5G has been projected as a catalyst in driving the adoption of AI, IoT and robotics. The security environment as we know in a pre-5G world is already relatively complex. Various discussions over its security concern are being raised, in anticipation of 5G especially in its use in IoT and autonomous systems.
The speaker intends to place the application of 5G in perspective of enterprise ecosystem. By breaking down the ecosystem into components, reviewing the concerns and requirements, the resolution and implementation of security controls could be mapped into respective roles, such as telco engineer, IoT developer, security professional and enterprise architect. Bringing us to a shared responsibility model, the key to creating a more secure 5G and IoT environment.
A detailed look at what is meant by private networks, why do we need them and why the sudden interest in them. Also discussed is the 3GPP defined 5G Non-Public Networks (NPN), they architecture, implementation, pros and cons. In addition RAN sharing and Campus Networks are also discussed with regards to where they fit in the private networks.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...PositiveTechnologies
Mobile network operators are planning to invest heavily in coming years to implement the transition to stand-alone 5G. However, in likening to 5G with interconnected infrastructure, 5G SA is prone to protocol vulnerabilities that can allow the malicious actor to impersonate subscribers, disclose subscriber profiles and cause a denial of service (DoS).
What you'll learn:
- How to spot the various types of threats in the 5G stand-alone core
- Network misconfigurations that open doors to attacks on subscribers
- 5G SA protocol components that malicious actors actively target
- An effective security strategy for the avoidance of network disruption
6G Training Course Part 9: Course Summary & Conclusion3G4G
After our successful launch of '5G for Absolute Beginners' course (http://bit.ly/5Gbegins) in 2020, we decided to create an introductory training course on 6G Mobile Wireless Communications technology. The course is ready and the best way to navigate it is via the Free 6G Training page at: https://bit.ly/6Gintro - this will ensure that you have the latest version of each video and also the most recent version of the 6G technologies videos as and they are added.
In this part we are providing a summary of the course and concluding with the next steps. Hopefully you found this course informative and useful. Do let us know what you thought and how do you think the 6G journey will proceed.
This course is part of #Free6Gtraining initiative (https://www.free6gtraining.com/)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
6G and Beyond-5G Page: https://www.3g4g.co.uk/6G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Free 6G Training Blog: https://www.free6gtraining.com/
While 6G is as yet 10 years away, organizations that keep themselves up to date with what this next networking architecture has to bring to the table will have a decisive advantage over their competitors.
While 5G commercialization is still in its initial stage, it's never too soon to begin planning for 6G on the grounds that it regularly takes around 10 years from the beginning of exploration to commercialization of new generation of communications technology.
Most tech insiders trust 6G would need to hit two or three benchmarks first beginning with a hyper-quick information rate that beats 5G, with download paces of at any rate 1,000Gbps (multiple times the speed of 5G) and record-breaking all-time low latency, or “air latency” of under 100 μs, start to finish (E2E) inertness under 1 ms, and amazingly low delay jitter in order of microseconds.
Technology doesn't rest.
Despite the fact that the 5G Technology is still in the beginning of its arrangement, the tech world is now bantering around thoughts on what the next generation – 6G – might resemble.
This isn't startling on the grounds that the technology that goes into 5G's replacement will set aside some effort to create.
Tonex offers 6G Introduction, IMT-2030, a one-day course covering the planning inspiration and basic technology of 6G engineering, just like the new 6G terminology. Members are familiar with the comparison between 5G and 6G, and understand how 6G achieves its goals by understanding the functions of 6G.
Introduction to 6G Course by Tonex
IMT-2030 is an introduction to 6G, a one-day overview of 6G technology consistent with ITU-T IMT-2030. Learn about 6G wireless systems, use cases, applications, trends, technologies and protocols.
6G or IMT-2030 is the future of mobile networks promised by ITU-T network 2030. Tonex now offers training courses to help develop the next generation of 6G skills.
Who Should Attend
This one-day training course covers the design motivation and basic technology of 6G architecture, as well as new 6G vocabulary. You will also understand the difference between 5G and 6G, and understand how 6G will achieve its goals by observing how 6G works.
An advanced 6G technical overview for anyone involved in 6G product development, product management, analysis, planning, design and engineering.
Learning Objectives
Describe the 6G vision and business case Explain the key technologies and basic components of 6G networks
Draw end-to-end 6G network architecture, including new radio types, core networks and applications
Gradually complete the evolution from 5G to 6G
Course outline
Overview of 6G Wireless Networks
6G Vision, Architecture, and Key Technologies
Hologram Type Communications
Learn More
Introduction to 6G, Prepare Now Training
https://www.tonex.com/introduction-to-6g-prepare-now-training/
After our successful launch of '5G for Absolute Beginners' course (http://bit.ly/5Gbegins) in 2020, we decided to create an introductory training course on 6G Mobile Wireless Communications technology. The course is ready and the best way to navigate it is via the Free 6G Training page at: https://bit.ly/6Gintro - this will ensure that you have the latest version of each video and also the most recent version of the 6G technologies videos as and they are added.
In this part we will look at how and why the industry and research community believes that things will be very different in 2030 and to get ready for that era, we need to start looking at and defining 6G today. While some believe that there will be an intermediate 5.5G or Beyond 5G step before jumping directly on to 6G, others believe that 6G will require step change that 5G evolution may not achieve satisfactorily.
