EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC
|
|
- Sheryl Lee
- 5 years ago
- Views:
Transcription
1 EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC
2 PUBLIC 2
3 Key concerns with IoT.. PUBLIC 3
4 Why Edge Computing? CLOUD Too far away Expensive connectivity EDGE Real-time Increased privacy Offline operation IoT NODES Massive data Mission-critical PUBLIC 4
5 Edge Compute use-cases Security, Building automation Face-recognition, object recognition, pattern detection, temperature, lighting controls Fleet Management Tracking, location, temperature, road conditions, optimized routing Cloud-based Deployment & Management Industrial Analytics Real-time data acquisition, analytics, inventory control, Real-time object recognition, asset tracking. Retail (Inventory Management) Analytics, monitoring, inventory tracking, warehouse management. Healthcare Tracking, analysis, privacy-filtering, emergency response. Retail (Consumer personalization) Face recognition, pattern identification, personalized shopping, targeted ad insertion, product recommendations. PUBLIC 5
6 E.g. Home and Building Automation Services Stream Analytics AI / ML Voice Triggers & Instant translation Service Media-server Home automation & security Network Security Services Analytics, Content insertion Virtual Assistant (e.g. Alexa) Benefits Eliminate need for separate equipment. DRM management simplified Eliminate need for separate Automation/IoT gateway. Better credential management, critical operations control, privacy control. Offer value added service to generate additional revenue Real-time action based on usage pattern detection. Data collection restricted to customer (privacy). Centralize information within gateway, real-time response, privacy. 3 rd Party Applications Create infrastructure for value-added services PUBLIC 6
7 Where is the Edge? Media Nodes AWS App Customer Solution Azure App SW Platform Application Framework Linux Platform Firmware Aliyun App Edge computing is the application of cloud technology outside a large data center. Network Cloud Amazon AWS Smart Nodes (Control) Microsoft Azure Smart-nodes can run targeted Edge applications Edge Gateway (Control, Analytics, Machine-Learning) Network Infrastructure (Aggregation, Analytics) Google Cloud Sensor Nodes Gateways are a natural host for Edge computing right balance of Compute, Connectivity and Storage Edge applications can also run on access e.g. Basestations, Central Office costlier pipe, higher latency. AliYun PUBLIC 7
8 Management and Security Challenges SOLUTION: CLOUD-BASED MANAGEMENT AND SECURITY FOR EDGE Manage devices, apps remotely provisioning, upgrades TRADITIONAL PC, MOBILE DEVICES Multiple authentication mechanisms Cloud-based security and application management EDGE COMPUTING DEVICES Traditionally embedded devices Not physically accessible, or lack display Can be many (10s, 100s, 1000s) per user PUBLIC 8
9 Device Mgmt Applications Device vs. Application Management Cloud Cloud Applications Applications Edge Applications AliYun Google Cloud Amazon AWS Microsoft Azure Embedded Applications Edge Compute Framework Operating System Application Management Service Customer have choice for Application Management AWS, Azure, Aliyun, Google Home-grown or 3 rd Party Device Management Device Provisioning Device Management Service EdgeScale provides Device Management Security via Hardware Root of Trust Edge Gateway Cloud PUBLIC 9
10 EdgeScale Device Management EdgeScale Device Management Remotely Manage Edge Compute nodes deployed anywhere in the world Common Portal Enrollment, Firmware updates, Container Deployment, Device Monitoring & More PUBLIC 10
