Android Everywhere. February 15, Cristina Segal, WW Director Android Solutions

Size: px
Start display at page:

Download "Android Everywhere. February 15, Cristina Segal, WW Director Android Solutions"

Transcription

1 Android Everywhere February 15, 2012 Cristina Segal, WW Director Android Solutions

2 Increasing Device Connectivity M2M, Cloud Architectures, 50 Billion connected devices by 2020 Increased complexity with system consolidation Highly organized statefunded security attacks Device convergence and industry specifics Consumer Devices Regulated Public Services Infrastructure Mission Critical Systems Wind River. All Rights Reserved.

3 Connected devices disruptive effect Social impact: new social behaviors will imply new consumer behavior Tablets like devices will cannibalize PC market A game changer for content owners: Printed information will drop in the favor of rich multimedia driven information Opportunities for systems management, applications and security software vendors OS and hardware impact: convergence and standardization OEMs and Operators impact on the revenue and margin Wind River. All Rights Reserved.

4 The 3 waves of connected devices Source: Ericcson wp-50-billions Wind River. All Rights Reserved.

5 Who is adopting machine connectivity? Utilities: smart grids can lower energy consumption and enable more renewable energy sources Government: access to public services, e-education, personal safety and cuts social costs Transportation: intelligent transport solutions to speed up traffic flows, reduce fuel consumption and save live Health care: remote patient monitoring could save as much as Usd 200 billion in the treatment of chronic diseases across Finance and new business opportunities Wind River. All Rights Reserved.

6 Drivers for technology choice of connected devices Application interoperability between devices, networks, HW/OS Tools to facilitate application development Service innovation: app stores, open APIs, cloud-based capabilities Device reuse, enablement of common functionalities Standardized interfaces in devices and for application enablers Compliance to Industry norms for QoS, security and safety Wind River. All Rights Reserved.

7 Why Android? Why now? "The Android circle is getting bigger," "Everything should be... Androidified?...is that the word?" Andy Rubin Wind River. All Rights Reserved.

8 Android everywhere? Leader in smartphone sales WW since But not just an OS for mobile phones Wind River. All Rights Reserved.

9 What is Android? - Android is a software platform, rather than just an operating system (OS) having the potential for deployment across a much wider range of devices - Is a complete development framework with a unique development environment, Linux based - Out-of-the-box Internet-enabled - Android provides a sophisticated GUI framework and user interfaces that product designers can customize - A solid, standardized development environment - Large open source developer community Wind River. All Rights Reserved.

10 Android beyond mobile? Since Multi CPU support: Arm, MIPS, X86 becoming a standard way to bring the full Internet experience to DTVs, set-top boxes, MIDs, digital picture frames and other embedded devices The Android Application Market, both as a channel and a deployment capability is attractive to OEMs and Operators from non-mobile space: Automotive, home automation, productivity support, e-health, M2M Wind River. All Rights Reserved.

11 Business Reasons for Choosing Android Wind River. All Rights Reserved.

12 Why Use Android for Embedded Devices? Business Reasons 1. Clear licensing approach 2. Comprehensive source code 3. Rapid innovation and release cadence 4. Ecosystem support 5. Good documentation and training materials Wind River. All Rights Reserved.

13 Android key advantages and main issues? Business advantages for OEMs/ODMs Reduces cost for obtaining a commercial solution Increase time-to-market Large ecosystem New revenue stream - services Business disadvantages for OEMs/ODMs Unpredictable costs for upgrades Hard to differentiate New revenue stream outside the corebusiness Wind River. All Rights Reserved.

14 Licensing a big advantage 1. Apache 2.0-based Commercial friendly Open source friendly Some exceptions but manageable Kernel GPLv2 2. Contributor license grants Individuals Corporations IP and copyright compliance reviews must still be completed prior to release Wind River. All Rights Reserved.

