TÜV AUSTRIA and LGMS just officially created the TÜV AUSTRIA Cybersecurity Lab in Malaysia, to offer cybersecurity testing and certification to the Asia-Pacific region.
TÜV AUSTRIA Cybersecurity Lab Official Launch In Malaysia!
The formation of the TÜV AUSTRIA Cybersecurity Lab in Malaysia is a major joint venture between TÜV Trust IT (a member of TÜV AUSTRIA) and LGMS of Malaysia.
The Austrian Ambassador to Malaysia, Dr. Michael Postl, was the guest of honor to inaugurate this partnership, which aims to deliver both cybersecurity testing and certification to the Asia-Pacific region.
TÜV AUSTRIA : A Quick Primer
TÜV AUSTRIA is an international testing, inspection and certification (TIC) company, with more than 2,000 staff members in more than 20 countries globally. Founded and based in Austria, TÜV AUSTRIA generates more than €220 million in annual revenue.
LGMS : A Quick Primer
LGMS – a proudly Malaysian cybersecurity company – has been accredited with multiple international certifications and is recognised internationally by IDC as one of the world’s leading IoT key penetration testing vendors in their 2019 report.
TÜV AUSTRIA Cybersecurity Lab : The Quick Details
The new TÜV AUSTRIA Cybersecurity Lab will house a global Cybersecurity Testing and Certification Center of Excellence (CoE) in Malaysia to serve both domestic and international markets.
Staffed by a mix of TÜV AUSTRIA and LGMS staff initially, they plan to add a hundred more cybersecurity positions over the next few years.
The new team’s focus will be to help organisations identify vulnerabilities within their IT infrastructure, and recommending measures to maintain and improve on their cybersecurity practices.
This Austrian-Malaysian joint venture will also stimulate Industry 4.0 Cybersecurity Testing and Certifications both locally and internationally, as well as drive the protection Critical National Infrastructure (CNI) as encouraged by the Malaysian government.
This joint venture is also supported by MDEC (Malaysia Digital Economy Corporation), which is striving to promote Malaysia as the Asian hub for cybersecurity testing and certification.
Alibaba, specifically its research institute – the Alibaba DAMO Academy, just published their top 10 tech trends in 2020.
Here are the highlights from those top 10 tech trends that they are predicting will go big in 2020!
Here Are The Top 10 Tech Trends In 2020 From Alibaba!
Tech Trend #1 : AI Evolves From Perceptual Intelligence To Cognitive Intelligence
Artificial intelligence has reached or surpassed humans in the areas of perceptual intelligence such as speech to text, natural language processing, video understanding etc; but in the field of cognitive intelligence that requires external knowledge, logical reasoning, or domain migration, it is still in its infancy.
Cognitive intelligence will draw inspiration from cognitive psychology, brain science, and human social history, combined with techniques such as cross domain knowledge graph, causality inference, and continuous learning to establish effective mechanisms for stable acquisition and expression of knowledge.
These make machines to understand and utilize knowledge, achieving key breakthroughs from perceptual intelligence to cognitive intelligence.
Tech Trend #2 : In-Memory Computing Addresses Memory Wall Challenge In AI Computer
In Von Neumann architecture, memory and processor are separate and the computation requires data to be moved back and forth.
With the rapid development of data-driven AI algorithms in recent years, it has come to a point where the hardware becomes the bottleneck in the explorations of more advanced algorithms.
In Processing-in-Memory (PIM) architecture, in contrast to the Von Neumann architecture, memory and processor are fused together and computations are performed where data is stored with minimal data movement.
As such, computation parallelism and power efficiency can be significantly improved. We believe the innovations on PIM architecture are the tickets to next-generation AI.
Tech Trend #3 : Industrial IoT Will Power Digital Transformation
In 2020, 5G, rapid development of IoT devices, cloud computing and edge computing will accelerate the fusion of information system, communication system, and industrial control system.
Through advanced Industrial IoT, manufacturing companies can achieve automation of machines, in-factory logistics, and production scheduling, as a way to realise C2B smart manufacturing.
In addition, interconnected industrial system can adjust and coordinate the production capability of both upstream and downstream vendors.
Ultimately it will significantly increase the manufacturers’ productivity and profitability. For manufacturers with production goods that value hundreds of trillion RMB, If the productivity increases 5-10%, it means additional trillions of RMB.
Tech Trend #4 : Large Scale Collaboration Between Machines Become Possible
Traditional single intelligence cannot meet the real-time perception and decision of large-scale intelligent devices.
The development of collaborative sensing technology of Internet of things and 5G communication technology will realise the collaboration among multiple agents – machines cooperate with each other and compete with each other to complete the target tasks.
The group intelligence brought by the cooperation of multiple intelligent bodies will further amplify the value of the intelligent system:
large-scale intelligent traffic light dispatching will realise dynamic and real-time adjustment,
warehouse robots will work together to complete cargo sorting more efficiently,
driverless cars can perceive the overall traffic conditions on the road, and
group unmanned aerial vehicle (UAV) collaboration will get through the last-mile delivery more efficiently.
Tech Trend #5 : Modular Chiplet Design Makes Chips Easier & Faster To Create
Traditional model of chip design cannot efficiently respond to the fast evolving, fragmented and customised needs of chip production.
The open source SoC chip design based on RISC-V, high-level hardware description language, and IP-based modular chip design methods have accelerated the rapid development of agile design methods and the ecosystem of open source chips.
In addition, the modular design method based on chiplets uses advanced packaging methods to package the chiplets with different functions together, which can quickly customise and deliver chips that meet specific requirements of different applications.
Tech Trend #6 : Large Scale Blockchain Applications Will Gain Mass Adoption
BaaS (Blockchain-as-a-Service) will further reduce the barriers of entry for enterprise blockchain applications.
A variety of hardware chips embedded with core algorithms used in edge, cloud and designed specifically for blockchain will also emerge, allowing assets in the physical world to be mapped to assets on blockchain, further expanding the boundaries of the Internet of Value and realising “multi-chain interconnection”.
In the future, a large number of innovative blockchain application scenarios with multi-dimensional collaboration across different industries and ecosystems will emerge, and large-scale production-grade blockchain applications with more than 10 million DAI (Daily Active Items) will gain mass adoption.
Tech Trend #7 : A Critical Period Before Large-Scale Quantum Computing
In 2019, the race in reaching “Quantum Supremacy” brought the focus back to quantum computing. The demonstration, using superconducting circuits, boosts the overall confidence on superconducting quantum computing for the realisation of a large-scale quantum computer.
In 2020, the field of quantum computing will receive increasing investment, which comes with enhanced competitions. The field is also expected to experience a speed-up in industrialization and the gradual formation of an eco-system.
In the coming years, the next milestones will be the realization of fault-tolerant quantum computing and the demonstration of quantum advantages in real-world problems. Either is of a great challenge given the present knowledge. Quantum computing is entering a critical period.
Tech Trend #8 : New Materials Will Revolutionise Semiconductor Devices
Under the pressure of both Moore’s Law and the explosive demand of computing power and storage, it is difficult for classic Si based transistors to maintain sustainable development of the semiconductor industry.
Until now, major semiconductor manufacturers still have no clear answer and option to chips beyond 3nm. New materials will make new logic, storage, and interconnection devices through new physical mechanisms, driving continuous innovation in the semiconductor industry.
For example, topological insulators, two-dimensional superconducting materials, etc. that can achieve lossless transport of electron and spin can become the basis for new high-performance logic and interconnect devices; while new magnetic materials and new resistive switching materials can realize high-performance magnetics Memory such as SOT-MRAM and resistive memory.
Tech Trend #9 : Growing Adoption Of AI Technologies That Protect Data Privacy
The compliance costs demanded by the recent data protection laws and regulations related to data transfer are getting increasingly higher than ever before.
In light of this, there have been growing interests in using AI technologies to protect data privacy. The essence is to enable the data user to compute a function over input data from different data providers while keeping those data private.
Such AI technologies promise to solve the problems of data silos and lack of trust in today’s data sharing practices, and will truly unleash the value of data in the foreseeable future.
Tech Trend #10 : Cloud Becomes The Center Of IT Innovation
With the ongoing development of cloud computing technology, the cloud has grown far beyond the scope of IT infrastructure, and gradually evolved into the center of all IT technology innovations.
Cloud has close relationship with almost all IT technologies, including new chips, new databases, self-driving adaptive networks, big data, AI, IoT, blockchain, quantum computing and so forth.
Meanwhile, it creates new technologies, such as serverless computing, cloud-native software architecture, software-hardware integrated design, as well as intelligent automated operation.
Cloud computing is redefining every aspect of IT, making new IT technologies more accessible for the public. Cloud has become the backbone of the entire digital economy.
Dell Technologies just shared with us the key findings from their research that explore the future of connected living by the year 2030!
Find out how emerging technologies will transform how our lives will change by the year 2030!
Dell On The Future of Connected Living In 2030!
Dell Technologies conducted their research in partnership with the Institute for the Future (IFTF) and Vanson Bourne, surveying 1,100 business leaders across ten countries in Asia Pacific and Japan.
Let’s take a look at their key findings, and find out why they believe the future is brimming with opportunity thanks to emerging technologies.
Technological Shifts Transforming The Future By 2030
IFTF and a forum of global experts forecast that emerging technologies like edge computing, 5G, AI, Extended Reality (XR) and IoT will create these five major shifts in society :
1. Networked Reality
Over the next decade, the line between the virtual and the real will vanish. Cyberspace will become an overlay on top of our existing reality as our digital environment extends beyond televisions, smartphones and other displays.
This transformation will be driven by the deployment of 5G networks that enable high bandwidth, low-latency connections for streaming, interactive services, and multi-user media content.
2. Connected Mobility and Networked Matter
The vehicles of tomorrow will essentially be mobile computers, with the transportation system resembling packet-switched networks that power the Internet.
We will trust them to take us where we need to go in the physical world as we interact in the virtual spaces available to us wherever we are.
3. From Digital Cities to Sentient Cities
More than half of the world’s population live in urban areas. This will increase to 68% over the next three decades, according to the United Nations.
This level of growth presents both huge challenges and great opportunities for businesses, governments and citizens.
Cities will quite literally come to life through their own networked infrastructure of smart objects, self-reporting systems and AI-powered analytics.
4. Agents and Algorithms
Our 2030 future will see everyone supported by a highly personalised “operating system for living” that is able to anticipate our needs and proactively support our day-to-day activities to free up time.
Such a Life Operating System (Life OS) will be context-aware, anticipating our needs and behaving proactively.
Instead of interacting with different apps today, the intelligent agent of the future will understand what you need and liaise with various web services, other bots and networked objects to get the job done.
5. Robot with Social Lives
Within 10 years, we will have personal robots that will become our partners in life – enhancing our skills and extending our abilities.
In some cases, they will replace us, but this can mean freeing us to do the things we are good at, and enjoy.
In most cases, they can become our collaborators, helping to crowdsource innovations and accelerate progress through robot social networks.