11 Virtualization Technologies Best Suited for Edge Computing Container Container Container CPUs I/O Guest OS Virtual Hardware Memory CPUs Linux Kernel I/O Guest OS Virtual Hardware Memory App App App LXC Docker Docker Linux Kernel CPUs I/O Memory CPUs I/O Memory Hardware Hardware KVM Linux kernel driver to spin up VMs Complete CPU, Memory, I/O virtualization. Ability to run Multiple OS within VMs Requires significant memory, CPU Orchestration via OpenStack, ONF Linux Containers Docker, LXC Application-level virtualization Leverages underlying Linux kernel for IO, storage. Lightweight overhead compared to KVM Orchestration via Kubernetes or OpenStack. Best Suited for Cloud Computing PUBLIC 11
12 Edge Computing Frameworks IBM Cloud AliYun Google Cloud Microsoft Azure Private Cloud Amazon AWS IBM Apps AliYun Apps Google Apps Azure Apps Customer Apps AWS Apps AWS Apps IBM IoT SDK Docker Alibaba IoT SDK Docker Google IoT SDK Docker Azure IoT SDK Docker Private IoT SDK Docker AWS IoT SDK Docker Greengrass Docker Engine Protocol Adaptor Data processing Data filter Cgroup, Namespace File-System Network Stack Ethernet, Crypto Kernel Trust Zone Device Mgmt Common Platform... PUBLIC 12
13 Security Requirements for the Edge CHAIN OF TRUST Security starts with hardware root of trust End-to-end security is a chain of inter-locked security elements 01 Manufacturing 02 Enrollment 03 Device Monitoring Credentials may be installed in on-chip Layerscape fused memory or via external Element 04 Container Deployment 05 Application Deployment SECURE DEVICE MANAGEMENT manufacturing enrollment device monitoring and firmware management container deployment app management and deployment PUBLIC 13
14 Hardware Root of Trust Hardware based security features to ease the development of trustworthy systems All Layerscape SoCs support Trust Architecture General Purpose Processor General Purpose Processor DDR Controller Manufacturing Protection Boot Battery Back-up Security Fuses PreBoot Loader HV MMU ARM TrustZone HV MMU Coherent Interconnect Strong Partitioning Storage Security Monitor IOMMU IOMMU Tamper Detect(s) Internal BootROM Power Mgmt SD/MMC SPI DUART I 2 C IFC USB SATA Clocks/Reset SEC Engine Crypto, RNG Keys UID, Runtime Integrity Check Mgmt Control QMan BMan AIOP FMAN WRIOP Eth, PCI Debug Controller Real Time Debug Watchpoint Perf Monitor Aurora CoreNet Trace Tamper Detection 6 5 Debug 4 3 Key Revocation Key Protection CCSR GPIO Security sub-system Data-path sub-system PUBLIC 14
15 Chain of Trust Unique ID Public/Private Key Signed Provisioning Image Enrollment Device Certificate Signed Firmware Image Signed Firmware updates Containers AWS/Azure certificate Signed Containers Payment Signed Applications Manufacturing Device Monitoring Applications Hardware forms the Root of trust. Multiple layers of tamper-detection - each level validates the next. Multiple levels of secrets can revoke at any layer. Mutual authentication between device and cloud using Asymmetric cryptography. PUBLIC 15
16 NXP Solutions for Edge Computing IoT Nodes Edge Gateways Cloud Infrastructure HOME GATEWAY ETHERNET SWITCH Data Analytics Machine Learning WIRELESS ROUTER INDUSTRIAL CONTROLLER Customer Solution App App App NXP SW Platform Middleware RTOS, Linux, Android Application Management Device Management Multiple Cloud Frameworks NXP Kinetis, i.mx Family NXP Layerscape, i.mx Family NXP EdgeScale Suite PUBLIC 16
17 Summary IoT deployments are driving Edge Computing. Edge Computing provides real-time, offline operation, privacy and cost-reduction. Edge Gateways need to be securely managed from the cloud. Edge Gateways need to support multiple Edge compute frameworks. Security is a chain of trust starting from the Hardware. EdgeScale provides a solution for securely managing Edge Gateways. PUBLIC 17
18 NXP and the NXP logo are trademarks of NXP B.V. All other product or service names are the property of their respective owners NXP B.V.
MAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP
MAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP APR 2018 MARC GEBERT EMEA IOT SECURITY BD LEAD SENIOR DIRECTOR Secure Connections for the Smarter World Everything Smart Everything
More informationComputing at the Edge
Computing at the Edge Joseph Byrne Strategic Marketing for NXP Digital Networking November 2018 Company Public NXP, the NXP logo, and NXP secure connections for a smarter world are trademarks of NXP B.V.
More informationQorIQ P4080 Software Development Kit
July 2009 QorIQ P4080 Software Development Kit Kelly Johnson Applications Engineering service names are the property of their respective owners. Freescale Semiconductor, Inc. 2009. QorIQ P4080 Software
More informationBeyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationSmartNICs: Giving Rise To Smarter Offload at The Edge and In The Data Center
SmartNICs: Giving Rise To Smarter Offload at The Edge and In The Data Center Jeff Defilippi Senior Product Manager Arm #Arm Tech Symposia The Cloud to Edge Infrastructure Foundation for a World of 1T Intelligent
More informationAn Introduction to the QorIQ Data Path Acceleration Architecture (DPAA) AN129
July 14, 2009 An Introduction to the QorIQ Data Path Acceleration Architecture (DPAA) AN129 David Lapp Senior System Architect What is the Datapath Acceleration Architecture (DPAA)? The QorIQ DPAA is a
More informationAccelerating intelligence at the edge for embedded and IoT applications
Accelerating intelligence at the edge for embedded and IoT applications Arm Tech Symposia 2017 Agenda The emergence of intelligence at the edge Requirements for intelligent edge computing IP and technologies
More informationIoT It s All About Security
IoT It s All About Security Colin Walls colin_walls@mentor.com Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark of Linus Torvalds
More informationLaunch Smart Products With End-to-End Solutions You & Your Customers Can Trust
Solution Brief: Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust DeviceTone, our ready to run "connect, manage and enable" solution for product companies, makes secure connectivity,
More informationCloud & container monitoring , Lars Michelsen Check_MK Conference #4
Cloud & container monitoring 04.05.2018, Lars Michelsen Some cloud definitions Applications Data Runtime Middleware O/S Virtualization Servers Storage Networking Software-as-a-Service (SaaS) Applications
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationTRESCCA Trustworthy Embedded Systems for Secure Cloud Computing
TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing IoT Week 2014, 2014 06 17 Ignacio García Wellness Telecom Outline Welcome Motivation Objectives TRESCCA client platform SW framework for
More informationNXP MICROCONTROLLER INNOVATION CLOUD CONNECTIVITY WITH AWS & LPC54018
NXP MICROCONTROLLER INNOVATION CLOUD CONNECTIVITY WITH AWS & LPC54018 JUNE 2018 PUBLIC AGENDA MCU Introduction Cloud Connectivity Applications and challenges we re solving together Introducing Amazon FreeRTOS
More informationLINUX CONTAINERS. Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER
Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Flexible and connected platforms are core components in leading computing fields, including
More informationFreescale s definition:
October 2013 Freescale s definition: A Trustworthy system is a system which does what its stakeholders expect it to do, resisting attackers with both remote and physical access, else it fails safe. Freescale
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationTrustzone Security IP for IoT
Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Sr. Technical Marketing Manager Tech Symposia China 2015 November 2015 Agenda Introduction Security Foundations on ARM Cortex -M Security Foundations
More information#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication
More informationThe Next Steps in the Evolution of Embedded Processors
The Next Steps in the Evolution of Embedded Processors Terry Kim Staff FAE, ARM Korea ARM Tech Forum Singapore July 12 th 2017 Cortex-M Processors Serving Connected Applications Energy grid Automotive
More informationBeyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop
Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Part2 Security Enclaves Tech Seminars 2017 Agenda New security technology for IoT Security Enclaves CryptoIsland
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Rob Coombs Security Marketing Director TechCon 11/10/15 Agenda Introduction Security Foundations on Cortex-M Security Foundations on Cortex-A Use cases
More informationARM Security Solutions and Numonyx Authenticated Flash
ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Senior Technical Marketing Manager Shenzhen / ARM Tech Forum / The Ritz-Carlton June 14, 2016 Agenda Introduction Security Foundations on Cortex-A
More informationHow to Route Internet Traffic between A Mobile Application and IoT Device?
