profit and Efficiency appeared first on IoT@Intel.
The mass market for self-driving vehicles hasn’t yet arrived. But as automakers continue to integrate in-vehicle infotainment (IVI), and race down the path toward autonomous driving, there is no doubt that automotive cockpits are becoming increasingly defined by software. Data … Read more >
The post Accelerating the Adoption of Web Technologies in the Automotive Industry appeared first on IoT@Intel.
We know the Internet of Things (IoT) is a rapidly growing new market, but we have also learned that the IoT is complicated to deploy and scalability will be crucial to the industry’s success. Fortunately, Intel has an extensive history in … Read more >
The post Scaling the Internet of Things at GE Software Mind + Machines 2014 appeared first on IoT@Intel.
One of the most relevant—and challenging—aspects of using technology in the retail and financial services space is how to ensure the protection of personal data on open platforms. In the guest blog post below, Chris Lybeer, Vice President of Strategic … Read more >
The post Protecting Consumer Information: NCR and Intel Team Up for a New Approach appeared first on IoT@Intel.
My colleague Ignacio Alvarez, Research Scientist, Systems Prototyping & Infrastructure, Intel Labs, works closely with software and hardware engineers, user experience researchers, and designers to prototype concepts in the field of intelligent transportation. In his blog post below, Ignacio writes … Read more >
The post Intel Labs’ Orion Races In-Vehicle Infotainment Onto the IoT appeared first on IoT@Intel.
Each week, the Intel IoT blog brings you Internet of Things stories and news that inspire, create excitement, and share best practices. Today, we’re highlighting 10 “can’t miss” blog posts from 2014—whether you’re reading them again or catching them for the first … Read more >
The post Year in Review: Top 10 Intel IoT Blog Posts on the Internet of Things appeared first on IoT@Intel.
by Brock Noland (Cloudera), Na Yang (MapR), and Rui Li (Intel)
Nearly one year ago, the Hadoop community began to embrace Apache Spark as a powerful batch processing engine. Today, many… Read more
With mobility slated to top enterprise CIO priorities in 2015, clear internal communication strategies and robust collaboration platforms are crucial for continued success. As enterprise companies continue to heavily invest in IT infrastructure that enables their employees to untether from their desks and work remotely, collaboration software like Microsoft* Lync and Skype enable workers to remain productive and responsive — even out of the office.
As companies have developed mobility strategies, many have invested in hardware such as tablets and smartphones in order to provide employees a modicum of flexibility. CIOs have discovered that due to their mobility strategies:
“…employees in the field complete mission-critical tasks in real-time; they no longer gather information in one place, and then return to an office to transcribe what they learned on the road. Because workers are constantly connected, they’re always able to communicate, and are more likely to keep working even during off-hours.”
Though it has proven to be an invaluable strategy across the increasingly complex enterprise landscape, the increase in productivity through mobility is still evolving.
Refining Mobility in 2015
Mobility is no longer a “nice to have” for employees — it’s expected. However, as the enterprise continues to adopt mobile technology, flaws are starting to appear. As BYOD and mobility have evolved, cross-platform collaboration has been somewhat limited by compatibility issues between operating systems.
Collaboration platforms like Microsoft* Lync* and Skype* have apps for most popular mobile operating systems, but functionality across some of these mobile platforms may be significantly limited compared to the desktop client.
For example, Microsoft* recently announced support for unified Lync & Skype communication (meaning Lync users can call and message Skype users, and vice versa). However, this functionality is limited to desktop clients for both devices. This feature, as well as many others, has been a major stumbling block for companies trying to promote robust collaboration efforts in conjunction with their mobility strategies.
Companies looking to refine their mobility strategy should consider the range of cross-platform compatibility issues and productivity limitations when looking to invest in any new device or strategy. A recent Principled Technologies test report compared Microsoft* Lync and Skype* performance on three popular mobile devices: an Apple* iPad* Air, Samsung* Galaxy* Note 10.1, and Microsoft* Surface* Pro 3.
The feature set and performance for the apps on the iPad* and Galaxy* Note was significantly limited compared to the Surface* Pro 3. Since the Surface* Pro 3 runs the full desktop version of Windows* 8.1 Pro, as opposed to a mobile operating system like the iPad* and Galaxy* Note.
Click here to read the full Principled Technologies test report.
*Other names and brands are property of others
Diverse career development opportunities – there is no other way to phrase it. Intel is a multinational company, operating in a high tech industry. The cross-discipline needs to keep it running require an employee base that bring with it a … Read more >
As we continue to work to help game developers succeed on Intel platforms, we are pleased to partner with Unity to sponsor their x86 sweepstake. Prizes include 50 Intel-powered Android tablets and 30… Read more
Many manufacturers are still putting outdated 802.11bgn wireless technology in new devices despite the fact that the technology is almost 8 years old and has since been replaced by 802.11ac Wi-Fi, which is 3x faster and more stable. Since this … Read more >
The post Better, Faster 802.11ac Wi-Fi is Here — Shouldn’t It Be In Your New PC? appeared first on Technology@Intel.
The Internet of Things (IoT) is at the heart of a powerful technology revolution. Thanks to the recently announced Intel® IoT Platform, the act of connecting devices and systems to each other so that they can share data has suddenly … Read more >
The post New Intel IoT Platform Connects the Unconnected to the Internet of Things appeared first on IoT@Intel.