Preparing For The Future Of Connected Living By 2030
Many businesses in APJ are already preparing for these shifts, with business leaders expressing these perceptions :
80% (82% in Malaysia) will restructure the way they spend their time by automating more tasks
70% (83% in Malaysia) welcome people partnering with machines/robots to surpass our human limitations
More than half of businesses anticipate Networked Reality becoming commonplace
– 63% (67% in Malaysia) say they welcome day-to-day immersion in virtual and augmented realities
– 62% (63% in Malaysia) say they welcome people being fitted with brain computer interfaces
These technological shifts are seismic in nature, leaving people and organisations grappling with change. Organisations that want to harness these emerging technologies will need to collect, process and make use of the data, while addressing public concerns about data privacy.
APJ business leaders are already anticipating some of these challenges :
78% (88% in Malaysia) will be more concerned about their own privacy by 2030 than they are today
74% (83% in Malaysia) consider data privacy to be a top societal-scale challenge that must be solved
49% (56% in Malaysia) would welcome self-aware machines
49% (43% in Malaysia) call for regulation and clarity on how AI is used
84% (85% in Malaysia) believe that digital transformation should be more widespread throughout their organisation
With its small size and low-power, it opens up the possibility of adding AI on-the-edge computing capabilities to small commercial robots, drones, industrial IoT systems, network video recorders and portable medical devices.
The Jetson Xavier NX can be configured to deliver up to 14 TOPS at 10 W, or 21 TOPS at 15 W. It is powerful enough to run multiple neural networks in parallel, and process data from multiple high-resolution sensors simultaneously.
The NVIDIA Jetson Xavier NX runs on the same CUDA-X AI software architecture as all other Jetson processors, and is supported by the NVIDIA JetPack software development kit.
It is pin-compatible with the Jetson Nano, offering up to 15X higher performance than the Jetson TX2 in a smaller form factor.
It is not available for a few more months, but developers can begin development today using the Jetson AGX Xavier Developer Kit, with a software patch to emulate Jetson Xavier NX.
NVIDIA Jetson Xavier NX Specifications
NVIDIA Jetson Xavier NX
– 6 x Arm 64-bit cores
– 6 MB L2 + 4 MB L3 caches
– 384 CUDA cores, 48 Tensor cores, 2 NVDLA cores
21 TOPS : 15 watts
14 TOPS : 10 watts
– Up to 8 GB, 51.2 GB/s
Encoding : Up to 2 x 4K30 streams
Decoding : Up to 2 x 4K60 streams
Up to six CSI cameras (32 via virtual channels)
Up to 12 lanes (3×4 or 6×2) MIPI CSI-2
70 x 45 mm (Nano)
NVIDIA Jetson Xavier NX Price + Availability
The NVIDIA Jetson Xavier NX will be available in March 2020 from NVIDIA’s distribution channels, priced at US$399.
Yeo Siang Tiong, the General Manager of Kaspersky Southeast Asia, recently shared with us why cybersecurity is critical for Industry 4.0 initiatives to succeed.
While he uses Malaysia’s drive to implement Industry 4.0 as an example, the lessons are universal and apply across the world.
Let’s hear it from Mr. Yeo Siang Tiong!
Why Cybersecurity Is Critical For Industry 4.0 Success
The term Industry 4.0 was first used at the Hanover Fair, as a reference to the latest industrial strategy which has been termed the fourth industrial revolution.
According to the explanation by Ministry of International Trade and Industry Malaysia  I have read months ago, Industry 4.0 is referred to as production of manufacturing based industries digitalization transformation, driven by connected technologies.
Together with autonomous robots, big data analytics, cloud computing, Internet of Things, additive manufacturing, system integration, augmented reality and simulation, in my opinion, cybersecurity is among the main pillars of Industry 4.0.
Why? Because while the cyber-physical systems connected without wires, automated and with lesser human touch points promise more efficient processes and communications, this also exposes systems to potential cyberattacks.
Greater connectivity brought about by Industry 4.0 will require greater security attention for ICS security because the Fourth Industrial Revolution is a double-edged sword which countries and companies should use wisely.
It is great to note that Malaysia is currently ranked third globally among 193 International Telecom Union members, in terms of the level of national commitment to addressing cybersecurity risks.
In 2018, Ministry of International Trade and Industry Malaysia launched INDUSTRY 4WRD, a national policy on Industry 4.0, to place policies and guidelines in place to ensure Malaysian manufacturing industry and its related services would be ready, to be smart, systematic and resilient.
The policy has the overarching philosophy – A-C-T, Attract, Create and Transform.
The government’s efforts are indeed being commended worldwide. Proof is the Readiness for the Future of Production Report 2018  which put Malaysia in the “Leader” quadrant, positioned well for the future. Malaysia and China are the only two non-high-income countries in this coveted quadrant.
One important area for improvement that I know if will be the human force. Malaysia has shortage of required talents, skills and knowledge for Industry 4.0, particularly in the areas of IoT, robotics and AI. The lack of talents in the fields of IoT is hypocritical for Malaysia Industry 4.0 especially in the areas of exposure to cyber threats.
However, let us not miss the commitment uttered by the Ministry of Education Malaysia  saying that cybersecurity must be introduced at the grassroot level, especially among the schoolchildren. The department of Polytechnic and Community College Education and Politeknik Mersing in Johor is also off to set up the Cyber Range Academy, which provides the students with an authentic learning environment in the threat landscape.
For our part, Kaspersky understands the cyber security needs in ensuring the success of Industry 4.0 and have solutions in place – Industrial CyberSecurity (ICS), with the aim to protect companies from three main risks .
Firstly, unintentional infection of an industrial network. In theory, industrial information networks should not be connected to office networks, and should also not have direct access to the internet. However, sometimes without intending to cause any harm, staff will connect infected removable drives to industrial computers or access the internet to update software on the server, resulted malware manages to penetrate the network.
Secondly, it is not unusual for people who are professionally versed in industrial systems to try and use that knowledge to trick their employer, which cause serious harm to the business.
Thirdly, cyberwar, targeted actions that are intended to cause damage. Two years ago, a massive data breach saw more than 46 million mobile subscribers in Malaysia leaked on to the dark web.
For companies to reach their Industry 4.0 goals, all components have to be protected.
Remember ShadowHammer  which Kaspersky team highlighted in the research back in March? Executable files, found in reputable and trusted large manufacturer, contained malware features, which upon careful analysis confirmed been tampered by malicious attackers.
To avoid being victims and ensuring a clearer path to achieving Industry 4.0 , we suggest to:
Regularly update operating systems, application software, and security solutions
Apply necessary security fixes andaudit access control for ICS components in the enterprise’s industrial network and at its boundaries
Provide dedicated training and support for employees as well as partners and suppliers with access to your network
Restrict network traffic on ports and protocols used on edge routers and inside the organization’s OT networks
Use ICS network traffic monitoring, analysis and detection solutions for better protection from attacks potentially threatening technological process and main enterprise assets
Deploy dedicated securitysolutions on ICS servers, workstations and HMIs, such as Kaspersky Industrial CyberSecurity. This solution includes network traffic monitoring, analysis and detection to secure OT and industrial infrastructure from both random malware infections and dedicated industrial threats
Form a dedicated security team for both IT and OT sectors
Equip these security teams with proper cybersecurity training as well as real-time and in-depth threat intelligence reports
Industrial Revolution 4.0, also known as the Fourth Industrial Revolution or Industry 4.0, is a term that is applied towards the current trend of intelligent automation that is enabled by information technology, interconnectivity and data analytics.
Industry 4.0 employs a wide range of technologies to achieve those aims, such as mobile devices, Internet of Things, smart sensors, big data analytics, augmented reality, cloud computing, and more.
Countries and corporations that successfully make use of these technologies will greatly improve their productivity. Hence, there is great interest by governments and companies to develop and accelerate their IR 4.0 capabilities.
But that was not all, as Pat Gelsinger would soon reveal…
Pat Gelsinger Reveals 2019 VMware Strategy + Plans!
VMware CEO Pat Gelsinger comes from a “hardware” background, serving as Intel’s first Chief Technology Officer before taking over as President and CEO of EMC.
A point he makes in his talk about the Superpowers of Tech – Cloud, Mobile, AI/ML and Edge/IoT.
VMware’s vision still focuses on enabling any cloud resource and application, from the past or the present, to work on any device, while improving intrinsic security over time.
The hybrid cloud is the best answer for almost every single workload, because of three “laws” – the laws of physics, the laws of economics, and the laws of the land.
VMware and Dell Technologies are focusing on the hybrid cloud architecture with VxRail as its building block.
To bind together and manage disparate cloud and on-premise solutions with greater visibility, VMware is offering CloudHealth on all VMware Cloud solutions on Amazon, Azure and Google.
VMware is making great investments into Kubernetes as the “middleware for the cloud“.
VMware is partnering with Pivotal to make VMware PKS available as VMware Enterprise PKS, VMware Essential PKS and VMware Cloud PKS.
VMware is also rebuilding their security architecture and products, with AppDefense and vSphere Platinum, giving virtual machines an AI capability to learn the users’ behaviour, as well as end-to-end encryption throughout the network infrastructure.
The newly-announced Dell Unified Workspace leverages VMware’s Workspace ONE unified endpoint management to maintain the user’s devices in good health, while allowing them to seamlessly access any native, SaaS (Software as a Service), or internal application, with a single sign-on from any device.
Maxis just launched their first Narrowband Internet of Things (NB-IoT) service. Here are the full details!
The Maxis NB-IoT (Narrowband IoT) Service
The Maxis NB-IoT is a dedicated network for IoT devices. It offers 5G-like capabilities for low bandwidth applications and supports millions of connected things.
It also uses less power which allows for longer battery life. The NB-IoT network will enable expansion of advanced data analytics to enable companies to quickly make decisions in areas, like
potential cost savings
Maxis NB-IoT Coverage Areas
Maxis started operating their NB-IoT network on 16 April 2019 in selected areas within key IoT market centres, including :
Maxis Partners Vodafone In Its NB-IoT Services
Thanks to their collaboration with Vodafone, Maxis will have access to Vodafone’s experience in NB-IoT deployment in various countries and tap into Vodafone’s extensive global NB-IoT network.
Vodafone will also support Maxis in developing their NB-IoT ecosystem through the sharing of knowledge and access to the technology.
Maxis IoT Innovation Lab
Maxis set up its IoT Innovation Lab in 2018 as an experiential showcase for enterprise customers of NB-IoT solutions that include :
NB-IoT also presents great possibilities for key players like the government, state councils and Malaysian businesses in the prime areas of agriculture, utilities and Smart Cities.
“There is an immense amount of opportunities for NB-IoT especially around big data analytics and in enabling real life use cases.
The launch will encourage the development of an ecosystem of partners, developers and customers that will offer even more opportunities for enterprises, to better manage and optimise their assets, their environment, their energy usage and the safety of their people, and to unlock the potential for the delivery of new services in the Malaysian market.
This is a significant step for us as it sets the standards in the deployment of IoT solutions,” said Paul McManus, Head of Enterprise, Maxis.
The 2019 Dell EMC Global Data Protection Index is out! Here is a summary of its key findings!
The 2019 Dell EMC Global Data Protection Index
The 2019 Dell EMC Global Data Protection Index is the third survey conducted by Dell EMC in collaboration with Vanson Bourne.
The survey involved 2,200 IT decision makers from public and private organisations (of 250+ employees) across 18 countries and 11 industries. It was designed to reveal the state of data protection in the Asia Pacific and Japan region.
What Did The 2019 Data Protection Index Reveal?
The 2019 Dell EMC Global Data Protection Index revealed a large increase in the amount of data managed – from 1.68 petabytes in 2016 to a staggering 8.13 petabytes in 2018.
