Android Everywhere. February 15, Cristina Segal, WW Director Android Solutions
|
|
- Julius Jordan
- 6 years ago
- Views:
Transcription
1 Android Everywhere February 15, 2012 Cristina Segal, WW Director Android Solutions
2 Increasing Device Connectivity M2M, Cloud Architectures, 50 Billion connected devices by 2020 Increased complexity with system consolidation Highly organized statefunded security attacks Device convergence and industry specifics Consumer Devices Regulated Public Services Infrastructure Mission Critical Systems Wind River. All Rights Reserved.
3 Connected devices disruptive effect Social impact: new social behaviors will imply new consumer behavior Tablets like devices will cannibalize PC market A game changer for content owners: Printed information will drop in the favor of rich multimedia driven information Opportunities for systems management, applications and security software vendors OS and hardware impact: convergence and standardization OEMs and Operators impact on the revenue and margin Wind River. All Rights Reserved.
4 The 3 waves of connected devices Source: Ericcson wp-50-billions Wind River. All Rights Reserved.
5 Who is adopting machine connectivity? Utilities: smart grids can lower energy consumption and enable more renewable energy sources Government: access to public services, e-education, personal safety and cuts social costs Transportation: intelligent transport solutions to speed up traffic flows, reduce fuel consumption and save live Health care: remote patient monitoring could save as much as Usd 200 billion in the treatment of chronic diseases across Finance and new business opportunities Wind River. All Rights Reserved.
6 Drivers for technology choice of connected devices Application interoperability between devices, networks, HW/OS Tools to facilitate application development Service innovation: app stores, open APIs, cloud-based capabilities Device reuse, enablement of common functionalities Standardized interfaces in devices and for application enablers Compliance to Industry norms for QoS, security and safety Wind River. All Rights Reserved.
7 Why Android? Why now? "The Android circle is getting bigger," "Everything should be... Androidified?...is that the word?" Andy Rubin Wind River. All Rights Reserved.
8 Android everywhere? Leader in smartphone sales WW since But not just an OS for mobile phones Wind River. All Rights Reserved.
9 What is Android? - Android is a software platform, rather than just an operating system (OS) having the potential for deployment across a much wider range of devices - Is a complete development framework with a unique development environment, Linux based - Out-of-the-box Internet-enabled - Android provides a sophisticated GUI framework and user interfaces that product designers can customize - A solid, standardized development environment - Large open source developer community Wind River. All Rights Reserved.
10 Android beyond mobile? Since Multi CPU support: Arm, MIPS, X86 becoming a standard way to bring the full Internet experience to DTVs, set-top boxes, MIDs, digital picture frames and other embedded devices The Android Application Market, both as a channel and a deployment capability is attractive to OEMs and Operators from non-mobile space: Automotive, home automation, productivity support, e-health, M2M Wind River. All Rights Reserved.
11 Business Reasons for Choosing Android Wind River. All Rights Reserved.
12 Why Use Android for Embedded Devices? Business Reasons 1. Clear licensing approach 2. Comprehensive source code 3. Rapid innovation and release cadence 4. Ecosystem support 5. Good documentation and training materials Wind River. All Rights Reserved.
13 Android key advantages and main issues? Business advantages for OEMs/ODMs Reduces cost for obtaining a commercial solution Increase time-to-market Large ecosystem New revenue stream - services Business disadvantages for OEMs/ODMs Unpredictable costs for upgrades Hard to differentiate New revenue stream outside the corebusiness Wind River. All Rights Reserved.
14 Licensing a big advantage 1. Apache 2.0-based Commercial friendly Open source friendly Some exceptions but manageable Kernel GPLv2 2. Contributor license grants Individuals Corporations IP and copyright compliance reviews must still be completed prior to release Wind River. All Rights Reserved.