15 Lots of Source Code 1. Comprehensive set of common elements 200+ GIT Trees in public Android repo Source for common coms packages Wi-Fi etc Multiple vendors (Broadcom, TI) 2. Actively managed by contributors For all three project types (core, external, packages) 3. Many external packages are used by other open source distributions BlueZ, D-Bus, OpenSSL, webkit, sqlite, zlib Submitted accepted Wind River. All Rights Reserved.

16 Rapid Innovation and Release Cadence 1. Rapid release sequence is sign of: Stack maturity (decreasing) Community adoption and involvement Real world feedback Google investment RTOS Embedded Linux Android 2. It is expected to settle down to 1-2 major release and multiple updates per year Wind River. All Rights Reserved.

17 Broad Ecosystem Support 1. Support for leading processor architectures and vendors 2. Rapidly growing application developer community 3. Multiple commercialization partners within OHA Not all architectures are equally supported (SDK, NDK, CTS) Wind River. All Rights Reserved.

18 Degree of complexity/expertise required Documentation and Training Materials 1. Extensive training and documentation Instructions Videos Blogs Best practices Tutorials 2. Newcomer friendly Get to base enablement quickly Vertical market specific customization and release/patch maintenance Board bring up vertical market version of Android Snapshot release Android bring-up on reference board Wind River. All Rights Reserved.

19 Android Certification for Compatibility What is the Android certification The aim of the Android compatibility is to provide a consistent application and hardware environment to application developers The Android certification compatibility program : The source code to the Android software stack The Compatibility Definition Document (CDD), representing the "policy" aspect of compatibility The Compatibility Test Suite (CTS), representing the "mechanism" of compatibility What is the role of Android Market in compatibility? Devices that are Android compatible may seek to license the Android Market client software to become part of the Android app ecosystem. This option isn't available to devices that aren't compatible Wind River. All Rights Reserved.

20 Why and when to certify a device The Android Compatibility Program is optional Anyone can use it to build any kind of device using Android and not looking to certify it If a manufacturer wishes to use the Android name with their product, or wants access to Android Market, they must first demonstrate that the device is compatible Google apps for Android, such as YouTube, Google Maps and Navigation, Gmail, and so on are Google properties that are not part of Android, and are licensed separately Wind River. All Rights Reserved.

21 What about not getting the Android certification Non certifiable devices can run Android applications (but not guarantee to run all of them) Variation of tablets-like devices will not require Google certification. However they can t be advertised as Android device and will not have access to Google Market Place Multiple application stores, (like Motorola and Samsung), are considered as "healthy competition". Today Google doesn t commit to certify devices that are not consumer (as Automotive or A&D), therefore they don t want to license Google Marketplace (GMS) even tough they will pass 100% CTS and CDD Wind River. All Rights Reserved.

22 The different flavor of Android devices Google Branded (Nexus one, Galaxy S) Google apps Google default ui No middleware customization CTS compliant (Desire S, Droid X) Google apps Custom UI possible Custom apps and middleware Custom (Acer netbook, Archos Tablets gen8) No Google apps Everything can be customized Wind River. All Rights Reserved.

23 Best model is to focus on first device, then others follow Google Release Device Alpha Release Device Beta Release Device Final Release First Device n Devices Second Device 23 Wind River Confidential 2011 Wind River. All Rights Reserved

24 Efficiencies Realized for Multiple Devices and Carriers Amount of Effort for Android Upgrade Android Device 1 Android Device 2 Android Device 3 Android Device 4 Effort decreases for each device based on BOM similarity among devices Number of devices per product line 24 Wind River Confidential 2011 Wind River. All Rights Reserved

25 Technical Reasons for Choosing Android Wind River. All Rights Reserved.

26 Android key advantages and main issues? Technological advantages Based on Linux and Java Open source platform Large market space (millions of applications) Complete Multimedia stack Ready to go solution for wireless internet connected devices Technological issues: Lack of visibility into the Roadmap dictated by Google Discretional access to the code from one version to another Difficulties to have patches accepted by Google Wind River. All Rights Reserved.