They also saw a corresponding increase in awareness about the value of data, with 90% of the respondents aware about the value of the data they manage. However, only 35% are monetising their data.
The Index also noted that despite an impressive jump in the number of data protection leaders (from 1% to 13%) and “adopters” (from 8% to 53%) since 2016, most of the survey respondents still face challenges in implementing the right data protection measures.
Organisations in Asia Pacific & Japan managed 8.13 PB of data in 2018 – an explosive growth of 384% compared to the 1.68 PB managed in 2016
90% of businesses see the potential value of data but only 35% are monetising it
94% face data protection challenges, and 43% struggle to find suitable data protection solutions for newer technologies like artificial intelligence and machine learning
More than a third (34%) of respondents are very confident that their data protection infrastructure is compliant with regional regulations, but only 18% believe their data protection solutions will meet all future challenges
The State Of Data Protection In APJ
Data disruptions and data loss happen more frequently in APJ organisations, than the global average. Some 80% of the APJ respondents reported experiencing some type of disruption over the last 12 months.
This is higher than the global average of 76%. Even worse – 32% were unable to recover their data using existing data protection solutions.
Although system downtime is a problem, the loss of data is particularly expensive. On average, 20 hours of downtime cost businesses US$ 494,869. The average data loss of 2.04 terabytes, on the other hand, costs nearly twice as much at US$ 939,703.
Challenges To Data Protection In APJ
The vast majority of respondents (some 94%) report that they encounter at least one barrier to data protection. The top three challenges in APJ was determined to be :
The inability to keep track of and protect all data because of growth of DevOps and cloud development – 46% agree
The complexity of configuring and operating data protection software/hardware – 45.6% agree
The lack of data protection solutions for emerging technologies– 43.4% agree
They also struggled to find adequate data protection solutions for newer technologies :
Artificial intelligence and machine learning data – 54% agree
Cloud-native applications – 49% agree
Internet of Things – 40% agree
Cloud Is Changing The Data Protection Landscape
According to the 2019 Dell EMC Global Data Protection Index, organisations have increase their use of public cloud services – up from 27% in 2016 to 41% in 2018.
Nearly all of those organisations (99%) using public cloud, are leveraging it as part of their data protection strategy. The top use case – backup or snapshot services to protect data and workloads.
More than 60% of the respondents also consider the scalability of data protection solutions important, in anticipation of the inevitable boom of cloud workloads.
Regulation Is Not A Key Concern
Compliance with data privacy regulations like the UE’s General Data Protection Regulation (GDPR) is not a key concern for most of these organisations. Only 36% listed it as a top data protection challenge.
The 2019 Samsung Forum just kicked off in tropical Singapore with a slew of new home digital appliances!
In this article, we will share with you what they revealed – the new Family Hub 4.0 smart refrigerators and RS5000 side-by-side refrigerators, as well as the WW7800M QuickDrive washing machine and the new POWERstick Jet200 portable vacuum cleaner!
The 2019 Samsung Forum
Marking their 10th anniversary, the 2019 Samsung Forum is an annual showcase of the latest Samsung home technologies and appliances. This is where Samsung will show off their latest home entertainment products and home appliances.
The Samsung Family Hub 4.0 Refrigerator
The Samsung Family Hub 4.0 boasts enhanced AI and IoT capabilities, as well as the new Family Board – a communal display that family member can use together.
The Family Board can be used to create and share each family member’s schedules and messages. On top of that, it has a more analogue feel with a new Whiteboard that recognises handwriting, with a drawing function that can identify the objects you draw.
It will also feature a new and better Bixby digital assistant, which will offer more services and allow you to seamlessly control and monitor other IoT devices and services from your kitchen… using your voice alone!
The new Bixby can also identify each family member’s voice using its Voice ID technology. This allows Bixby to customise its responses and the information it provides to the individual’s needs.
The Samsung RS5000 Refrigerators
Samsung is also introducing a new generation of side-by-side refrigerators – the RS5000 series.
They will feature the new Space Max technology, which uses thinner insulation for ducts and the inner walls, creating more storage space for the same refrigerator size.
The Samsung RS5000 refrigerator will also offer Flex Zone, which allows you to individually control the temperature for separate compartments.
Finally, they offer All-Around Cooling using multiple cooling ducts, as well as a Power Cool / Power Freeze function to quickly cool new items that you just added to the refrigerator.
The Samsung WW7800M QuickDrive Washing Machine
The Samsung WW7800M washing machine is an IoT device, offering smart features allowing you to control it remotely and receive notifications via the SmartThings app.
It also features the Bixby smart assistant with features like a Laundry Planner, Laundry Recipe and a HomeCare Wizard to manage your laundry needs.
The Samsung WW7800M also comes with AddWash and QuickDrive technologies. AddWash allows you to add clothes at any time during the wash cycle, while QuickDrive lets the WW7800M cut washing time by 50% and reduce energy use by 20%.
The Samsung POWERstick Jet200 Portable Vacuum Cleaner
The new Samsung POWERstick Jet200 portable vacuum cleaner comes with a more powerful 200 watt digital inverter motor, a Jet Cyclone system and a new Turbo Action Brush head.
The POWERstick Jet200 also boasts a 5-layered HEPA filtration system that captures 99.999% of dust and allergens. And it has a 60-minute battery life, letting you clean your house on a single charge!
Symantec held an exclusive briefing on the newly-released 2019 Symantec Internet Security Threat Report. In this article, we will share with you the full briefing video, as well as highlights from that Symantec cybersecurity report!
The 2019 Symantec Internet Security Threat Report
The 2019 Symantec Internet Security Threat Report is the 24th volume published so far. Based on data from Symantec’s Global Intelligence Network, the ISTR is designed to give businesses and the public an overview of the cybersecurity threat landscape.
The Symantec Global Intelligence Network, incidentally is the world’s largest civilian cybersecurity threat intelligence network. It records events from 12 million attack sensors across more than 157 countries worldwide, blocking 142 million threats every day.
The 2019 Symantec ISTR Briefing Highlights
Briefing us on the 2019 Symantec ISTR was Sherif El-Nabawi, Vice-President of Sales Engineering, Symantec APJ; and David Rajoo, Chief Cybersecurity Architect, Symantec ASEAN.
Diminishing Returns Of Ransomware + Cryptojacking
Ransomware, which encrypts and holds data hostage in return for payment in the form of cryptocurrency, has been hit by declining cryptocurrency values as well as increasing adoption of cloud and mobile computing. This led to a 20% drop in infections.
Cryptojacking, in which malware is used to steal computing power from consumers and enterprises to mine cryptocurrency is similarly hit by the drop in cryptocurrency value. Symantec noted that cryptojacking activity declined by 52% in 2018. Even so, it is still a major problem – they blocked 3.5 million attempts in December 2018 alone!
Formjacking Overtakes Ransomware + Cryptojacking
With diminishing returns from ransomware and cryptojacking, cybercriminals now prefer formjacking.
Formjacking is basically a form of virtual ATM skimming. They basically inject malicious code into an online shopping site to steal shoppers’ payment card details.
According to Symantec, more than 4,800 websites are compromised with formjacking code every month, and they blocked more than 3.7 million formjacking attacks on endpoints in 2018.
Generally, small and medium retailers are most widely compromised, and a third of the attacks happened during the business online shopping period of the year – from November through December.
Cloud Is The New Weak Point
With the greater adoption of cloud computing, the same security mistakes are happening in the cloud… with exponentially greater consequences. In 2018, more than 70 million records were stolen from poorly-configured AWS S3 buckets.
Hardware vulnerabilities like Meltdown, Spectre and Foreshadow also put cloud services at risk of being exploited to gain access to every protected memory space in the compromised server. In a single server, data from hundreds of companies could be stolen by a single exploit.
Living off the Land Attacks On Supply Chain
Supply chain attacks using Living off the Land (LotL) tools have increased by 78% in 2018. For example, the use of malicious PowerShell scripts increased by 1,000 percent last year, with Symantec blocking 115,000 of them each month – less than 1%.
These attacks are hard to defend against, because they use the same tools users and organisations need to function. Identifying and blocking them will require the use of advanced detection methods like analytics and machine learning.
Internet of Things (IoT) Attacks Are Changing
While the volume of attacks of IoT devices remains high and consistent with 2017 levels, their profiles are changing. In addition to routers and wireless cameras, attacks now have access to smart light bulbs and virtual voice assistants.
Smartphones Are The Greatest Spying Devices
According to Symantec, smartphones are the greatest spying devices ever created. Their research show that :
45% of the most popular Android apps and 25% of the most popular iOS apps request location tracking,
46% of popular Android apps and 24% of popular iOS apps request permission to access the smartphone camera, and
email addresses are shared with 44% of top Android apps and 48% of top iOS apps!
Find out what the SUFECS project is all about, and why the team won the Microsoft Ignite People’s Choice Award!
Updated @ 2019-02-25 :Added a new video of Team SUFECS’s pitch at the Imagine Cup Asia 2019, with additional details on the SUFECS system.
Originally posted @ 2019-02-20
Team SUFECS From UTHM, Malaysia
The SUFECS team was formed by four students from Universiti Tun Hussein Onn Malaysia (UTHM).
Seah Choon Sen : Team Leader & Data Scientist
Tan Wei Yang : Technology Developer
Mek Zi Cong : Operations
Muhammad Adam bin Mazlan : Web Developer
What Is SUFECS All About?
Short for Smart Urban Farming with Automated Environmental Controlled System, SUFECS was developed to make urban farming easier and more accessible to both entrepreneurs and the common people.
Built to automate hydroponic vertical farming, it will continuously monitor and automatically adjust critical environmental parameters to ensure optimal growth. To do that, this enterprising team leveraged IoT devices, cloud computing and machine learning.
Multiple electronic sensors monitor conditions within the hydroponic system
A control module sends the environmental parameters to Microsoft Azure for processing and logging
Deviations from optimal conditions are automatically detected and corrected
The team has demonstrated that SUFECS does not only make it easy for anyone to grow their own crops in an urban, indoor environment, they are able to significantly speed up growth, reducing the time between planting and harvest.
They also showed that SUFECS has successfully increased the size of the plant, and the yield of the crops. This means their system will not only make it easier to setup and maintain an urban hydroponic farm of any size, it will create bigger and better crops.
What Can SUFECS Monitor & Control?
SUFECS is currently able to monitor and control six environmental parameters :
pH value, and
It will also monitor plant height, and alert you when it is ready for harvest.
The team is working to add the ability to monitor and control two additional environmental parameters
dissolved oxygen level
The team has, so far, developed datasets for five different plant types using machine learning.
SUFECS Wins People’s Choice Award @ Microsoft Ignite Sydney
Western Digital just announced three new open-source innovations to support its internal RISC-V SweRV Core development efforts and those of the growing RISC-V ecosystem. Learn more about Western Digital’s latest RISC-V move right here!
The New Western Digital RISC-V Developments
Western Digital’s Chief Technology Officer Martin Fink unveiled plans to release a new open source RISC-V core, an open standard initiative for cache-coherent memory over a network and an open source RISC-V instruction set simulator.
These innovations are expected to accelerate development of new open, purpose-built compute architectures for Big Data and Fast Data environments. Western Digital has taken an active role in helping to advance the RISC-V ecosystem.