15 Lots of Source Code 1. Comprehensive set of common elements 200+ GIT Trees in public Android repo Source for common coms packages Wi-Fi etc Multiple vendors (Broadcom, TI) 2. Actively managed by contributors For all three project types (core, external, packages) 3. Many external packages are used by other open source distributions BlueZ, D-Bus, OpenSSL, webkit, sqlite, zlib Submitted accepted Wind River. All Rights Reserved.
16 Rapid Innovation and Release Cadence 1. Rapid release sequence is sign of: Stack maturity (decreasing) Community adoption and involvement Real world feedback Google investment RTOS Embedded Linux Android 2. It is expected to settle down to 1-2 major release and multiple updates per year Wind River. All Rights Reserved.
17 Broad Ecosystem Support 1. Support for leading processor architectures and vendors 2. Rapidly growing application developer community 3. Multiple commercialization partners within OHA Not all architectures are equally supported (SDK, NDK, CTS) Wind River. All Rights Reserved.
18 Degree of complexity/expertise required Documentation and Training Materials 1. Extensive training and documentation Instructions Videos Blogs Best practices Tutorials 2. Newcomer friendly Get to base enablement quickly Vertical market specific customization and release/patch maintenance Board bring up vertical market version of Android Snapshot release Android bring-up on reference board Wind River. All Rights Reserved.
19 Android Certification for Compatibility What is the Android certification The aim of the Android compatibility is to provide a consistent application and hardware environment to application developers The Android certification compatibility program : The source code to the Android software stack The Compatibility Definition Document (CDD), representing the "policy" aspect of compatibility The Compatibility Test Suite (CTS), representing the "mechanism" of compatibility What is the role of Android Market in compatibility? Devices that are Android compatible may seek to license the Android Market client software to become part of the Android app ecosystem. This option isn't available to devices that aren't compatible Wind River. All Rights Reserved.
20 Why and when to certify a device The Android Compatibility Program is optional Anyone can use it to build any kind of device using Android and not looking to certify it If a manufacturer wishes to use the Android name with their product, or wants access to Android Market, they must first demonstrate that the device is compatible Google apps for Android, such as YouTube, Google Maps and Navigation, Gmail, and so on are Google properties that are not part of Android, and are licensed separately Wind River. All Rights Reserved.
21 What about not getting the Android certification Non certifiable devices can run Android applications (but not guarantee to run all of them) Variation of tablets-like devices will not require Google certification. However they can t be advertised as Android device and will not have access to Google Market Place Multiple application stores, (like Motorola and Samsung), are considered as "healthy competition". Today Google doesn t commit to certify devices that are not consumer (as Automotive or A&D), therefore they don t want to license Google Marketplace (GMS) even tough they will pass 100% CTS and CDD Wind River. All Rights Reserved.
22 The different flavor of Android devices Google Branded (Nexus one, Galaxy S) Google apps Google default ui No middleware customization CTS compliant (Desire S, Droid X) Google apps Custom UI possible Custom apps and middleware Custom (Acer netbook, Archos Tablets gen8) No Google apps Everything can be customized Wind River. All Rights Reserved.
23 Best model is to focus on first device, then others follow Google Release Device Alpha Release Device Beta Release Device Final Release First Device n Devices Second Device 23 Wind River Confidential 2011 Wind River. All Rights Reserved
24 Efficiencies Realized for Multiple Devices and Carriers Amount of Effort for Android Upgrade Android Device 1 Android Device 2 Android Device 3 Android Device 4 Effort decreases for each device based on BOM similarity among devices Number of devices per product line 24 Wind River Confidential 2011 Wind River. All Rights Reserved
25 Technical Reasons for Choosing Android Wind River. All Rights Reserved.
26 Android key advantages and main issues? Technological advantages Based on Linux and Java Open source platform Large market space (millions of applications) Complete Multimedia stack Ready to go solution for wireless internet connected devices Technological issues: Lack of visibility into the Roadmap dictated by Google Discretional access to the code from one version to another Difficulties to have patches accepted by Google Wind River. All Rights Reserved.
27 Android Embedded devices and beyond Virtualization Security Vertical market specific issues Wind River. All Rights Reserved.