We recently published the latest Intel(r) Active Management Technology Release 10.0 Software Developer Kit. Below is a description of what components are included in the SDK as well as the list of… Read more
Not all roads lead to BYOD.
Business paths diverge when it comes to mobile device management (MDM) strategy; as consumerization and mobility have become more prevalent within the enterprise, so has the variety in both corporate and customer requirements. According to Hyoun Park, “The proliferation of mobile devices has led to a similar proliferation of enterprise mobility support models. As your organization considers how to move forward to support mobile devices, applications, data, content, and unified communications, keep in mind how enterprise mobility is currently supported within your organization.”
Park states that the blanket term of BYOD can be broken down into eight specific categories that better represent specific strategies and objectives for the business.
Eight Ways to Structure Your MDM
COLD: Corporate Owned, Locked Down
Provides both a secure device and secure gateway, with rigorous policies surrounding lost or stolen devices. “In today’s world, this model has only become even more secure with the encryption of voice calls, multifactor authentication, content and application virtualization to prevent improper sharing, and sandboxes used to isolate applications and content.”
COBRA: Corporate Owned, Business Ready Applications
New employees are given corporate devices pre-loaded with applications geared towards the mobile worker. “This might be as simple as including Dropbox, Box, or Evernote. This could also include mobile CRM and ERP applications, help desk applications, and productivity enablers.”
COPE: Corporate Owned, Personally Enabled
All devices are compartmentalized into corporate-owned and personally-owned. “This can be done by dedicating an enterprise-specific portion of the device to the applications and documents used in the workplace, while dedicating the rest of the device to Facebook, Angry Birds, personal e-mail accounts, and whatever else the employee wants to put on the device.”
CAPO: Corporate Approved, Personally Obtained
Devices are purchased by employees, but must meet corporate guidelines. “These standards can be as simple as supporting the company’s security or mobile device management standards or as complex as defining specific policies to shut off nearfield communications, camera, and other functions.”
EQUAL: EQuipment Under Approved List
EQUAL is a version of CAPO; all devices or operating systems are company ordained. “This allows companies to focus on the devices and operating systems they support without being overwhelmed by the evolution of mobility across every possible platform. However, the focus comes at the potential cost of creating a new version of shadow IT from unsupported devices.”
PEER: Personally Equipped, Enterprise Ready
PEER is a version of the COPE model; rather than the company funding the device, the employee makes the purchase instead. “The PEER model allows companies to put business applications, security, and governance onto a personally owned device. Employees agree to give businesses the control needed to transmit and support these applications.”
POOR: Personally Owned, Office Required
A somewhat controversial model that dictates employees must fund a device (sans employer compensation) in order to fulfill job requirements. “POOR is expected to become more troublesome as states increasingly see class action lawsuits that, like Cochran, are created based on a combination of state labor laws and BYOD requirements.”
CHAOS: Corporate Handles All Operating Systems
Often IT’s least favorite BYOD option, this means corporate supports all operating systems regardless of platform. “From an operational perspective, this approach often results in users falling through the cracks as IT is unable to provide employees with enterprise applications because vendors have never developed them for a specific platform. And from a support perspective, IT is constantly on the phone with additional support staff to troubleshoot unfamiliar devices.”
As the device market continues to evolve, remember to refresh your strategy and policies often to keep pace with our ever-changing world.
I am excited for the opening of the free Cyber Warfare Range. I had the pleasure of meeting the team at Arizona Cyber Warfare Range (ACWR) and getting an exclusive tour of their virtual warfare range. During this guide of their internal architecture, I was able to get some insights into controls which protect their cyber warfare environment. It is vital the activities which occur inside the range do not get loose and directly impact the real world.
So what is a virtual warfare range?
A virtual warfare range is an open-source, virtual location where security professionals can test their skills and programs in a simulated environment. You can conduct dangerous activities in a safe, isolated, and controlled space. You can think of it like a cybersecurity gun range or paintball arena. For example, users are encouraged to hack the servers, compromise networks, break software, test the robustness of products, and even play with toxic malware (in specialized ranges). Customized environments can be created to attack or defend. All of which are important learning experiences for security professionals.
It’s no secret that security professionals need practical, real-world experience. However, it is never recommended to do dangerous activities on production, personal, or work networks as it is a recipe for harmful unintended consequences. As a vitally important resource, the warfare range provides a free, internet accessible, and safe place where novices and experts alike can learn and test their skills while conducting more specific activities – such as testing products, evaluating malware, etc…
The ACWR is simply a safe environment for learning by doing. Hacking, testing, war games, malware practice, product evaluations, and real opponent challenges help security professionals hone their skills in an isolated setting. Beginner and advanced ranges provide teaching challenges, customizable environments, analysis, and metrics. The site encourages users to go wild, ‘burn systems to the ground’, and do whatever it takes to learn and improve.
No more excuses, time to get learning.
- Matthew Rosenquist
To find out more visit the Arizona Cyber Warfare Range Website: http://www.azcwr.com/
IT Peer Network: My Previous Posts
My Blog: Information Security Strategy
I’ve travelled to a lot of roadshows, meetups and industry events in 2014 in my role as the USA Community Manager for the Internet Of Things Developer Program but my favorite trip this year was… Read more