27 Android Embedded devices and beyond Virtualization Security Vertical market specific issues Wind River. All Rights Reserved.

28 Security Threat Vectors Information Assurance and Cyber Security Information Assurance Managing risks related to the use, storage, and transmission of information Cyber Security Protecting computer system services from disruption, corruption, and unplanned behavior Wind River. All Rights Reserved.

29 Central Security Vulnerabilities API s System Applications Data Prevent Bypassing of Standard Functions Protect Against System Disruption or Corruption Eliminate Unauthorized Application Execution/Update Protect Against Data Disclosure or Corruption Broad Security Threat Vectors with Unknown Objectives Wind River. All Rights Reserved.

30 Eliminating Security Vulnerabilities Wind River Security Approach Threat Assessment Security Optimized Design Secure Runtime Selection Application Protection Development Lifecycle & Tools System Management Complete Device Security Assessment Separation of System Components Use of Security- Enabled Features Certified Runtime Platform (Hypervisor and OS) Hardened/Certi fied Middleware Use of whitelisting Incorporate reputation aware application behavior Use of code analysis tools Security Test Suites What-If Vulnerability Analysis Config & Provisioning System Updates Security Policy Mgmt Wind River. All Rights Reserved.

31 Android Security Trends Android Security Vulnerabilities in the press A good number of patches have rolled out to counter threats Very good descriptions on how compromises have occurred Google has taken some action Enterprise Level Security Google making progress here with Gingerbread and ICS 3 rd parties extending Android adoption in Enterprise DoD Level Security Lots of published interest and activity SEAndroid pushed to open source Google appears to be accepting some contributions Wind River. All Rights Reserved.

32 Wind River and Android Security Wind River as system integrator For leading-edge commercial security solutions identified by customer or WRS partners Wind River as solution provider Kernel and HAL layer optimizations Based on deep Linux kernel expertise Meeting customerspecific, confidential requirements Android applications AV and malware mitigation Managed application execution Secure app stores Android middleware Permissions Remote wipe, update and restore Dalvik security HAL and Linux Kernel security Secure Linux kernel implementations Silicon-specific implementations (Trustzone, etc ) Wind River. All Rights Reserved.

33 Virtualization in Embedded Android Consolidation: Reduce the number, size, weight, and power of application-specific devices by consolidating disparate functionality onto common hardware. Performance: Increase the speed and functionality of your systems while decreasing the power requirements. Separation (safety/security): Isolate certified applications from noncertified applications to retain certification levels while extending functionality. Migration to new platforms: Extend existing functionality, leveraging legacy applications and stacks while adding new functionality. Preserve investment in existing products while adding new differentiated features in new isolated application stacks Wind River. All Rights Reserved.

34 Example of virtualization use cases In-vehicle infotainment: consolidate head unit (Android), realtime (e.g. cluster displays), and/or instant-on/safety-critical (e.g., rear-view camera) Software-defined radio: real-time/safety-critical alongside Android Health: isolate and secure sensitive patient information per HIPAA on mobile devices, e.g., electronic medical records management by physicians Real-time: Using a separate virtual board for real-time activities IP separation: Isolating GPL and LGPL components from proprietary ones Multiuser: Separating work and personal activities 34

35 Wind River and Android

36 Android and Wind River Wind River, OHA member from the begining Contributed to Android since 2005, OHA founding member : 7 designs at MWC 2007 Pushed new features to Android with device manufacturers or operators Code maintainer for ALSA and V4L2, Linux kernel maintainer 1st commercialization partner One technical meeting / week with dedicated Google Android team Wind River Android expertise Android everywhere : mobile, industrial, defense & security, and automotive projects on going Design architecture : specification, audit, implementation Ux modification : UI, gesture, new input methods Enhancements and modifications from kernel to user space 50+ Android Projects since 2007 Wind River Android related offering Wind River Platform for Android Wind River FAST for Android, including STP plugin and compliance test solution Android application training Worldwide Profesionnal services, consulting, support Wind River. All Rights Reserved.