28 Security Threat Vectors Information Assurance and Cyber Security Information Assurance Managing risks related to the use, storage, and transmission of information Cyber Security Protecting computer system services from disruption, corruption, and unplanned behavior Wind River. All Rights Reserved.
29 Central Security Vulnerabilities API s System Applications Data Prevent Bypassing of Standard Functions Protect Against System Disruption or Corruption Eliminate Unauthorized Application Execution/Update Protect Against Data Disclosure or Corruption Broad Security Threat Vectors with Unknown Objectives Wind River. All Rights Reserved.
30 Eliminating Security Vulnerabilities Wind River Security Approach Threat Assessment Security Optimized Design Secure Runtime Selection Application Protection Development Lifecycle & Tools System Management Complete Device Security Assessment Separation of System Components Use of Security- Enabled Features Certified Runtime Platform (Hypervisor and OS) Hardened/Certi fied Middleware Use of whitelisting Incorporate reputation aware application behavior Use of code analysis tools Security Test Suites What-If Vulnerability Analysis Config & Provisioning System Updates Security Policy Mgmt Wind River. All Rights Reserved.
31 Android Security Trends Android Security Vulnerabilities in the press A good number of patches have rolled out to counter threats Very good descriptions on how compromises have occurred Google has taken some action Enterprise Level Security Google making progress here with Gingerbread and ICS 3 rd parties extending Android adoption in Enterprise DoD Level Security Lots of published interest and activity SEAndroid pushed to open source Google appears to be accepting some contributions Wind River. All Rights Reserved.
32 Wind River and Android Security Wind River as system integrator For leading-edge commercial security solutions identified by customer or WRS partners Wind River as solution provider Kernel and HAL layer optimizations Based on deep Linux kernel expertise Meeting customerspecific, confidential requirements Android applications AV and malware mitigation Managed application execution Secure app stores Android middleware Permissions Remote wipe, update and restore Dalvik security HAL and Linux Kernel security Secure Linux kernel implementations Silicon-specific implementations (Trustzone, etc ) Wind River. All Rights Reserved.
33 Virtualization in Embedded Android Consolidation: Reduce the number, size, weight, and power of application-specific devices by consolidating disparate functionality onto common hardware. Performance: Increase the speed and functionality of your systems while decreasing the power requirements. Separation (safety/security): Isolate certified applications from noncertified applications to retain certification levels while extending functionality. Migration to new platforms: Extend existing functionality, leveraging legacy applications and stacks while adding new functionality. Preserve investment in existing products while adding new differentiated features in new isolated application stacks Wind River. All Rights Reserved.
34 Example of virtualization use cases In-vehicle infotainment: consolidate head unit (Android), realtime (e.g. cluster displays), and/or instant-on/safety-critical (e.g., rear-view camera) Software-defined radio: real-time/safety-critical alongside Android Health: isolate and secure sensitive patient information per HIPAA on mobile devices, e.g., electronic medical records management by physicians Real-time: Using a separate virtual board for real-time activities IP separation: Isolating GPL and LGPL components from proprietary ones Multiuser: Separating work and personal activities 34
35 Wind River and Android
36 Android and Wind River Wind River, OHA member from the begining Contributed to Android since 2005, OHA founding member : 7 designs at MWC 2007 Pushed new features to Android with device manufacturers or operators Code maintainer for ALSA and V4L2, Linux kernel maintainer 1st commercialization partner One technical meeting / week with dedicated Google Android team Wind River Android expertise Android everywhere : mobile, industrial, defense & security, and automotive projects on going Design architecture : specification, audit, implementation Ux modification : UI, gesture, new input methods Enhancements and modifications from kernel to user space 50+ Android Projects since 2007 Wind River Android related offering Wind River Platform for Android Wind River FAST for Android, including STP plugin and compliance test solution Android application training Worldwide Profesionnal services, consulting, support Wind River. All Rights Reserved.
