Jon Gold

Author Archives: Jon Gold

Google claims quantum supremacy over supercomputers

The results of an experiment performed on Google’s Sycamore quantum computer demonstrate that theoretical quantum computing designs can work as expected, the company announced today in a paper published in the journal Nature.Formulating the problem was the first hurdle. The company’s research team eventually settled on comparing the Sycamore computer’s output to that of a modern, classical supercomputer in the task of reading the state of a pseudo-random quantum circuit. This results in a computational challenge that should be comparatively simple for Sycamore, but enormously difficult for a supercomputer equipped with traditional silicon.To read this article in full, please click here

Google claims quantum supremacy over supercomputers

The results of an experiment performed on Google’s Sycamore quantum computer demonstrate that theoretical quantum computing designs can work as expected, the company announced today in a paper published in the journal Nature.Formulating the problem was the first hurdle. The company’s research team eventually settled on comparing the Sycamore computer’s output to that of a modern, classical supercomputer in the task of reading the state of a pseudo-random quantum circuit. This results in a computational challenge that should be comparatively simple for Sycamore, but enormously difficult for a supercomputer equipped with traditional silicon.To read this article in full, please click here

How the oil and gas industry exploits IoT

Like many traditional industries that have long-standing, tried-and-true methods of operation, the oil-and-gas sector hasn’t been the quickest to embrace IoT technology – despite having had instrumentation on drilling rigs, pipelines and refining facilities for decades, the extraction industry has only recently begun to work with modern IoT.To read this article in full, please click here(Insider Story)

10 most powerful companies in IoT

The Internet of Things is still very much a growth industry. As a technology area whose development is dictated by the needs of the operational side of any given business, it’s a new challenge for traditional IT companies – and one that gives them an unusual array of competitors. But there are always going to be a few companies that set the tone, and we’ve collected what we think are the 10 most powerful players in the IoT sector right now.A word on methodology. We began by looking at about 25 prominent corporate names in IoT, comparing them based on how innovative their technology is, their market share and solution depth and breadth.To read this article in full, please click here

The 10 most powerful companies in IoT

The Internet of Things is still very much a growth industry. As a technology area whose development is dictated by the needs of the operational side of any given business, it’s a new challenge for traditional IT companies – and one that gives them an unusual array of competitors. But there are always going to be a few companies that set the tone, and we’ve collected what we think are the 10 most powerful players in the IoT sector right now.A word on methodology. We began by looking at about 25 prominent corporate names in IoT, comparing them based on how innovative their technology is, their market share and solution depth and breadth.To read this article in full, please click here

IoT security essentials: Physical, network, software

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology.And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.Physical access Physical access is an important but, generally, straightforward consideration for traditional IT security. Data centers can be carefully secured, and routers and switches are often located in places where they’re either difficult to fiddle with discreetly or difficult to access in the first place.To read this article in full, please click here

IoT security essentials: Physical, network, software

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology.And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.Physical access Physical access is an important but, generally, straightforward consideration for traditional IT security. Data centers can be carefully secured, and routers and switches are often located in places where they’re either difficult to fiddle with discreetly or difficult to access in the first place.To read this article in full, please click here

Rating IoT devices to gauge their impact on your network

One difficulty designing IoT implementations is the large number of moving parts. Most IoT setups are built out of components from many different manufacturers – one company’s sensors here, another’s there, someone else handling the networking and someone else again making the backend.To help you get a ballpark sense of what any given implementation will demand from your network, we’ve come up with a basic taxonomy for rating IoT endpoints. It’s got three main axes: delay tolerance, data throughput and processing power. Here is an explainer for each. (Terminology note: We’ll use “IoT setup” or “IoT implementation” to refer to the entirety of the IoT infrastructure being used by a given organization.)To read this article in full, please click here

Microsoft finds Russia-backed attacks that exploit IoT devices

The STRONTIUM hacking group, which has been strongly linked by security researchers to Russia’s GRU military intelligence agency, was responsible for an IoT-based attack on unnamed Microsoft customers, according to the company. a blog post from the company’s security response center issued Monday.Microsoft said in a blog that the attack, which it discovered in April, targeted three specific IoT devices – a VoIP phone, a video decoder and a printer (the company declined to specify the brands) – and used them to gain access to unspecified corporate networks. Two of the devices were compromised because nobody had changed the manufacturer’s default password, and the other one hadn’t had the latest security patch applied.To read this article in full, please click here

Microsoft finds Russia-backed attacks that exploit IoT devices

The STRONTIUM hacking group, which has been strongly linked by security researchers to Russia’s GRU military intelligence agency, was responsible for an IoT-based attack on unnamed Microsoft customers, according to the company. a blog post from the company’s security response center issued Monday.Microsoft said in a blog that the attack, which it discovered in April, targeted three specific IoT devices – a VoIP phone, a video decoder and a printer (the company declined to specify the brands) – and used them to gain access to unspecified corporate networks. Two of the devices were compromised because nobody had changed the manufacturer’s default password, and the other one hadn’t had the latest security patch applied.To read this article in full, please click here