37 Wind River & Android 1. 5 years Regular engineering sync with Google program contributions Contributed to enablement of several hundred Android SKUs development centers worldwide China, Korea, Romania, US, Canada, France, Sweden, Germany 4. Customers span entire value chain Silicon, device manufacturer, operator, SW vendor and integrators 5. Mobile & non-mobile Android devices Wind River. All Rights Reserved.

38 Wind River Solutions for Android 1. Commercial, compliant platform 2. Pre-integrated ecosystem 3. Automated test framework 4. Virtualization support 5. Solutions for Security 6. Customization/optimization services 7. Worldwide support Wind River. All Rights Reserved.

39 Summary - Why Wind River? Semi Vendor Relationship Industry Consortium Leadership Local Delivery with Global Support The Best Android Experts Available for Customer Projects Wind River. All Rights Reserved.

40 Thank You Thank You 40

Android Everywhere. Cristina Segal, EMEA Director Android Solutions GM Android testing tools

Android Everywhere. Cristina Segal, EMEA Director Android Solutions GM Android testing tools Android Everywhere Cristina Segal, EMEA Director Android Solutions GM Android testing tools Trends on connected devices* Bigger and richer computing experiences are ahead, driven by connected usages Connecting

More information

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly

More information

BUILDING the VIRtUAL enterprise

BUILDING the VIRtUAL enterprise BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,

More information

Open Source in Automotive Infotainment

Open Source in Automotive Infotainment Open Source in Automotive Infotainment Taeyong Kim (ty.kim@windriver.com) Services & Solutions Wind River Systems 2015 Wind River. All Rights Reserved. Why using Open Source in IoT? Internet of Things

More information

Windows 10 IoT Overview. Microsoft Corporation

Windows 10 IoT Overview. Microsoft Corporation Windows 10 IoT Overview Microsoft Corporation 25 $7.2 BILLION TRILLION Connected things will by 2020 be in use by 2020 worldwide market for IoT solutions IDC: Worldwide and Regional Internet of Things

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

IJRDTM Kailash ISBN No Vol.17 Issue

IJRDTM Kailash ISBN No Vol.17 Issue ABSTRACT ANDROID OPERATING SYSTEM : A CASE STUDY by Pankaj Research Associate, GGSIP University Android is a software stack for mobile devices that includes an operating system, middleware and key applications.

More information

IoT Market: Three Classes of Devices

IoT Market: Three Classes of Devices IoT Market: Three Classes of Devices Typical Silicon BOM PC-Like Embedded Devices ~100 million units ATM, Retail Point of Service Intel Core $100+ Smart Things ~800 million units PLC, Edge Gateway, Thermostat

More information

Smart Data Center Solutions

Smart Data Center Solutions Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,

More information

ENHANCING INTELLIGENCE IN THE INTERNET OF THINGS The Business of Embedded Virtualization Alexander Damisch, Director, Industrial Vertical, Wind River

ENHANCING INTELLIGENCE IN THE INTERNET OF THINGS The Business of Embedded Virtualization Alexander Damisch, Director, Industrial Vertical, Wind River ENHANCING INTELLIGENCE IN THE INTERNET OF THINGS The Business of Embedded Virtualization Alexander Damisch, Director, Industrial Vertical, Wind River INNOVATORS START HERE. EXECUTIVE SUMMARY A key driver

More information

IT Consulting and Implementation Services

IT Consulting and Implementation Services PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from

More information

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

Get more out of technology starting day one. ProDeploy Enterprise Suite

Get more out of technology starting day one. ProDeploy Enterprise Suite Enterprise Suite Get more out of technology starting day one 1 Secure the path to a future-ready data center The landscape faced by IT managers and business leaders today can be daunting to navigate. Continually

More information

Cloud-Enable Your District s Network For Digital Learning

Cloud-Enable Your District s Network For Digital Learning Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