37 Wind River & Android 1. 5 years Regular engineering sync with Google program contributions Contributed to enablement of several hundred Android SKUs development centers worldwide China, Korea, Romania, US, Canada, France, Sweden, Germany 4. Customers span entire value chain Silicon, device manufacturer, operator, SW vendor and integrators 5. Mobile & non-mobile Android devices Wind River. All Rights Reserved.
38 Wind River Solutions for Android 1. Commercial, compliant platform 2. Pre-integrated ecosystem 3. Automated test framework 4. Virtualization support 5. Solutions for Security 6. Customization/optimization services 7. Worldwide support Wind River. All Rights Reserved.
39 Summary - Why Wind River? Semi Vendor Relationship Industry Consortium Leadership Local Delivery with Global Support The Best Android Experts Available for Customer Projects Wind River. All Rights Reserved.
40 Thank You Thank You 40
Android Everywhere. Cristina Segal, EMEA Director Android Solutions GM Android testing tools
Android Everywhere Cristina Segal, EMEA Director Android Solutions GM Android testing tools Trends on connected devices* Bigger and richer computing experiences are ahead, driven by connected usages Connecting
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationTHE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly
More informationBUILDING the VIRtUAL enterprise
BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,
More informationOpen Source in Automotive Infotainment
Open Source in Automotive Infotainment Taeyong Kim (ty.kim@windriver.com) Services & Solutions Wind River Systems 2015 Wind River. All Rights Reserved. Why using Open Source in IoT? Internet of Things
More informationWindows 10 IoT Overview. Microsoft Corporation
Windows 10 IoT Overview Microsoft Corporation 25 $7.2 BILLION TRILLION Connected things will by 2020 be in use by 2020 worldwide market for IoT solutions IDC: Worldwide and Regional Internet of Things
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationIJRDTM Kailash ISBN No Vol.17 Issue
ABSTRACT ANDROID OPERATING SYSTEM : A CASE STUDY by Pankaj Research Associate, GGSIP University Android is a software stack for mobile devices that includes an operating system, middleware and key applications.
More informationIoT Market: Three Classes of Devices
IoT Market: Three Classes of Devices Typical Silicon BOM PC-Like Embedded Devices ~100 million units ATM, Retail Point of Service Intel Core $100+ Smart Things ~800 million units PLC, Edge Gateway, Thermostat
More informationSmart Data Center Solutions
Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,
More informationENHANCING INTELLIGENCE IN THE INTERNET OF THINGS The Business of Embedded Virtualization Alexander Damisch, Director, Industrial Vertical, Wind River
ENHANCING INTELLIGENCE IN THE INTERNET OF THINGS The Business of Embedded Virtualization Alexander Damisch, Director, Industrial Vertical, Wind River INNOVATORS START HERE. EXECUTIVE SUMMARY A key driver
More informationIT Consulting and Implementation Services
PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from
More informationNEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS
NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationGet more out of technology starting day one. ProDeploy Enterprise Suite
Enterprise Suite Get more out of technology starting day one 1 Secure the path to a future-ready data center The landscape faced by IT managers and business leaders today can be daunting to navigate. Continually
More informationCloud-Enable Your District s Network For Digital Learning
Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationIoT and the Role of PLATFORMS. Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D
IoT and the Role of PLATFORMS Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D 1 The Future is IoT IoT will touch every market Key Manufacturer Driving Factors Competitive
More informationCar Connectivity Consortium. MirrorLink and the Connected Car
Car Connectivity Consortium MirrorLink and the Connected Car 1 Agenda Landscape for Smartphone Integration into Cars Car Connectivity Consortium MirrorLink Technology Certification Applications 2 Landscape
More informationData Protection Everywhere. For the modern data center
Data Protection Everywhere For the modern data center Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright
More informationTransforming the way people watch TV
Transforming the way people watch TV Nokia Siemens Networks Ubiquity Multiscreen TV Platform - Executive summary An open solution for delivering TV and Internet as a single service on any device over any