Remote code execution is possible by exploiting flaws in Vxworks

Eleven zero-day vulnerabilities in WindRiver’s VxWorks, a real-time operating system in use across an advertised 2 billion connected devices have been discovered by network security vendor Armis.Six of the vulnerabilities could enable remote attackers to access unpatched systems without any user interaction, even through a firewall according to Armis. About IoT: What is the IoT? How the internet of things works What is edge computing and how it’s changing the network Most powerful Internet of Things companies 10 Hot IoT startups to watch The 6 ways to make money in IoT What is digital twin technology? [and why it matters] Blockchain, service-centric networking key to IoT success Getting grounded in IoT networking and security Building IoT-ready networks must become a priority What is the Industrial IoT? [And why the stakes are so high] The vulnerabilities affect all devices running VxWorks version 6.5 and later with the exception of VxWorks 7, issued July 19, which patches the flaws. That means the attack windows may have been open for more than 13 years.To read this article in full, please click here

Remote code execution is possible by exploiting flaws in Vxworks

Eleven zero-day vulnerabilities in WindRiver’s VxWorks, a real-time operating system in use across an advertised 2 billion connected devices have been discovered by network security vendor Armis.Six of the vulnerabilities could enable remote attackers to access unpatched systems without any user interaction, even through a firewall according to Armis. About IoT: What is the IoT? How the internet of things works What is edge computing and how it’s changing the network Most powerful Internet of Things companies 10 Hot IoT startups to watch The 6 ways to make money in IoT What is digital twin technology? [and why it matters] Blockchain, service-centric networking key to IoT success Getting grounded in IoT networking and security Building IoT-ready networks must become a priority What is the Industrial IoT? [And why the stakes are so high] The vulnerabilities affect all devices running VxWorks version 6.5 and later with the exception of VxWorks 7, issued July 19, which patches the flaws. That means the attack windows may have been open for more than 13 years.To read this article in full, please click here

IoT roundup: Connected cows, food safety sensors and tracking rent-a-bikes

While the public image of agriculture remains a bit antiquated, the industry is actually an increasingly sophisticated one, and farmers have been particularly enthusiastic in their embrace of IoT. Everything from GPS-guided precision for planting, watering and harvesting to remote soil monitoring and in-depth yield analysis is available to the modern farmer.What’s more, the technology used in agriculture continues to evolve at speed; witness the recent partnership between Quantified Ag, a University of Nebraska-backed program that, among other things, can track livestock health via a system of IoT ear tags, and Cradlepoint, a vendor that makes the NetCloud Manager product.To read this article in full, please click here

Report: Smart-city IoT isn’t smart enough yet

Security arrangements for smart-city IoT technology around the world are in an alarming state of disrepair, according to a report from Forrester Research that argues serious changes are needed in order to avoid widespread compromises.Much of what’s wrong has to do with a lack of understanding on the part of the people in charge of those systems and a failure to follow well-known security best practices, like centralized management, network visibility and limiting attack-surfaces. More on IoT: What is the IoT? How the internet of things works What is edge computing and how it’s changing the network Most powerful Internet of Things companies 10 Hot IoT startups to watch The 6 ways to make money in IoT What is digital twin technology? [and why it matters] Blockchain, service-centric networking key to IoT success Getting grounded in IoT networking and security Building IoT-ready networks must become a priority What is the Industrial IoT? [And why the stakes are so high] Those all pose stiff challenges, according to “Making Smart Cities Safe And Secure,” the Forrester report by Merritt Maxim and Salvatore Schiano. The attack surface for a smart city is, by default, enormous, given the volume of Internet-connected hardware involved. Continue reading

Wireless alliance: You might want to move some access points for Wi-Fi 6

Businesses could find themselves repositioning wireless access points and even facing increased bandwidth demands as Wi-Fi 6 hits the market in the coming months, according to a white paper released today by the Wireless Broadband Alliance.Nevertheless, the news is mostly good for prospective business users. Thanks to Wi-Fi 6’s array of coexistence, power-saving and smart management features, a new network based on the technology shouldn’t pose many deployment problems.The time of 5G is almost here Key to the enterprise WLAN use case, the white paper says, is deployment planning – Wi-Fi 6 can offer different optimal placement options than previous-generation Wi-Fi, so it could behoove upgraders to consider changing AP locations, instead of just swapping out existing devices in the same locations.To read this article in full, please click here

IoT roundup: Robot boats, AT&T makes IoT partner deals

There’s plenty of IoT technology coming into the automotive sector – sophisticated fleet management systems, in-car entertainment and connectivity - but the real pot of gold is fully autonomous transport, which is inching closer all the time.One piece of news on that front comes out of MIT, where researchers announced earlier this month that they are collaborating with the Amsterdam Institute for Advanced Metropolitan Solutions to create a “roboat,” which leverages GPS, cameras and other sensors, alongside on-board connectivity and compute, to create autonomous boats for travel along the Dutch capital’s 165 canals.To read this article in full, please click here

IoT roundup: Robot boats; AT&T makes IoT partner deals

There’s plenty of IoT technology coming into the automotive sector – sophisticated fleet management systems, in-car entertainment and connectivity - but the real pot of gold is fully autonomous transport, which is inching closer all the time.One piece of news on that front comes out of MIT, where researchers announced earlier this month that they are collaborating with the Amsterdam Institute for Advanced Metropolitan Solutions to create a “roboat,” which leverages GPS, cameras and other sensors, alongside on-board connectivity and compute, to create autonomous boats for travel along the Dutch capital’s 165 canals.To read this article in full, please click here

1 9 10 11 12 13 32