This includes multiple related strategic investments and partnerships. Western Digital has also demonstrated progress toward its stated goal of transitioning one billion of the company’s processor cores to the RISC-V architecture.
“As Big Data and Fast Data continues to proliferate, purpose-built technologies are essential for unlocking the true value of data across today’s wide-ranging data-centric applications,” said Fink.
“Our SweRV Core and the new cache coherency fabric initiative demonstrate the significant possibilities that can be realized by bringing data closer to processing power.”
“These planned contributions to the open-source community and continued commitment of the RISC-V initiative offer exciting potential to accelerate collaborative innovation and data-driven discoveries.”
What Is RISC-V?
RISC-V is an open, scalable instruction set architecture that enables the diversity of Big Data and Fast Data applications and workloads proliferating in core data centers and in remote and mobile systems at the edge.
As an alternative to current, standard, general purpose compute architectures, RISC-V can be utilized to enable specialty processing, memory centric solutions, unique storage and flexible interconnect applications.
Western Digital is planning to open source its new RISC-V SweRV Core, which has a 2-way superscalar design. Western Digital’s RISC-V SweRV Core is a 32-bit, 9-stage pipeline core that allows several instructions to be loaded at once and execute simultaneously, shortening the time taken to run programs.
It is a compact, in-order core and runs at 4.9 CoreMarks/MHz. Its power-efficient design offers clock speeds of up to 1.8 GHz on a 28 nm CMOS process technology. The company plans to use the RISC-V SweRV Core in various internal embedded designs like flash controllers and SSDs.
Open sourcing the core is expected to drive development of new data-centric applications such as Internet of Things(IoT), secure processing, industrial controls and more.
Western Digital’s OmniXtend is a new open approach to providing cache coherent memory over an Ethernet fabric. This memory-centric system architecture provides open standard interfaces for access and data sharing across processors, machine learning accelerators, GPUs, FPGAs and other components.
It is an open solution for efficiently attaching persistent memory to processors and offers potential support of future advanced fabrics that connect compute, storage, memory and I/O components.
SweRV Instruction Set Simulator (ISS)
Also introduced was its open-sourced SweRV Instruction Set Simulator (ISS) which offers full test bench support for use with RISC-V cores.
An ISS is a computer program that simulates the execution of instructions of a processor. It allows external events to be modeled, such as interrupts and bus errors, and assures the RISC-V core is functioning properly.
The company utilized the SweRV ISS to rigorously simulate and validate the SweRV Core with more than 10 billion instructions executed. Western Digital expects both the SweRV Core and SweRV ISS will help to accelerate the industry’s move to an open source instruction set architecture.
“Speeds, feeds, and brute compute is no longer the winning formula for edge and endpoint computing. As more data moves to the edge for real-time processing and inferencing, configurable architectures will be better suited to meet the needs of heavy and often dynamic application workloads, especially for those driven by artificial intelligence and Internet of Things,” said Mario Morales, program vice president, enabling technologies and semiconductors, IDC. “Power efficiency, configurability, and low power will become the key metrics for edge and endpoint computing architectures.”
Availability + Resources
Western Digital’s SweRV ISS and OmniXtend architecture are available now for download at the following locations:
Xiaomi and IKEA will bring smart homes to consumers in China. Find out what this means for the future of smart homes!
Xiaomi And IKEA Bring Smart Homes To Users!
Xiaomi and Ikea In Connectivity
IKEA’s full range of smart lighting products will be connected to Xiaomi IoT platform and be controlled via Xiaomi products. This includes Xiao Ai voice assistant and the Mi Home app.
The lights can also be paired to other Xiaomi IoT smart devices such as sensors and electrical appliances for smart scene management. The smart lighting products will be connected to Mi Control Hub through the ZigBee protocol.
Xiaomi And IKEA In Smart Homes
This is the first time that Ikea has partnered with a Chinese technology company. Xiaomi IoT platform has connected more than 132 million smart devices (excluding mobile phones and laptops), and has more than 20 million daily active devices in more than 200 countries and regions around the world.
Anna Pawlak-Kuliga, CEO and president of IKEA Retail China believes the partnership will enable both companies to serve customers worldwide with smarter solutions at home.
“IKEA and Xiaomi share very similar values and I believe our cooperation will accelerate the development of the smart home industry across the world.”said Fan Dian, General Manager of the IoT platform department of Xiaomi.
Xiaomi + Third Party Developers
Since the inaugural MIDC conference in 2017, Xiaomi has been developing initiatives for developers to take advantage of the opportunities in AI and IoT. The Xiaomi IoT Developer Program was first launched last year to third-party developers access to the Mi Home platform for controlling smart home scenarios with cloud + AI + big data capabilities.
Xiaomi continues to open up AIoT possibilities by announcing that it will invest RMB 100 million to build the “Xiaomi AIoT Developer Fund”, which will be used to support AI developers, hardware equipment manufacturers and AI technology companies.
Signify (Euronext: LIGHT) today gave us an introduction and experiential tour of Philips Hue. Join us for our coverage of the Philips Hue Experience!
An Introduction To Philips Hue
Philips Hue was introduced in 2012, and first entered the Malaysian market in 2017. It is a personal wireless lighting system that allows you to remotely control your home lighting. As an IoT platform, Hue is upgradable and future-proof, with more features being added over time.
As these are IoT devices, you have the ability to remotely control them from outside of your home. In fact, you can conveniently manage your lighting – everything from brightness to colour – from your mobile device or computer. You also have the ability to save your personal light settings and recreate them at a touch of a button.
The Philips Hue Experiential Tour
The tour showcased the many features of the Philips Hue lighting system – Ambience, Feel Secure, Daily Activities, Wake Up and Go To Sleep Naturally, and Entertainment.
The Hue system comes with what they call “Light Recipes” – pre-programmed lighting settings based on Signify’s research on the biological effects of lighting on the body. They dynamically adjust the bulbs to the optimum shade and brightness of light to help you relax, read, concentrate or energise.
Philips Hue Sync
They also announced the availability of Philips Hue Sync, which increases spatial immersion of your entertainment – be it gaming on a PC, watching a movie on your TV, or listening to music on your radio. Signify wants us to think of it as surround sound for our eyes.
It is a free app (Windows 10 or macOS) that allows you to synchronise the Hue smart bulbs with games, videos and music that are being played on your computer.
Philips Hue Price + Availability
Signify offers a Starter Kit (RM 849 / US$ 212) that comes with three white and colour ambience light bulbs, and a bridge controller that plugs into your WiFi router.
Here are some direct purchase links for the Philips Hue Starter Kit, and other components:
Great companies are created on the back of innovative products or services. But to maintain their greatness, these companies need to keep innovating. This is becoming increasingly difficult because the development of new technologies is outpacing the ability of many companies to adapt, much less innovate. This is where SAP Leonardo comes in.
Join us for exclusive in-depth presentations on SAP Leonardo. Find out what SAP Leonardo is all about, and how it can help companies innovate faster and better!
What Is SAP Leonardo?
SAP introduced Leonardo at the 2017 SAPPHIRE NOW conference, combining six key digital innovation technologies into a single “digital innovation system” – machine learning, blockchain technology, data intelligence, Big Data, Internet of Things, and Analytics.
In addition to those technologies, Leonardo also offers Design Thinking methodologies, data intelligence tools, benchmarking and more. For speedy implementation, SAP even offers “Leonardo Accelerator Packages” that are tailored for specific industries and core functions, such as IoT.
SAP Leonardo Centers
Since its introduction in 2017, SAP has created five SAP Leonardo Centers worldwide, with SAP Leonardo Center Singapore as the latest addition. These are interconnected hubs that serve as points of contact for companies and startups interested in SAP Leonardo.
They are part showcase, and part collaborative centers. Their real-world examples of digital innovation using Leonardo serve as inspiration for SAP customers and partners. They also offer a place for businesses and startups to experiment and innovate, jointly or in collaborative efforts.
Innovating With Purpose
Scott Russell, President of SAP APJ, kicked things off with his keynote speech, Asia Soaring : Innovating with Purpose.
Tour & Real-World Examples
For those who missed our coverage of SAP Leonardo Center Singapore, check out this tour of the SAP Leonardo demos by Thorsten Vieth, Director of Industry Innovation at SAP South East Asia. These are actual real-world examples of Leonardo at work.
Becoming An Intelligent Enterprise With SAP Leonardo
Mala Anand, President of SAP Leonardo and Analytics, now explains how to become an Intelligent Enterprise with Leonardo. If you want to understand what SAP Leonardo is about, and how it can help your company, you must watch this!
Innovation, Integration & Scaling For CFOs
This presentation by Richard McLean, CFO of SAP APJ, is specific for CFOs (Chief Financial Officers). He brought in Anja Langhoff, Head of Finance Shared Services (SAP Singapore), who shared how machine learning technology helped improve the efficiency and employee satisfaction of her team. Manik Saha, CIO of SAP APJ, and McLean, also shared about the use of Leonardo analytics in the finance department.
Improving Customer Experience
Maggie Buggie, SVP and Global Head of SAP Leonardo Services, explains how SAP Leonardo technologies can help businesses improve customer experience.
The Hanon Systems Story
Hanon Systems, a manufacturer of automotive thermal and energy management solutions, was one of the first SAP Leonardo customers in South Korea. Robert Oh, their Global CIO & Business Transformation Executive, explained how Hanon Systems plans to launch a pilot program of Leonardo to achieve real-time visibility and monitoring capabilities, for better productivity as well as preventive maintenance.
Hanon Systems also plans to use Leonardo to automate data analysis of product detects to mitigate risks, and improve production quality. In short, Leonardo is expected to help them to create smart factories through real-time monitoring of sensing data, while improving their products using predictive analytics of their product quality data.
Connecting Innovation To The Digital Core
Paul Marriott, SVP of Digital Core & Industry Solutions, SAP APJ, summed up all the key points of the previous presentations on Leonardo, before demonstrating how artificial intelligence allows businesses to easier access business intelligence through digital assistants.
On 8 May 2018, SAP SE (NYSE: SAP) announced the establishment of the SAP Leonardo Center Singapore, to help their customers, partners, and foster faster innovation throughout the broader ecosystem of universities and start-ups across the Asia Pacific and Japan (APJ) region.
Join us for an exclusive look at the new SAP Leonardo Center Singapore, including a tour of the digital innovations that SAP Leonardo offers enterprises and businesses.
SAP Leonardo Center Singapore
SAP Leonardo Centers are interconnected hubs that serve as points of contact for companies and startups interested in SAP Leonardo. They are part showcase, and part collaborative centers. Their real-world examples of digital innovation using SAP Leonardo serve as inspiration for SAP customers and partners. They also offer a place for businesses and startups to experiment and innovate, jointly or in collaborative efforts.
Leonardo Center Singapore expands SAP’s presence in the APJ region, which already boasts three SAP Innovation Centers and four SAP Labs. It will be the fifth in the global network of SAP Leonardo Centers, serving a “front-end” to assist SAP customers in transforming their businesses with SAP Leonardo and Design Thinking.
SAP Leonardo brings together the Internet of Things (IoT), Machine Learning, Blockchain technology, Big Data Analytics and Data Intelligence on the SAP Cloud Platform. It also applies SAP’s technological capabilities and deep knowledge of 25 industries to deliver the promise of Intelligent Enterprise.