Whitepaper How to Route Internet Traffic between A Mobile Application and IoT Device? Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. Approach: 1 Uses AWS IoT Setup
More informationPerformance Analysis with Hybrid Simulation
6 th November, 2008 Performance Analysis with Hybrid Simulation PN111 Matthew Liong System and Application Engineer, NMG owners. Freescale Semiconductor, Inc. 2008. r2 Overview Hybrid Modeling Overview
More informationTrusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague
Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July 2017 -- IETF 99 th, Prague 2 What do we mean by security? Communication Security Aims
More informationWindows 10 IoT Core Azure Connectivity and Security
Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a
More informationmbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017
mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security
More informationAWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect
AWS IoT Overview July 2016 Thomas Jones, Partner Solutions Architect AWS customers are connecting physical things to the cloud in every industry imaginable. Healthcare and Life Sciences Municipal Infrastructure
More informationScalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018
Scalable and Flexible Software Platforms for High-Performance ECUs Christoph Dietachmayr Sr. Engineering Manager, November 8, Agenda A New E/E Architectures and High-Performance ECUs B Non-Functional Aspects:
More informationAn Intelligent NIC Design Xin Song
2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) An Intelligent NIC Design Xin Song School of Electronic and Information Engineering Tianjin Vocational
More informationHigh-Performance, Highly Secure Networking for Industrial and IoT Applications
High-Performance, Highly Secure Networking for Industrial and IoT Applications Table of Contents 2 Introduction 2 Communication Accelerators 3 Enterprise Network Lineage Features 5 Example applications
More informationMaximizing heterogeneous system performance with ARM interconnect and CCIX
Maximizing heterogeneous system performance with ARM interconnect and CCIX Neil Parris, Director of product marketing Systems and software group, ARM Teratec June 2017 Intelligent flexible cloud to enable
More informationARM mbed Towards Secure, Scalable, Efficient IoT of Scale
ARM mbed Towards Secure, Scalable, Efficient IoT of Scale Kirsi Maansaari Product Manager, ARM Copenhagen/Embedded Everywhere 2016 Faster route to secure IoT from chip to cloud Announced at ARM TechCon
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationOpenNebula on VMware: Cloud Reference Architecture
OpenNebula on VMware: Cloud Reference Architecture Version 1.2, October 2016 Abstract The OpenNebula Cloud Reference Architecture is a blueprint to guide IT architects, consultants, administrators and
More informationNew Approaches to Connected Device Security
New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the
More informationSecurity and Performance Benefits of Virtualization
Security and Performance Benefits of Virtualization Felix Baum mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered
More informationIndustry-leading Application PaaS Platform
Industry-leading Application PaaS Platform Solutions Transactional Apps Digital Marketing LoB App Modernization Services Web Apps Web App for Containers API Apps Mobile Apps IDE Enterprise Integration
More informationQualys Cloud Platform
18 QUALYS SECURITY CONFERENCE 2018 Qualys Cloud Platform Looking Under the Hood: What Makes Our Cloud Platform so Scalable and Powerful Dilip Bachwani Vice President, Engineering, Qualys, Inc. Cloud Platform
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationA Developer's Guide to Security on Cortex-M based MCUs
A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone
More informationBuilding a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017
Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017 Trust is vital and it s what we provide enabling our clients to deliver