More informationThe Digital Operator How do operators transform to a full Service Strategy
The Digital Operator How do operators transform to a full Service Strategy Telecom and cable operators have greatly benefited from the explosive adoption and utilization of mobile services More people
More informationSecurity and Performance Benefits of Virtualization
Security and Performance Benefits of Virtualization Felix Baum mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered
More informationCisco 5G Now! Product Announcements. February, 2018
Cisco 5G Now! Product Announcements February, 2018 Mobile Cloud Services 2017 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application Access (%) Displacing Legacy, Mobile
More informationEmbedded Software: Its Growing Influence on the Hardware world
Embedded Software: Its Growing Influence on the Hardware world ISA Vision Summit 2009, Bangalore 16 th FEB 09 V. R. Venkatesh Head, Product Engineering Services, Wipro Technologies. Wipro in Product Engineering
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationI D C T E C H N O L O G Y S P O T L I G H T. V i r t u a l and Cloud D a t a Center Management
I D C T E C H N O L O G Y S P O T L I G H T Orchestration S i m p l i f i es and Streamlines V i r t u a l and Cloud D a t a Center Management January 2013 Adapted from Systems Management Software Purchasing
More informationMobile Computing. Juha-Matti Liukkonen, Nov 17, 2010
Mobile Computing Juha-Matti Liukkonen, Nov 17, 2010 1 Contents Mobile Computing revolution Structural impact of device evolution A look into Mobile Linux 2 Mobile Computing revolution 3 Pocketable power
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationServices for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam
Services for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam Practice Leader : Borderless Network Architecture APJC Services Agenda Priorities & Smart Solutions Innovation and
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationCenturyLink for Microsoft
Strategic Partner Alliances CenturyLink for Microsoft EMPOWER REACH AGILITY 2017 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product names are the property
More informationSilicon Labs Corporate Overview
Silicon Labs Corporate Overview APRIL 2018 The leader in silicon, software and solutions for a smarter, more connected world. A World-Class Design Culture In 1996, a visionary group of engineers pioneered
More informationSecuring Today s Mobile Workforce
WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................
More informationJUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE.
JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE. EXECUTIVE SUMMARY There s little question that advances in therapeutic technologies have
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationCopyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Lynn Anderson Senior Vice President, Communications Chief Communications Officer Chief of Staff Bill Veghte Chief Operating Officer, HP Lynn Anderson Senior Vice President, Communications Chief Communications
More informationLinux Community Project Leaders Unite. Peter Vescuso EVP Marketing, Bus Dev Black Duck Software
Linux Community Project Leaders Unite Peter Vescuso EVP Marketing, Bus Dev Black Duck Software Agenda Trends Communities of communities Linux Community Projects 2 Innovation and FOSS - A Virtuous Circle
More informationLESSONS LEARNED IN SMART GRID CYBER SECURITY
LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationNEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE FROM PROOF-OF-CONCEPT TO START-OF-PRODUCTION
DRIVING CONNECTED NEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE VNC Automotive deliver ingenious connectivity and telematics middleware for the vehicles of tomorrow. Our solutions enable
More informationLinux and Open Source in Samsung
Toward Soft Driven Company Linux and Open Source in Samsung 2012/ 10 /10 Samsung Software R&D Center VP WonJoo Park 2012 SAMSUNG Electronics Co. What does Software mean to Samsung? In the past, Means for
More informationEnhancing Security With SQL Server How to balance the risks and rewards of using big data
Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company
More informationDATA SHEET HIGHTLIGHTS Deploying a Single System to Manage All Devices and Services Implementing Service Assurance
Motorola EDGE Service Assurance Software Suite The allows service providers to expand broadband service revenues while reducing operational and support costs through automated service provisioning and