“The SAP Leonardo Center in Singapore will showcase the art of the possible in digital innovation and help our customers scale quickly, easily and effectively,” said Scott Russell, President, SAP APJ. “Together with our customers and partners, we aim to leverage the SAP Leonardo Center Singapore as a think tank to drive purpose-led innovation that will ultimately improve the lives of one billion people and deliver the Intelligent Enterprise for over 70,000 customers in APJ by 2022. The SAP Leonardo Center in Singapore will play a key role in realizing our growth strategy and drive customer success in the new Intelligence era.”
The SAP Leonardo Center Singapore aims to foster a collaborative environment for businesses, start-ups, small and medium-sized enterprises to experiment and innovate.
It will also serve as a hub for SAP’s broader digital technology ecosystem including universities, startups, tech communities and accelerators.
Through the SAP University Alliances program, SAP APJ helps to educate 1.7 million students in educational institutions across the region. SAP APJ has also established 13 labs in APJ with plans to open more in the future.
Tour Of SAP Leonardo Center Singapore
Thorsten Vieth, Director of Industry Innovation at SAP South East Asia, took us on a tour of SAP Leonardo Center Singapore. SAP created various booths to showcase real world examples of SAP Leonardo at work.
They include traffic management of an entire city, how a smart stadium manages crowds, predictive maintenance of smart trains, and ensuring safety of drivers and passengers in smart buses.
They also showed how machine learning can be used to simplify the maintenance of home appliances with IoT capability, while providing a transparent and secure service record using blockchain technology. Such capabilities not only improve the customer experience, they also reduce costs for businesses.
LG Electronics today showcased their new line-up of home technology products. With the theme, “Create a better life“, the 2018 LG Electronics home technology showcase includes their new OLED and Super UHD TVs, InstaView Refrigerators, and TWINWash washing machines.
The 2018 LG Electronics Home Technology Showcase
The 2018 LG Electronics home technology showcase kicked off with a performance by the VIVAS LED water drummers – an all-female ensemble. LG Electronics specifically featured them to showcase “pitch perfect black” quality of their new OLED TVs.
Pitch Perfect Black With 2018 LG OLED TVs
The new 2018 LG OLED TVs redefines the viewing experience with its ability to deliver pitch perfect black. They also feature Cinema HDR capability, projected through Dolby Vision, Advanced HDR by Technicolour, HDR10 Pro and HLD Pro.
The 2018 LG OLED TVs also feature the α9 Intelligent Processor that deliver better picture quality through these improvements :
Noise Reduction – the processor cleans away grainy imaging and expresses smoother contouring of colours.
Image Enhancement – the processor analyses the image frequency, allowing it to increase depth and image quality.
True Colour Accuracy – the processor supports the 33x33x33 colour space, which is 7.3x larger than the conventional 17x17x17 colour space, allowing more accurate colour reproduction, and a wider colour spectrum.
4K High Frame Rate (HFR) : HFR reduces eye fatigue with a smoother motion, and a more life-life picture quality.
The new LG ThinQ AI technology is also embedded in the 2018 LG OLED TVs, enabling users to command the televisions to perform instructions. They also support the Dolby Atmos surround sound technology.
2018 LG Super UHD TVs With Nano Cell Display
The 2018 LG Super UHD TVs boast Cinema HDR capability, as well as Full Array Local Dimming (FALD) for deeper blacks, a wider colour gamut and a greatly improved contrast ratio. These new LED TVs also have a wide viewing angle of 60 degrees, with a wide colour gamut, thanks to its Nano Cell Display with IPS Nano Dots.
For a more immersive viewing experience, the 2018 LG Super UHD TVs also support Dolby Atmos, which realistically renders a 360-degree soundscape for a true home cinema experience.
2018 LG InstaView Refrigerators
The 2018 LG InstaView refrigerators provide improved accessibility with the Knock-On feature. With just two knocks on the screen, the user can check on items inside without opening the door, reducing cold air loss by up to 41%.
This year, the Knock-On feature will be available in side-by-side models, as well as the multi-door models. To further improve energy efficiency, they will feature the LG Inverter Linear Compressor. By , using a linear piston drive, it is possible to reduce power by up to 32%, with up to 25% less noise.
The Inverter Linear Compressor also offers these other benefits :
LINEARCooling – allows even cooling, with granular temperature regulation in steps of 0.5 degrees Celsius
NatureFRESH – precise temperature control keeps produce in the refrigerator fresh for longer
DoorCooling – allows for even and fast cooling in any part of the refrigerator
2018 LG TWINWash Washing Machines
The 2018 LG TWINWash incorporates TurboWash, with multi-spray capability for faster and better cleaning performance. These LG washers with TurboWash and TWINWash capabilities allow customers to wash two loads of laundry of different wash cycles at the same time.
2018 LG DUALCOOL Air Conditioners
The 2018 LG DUALCOOL air conditioners is now filled with R32 refrigerant, which delivers faster cooling performance while being environmentally-friendly. Its Dual Inverter Compressor saves up to 70% of energy used, while deliver 40% faster cooling performance.
These new air conditioners are also enhanced by Smart ThinQ, allowing you to access and control their functions using an app. The app can also alert you about low levels of refrigerant, helping you maintain the air conditioner’s performance and lifespan.
F-Secure Regional Director of APAC and Japan, Keith Martin, flew into Singapore to ink a major regional partnership agreement with ACE Pacific Group. Timothy Shim from Tech Barrista and I had the opportunity to interview Mr. Martin about cybersecurity trends in Asia Pacific and worldwide.
Tech ARP Interviews Keith Martin
Keith Martin is the Head of Asia Pacific Corporate Business, F-Secure. Here was our exclusive interview with Mr. Martin after he officially signed the APAC partnership agreement with ACE Pacific Group.
The Cybersecurity Business
Tech ARP : How has your long experience in Japan helped you with F-Secure’s business in Japan?
Keith Martin : Japan is one of the largest market for F-Secure, and we are trying to replicate that (success) in the APAC region.
Tech ARP : Are you still based in Japan?
Keith Martin : Yes, but I have now racked up a lot of frequent flyer miles.
Tech ARP : What are your thoughts on the cybersecurity market in the APJ (Asia Pacific and Japan) region?
Keith Martin : Japan is a large market, but the growth rates are relatively stable. We look at the Asia Pacific region (which includes India, Australia and New Zealand), as the next source of growth for F-Secure.
Tech ARP : What are your plans, and areas of focus, for the APJ region?
Keith Martin : Without question, Singapore is going to be a major focus for F-Secure, as well as Australia and New Zealand. We just signed a major partnership agreement with ACE Pacific, which will be a cornerstone of our strategy in coming years.
Tech ARP : Chinese and Russian companies have been hit by accusations of cyber espionage and hacking, loose security and/or inserting backdoors into their products. Do you see this as a good opportunity to promote F-Secure’s products, or is this a poison pill for the entire industry?
Keith Martin : I don’t think it’s a poison pill for the entire industry. I have never seen any direct evidence that these go beyond mere accusations, but I understand the need to be cautious. One of the things that F-Secure is proud of is our policy that we will never add a backdoor into our products.
We are willing to walk away from any business if it means adding a backdoor. This is just the way we operate, because Finland has extremely tough privacy laws.
I think it’s absolutely an opportunity for us to differentiate ourselves (from the other cybersecurity companies) with our public pledge never to add backdoors in our software.
Tech ARP : Some countries like China and Russia are demanding access to encryption keys, and in some cases, requiring registration of VPN services. How do those tightening laws affect F-Secure products like Freedome VPN?
Keith Martin : F-Secure is very focused on maintaining the security of our products, so if those are the requirements, we will decline and get out of those markets. We would rather walk away from the potential business, than compromise the security of our products.
Tech Barrista : On the geopolitical implications of malware, do you feel that governments are increasingly more focused on cybersecurity on a national scale?
Keith Martin : For sure. We now see nation states attacking each other. There’s no denying that fact. Look at Stuxnet, that malware (which was targeted at Iran) got released into the wild and suddenly, people have the technology to use it elsewhere for nefarious purposes. I think that any country that does not pay attention to cybersecurity is sticking their heads into the sand.
Tech Barrista : Do you feel that this presents a greater opportunity for F-Secure?
Keith Martin : It represents opportunity, of course, but our mission as a company is to stop the spread of malware and cybersecurity attacks, wherever they happen. It’s a kind of Catch-22 situation, where we wish that nation states would not attack each other, but yes, we have the opportunity to help them protect themselves against such attacks.
Tech ARP : What is F-Secure doing to promote and enhance source code transparency? Like opening up transparency centers?
Keith Martin : At this point in time, there are no plans to do so. We have a very good reputation throughout our 30-year history of being straightforward and upfront. I have never seen any accusations against us of malicious activities.
Tech ARP : Does F-Secure allow corporations or countries with concerns to inspect their code?
Keith Martin : I don’t know of any specific situations in Asia Pacific where F-Secure has allowed this. It may have been allowed in other regions, where governments have specific concerns, but I’m not aware of those situations.
Tech ARP : Ransomware and phishing attacks are big problems these days. Can you detail how F-Secure can help users prevent or mitigate the risks of ransomware and/or phishing attacks.
Keith Martin : Third-party analysis of our software show that we are actually better at detecting these 0-day attacks than any other companies out there. We pride ourselves in detecting not just the malware we know about, but also the malware we don’t about, using technologies we have been developing over the last 20 years.
We have a multi-layered engine, where we use everything from the basic pattern matching technology, to heuristics, etc. so that if it doesn’t catch the malware on the first layer, it will catch the malware on the second or third or fourth layer.
Tech Barrista : Is malware-as-a-service now common?
Keith Martin : It is becoming more and more common. The entry barrier to launching a malware attack is now much lower due to the ability to outsource the creation of the malware.
Cybersecurity Risks Of IoT Devices
Tech Barrista : With cybercriminals leveraging the Internet of Things and Artificial Intelligence, how much more complex do you see the cybersecurity landscape becoming?
Keith Martin : It’s becoming incredibly complex. Our Chief Research Officer Mikko Hypponen said, “Once you connect something to the Internet, it’s vulnerable“. Billions of devices connected to the Internet become potential attack vectors for cybercriminals.
Most IoT devices don’t have good security. If you can get into one of those devices, you can get into the network through them.
Tech ARP : Does F-Secure have any products to mitigate the risks of poorly-secured IoT devices?
Keith Martin : On the consumer side, we have F-Secure Sense, which protects every device on your network.
Keith Martin’s Professional Bio
Keith Martin has been Country Manager for F-Secure Japan for 2 years, before being promoted in February 2018 to oversee the entire Asia Pacific region.
Prior to joining F-Secure in 2015, he spent a decade in the telephony and contact center space, first working for four years in Avaya Japan as Director of Multinational Account Sales, followed by six years serving as Japan Country Manager for Interactive Intelligence, a pioneer in cloud contact center technology.
Before that, Keith also spent three years at internet startup ValueCommerce helping build their web hosting platform business before the company was acquired by Yahoo Japan. He got his start at global IT services provider EDS (now HP), delivering IT services to numerous financial industry accounts.
On 19 March 2018, TUV Rheinland invited us to an exclusive Industry 4.0 cybersecurity seminar. Entitled Cyber Risk Management for Industry 4.0, it looks at the role of cybersecurity in securing critical infrastructure and heavy industries, and paving the way for Industry 4.0.