More informationIoT Edge within the IoT Framework
IoT Edge within the IoT Framework Axel Dittmann Diplom-Betriebswirt (FH) Diplom-Wirtschaftsinformatiker (FH) Global Technical Solution Specialist IOT CISSP, MCP Twitter: @DittmannAxel Waves of Innovation
More informationCreating a Hybrid Gateway for API Traffic. Ed Julson API Platform Product Marketing TIBCO Software
Creating a Hybrid Gateway for API Traffic Ed Julson API Platform Product Marketing TIBCO Software Housekeeping Webinar Recording Today s webinar is being recorded and a link to the recording will be emailed
More informationOn-Chip Debugging of Multicore Systems
Nov 1, 2008 On-Chip Debugging of Multicore Systems PN115 Jeffrey Ho AP Technical Marketing, Networking Systems Division of Freescale Semiconductor, Inc. All other product or service names are the property
More informationIEEE Sec Dev Conference
IEEE Sec Dev Conference #23, Improving Attention to Security in Software Design with Analytics and Cognitive Techniques Jim Whitmore (former) IBM Distinguished Engineer Carlisle, PA jjwhitmore@ieee.org
More informationCloud has become the New Normal
Yip In Tsoi Cloud Cloud has become the New Normal By 2020 the distinction between public and private cloud disappears as self-built private clouds become extinct #idcgrac @craw Crawford Del Prete EVP,
More information#techsummitch
www.thomasmaurer.ch #techsummitch Justin Incarnato Justin Incarnato Microsoft Principal PM - Azure Stack Hyper-scale Hybrid Power of Azure in your datacenter Azure Stack Enterprise-proven On-premises
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationDeployment Patterns using Docker and Chef
Deployment Patterns using Docker and Chef Sandeep Chellingi Sandeep.chellingi@prolifics.com Agenda + + Rapid Provisioning + Automated and Managed Deployment IT Challenges - Use-cases What is Docker? What
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationOSIsoft Technologies for the Industrial IoT and Industry 4.0 Chris Felts, Sr. Product Manager Houston Regional Seminar, October 4, 2017
OSIsoft Technologies for the Industrial IoT and Industry 4. Chris Felts, Sr. Product Manager Houston Regional Seminar, October 4, 27 Copyright 27 OSIsoft, LLC Introduction Copyright 27 OSIsoft, LLC 2 Industry
More informationS Implementing DevOps and Hybrid Cloud
S- Implementing DevOps and Hybrid Cloud Srihari Angaluri Lenovo Data Center Group Red Hat Summit // Outline DevOps and Containers Architectural Considerations Lenovo Cloud Technology Center Implementing
More informationHow SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes
How SD-WAN will Transform the Network And lead to innovative, profitable business outcomes By 2020, more than 50 percent of WAN edge infrastructure refresh initiatives will be based on SD-WAN versus traditional
More informationBeyond TrustZone PSA. Rob Coombs Security Director. Part1 - PSA Tech Seminars Arm Limited
Beyond TrustZone PSA Rob Coombs Security Director Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security analyses Summary
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Zach Shelby VP Marketing Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon
More informationThe Zentri Secure IoT Platform
The Zentri Secure IoT Platform Zentri s Secure IoT Platform empowers industrial, commercial, and consumer product companies to securely build, launch, manage, and scale cloud-connected products. With Zentri,
More information.org. IoT Development Platform
1.org IoT Development Platform 2 Q&A How many ARM cores shipped in 2012? 8,700,000,000 Per Day: 23,835,616 Per Hour: 993,151 Per Minute: 16,553 Per Second: 276 2002 1+ billion 2011 billion 2020 25+ 150+
More informationHow to protect Automotive systems with ARM Security Architecture
How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car Successful products will be attacked
More informationAkraino & Starlingx: A Technical Overview
Akraino & Starlingx: A Technical Overview Agenda Why Edge Computing? What s Edge Computing? Akraino and Its Building Blocks StarlingX Technical Overview Collaboration in Akraino Community LC3 Beijing 2018