IoT and the Role of PLATFORMS. Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D

IoT and the Role of PLATFORMS. Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D IoT and the Role of PLATFORMS Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D 1 The Future is IoT IoT will touch every market Key Manufacturer Driving Factors Competitive

More information

Car Connectivity Consortium. MirrorLink and the Connected Car

Car Connectivity Consortium. MirrorLink and the Connected Car Car Connectivity Consortium MirrorLink and the Connected Car 1 Agenda Landscape for Smartphone Integration into Cars Car Connectivity Consortium MirrorLink Technology Certification Applications 2 Landscape

More information

Data Protection Everywhere. For the modern data center

Data Protection Everywhere. For the modern data center Data Protection Everywhere For the modern data center Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright

More information

Transforming the way people watch TV

Transforming the way people watch TV Transforming the way people watch TV Nokia Siemens Networks Ubiquity Multiscreen TV Platform - Executive summary An open solution for delivering TV and Internet as a single service on any device over any

More information

The Digital Operator How do operators transform to a full Service Strategy

The Digital Operator How do operators transform to a full Service Strategy The Digital Operator How do operators transform to a full Service Strategy Telecom and cable operators have greatly benefited from the explosive adoption and utilization of mobile services More people

More information

Security and Performance Benefits of Virtualization

Security and Performance Benefits of Virtualization Security and Performance Benefits of Virtualization Felix Baum mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered

More information

Cisco 5G Now! Product Announcements. February, 2018

Cisco 5G Now! Product Announcements. February, 2018 Cisco 5G Now! Product Announcements February, 2018 Mobile Cloud Services 2017 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application Access (%) Displacing Legacy, Mobile

More information

Embedded Software: Its Growing Influence on the Hardware world

Embedded Software: Its Growing Influence on the Hardware world Embedded Software: Its Growing Influence on the Hardware world ISA Vision Summit 2009, Bangalore 16 th FEB 09 V. R. Venkatesh Head, Product Engineering Services, Wipro Technologies. Wipro in Product Engineering

More information

Securing Your Most Sensitive Data

Securing Your Most Sensitive Data Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way

More information

I D C T E C H N O L O G Y S P O T L I G H T. V i r t u a l and Cloud D a t a Center Management

I D C T E C H N O L O G Y S P O T L I G H T. V i r t u a l and Cloud D a t a Center Management I D C T E C H N O L O G Y S P O T L I G H T Orchestration S i m p l i f i es and Streamlines V i r t u a l and Cloud D a t a Center Management January 2013 Adapted from Systems Management Software Purchasing

More information

Mobile Computing. Juha-Matti Liukkonen, Nov 17, 2010

Mobile Computing. Juha-Matti Liukkonen, Nov 17, 2010 Mobile Computing Juha-Matti Liukkonen, Nov 17, 2010 1 Contents Mobile Computing revolution Structural impact of device evolution A look into Mobile Linux 2 Mobile Computing revolution 3 Pocketable power

More information

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

Services for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam

Services for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam Services for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam Practice Leader : Borderless Network Architecture APJC Services Agenda Priorities & Smart Solutions Innovation and

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

CenturyLink for Microsoft

CenturyLink for Microsoft Strategic Partner Alliances CenturyLink for Microsoft EMPOWER REACH AGILITY 2017 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product names are the property

More information

Silicon Labs Corporate Overview

Silicon Labs Corporate Overview Silicon Labs Corporate Overview APRIL 2018 The leader in silicon, software and solutions for a smarter, more connected world. A World-Class Design Culture In 1996, a visionary group of engineers pioneered

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE.

JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE. JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE. EXECUTIVE SUMMARY There s little question that advances in therapeutic technologies have

More information

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Lynn Anderson Senior Vice President, Communications Chief Communications Officer Chief of Staff Bill Veghte Chief Operating Officer, HP Lynn Anderson Senior Vice President, Communications Chief Communications

More information

Linux Community Project Leaders Unite. Peter Vescuso EVP Marketing, Bus Dev Black Duck Software

Linux Community Project Leaders Unite. Peter Vescuso EVP Marketing, Bus Dev Black Duck Software Linux Community Project Leaders Unite Peter Vescuso EVP Marketing, Bus Dev Black Duck Software Agenda Trends Communities of communities Linux Community Projects 2 Innovation and FOSS - A Virtuous Circle

More information

LESSONS LEARNED IN SMART GRID CYBER SECURITY

LESSONS LEARNED IN SMART GRID CYBER SECURITY LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

NEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE FROM PROOF-OF-CONCEPT TO START-OF-PRODUCTION

NEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE FROM PROOF-OF-CONCEPT TO START-OF-PRODUCTION DRIVING CONNECTED NEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE VNC Automotive deliver ingenious connectivity and telematics middleware for the vehicles of tomorrow. Our solutions enable

More information

Linux and Open Source in Samsung

Linux and Open Source in Samsung Toward Soft Driven Company Linux and Open Source in Samsung 2012/ 10 /10 Samsung Software R&D Center VP WonJoo Park 2012 SAMSUNG Electronics Co. What does Software mean to Samsung? In the past, Means for

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

DATA SHEET HIGHTLIGHTS Deploying a Single System to Manage All Devices and Services Implementing Service Assurance

DATA SHEET HIGHTLIGHTS Deploying a Single System to Manage All Devices and Services Implementing Service Assurance Motorola EDGE Service Assurance Software Suite The allows service providers to expand broadband service revenues while reducing operational and support costs through automated service provisioning and

More information

Security for Secure IoT: Advanced Architectures for IoT Gateways. Simon Forrest Director of Segment Marketing, Consumer Electronics

Security for Secure IoT: Advanced Architectures for IoT Gateways. Simon Forrest Director of Segment Marketing, Consumer Electronics Security for Secure IoT: Advanced Architectures for IoT Gateways Simon Forrest Director of Segment Marketing, Consumer Electronics www.imgtec.com Imagination Technologies Company overview A world leader

More information

FLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD

FLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD FLUID COMPUTING IN A SOFTWARE-DEFINED WORLD ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River Chemical Sector Commercial Building Sector Communications Sector Critical Manufacturing

More information

WIND RIVER NETWORKING SOLUTIONS

WIND RIVER NETWORKING SOLUTIONS WIND RIVER NETWORKING SOLUTIONS TRANSFORMING THE NETWORK Businesses of all kinds are benefitting from the transformation of the networks they rely on, from LANs to WANs. Those network transformations are

More information

Overview. Solution Partner Opportunity. Transactional Partner Opportunity. OEM Partner Opportunity. Next Steps. Appendix

Overview. Solution Partner Opportunity. Transactional Partner Opportunity. OEM Partner Opportunity. Next Steps. Appendix Overview Solution Partner Opportunity Transactional Partner Opportunity OEM Partner Opportunity Next Steps Appendix Intelligent systems market 1.5 billion units in 2012 is already 68% larger than the

More information

Transformation Through Innovation

Transformation Through Innovation Transformation Through Innovation A service provider strategy to prosper from digitization People will have 11.6 billion mobile-ready devices and connections by 2020. For service providers to thrive today

More information

JBoss Enterprise Middleware

JBoss Enterprise Middleware JBoss Enterprise Middleware Making software from the open source community ready for the enterprise DLT Solutions 2411 Dulles Corner Park, Suite 800 Herndon, VA 20171 Web: www.dlt.com Phone: 703-709-7172

More information

24th MONDAY. Overview 2018

24th MONDAY. Overview 2018 24th MONDAY Overview 2018 Imagination: your route to success At Imagination, we create and license market-leading processor solutions for graphics, vision & AI processing, and multi-standard communications.

More information

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS

More information

RTOS, Linux & Virtualization Wind River Systems, Inc.