Join us for the presentations by TUV Rheinland cybersecurity experts on how you can secure your company against the latest cyberthreats.
Industry 4.0 refers to the new industrial trend of creating “smart factories” with highly-networked manufacturing technologies.
Also referred to as the 4th Industrial Revolution, it makes use of cyber-physical systems, Internet of Things, cloud computing and cognitive computing, to automate almost every aspect of the manufacturing process.
Fun Fact : The name Industry 4.0 comes from the German “Industrie 4.0” from the high-tech strategy of the German government to promote the computerisation of manufacturing.
TUV Rheinland : Cyber Risk Management for Industry 4.0
The Cyber Risk Management for Industry 4.0 seminar is a platform for TUV Rheinland to share their insights on developing cybersecurity measures to manage operational cyber risk, be it for smart factories, smart devices or smart vehicles.
According to TUV Rheinland, the discipline of Cyber Risk Management can be effectively implemented if cybersecurity and privacy are addressed by design – both in strategy as well as operations. Let’s hear from their experts…
Operational Technology Protected
by Nigel Stanley, Chief Technology Officer of TUV Rheinland Industrial
Automotive Cyber Security
by Rajeev Sukumaran, Director of TUV Rheinland Consulting Services
It hasn’t been a year since HARMAN International became a wholly-owned subsidiary of Samsung Electronics focused on connected technologies for automotive, consumer and enterprise markets, and the two companies have already leveraged their combined teams and resources to drive future mobility forward.
Unveiled today at CES 2018 are a host of unique connected car solutions that support HARMAN and Samsung’s joint mission to become the leader in connectivity and autonomous driving: connecting the lives of people, whether at home, on the go, or together in the car.
The Samsung + HARMAN Tech Updates
These key innovations showcase an integrated approach to a rich digital car experience, including:
A reinvented digital cockpit platform for all vehicle segments that has given the interior of the car a makeover;
A new telematics solution along with the industry first automotive-grade 5G-ready connectivity solution; and
An ecosystem of partners and solutions to further build out the Samsung open autonomous platform, along with a showcase of our first implementation of this together with TTTech.
Each new solution was made possible through the HARMAN-Samsung alliance that leverages Samsung’s global scale, R&D capabilities, dominance in mobile/TV/semiconductors and distribution channels and HARMAN’s leading connected car heritage, relationships, market knowledge and growing community of innovation partners. Both companies are also making global investments in start-ups to help OEMs meet growing consumer demand for in-vehicle technology through scalable solutions that enhance the user experience for every vehicle segment.
New HARMAN Digital Cockpit Platform
The new Digital Cockpit platform includes a suite of flexible and scalable premium experiences that support today’s connected lifestyles without compromising safety or performance. It’s available in standard and advanced system configurations and can seamlessly integrate the instrument cluster with center console via voice, haptic feedback, and physical knobs and steering wheel controls in a single, center screen for all vital vehicle information and features. This also supports a multi-modal approach for interactions with different human-machine interfaces to allow customization in terms of HVAC, media and user settings.
The Digital Cockpit platform brings an entirely new generation of communication and ergonomics inside vehicles, allowing drivers to focus on the road ahead while intuitively and safely interacting with their in-car technology. This is made possible through a projection mode for services and apps via a user’s smartphone, allowing for increased personalization. A greater IoT ecosystem via cloud technology in the entry-level segment, as well as mid/high-level configurations, not only improves connectivity, but helps lower costs and overall vehicle weight.
In a premium configuration, the Digital Cockpit weaves together a driver’s entire connected lifestyle across the Internet of Things. Through a multi-display layout that leverages HARMAN’s Ignite Platform, the in-car user experience can be personalized for the driver and passenger via services such as virtual personal assistants, portable profiles, augmented reality and more. This also allows for the Android OS to be integrated on four displays – a first for the industry.
Focused on a future generation of shared mobility, the premium Digital Cockpit personalizes occupant experiences, so drivers and passengers feel like the car is theirs even if they don’t own it. By leveraging the phone as a key service, the system can automatically access subscription services associated with user profiles while Bixby offers intelligent personal assistance to help occupants complete tasks by voice, touch, gesture and context-based triggers.
The Digital Cockpit is scalable and made available for every automotive segment, offering future proof and safety focused features within a developer-friendly open ecosystem.
First 5G Automotive Telematics Solution and Customer
HARMAN and Samsung are jointly developing modular approaches for advanced telematics, capable of 1 Gb/s bandwidth.
HARMAN and Samsung will deliver the industry’s first 5G-ready automotive solution and multi-band conformal antenna to enable secure, fast and reliable data communications. The solution consists of a telematics control unit with a modular design accommodating a network access device (NAD) supporting LTE CAT 16 connectivity today and 5G in the future leveraging the same hardware design.
5G represents a paradigm shift in the future of mobility. In the automotive sector, 5G delivers safety-enhancing C-V2X capability that is an essential enabler for autonomous transportation. 5G boosts speeds up to 100X faster than current 4G LTE standards to provide incredibly fast high-resolution streaming, immersive virtual and augmented reality features and seamless cloud-based applications in fast-moving cars.
Ultra-reliable and with low-latency response times of just 1ms, 5G enables C-V2X and cloud-based compute and storage for the next generation autonomous vehicles. HARMAN today announced that a leading European automaker will be the first customer for this solution. At CES 2018, HARMAN and Samsung will demonstrate high speed connectivity in a future mobility concept vehicle powered by the Samsung Networks 5G infrastructure.
Samsung + HARMAN DRVLINE Platform
Developed in close collaboration with HARMAN, Samsung announced its new DRVLINE platform, an open and modular platform for autonomous driving designed to scale from Level 3 automation up to Levels 4 and 5.
The two companies will continue to focus on engineering, high-performance computing, sensor technologies, algorithms, artificial intelligence, and cloud and connectivity solutions that are scalable and capable of lower-level autonomy through to Level 5.
The first HARMAN/Samsung-developed ADAS product will be a forward-facing camera featuring lane-departure warning, adaptive cruise control, collision warning and pedestrian warning algorithms. The new system combines Samsung’s heritage in camera technology with HARMAN’s ADAS 360 solution that blends machine learning and data science with augmented reality to create a self-learning virtual co-passenger to ensure the connected driving experience is personalized and safe.
Ettienne Reinecke, Dimension Data’s Group Chief Technology Officer, reveals the Dimension Data 2018 IT Predictions!
The Dimension Data 2018 IT Predictions
The Dimension Data 2018 IT Predictions that was just published, noted the importance of blockchain, artificial intelligence, machine learning, robotics as well as virtual and augmented reality in 2018. They all have the potential to “deliver disruptive outcomes” and “reshape digital business”.
Ettienne Reinecke, Dimension Data’s Group Chief Technology Officer, says Blockchain has gone from strength to strength. “Last year, when we looked at the top digital business trends for 2017, we predicted that centralised transaction models would come under attack. We were spot on. In the financial services sector, we’ve seen the US and European capital markets moving onto Blockchain platforms, and similar activity in markets such as Japan. Considering how conservative and compliance-focused this sector is, that’s quite remarkable.
“It’s ironic that the cybercriminals who perpetrated the recent WannaCry ransomware attack could hold a federal government to ransom and demand to be paid in Bitcoin. Bitcoin might be a crypto-currency, but it’s based on Blockchain, and if cybercriminals are confident that Bitcoin provides a safe mechanism for the payment of ransoms, it indicates just how secure the distributed ledger approach is. I believe that Blockchain has the potential to totally re-engineer cybersecurity, but the industry has yet to come to terms with it.”
Blockchain And IoT
Reinecke predicts that Blockchain will also deliver on the promise of Internet of Things (IoT) in the year ahead.
“In the world of IoT you’re generating millions of small transactions that are being collected from a distributed set of sensors. It’s not feasible to operate these systems using a centralised transactional model: it’s too slow, expensive, and exclusive. To extract the true value from IoT technology you have to be able to operate in real time. Once a sensor alert is received from a control system you must react to it, meter it, and bill for it instantly – all of which negates the viability of a centralised transactional authority. The cost of the transaction has to be near-zero or free, and the cost elements of a centralised model simply don’t support the potential business model in IoT,” he explains.
In 2018, some interesting applications of Blockchain and IoT in the area of cybersecurity will emerge. Significant attacks have recently been launched from low-cost IoT endpoints, and there’s very little incentive for manufacturers of these devices to incur the cost of a security stack, which leaves them extremely vulnerable. Blockchain can play a fundamental role in securing these environments.
New Wireless Technologies
Another exciting trend to look forward to is the boom in new wireless technologies that will enable IoT and bring us a step closer to the dream of pervasive connectivity. Some of these advancements will include 5G and Gbps Wi-Fi, new controls, virtual beacon technology, and low power, long distance radio frequency.
There’s also a “digital fight-back” coming on the part of certain incumbent players. Established businesses that have proactively transformed into digital businesses, modernised their architectures, and embedded high levels of automation into their operations have a window of opportunity to claw back market share in the year ahead. That’s because there’s been an increase in the number of cloud-born start-ups themselves starting to be disrupted in certain industries.
“I predict that a number of digitally transformed incumbents will successfully start reclaiming their markets because they have more credibility, longer histories, an established customer base, and assets that can stand the test of time,” says Reinecke.
On 8 June 2017, Digi Telecommunications revealed to us the first IoT solution to debut from their Connected Vehicle project – the Digi iFleet fleet management system. This is a B2B solution targeted at commercial vehicles, offering an all-in-one solution for businesses to track their vehicle fleet in real-time.
Digi Connected Vehicles
Digi is transforming from its beginnings as a telecommunications provider into a digital company. To diversify their revenue streams, they are leveraging their 4G+ network to offer IoT solutions. Their Connected Vehicles project is the first of many IoT verticals that Digi is venturing into.
Digi is particularly interested in the commercial vehicle market, which boasts more than 27.6 million registered vehicles. The market is also projected to grow at 60,000 additional vehicles per year. With SPAD ICOP safety guidelines requiring these vehicles to have real-time tracking systems, this is a huge market for a fleet management system. This is where the new Digi iFleet service comes in.
Digi iFleet Fleet Management System
Digi iFleet is a B2B solution targeted at commercial vehicles. This is the first IoT solution Digi is introducing from its range of Connected Vehicle offerings. This fleet management service enables businesses to track their fleet in real-time. Digi believes it’s the most robust all-in-one solution in the market, with the following advantages over its competitor :
All inclusive solution that takes care of hardware, software and connectivity at one go
Advanced tracking technology providing greater fleet insights to improve business productivity
Driver behaviour insights and scoring to instil safe driving culture
A continuously evolving value-added solution introducing features beyond tracking, such as smart fuel management and usage-based insurance (UBI) ready to name a few
While Digi is rather late to the fleet management market, they believe that Digi iFleet will disrupt the market with its end-to-end system, and affordable fee with no major cost outlay. How does Digi iFleet do that? For that, we have Selina Wong, the Digi iFleet Product Manager, who explains it all in this video.
The Digi iFleet solution consists of both hardware and a cloud-based service. When a business signs up for iFleet, a tracking module will be attached to the battery of their vehicles. The tracking module has independent sensors and a built-in modem that transmits data to the Digi iFleet system every 10 seconds. It also has an internal battery that last 4 hours, and 8 MB of flash storage.