More informationCisco Cloud Strategy. Uwe Müller. Leader PreSales Cloud & Datacenter Germany
Cisco Cloud Strategy Uwe Müller Leader PreSales Cloud & Datacenter Germany 277X Data created by IoE devices v. end-user 30M New devices connected every week 180B Mobile apps downloaded in 2015 78% Workloads
More informationFull Scalable Media Cloud Solution with Kubernetes Orchestration. Zhenyu Wang, Xin(Owen)Zhang
Full Scalable Media Cloud Solution with Kubernetes Orchestration Zhenyu Wang, Xin(Owen)Zhang Agenda Media in the Network and Cloud Intel Media Server Reference Software Stack Container with MSS enablement
More informationIOT DEVICE MANAGEMENT: SECURE AND SCALABLE DEPLOYMENTS WITH DIGI REMOTE MANAGER
IOT DEVICE MANAGEMENT: SECURE AND SCALABLE DEPLOYMENTS WITH DIGI REMOTE MANAGER IOT DEVICE MANAGEMENT: SECURE AND SCALABLE DEPOYMENTS WITH DIGI REMOTE MANAGER INTRODUCTION 3 CHALLENGES IN THE MANAGEMENT
More informationSmart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017
Smart Antennas and : Enabling Secure Convergence July 5, 2017 About OpenSynergy OpenSynergy develops software solutions for embedded automotive systems. OpenSynergy s product portfolio includes key software
More informationARM mbed Technical Overview
ARM mbed Technical Overview Jerry Wang, FAE, ISG ARM Tech Forum Taipei July 4 th 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application
More informationSecuring Microservices Containerized Security in AWS
Securing Microservices Containerized Security in AWS Mike Gillespie, Solutions Architect, Amazon Web Services Splitting Monoliths Ten Years Ago Splitting Monoliths Ten Years Ago XML & SOAP Splitting Monoliths
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationDevOps and Continuous Delivery USE CASE
DevOps and Continuous Delivery USE CASE CliQr DevOps and Continuous Delivery Page 2 DevOps and Continuous Delivery In the digital economy, increasing application velocity is key to success. In order to
More informationCCIX: a new coherent multichip interconnect for accelerated use cases
: a new coherent multichip interconnect for accelerated use cases Akira Shimizu Senior Manager, Operator relations Arm 2017 Arm Limited Arm 2017 Interconnects for different scale SoC interconnect. Connectivity
More informationViryaOS RFC: Secure Containers for Embedded and IoT. A proposal for a new Xen Project sub-project
ViryaOS RFC: Secure Containers for Embedded and IoT A proposal for a new Xen Project sub-project Stefano Stabellini @stabellinist The problem Package applications for the target Contain all dependencies
More informationAgenda. AWS Database Services Traditional vs AWS Data services model Amazon RDS Redshift DynamoDB ElastiCache
Databases on AWS 2017 Amazon Web Services, Inc. and its affiliates. All rights served. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon Web Services,
More informationARM mbed mbed OS mbed Cloud
ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics
More informationSão Paulo. August,
São Paulo August, 28 2018 Going Cloud Native with Cloud Foundry Luis Macedo Sr Platform Engineer, Pivotal @luis0macedo What is Cloud Native Platform? - A platform that delivers predictable deployment
More informationThe Integrated Smart & Security Platform Powered the Developing of IOT
The Integrated Smart & Security Platform Powered the Developing of IOT We Are Entering A New Era- 50million connections Smart-Healthcare Smart-Wearable VR/AR Intelligent Transportation Eco-Agriculture
More informationProfiling and Debugging OpenCL Applications with ARM Development Tools. October 2014
Profiling and Debugging OpenCL Applications with ARM Development Tools October 2014 1 Agenda 1. Introduction to GPU Compute 2. ARM Development Solutions 3. Mali GPU Architecture 4. Using ARM DS-5 Streamline
More informationCloud I - Introduction
Cloud I - Introduction Chesapeake Node.js User Group (CNUG) https://www.meetup.com/chesapeake-region-nodejs-developers-group START BUILDING: CALLFORCODE.ORG 3 Agenda Cloud Offerings ( Cloud 1.0 ) Infrastructure
More informationPowerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations
Powerful Insights with Every Click FixStream Agentless Infrastructure Auto-Discovery for Modern IT Operations The Challenge AIOps is a big shift from traditional ITOA platforms. ITOA was focused on data
More informationTEN LAYERS OF CONTAINER SECURITY
TEN LAYERS OF CONTAINER SECURITY Tim Hunt Kirsten Newcomer May 2017 ABOUT YOU Are you using containers? What s your role? Security professionals Developers / Architects Infrastructure / Ops Who considers
More informationPOWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security. Business, Opportunities and Risks
POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security Business, Opportunities and Risks Overview Cloud, Big Data & Cyber Security Summary Cloud: scalable, adaptable, cost effective but not under
More informationEnergy Management with AWS
Energy Management with AWS Kyle Hart and Nandakumar Sreenivasan Amazon Web Services August [XX], 2017 Tampa Convention Center Tampa, Florida What is Cloud? The NIST Definition Broad Network Access On-Demand
More informationTechnical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
More informationCONTAINERS AND MICROSERVICES WITH CONTRAIL
CONTAINERS AND MICROSERVICES WITH CONTRAIL Scott Sneddon Sree Sarva DP Ayyadevara Sr. Director Sr. Director Director Cloud and SDN Contrail Solutions Product Line Management This statement of direction
More informationAWS Integration Guide
AWS Integration Guide Cloud-Native Security www.aporeto.com AWS Integration Guide Aporeto integrates with AWS to help enterprises efficiently deploy, manage, and secure applications at scale and the compute
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Paul Bakker Product Strategy, IoT BU ARM Tech Symposia China 2015 November 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon Last Year 60K 2014
More informationPasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP
Pasiruoškite ateičiai: modernus duomenų centras Laurynas Dovydaitis Microsoft Azure MVP 2016-05-17 Tension drives change The datacenter today Traditional datacenter Tight coupling between infrastructure
More informationSecurity in NFC Readers
Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic
More information2013 Cisco and/or its affiliates. All rights reserved. 1
2013 Cisco and/or its affiliates. All rights reserved. 1 Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System
More informationLecture 3 MOBILE PLATFORM SECURITY
Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common
More informationGoogle on BeyondCorp: Empowering employees with security for the cloud era
SESSION ID: EXP-F02 Google on BeyondCorp: Empowering employees with security for the cloud era Jennifer Lin Director, Product Management, Security & Privacy Google Cloud What is BeyondCorp? Enterprise
More informationEnabling Flexible Network FPGA Clusters in a Heterogeneous Cloud Data Center
Enabling Flexible Network FPGA Clusters in a Heterogeneous Cloud Data Center Naif Tarafdar, Thomas Lin, Eric Fukuda, Hadi Bannazadeh, Alberto Leon-Garcia, Paul Chow University of Toronto 1 Cloudy with
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Dr.Krisztián Flautner General Manager / ARM Internet of Things Business Unit ARM Holdings Ltd mbed Sponsored Session / ARM TechCon 2015 11 th Nov 2015 Productivity Security
More informationEnabling the Next Generation of SDN
Enabling the Next Generation of SDN Brian O Connor (ONF) brian@opennetworking.org P4 Workshop on June 5, 2018 Link to slides: https://goo.gl/6hfg1h Presenting on behalf of Google and ONF Background Google
More informationP a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection
P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:
More informationVARIABILITY IN OPERATING SYSTEMS
VARIABILITY IN OPERATING SYSTEMS Brian Kocoloski Assistant Professor in CSE Dept. October 8, 2018 1 CLOUD COMPUTING Current estimate is that 94% of all computation will be performed in the cloud by 2021
More information