RTOS, Linux & Virtualization Wind River Systems, Inc. taeyong.kim@windriver.com RTOS, Linux & Virtualization 2008 Wind River Systems, Inc. Simple Board Simple Code 2 2008 Wind River Systems, Inc. start: /* disable interrupts in CPU and switch to SVC32 mode

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration Dr. Andreas Hauser Director Digital Service, TÜV SÜD Tokyo, 21 February 2017 Corporate Profile Slide 2 Our heritage: 150

More information

Maximum Security with Minimum Impact : Going Beyond Next Gen

Maximum Security with Minimum Impact : Going Beyond Next Gen SESSION ID: SP03-W10 Maximum Security with Minimum Impact : Going Beyond Next Gen Wendy Moore Director, User Protection Trend Micro @WMBOTT Hyper-competitive Cloud Rapid adoption Social Global Mobile IoT

More information

Nokia for developers. Alexey Kokin. Developer Relations

Nokia for developers. Alexey Kokin. Developer Relations Nokia for developers Alexey Kokin Developer Relations alexey.kokin@nokia.com Agenda Nokia Platforms and changes due to MSFT deal WP7 Symbian Meego S40 Qt update Ovi Store update 2 Strategy shift in brief

More information

Cisco Connected Factory Accelerator Bundles

Cisco Connected Factory Accelerator Bundles Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment

More information

Improving Security in Embedded Systems Felix Baum, Product Line Manager

Improving Security in Embedded Systems Felix Baum, Product Line Manager Improving Security in Embedded Systems Felix Baum, Product Line Manager The Challenge with Embedded Security Business Imperatives Security Imperatives I need to keep my production expenses as low as possible.

More information

ProDeploy Suite. Accelerate enterprise technology adoption with expert deployment designed for you

ProDeploy Suite. Accelerate enterprise technology adoption with expert deployment designed for you Accelerate enterprise technology adoption with expert deployment designed for you 1 Shift resources to innovate and drive better business outcomes The landscape faced by IT managers and business leaders

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Why is Office 365 the right choice?

Why is Office 365 the right choice? Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

Conquer New Digital Frontiers with leading Public Cloud Platforms.

Conquer New Digital Frontiers with leading Public Cloud Platforms. Singtel Business Product Factsheet Brochure Managed Defense Public Cloud Services Conquer New Digital Frontiers with leading Public Cloud Platforms. Singtel Managed Public Cloud supports enterprises in

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance. Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do

More information

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant

More information

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy Business Challenges Investment in the Industrial Internet of Things (IIoT) is expected to top $60 trillion during the next 15 years.

More information

ARM Security Solutions and Numonyx Authenticated Flash

ARM Security Solutions and Numonyx Authenticated Flash ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware

More information

Silicon Labs Corporate Overview

Silicon Labs Corporate Overview Silicon Labs Corporate Overview MARCH 2018 The leader in silicon, software and solutions for a smarter, more connected world. A World-Class Design Culture In 1996, a visionary group of engineers pioneered

More information

Introduction to TIZEN Ecosystem

Introduction to TIZEN Ecosystem Introduction to TIZEN Ecosystem Sungjin Lee Samsung Electronics TIZEN Ecosystem What is Ecosystem? Information Promotion Device Platform Content & Service Provider (Developer) Distribution Channel (App

More information

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Cisco Cloud Application Centric Infrastructure

Cisco Cloud Application Centric Infrastructure Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified

More information

A Big Little Hypervisor for IoT Development February 2018

A Big Little Hypervisor for IoT Development February 2018 A Big Little Hypervisor for IoT Development February 2018 Contents PROJECT OVERVIEW TECHNICAL OVERVIEW GOVERNANCE JOIN US! PROJECT OVERVIEW Current State of Affairs IoT Development IoT device devices requires