If necessary, Digi can enable roaming for vehicles that need to cross national borders during their deliveries. Otherwise, the internal flash storage is sufficient to store about a month’s worth of data. The module is designed to transmit the data whenever it is within range of the Digi network.
According to Digi, iFleet is already being used by logistic providers like SnT Global, and piloted across diverse industries like FMCG, automobile and infrastructure with brands such as Peugeot, Kia, Gamuda and Citylink.
Digi iFleet Price & Availability
Digi iFleet is available to all Malaysian enterprises at just RM 90 per vehicle per month.
Companies that are Digi Enterprise Business customers will be entitled to a special offer. If they sign up by 30 June 2017, they only need to pay RM 75 per vehicle per month – a 16.67% discount.
Coming Soon In 2H 2017 : B2C & UBI Solutions For Private Vehicles
Digi will introduce a B2C connected vehicle solution in 2H 2017 that will offer private vehicle owners a solution that encompasses tracking, driver safety, vehicle security and smart in-vehicle services for an affordable price.
In addition, Digi is also preparing to introduce usage-based insurance solutions when the insurance tariff is liberalised in July 2017. They will allow private vehicle insurers the capability to price motor insurance premiums according to actual individual vehicle or fleet performance. This will reward good drivers with lower premium payments.
Kuala Lumpur, Malaysia, 03 April 2017 – Cenviro today announced that it will be deploying multiple SAP solutions including SAP Suite on HANA with IS-U Waste Management as part of the organisation’s digital transformation. The deployment will leverage on the services of Deloitte Consulting SEA with iTelligence Outsourcing MSC as hosting partner.
Cenviro, a wholly-owned subsidiary of Khazanah Nasional Berhad, is a leader in the Malaysian green solutions revolution, providing innovative environmental solutions through a cradle-to-cradle philosophy. The company leads in all areas of waste management, from treatment to recycling, recovery and final disposal.
Cenviro also owns and operates Malaysia’s first integrated waste management centre in Negeri Sembilan, a state-of-the-art facility which meets stringent international and local standards.
One of the pressing requirements that Cenviro needed to address, as its business grows, is reconciling financial data from different sources. The management was also aware of the need to improve operational performance monitoring throughout the group of companies.
Upon evaluating several options, Cenviro decided to work with SAP and its partners, Deloitte Consulting and iTelligence Outsourcing MSC, to deploy a fully-integrated ERP (enterprise resource planning) system. In the process of evaluation, Cenviro’s management recognised that SAP had the ideal, proven solution to address these issues, and the possibility of customising unique modules tailoring to Cenviro’s requirements.
The Cenviro Implementation Of SAP Suite On HANA
At the initial phase of its implementation, Cenviro will look towards the SAP Suite on HANA with IS-U for Waste Management. IS-U is SAP’s industry specific solution for the utilities vertical which includes best practices for waste management within an integrated system.
The platform is designed to facilitate business process simplification and improve decision making and to pave the way for future innovations. It includes capabilities to optimize activities for performance management, sales, finance, operations and human resources. With this, Cenviro sets its sights on becoming more efficient as it consolidates its processes by leveraging business intelligence solutions.
Ultimately, SAP waste and environmental services solution is intended to streamline and optimize commerce, service, logistics, billing, and customer engagement activities. The software will enable Cenviro to meet critical business, technical, and personnel-related requirements cost-effectively to help it offer better and more efficient waste disposal services.
“SAP has long been a forerunner in helping companies simplify their operations and our mission is to lead the global transformation in the new digital economy, empowering companies to reimagine their business using the SAP digital business framework. We’re excited to be working with Cenviro on a project of this scale and look forward to working hand-in-hand with the company as it embarks on further expansion,” said Terrence Yong, Managing Director, SAP Malaysia.
“SAP S/4HANA is the digital core that paves the way for latest technologies such as the Internet of Things (IoT), Big Data, real-time analytics, mobile, business networks, third-party systems, and more. With SAP solutions, Cenviro can now run its business more efficiently and in ‘real time’,” added Yong.
5 December 2016 – One day, everything will be buttonless. Nobody will ever need to grab the remote to turn on the television or hit a switch to kill the lights. These devices will just do what they’re supposed to, all by themselves, without any physical prompts from the user. They won’t be set off by claps, or voice commands, or hand gestures in the air. They will gain a certain level of independence that will diminish the need for human interaction. This is the very inevitable, very near, and very real future. Smart technology is here, and it’s only getting smarter.
Welcome to the Smart Home
Often, people talk about these technologies and the internet of things (IoT) as if automation were the only criteria for gadgets and infrastructure to be called smart. But it’s more than just that.
Firstly, for any device to fall under IoT, it needs to go beyond its original basic functions. It has to be able to receive, process, and transmit digital information the way a personal computer normally does. In order to do this, it should meet a second requirement—connectivity. The device should have the ability to connect to the internet or even communicate with other smart machines around it.
Think of it this way: A smart home fitted with automated blinds can have them immediately open once the sun rises. This triggers the smart lightbulbs inside the house to turn off. This relay of actions allows natural sunlight to come in, illuminating the house while saving on energy. Another example of devices communicating with each other is when a smart TV’s volume goes down every time a phone call comes in. This makes it easier for the user to notice the call.
Both automation and connectivity have helped push IoT forward, but, in the same way, they have also held it back.
The Inevitable Rise of Home IoT Adoption
For a number of years, the mass adoption of IoT has stalled. Users found smart devices impractical. The production of these one-off gadgets was very costly, thus driving up their prices. A few years ago, they were more of a luxury than a necessity. On top of this, not every country in the world has the kind of infrastructure needed to make internet access available to everyone. The early adopters were limited to enthusiasts who had the money to afford IoT devices and were based in regions that allowed them to optimally use their devices.
But the market has since shifted. People are clamoring for smarter things to either ease their daily lives or be a source of personal pleasure. And the industry is taking notice.
The market has since shifted. People are clamoring for smarter things to either ease their daily lives or be a source of personal pleasure. And the industry is taking notice.
Multi-billion dollar companies out of Silicon Valley are trying to one-up each other in terms of innovation, offering a very diverse collection of IoT devices to the public. Companies, regardless of size, that are not willing to acknowledge this shift will eventually get left behind. Some things that come to mind are those cellphone giants that did not respond to the shifting consumer demand for smarter phones. They eventually disappeared.
Research and advisory firm Gartner even predicted that there will be over one billion connected devices in use by 2018, and that figure alone is just for smart homes. Another billion devices are projected to be used in smart commercial buildings. The remaining billion devices are divided accordingly to industries such as healthcare, transportation, and other organizations that make up fully functional smart cities.
Japan and Germany are two of the many countries whose urban areas are already embracing smart homes. In these places, IoT has become ingrained in people’s lives to the point of necessity.
In metropolitan Japan, where commuting takes a big toll, workers are able to save time and energy during their long rides from their office to their house through home automation. Apartments with smart cookers, for example, can churn out meals which should be ready by the time their owners step through the front door.
In Germany, where the elderly make up a significant portion of the population, a number of people have opted to use smart health-monitoring devices. In the event of an emergency, like a heart attack, the device can trigger a call for emergency assistance. These monitors can save people’s lives.
Holding Accountability for Home IoT Security
The rise of the home IoT adoption rate will ultimately increase the competition between several players in the market. But with no unified regulating body to instill functional and security standards on these devices’ manufacturers, this can lead to several security issues in the long run.
This then begs the question: Who should be responsible for IoT security?
The IoT landscape is continuously evolving. As IoT branches out from user homes and into the city, users become significantly more powerless.
Should it be the IoT users? At the moment, it seems to be the case. Users have the freedom to decide which IoT devices to introduce to their homes. They can opt to install a smart home entertainment system in their house knowing what kind of information they could be sending back to the device manufacturer every time they use it. It’s an ongoing tradeoff, with users weighing their personal privacy and safety against their personal comfort and satisfaction.
But the IoT landscape is continuously evolving. As IoT branches out from user homes and into the city, users become significantly more powerless.
A good illustration would be new smart condominium units already being fitted with IoT devices like security cameras or emergency sensors. People who will be moving into these spaces will have no other choice but to opt in to that level of surveillance. Just imagine if all future building developments, both private and public, were required to have these IoT devices in place.
Once smart technologies get broadly used for public utility buildings or vehicles, users will have no reign over their privacy and personal security. The brunt of that responsibility ultimately shifts from the users to the IoT manufacturers. What risks should manufacturers foresee to protect both their users and their organizations from potential disaster?
Support Tech ARP!
If you like our work, you can help support our work by visiting our sponsors, participate in the Tech ARP Forums, or even donate to our fund. Any help you can render is greatly appreciated!
On 24 November 2016, SAP and IDC hosted an exclusive briefing on the future of the Malaysian Internet economy. The timing is impeccable because the Malaysian government has declared that 2017 should be the “Year of the Internet Economy“.
Their analysis and opinions on how Malaysian businesses and entrepreneurs should chart their courses going into 2017 are invaluable for anyone who wants to stay relevant in the new age of the Internet economy. We all need to stay on top of the wave of new developments, or risk having it crash on us.
2017 – The Year Of The Internet Economy
In 2015, the Malaysian Internet economy contributed 17.8% to the GDP (Gross Domestic Product), just shy of the 18.2% target set for 2020. On the back of this rapid growth in importance, Prime Minister Datuk Seri Najib Tun Abdul Razak called on Malaysians to “embrace, adapt to changes and explore new areas of growth to accelerate the economy“.
SAP Malaysia is in full agreement of this view. In the past decade, the rate of adoption of new technologies has accelerated and technology is changing the rules of business with disruption becoming the norm. This will accelerate in 2017 and local businesses need to absorb, understand and adapt to these underpinning seismic shifts taking place, particularly with regards to Internet of Things and Big Data Analytics.
SAP Malaysia Managing Director Terrence Yong kicked off the session with his view on the Malaysian digital economy, and how IoT and big data analytics are changing the way we make, buy and sell products and services.
IDC Asia-Pacific Research Director Chin Jun Fwu then shared his findings on the adoption of the latest IoT and big data analytics here in Malaysia, before SAP (Southeast Asia) Head of Analytics Kathleen Muller touched on the impact of data analytics and the Internet of Things, particularly for SMEs (Small and Medium Enterprises).
Unfortunately, the current adoption of big data analytics and IoT in Malaysia is low. The key takeaway is that price is not really the issue, but rather inertia. Even if they are aware of what they must do to adapt to the changing world, there is resistance to learning new ways.
That will have to change, soon. Otherwise, even the most established businesses may lose out to their more nimble competitors.
On October 1, 2016 – Krebs on Security reported that the source code for the Internet of Things (IoT) botnet malware Mirai had been posted online and was freely available for download. Mirai reportedly spreads through Telnet brute-forcing, indicating that this a current, on-going issue. But what is Telnet and what are the implications of its use?
How The Mirai Malware Uses The Telnet Protocol
As a user, the Internet appears to consist predominately of websites and the servers that support them. It is easy to miss the enormous range of systems that are beneath the surface. In this article, we will plumb the depths of the Internet a little to see what goes on behind the scenes.
While there are almost 14 million devices on the current Internet using the Secure Shell (SSH) protocol to encrypt remote machine access, there are still over 15 million devices using the Telnet protocol.