More informationSecurity for Secure IoT: Advanced Architectures for IoT Gateways. Simon Forrest Director of Segment Marketing, Consumer Electronics
Security for Secure IoT: Advanced Architectures for IoT Gateways Simon Forrest Director of Segment Marketing, Consumer Electronics www.imgtec.com Imagination Technologies Company overview A world leader
More informationFLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD
FLUID COMPUTING IN A SOFTWARE-DEFINED WORLD ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River Chemical Sector Commercial Building Sector Communications Sector Critical Manufacturing
More informationWIND RIVER NETWORKING SOLUTIONS
WIND RIVER NETWORKING SOLUTIONS TRANSFORMING THE NETWORK Businesses of all kinds are benefitting from the transformation of the networks they rely on, from LANs to WANs. Those network transformations are
More informationOverview. Solution Partner Opportunity. Transactional Partner Opportunity. OEM Partner Opportunity. Next Steps. Appendix
Overview Solution Partner Opportunity Transactional Partner Opportunity OEM Partner Opportunity Next Steps Appendix Intelligent systems market 1.5 billion units in 2012 is already 68% larger than the
More informationTransformation Through Innovation
Transformation Through Innovation A service provider strategy to prosper from digitization People will have 11.6 billion mobile-ready devices and connections by 2020. For service providers to thrive today
More informationJBoss Enterprise Middleware
JBoss Enterprise Middleware Making software from the open source community ready for the enterprise DLT Solutions 2411 Dulles Corner Park, Suite 800 Herndon, VA 20171 Web: www.dlt.com Phone: 703-709-7172
More information24th MONDAY. Overview 2018
24th MONDAY Overview 2018 Imagination: your route to success At Imagination, we create and license market-leading processor solutions for graphics, vision & AI processing, and multi-standard communications.
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationRTOS, Linux & Virtualization Wind River Systems, Inc.
taeyong.kim@windriver.com RTOS, Linux & Virtualization 2008 Wind River Systems, Inc. Simple Board Simple Code 2 2008 Wind River Systems, Inc. start: /* disable interrupts in CPU and switch to SVC32 mode
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationEnd-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration
End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration Dr. Andreas Hauser Director Digital Service, TÜV SÜD Tokyo, 21 February 2017 Corporate Profile Slide 2 Our heritage: 150
More informationMaximum Security with Minimum Impact : Going Beyond Next Gen
SESSION ID: SP03-W10 Maximum Security with Minimum Impact : Going Beyond Next Gen Wendy Moore Director, User Protection Trend Micro @WMBOTT Hyper-competitive Cloud Rapid adoption Social Global Mobile IoT
More informationNokia for developers. Alexey Kokin. Developer Relations
Nokia for developers Alexey Kokin Developer Relations alexey.kokin@nokia.com Agenda Nokia Platforms and changes due to MSFT deal WP7 Symbian Meego S40 Qt update Ovi Store update 2 Strategy shift in brief
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationImproving Security in Embedded Systems Felix Baum, Product Line Manager
Improving Security in Embedded Systems Felix Baum, Product Line Manager The Challenge with Embedded Security Business Imperatives Security Imperatives I need to keep my production expenses as low as possible.
More informationProDeploy Suite. Accelerate enterprise technology adoption with expert deployment designed for you
Accelerate enterprise technology adoption with expert deployment designed for you 1 Shift resources to innovate and drive better business outcomes The landscape faced by IT managers and business leaders
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationWhy is Office 365 the right choice?
Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationConquer New Digital Frontiers with leading Public Cloud Platforms.
Singtel Business Product Factsheet Brochure Managed Defense Public Cloud Services Conquer New Digital Frontiers with leading Public Cloud Platforms. Singtel Managed Public Cloud supports enterprises in
More informationForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.
Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationDigital Renewable Ecosystem on Predix Platform from GE Renewable Energy
Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy Business Challenges Investment in the Industrial Internet of Things (IIoT) is expected to top $60 trillion during the next 15 years.