More information

MOBILE OPERATING SYSTEM TRANSITION Insights and Considerations

MOBILE OPERATING SYSTEM TRANSITION Insights and Considerations MOBILE OPERATING SYSTEM TRANSITION Insights and Considerations Mobile Operating System Transition Insights and Considerations www.honeywellaidc.com 1 Introduction A shift in the mobile operating system

More information

Understanding VDI End-to-End

Understanding VDI End-to-End Understanding VDI End-to-End Cloud Client-Computing Dario Gnaccarini Sales Engineer Cloud client-computing Matteo Mazzari Principal Consultant Services Compute continues to change 3 Billion people worldwide

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

OCTOBER 2016 TELIT WHITE PAPER

OCTOBER 2016 TELIT WHITE PAPER OCTOBER 2016 TELIT WHITE PAPER TELIT INTELLIGENT MODULES HARNESS THE POWER OF INTEL ATOM TM x3 PROCESSORS TO PROVIDE IoT DEVELOPERS WITH UNRIVALLED CHOICE, FLEXIBILITY & PERFORMANCE. CONTENTS INTRODUCTION

More information

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Device Discovery for Vulnerability Assessment: Automating the Handoff

Device Discovery for Vulnerability Assessment: Automating the Handoff Device Discovery for Vulnerability Assessment: Automating the Handoff O V E R V I E W While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are

More information

Customer Case Studies on Accelerating Their Path to Hybrid Cloud

Customer Case Studies on Accelerating Their Path to Hybrid Cloud Customer Case Studies on Accelerating Their Path to Hybrid Cloud Hitachi and VMware: Global Strategic Partners Committed to Success Sunny Sahajpal EMEA Strategic Alliances and OEM Mananger VMware Partner

More information

Mobile Devices prioritize User Experience

Mobile Devices prioritize User Experience Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile

More information

New Digital Business Models Driving the Softwarization of the Network

New Digital Business Models Driving the Softwarization of the Network New Digital Business Models Driving the Softwarization of the Network Marc Halbfinger January 2018 Here To Serve Headquartered in Hong Kong PCCW consolidated 2016 Revenue: US$4.9 billion HKT 2016 Revenue:

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Preparing your network for the next wave of innovation

Preparing your network for the next wave of innovation Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Secure & Unified Identity

Secure & Unified Identity Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong

More information

WEB DESIGN SERVICES. Google Certified Partner. In-Studio Interactive CEO: Onan Bridgewater. instudiologic.com.

WEB DESIGN SERVICES. Google Certified Partner. In-Studio Interactive CEO: Onan Bridgewater. instudiologic.com. In-Studio Interactive CEO: Onan Bridgewater instudiologic.com sales@instudiologic.com info@instudiologic.com WEB DESIGN SERVICES Google Certified Partner 1. Brand Building Engagements that Drive Sales

More information

Guide Series. How to upgrade to Microsoft Windows 10? Guide Series

Guide Series. How to upgrade to Microsoft Windows 10? Guide Series How to upgrade to Microsoft Windows 10? Acuutech All rights reserved 2016 1 Contents Introduction... 2 Why use Windows 10?... 3 What are the advantages of Windows 10?... 4 Windows 10 editions comparison...

More information

A Guide to Closing All Potential VDI Security Gaps

A Guide to Closing All Potential VDI Security Gaps Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.

More information

Cyber Risk and Networked Medical Devices

Cyber Risk and Networked Medical Devices Cyber Risk and Networked Medical Devices Hot Topics Deloitte & Touche LLP February 2016 Copyright Scottsdale Institute 2016. All Rights Reserved. No part of this document may be reproduced or shared with

More information

Proven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid

Proven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid Proven results Unsurpassed interoperability Fast, secure and adaptable network Only EnergyAxis brings it all together for the Smart Grid Outage management & restoration Elster global strength Demand response

More information

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities SESSION ID: SBX3-W1 Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities Gary Hayslip Deputy Director, CISO City of San Diego, CA @ghayslip City of San Diego by the Numbers 11,000+

More information

Express Monitoring 2019

Express Monitoring 2019 Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities

More information