Telnet was deprecated in favour of SSH as Telnet sends credentials (username/password) in clear-text and any attacker on that network path can intercept the credentials. Additionally, Telnet rarely has brute-force protection enabled so attackers can take their time sending well-known username/password combinations to a device in order to attempt to gain access.
Telnet, however, has other interesting angles to it for security research. As it has been deprecated, it is typically still visible on legacy equipment, in particular network infrastructure equipment. In short, Telnet typically appears on older network equipment. This is very helpful shorthand for an attacker.
The equipment in question falls into a number of basic categories:
Routers, Firewalls and VPNs for organizations
(Industrial) Control Systems
One major issue for older network equipment running telnet, is that they typically do not have the same security engineering practices as modern devices. For example, default credentials. Whilst many devices unfortunately still ship with default credentials, some devices even advertise that they are currently configured to use them!
The routers of one well-known manufacturer have default administrator credentials detailed in the telnet banner. Our research has yielded over 20,000 of these devices currently connected to the Internet, some of which were from within government departments.
Home routers are an attractive target for people attempting to make DDoS botnets as vulnerabilities that these devices have are frequently wormable. That is, a piece of code can be deployed which autonomously seeks out vulnerable devices, compromises them and uses these freshly compromised devices as launching pads for the next wave of attacks.
In a twist of events, one worm infecting Linux home routers, called Wifatch or REINCARNA, actually displays a warning message on the Telnet banner that the device has been infected and provides instructions for how the user can protect him or herself. Our research indicated over 82,000 infected devices that were infected by REINCARNA. The banner is displayed below:
“Telnet and other backdoors have been closed to avoid further infection of this device. Please disable telnet, change root/admin passwords, and/or update the firmware.”
The Telnet banner is also often used to issue legal threats, for example, “PRIVATE ELECTRONIC DEVICE” yields 139 results. The threat of “imprisonment” is also wielded by 3048 devices. Military systems have their own kinds of banners informing the user that information on its usage is collected “or purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct, law enforcement, and counterintelligence investigations.”
Other more esoteric devices such as Automatic Number Plate Recognition (64 devices), 3G backup routers (31 devices), GPRS modems (33 devices) and cable set-top boxes (213 devices). The full numbers are naturally much higher, but we simply want to demonstrate the diversity of devices connected to the public Internet.
Our research shows that legacy network protocols can still endanger us today. The combination of cleartext passwords – such as no encryption, default or weak credentials – and ease of brute-forcing make Telnet an attractive target. Coupled to that is the fact that Telnet is still often enabled on network devices. The perfect storm? It remains to be seen.
Support Tech ARP!
If you like our work, you can help support our work by visiting our sponsors, participate in the Tech ARP Forums, or even donate to our fund. Any help you can render is greatly appreciated!
SAP today released the results of their inaugural SAP Digital Experience Report. Conducted among 500 participants requiring them to rate about 1400 digital engagements, the survey reveals that Malaysia only achieved a DX (Digital Experience) score of 17%.
The DX score is derived as the difference between consumers who are delighted with their digital experience (43%) and consumers who are unsatisfied (26%) with their digital experience. There is certainly much room for improvement here given that the average score in the region comes up to 27%.
The SAP Digital Experience Report was presented by Terrence Yong, Managing Director of SAP Malaysia who said “Malaysia is at an exciting time in its development. With 14 million digital consumers, digital is becoming a part of our daily lives. This rapid growth is also making consumers in Malaysia more sophisticated in their digital preference. To help them navigate through a multitude of devices and apps, customers are demanding simple, seamless and personalized experiences across any channel, anytime, anywhere, and on any device. As evident from SAP’s Digital Experience Report, brands that fail to realize this will see a drop in share of consumer’s wallet”
Key Findings From The SAP Digital Experience Report
Here are the key finding from the report:
Consumers in Malaysia are, on average, delighted with their digital experiences
There is a strong correlation between digital experience and net promoter score (NPS) and loyalty
There is a strong correlation between digital experience performance and customers’ willingness to provide private data
It is interesting to note that despite all the concerns about privacy and security of personal data, consumers are very willing to divulge sensitive personal data to brands that they trust (or in this case satisfied with). This includes data on personal profile, main financial institutions, education level, occupation level, buying preferences, health or medical records, personal finances, mobile phone records, social media usage and even web browsing history.
These kind of data is crucial to businesses today especially in the world of Big Data and IoT where SAP could develop solutions to make sense of these unstructured data into structured data to assist business in the ever changing business environment. With these data at hand, businesses will also be able to provide a more personalized solutions and products to its customers.
SAP in its report then reveals some of the key factors which matter most to consumers that will help them to improve their digital experience. The top 3 factors which consumers find most important being:
Safety and security
Availability at any time
Cohesive, integrated and simple
So what does this mean to the digital business? To excel digitally, brands must align their people and processes – not just in their marketing or digital teams, but across lines of business – onto a single platform architect-ed with the customer in mind.
To engage the customer digitally, businesses will have to engage the workforce and suppliers – and to marshal all of the assets to enable the elusive delightful digital experience. SAP calls this platform the digital business framework.
On the first day of Computex 2016, Diane M. Bryant and Navin Shenoy from Intel gave an hour-long keynote on “Expanding the Boundaries of Computing“. It was basically a combination of new product announcements and the technologies that Intel will be focusing on going forward.
Diane M. Bryant is the Executive Vice President and General Manager of Intel’s Data Center Group, while Navin Shenoy is the Corporate Vice President and General Manager of Intel’s Client Computing Group. Hang on to every word they say, because they will show you why Intel is changing direction.
Real Possibilities With RealSense
Before the Intel Computex 2016 keynote started, there was a wushu demonstration. It was not mere entertainment, but a demonstration of Intel RealSense’s ability to follow the wushu master’s moves, and Intel processing power in determining how the background display should react to her movements.
The Intel Computex 2016 Keynote
Here is the 70-minute long Intel Computex 2016 keynote in its entirety. We will summarise the 5 key takeaways from this keynote in the following section.
5 Takeaways From The Keynote
No. 1 : Intel’s Evolution Is Underway
Last month, Intel CEO Brian Krzanich radically changed the direction for the entire company, based on five core beliefs :
The cloud is the most important trend shaping the future of the smart, connected world – and thus Intel’s future.
The many “things” that make up the PC Client business and the Internet of Things are made much more valuable by their connection to the cloud.
Memory and programmable solutions such as FPGAs will deliver entirely new classes of products for the data center and the Internet of Things.
5G will become the key technology for access to the cloud and as we move toward an always-connected world.
Moore’s Law will continue to progress and Intel will continue to lead in delivering its true economic impact.
That change is underway, with Navin Shenoy describing how Intel will change the way we view computing. He not only emphasised the future of connected homes, smart vehicles and drones, but also unveiled new products to deliver new capabilities in those spaces.
No. 2 : Visual cloud, machine learning unlock human potential
Video streaming is now taking up almost 80% of all Internet traffic, so delivering that content via the cloud is top priority for many service providers. To help them accelerate video encoding for secure streaming, Intel announced the Intel Xeon E3-1500 v5 family of processors. This allows service to pack more video streams into a single server or appliance for a minimized data center footprint and reduced power consumption.
Intel demonstrated that capability by live-streaming a 360-degree virtual reality jazz concert delivered from the legendary Blue Note Jazz Club in New York using hardware-assisted 4K video delivery on Intel Xeon E3-1500 v5 servers.
No. 3 : Continuing to push the boundaries of PC innovation
Intel will continue to work on newer and faster processors. To demonstrate that commitment, Intel announced the availability of the new Intel Core i7 Extreme Edition processor. This is the first 10-core desktop processor that can handle up to 20 threads simultaneously.
Intel also confirmed that the 7th Generation Intel Core processors (codenamed Kaby Lake) as well as the low-cost Intel Pentium, Celeron and Atom processors (codenamed Apollo Lake) are on schedule for release later in Q3, 2016.
No. 4 : “Things” are getting smarter and more connected
Intel is betting on connected homes, vehicles and the Internet of Things. They demonstrated that by announcing the Intel AnyWAN GRX 750 system-on-a-chip (SoC) family and the Intel XWAY WAV500 Wi-Fi chipset – Intel’s new 5th Generation 11ac MU-MIMO Wi-Fi family of products for home gateways.
The Intel Atom x3 (formerly known as SoFIA) lives on though. Intel will continue to expand Intel Atom x3 processor-based solutions for products like point-of-sale systems, healthcare tablets and industrial devices within the IoT.
No. 5 : 5G will transform mobility
5G is not just about faster mobile Internet. It is about more powerful wireless networks that connect “things” to each other, to people and to the cloud. To that end, Intel announced an agreement with Foxconn to collaborate on the development of 5G network infrastructure technologies like Mobile Edge Computing, Cloud Radio Access Network (CloudRAN) and Network Functions Virtualization (NFV).
Support Tech ARP!
If you like our work, you can help support our work by visiting our sponsors, participate in the Tech ARP Forums, or even donate to our fund. Any help you can render is greatly appreciated!
Taipei, Taiwan, 23 February, 2016 – VIA Technologies, Inc. today announced that it will demonstrate the new VIA Mobile360 In-Vehicle Surround View Fleet Management System at Embedded World 2016. The company’s booth is located at 4A-251 in Hall 4 of the Nuremberg Exhibition Centre.
Specifically designed for real-time commercial vehicle monitoring, security, and tracking applications, the system utilizes VIA Multi-Stitch Technology to seamlessly combine up to six camera feeds on the fly and create an all-encompassing 360° view that can be viewed locally or remotely.
VIA Mobile360 Key Features
Ruggedized chassis with extended temperature support
Flexible voltage input
Up to 8 PoE or 8 CSI camera support
360° real-time display
Local recording and storage
Video encoding for remote viewing
VIA Multi-Stitch Technology
The VIA Mobile360 In-Vehicle Surround View Fleet Management System provides a flexible ruggedized solution that can be customized to meet the requirements for multiple in-vehicle applications and environments. With its sophisticated 3D imaging algorithms, VIA Multi-Stitch Technology not only ensures stunning spherical images but also supports dynamic multidirectional monitoring around the vehicle from an almost unlimited range of easily-configurable perspectives.
VIA Mobile360 @ Embedded World
The VIA Mobile360 In-Vehicle Surround View Fleet Management System is one of a host of innovative new Enterprise IoT and Mobile360 innovations that are on display at the VIA booth at Embedded World. Other highlights include:
VIA Mobile360 HMI Starter Kits: Available in a choice of Android- and Linux-based configurations, VIA Mobile360 HMI Starter Kits feature a highly-integrated low power motherboard and a choice of validated LCD screens to provide the fastest and smoothest path for building a host of all-in-one smart display devices for a wide variety of in-vehicle infotainment and digital signage applications.
VIA ETX-8X90-10GR Module: Harnessing the ultra low power consumption and advanced performance of the new VIA Eden X1 processor, this flexible new module provides a powerful upgrade for systems currently featuring end-of-life processor modules while maintaining full legacy software support.
VIA Alegro 100 Smart Home Automation System: With its support for Bluetooth, Wi-Fi, ZigBee, Z-Wave, and KNX-RF, this multi-protocol home gateway device provides a flexible solution for a host of smart home automation applications and can be customized to meet your exact requirements.