More informationARM Security Solutions and Numonyx Authenticated Flash
ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware
More informationSilicon Labs Corporate Overview
Silicon Labs Corporate Overview MARCH 2018 The leader in silicon, software and solutions for a smarter, more connected world. A World-Class Design Culture In 1996, a visionary group of engineers pioneered
More informationIntroduction to TIZEN Ecosystem
Introduction to TIZEN Ecosystem Sungjin Lee Samsung Electronics TIZEN Ecosystem What is Ecosystem? Information Promotion Device Platform Content & Service Provider (Developer) Distribution Channel (App
More informationSOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE
SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationA Big Little Hypervisor for IoT Development February 2018
A Big Little Hypervisor for IoT Development February 2018 Contents PROJECT OVERVIEW TECHNICAL OVERVIEW GOVERNANCE JOIN US! PROJECT OVERVIEW Current State of Affairs IoT Development IoT device devices requires
More informationMOBILE OPERATING SYSTEM TRANSITION Insights and Considerations
MOBILE OPERATING SYSTEM TRANSITION Insights and Considerations Mobile Operating System Transition Insights and Considerations www.honeywellaidc.com 1 Introduction A shift in the mobile operating system
More informationUnderstanding VDI End-to-End
Understanding VDI End-to-End Cloud Client-Computing Dario Gnaccarini Sales Engineer Cloud client-computing Matteo Mazzari Principal Consultant Services Compute continues to change 3 Billion people worldwide
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationOCTOBER 2016 TELIT WHITE PAPER
OCTOBER 2016 TELIT WHITE PAPER TELIT INTELLIGENT MODULES HARNESS THE POWER OF INTEL ATOM TM x3 PROCESSORS TO PROVIDE IoT DEVELOPERS WITH UNRIVALLED CHOICE, FLEXIBILITY & PERFORMANCE. CONTENTS INTRODUCTION
More informationBEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE
BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationDevice Discovery for Vulnerability Assessment: Automating the Handoff
Device Discovery for Vulnerability Assessment: Automating the Handoff O V E R V I E W While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are
More informationCustomer Case Studies on Accelerating Their Path to Hybrid Cloud
Customer Case Studies on Accelerating Their Path to Hybrid Cloud Hitachi and VMware: Global Strategic Partners Committed to Success Sunny Sahajpal EMEA Strategic Alliances and OEM Mananger VMware Partner
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationNew Digital Business Models Driving the Softwarization of the Network
New Digital Business Models Driving the Softwarization of the Network Marc Halbfinger January 2018 Here To Serve Headquartered in Hong Kong PCCW consolidated 2016 Revenue: US$4.9 billion HKT 2016 Revenue:
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationSecure & Unified Identity
Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong
More informationWEB DESIGN SERVICES. Google Certified Partner. In-Studio Interactive CEO: Onan Bridgewater. instudiologic.com.
In-Studio Interactive CEO: Onan Bridgewater instudiologic.com sales@instudiologic.com info@instudiologic.com WEB DESIGN SERVICES Google Certified Partner 1. Brand Building Engagements that Drive Sales
More informationGuide Series. How to upgrade to Microsoft Windows 10? Guide Series
How to upgrade to Microsoft Windows 10? Acuutech All rights reserved 2016 1 Contents Introduction... 2 Why use Windows 10?... 3 What are the advantages of Windows 10?... 4 Windows 10 editions comparison...
More informationA Guide to Closing All Potential VDI Security Gaps
Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationUSING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT
USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.
More informationCyber Risk and Networked Medical Devices
Cyber Risk and Networked Medical Devices Hot Topics Deloitte & Touche LLP February 2016 Copyright Scottsdale Institute 2016. All Rights Reserved. No part of this document may be reproduced or shared with
More informationProven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid
Proven results Unsurpassed interoperability Fast, secure and adaptable network Only EnergyAxis brings it all together for the Smart Grid Outage management & restoration Elster global strength Demand response
More informationCyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities
SESSION ID: SBX3-W1 Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities Gary Hayslip Deputy Director, CISO City of San Diego, CA @ghayslip City of San Diego by the Numbers 11,000+
More informationExpress Monitoring 2019
Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities
More information