This course is part of #Free6Gtraining initiative (https://www.free6gtraining.com/)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
6G and Beyond-5G Page: https://www.3g4g.co.uk/6G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Free 6G Training Blog: https://www.free6gtraining.com/
This presentation and video looks at the concept of Open RAN, White Bix RAN and Virtualized RAN (vRAN). It looks at the motivation to move away from traditional architectures where the vendor supplies their own proprietary hardware and software to the new Open RAN architecture movement. Business case from an MNO / SP point of view is discussed and the results from joint Open RAN RFI by Telefonica and Vodafone is discussed.
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...Mavenir
Dean Bubley, Founder of Disruptive Analysis and well known industry analyst, and Aniruddho Basu, Mavenir SVP/GM of Global Emerging Business, showcase the future of Private LTE & 5G Networks. Presentation from the "Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enterprises" webinar.
A detailed look at what is meant by private networks, why do we need them and why the sudden interest in them. Also discussed is the 3GPP defined 5G Non-Public Networks (NPN), they architecture, implementation, pros and cons. In addition RAN sharing and Campus Networks are also discussed with regards to where they fit in the private networks.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...PositiveTechnologies
Mobile network operators are planning to invest heavily in coming years to implement the transition to stand-alone 5G. However, in likening to 5G with interconnected infrastructure, 5G SA is prone to protocol vulnerabilities that can allow the malicious actor to impersonate subscribers, disclose subscriber profiles and cause a denial of service (DoS).
What you'll learn:
- How to spot the various types of threats in the 5G stand-alone core
- Network misconfigurations that open doors to attacks on subscribers
- 5G SA protocol components that malicious actors actively target
- An effective security strategy for the avoidance of network disruption
6G Training Course Part 9: Course Summary & Conclusion3G4G
After our successful launch of '5G for Absolute Beginners' course (http://bit.ly/5Gbegins) in 2020, we decided to create an introductory training course on 6G Mobile Wireless Communications technology. The course is ready and the best way to navigate it is via the Free 6G Training page at: https://bit.ly/6Gintro - this will ensure that you have the latest version of each video and also the most recent version of the 6G technologies videos as and they are added.
In this part we are providing a summary of the course and concluding with the next steps. Hopefully you found this course informative and useful. Do let us know what you thought and how do you think the 6G journey will proceed.
This course is part of #Free6Gtraining initiative (https://www.free6gtraining.com/)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
6G and Beyond-5G Page: https://www.3g4g.co.uk/6G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Free 6G Training Blog: https://www.free6gtraining.com/
While 6G is as yet 10 years away, organizations that keep themselves up to date with what this next networking architecture has to bring to the table will have a decisive advantage over their competitors.
While 5G commercialization is still in its initial stage, it's never too soon to begin planning for 6G on the grounds that it regularly takes around 10 years from the beginning of exploration to commercialization of new generation of communications technology.
Most tech insiders trust 6G would need to hit two or three benchmarks first beginning with a hyper-quick information rate that beats 5G, with download paces of at any rate 1,000Gbps (multiple times the speed of 5G) and record-breaking all-time low latency, or “air latency” of under 100 μs, start to finish (E2E) inertness under 1 ms, and amazingly low delay jitter in order of microseconds.
Technology doesn't rest.
Despite the fact that the 5G Technology is still in the beginning of its arrangement, the tech world is now bantering around thoughts on what the next generation – 6G – might resemble.
This isn't startling on the grounds that the technology that goes into 5G's replacement will set aside some effort to create.
Tonex offers 6G Introduction, IMT-2030, a one-day course covering the planning inspiration and basic technology of 6G engineering, just like the new 6G terminology. Members are familiar with the comparison between 5G and 6G, and understand how 6G achieves its goals by understanding the functions of 6G.
Introduction to 6G Course by Tonex
IMT-2030 is an introduction to 6G, a one-day overview of 6G technology consistent with ITU-T IMT-2030. Learn about 6G wireless systems, use cases, applications, trends, technologies and protocols.
6G or IMT-2030 is the future of mobile networks promised by ITU-T network 2030. Tonex now offers training courses to help develop the next generation of 6G skills.
Who Should Attend
This one-day training course covers the design motivation and basic technology of 6G architecture, as well as new 6G vocabulary. You will also understand the difference between 5G and 6G, and understand how 6G will achieve its goals by observing how 6G works.
An advanced 6G technical overview for anyone involved in 6G product development, product management, analysis, planning, design and engineering.
Learning Objectives
Describe the 6G vision and business case Explain the key technologies and basic components of 6G networks
Draw end-to-end 6G network architecture, including new radio types, core networks and applications
Gradually complete the evolution from 5G to 6G
Course outline
Overview of 6G Wireless Networks
6G Vision, Architecture, and Key Technologies
Hologram Type Communications
Learn More
Introduction to 6G, Prepare Now Training
https://www.tonex.com/introduction-to-6g-prepare-now-training/
After our successful launch of '5G for Absolute Beginners' course (http://bit.ly/5Gbegins) in 2020, we decided to create an introductory training course on 6G Mobile Wireless Communications technology. The course is ready and the best way to navigate it is via the Free 6G Training page at: https://bit.ly/6Gintro - this will ensure that you have the latest version of each video and also the most recent version of the 6G technologies videos as and they are added.
In this part we will look at how and why the industry and research community believes that things will be very different in 2030 and to get ready for that era, we need to start looking at and defining 6G today. While some believe that there will be an intermediate 5.5G or Beyond 5G step before jumping directly on to 6G, others believe that 6G will require step change that 5G evolution may not achieve satisfactorily.
This course is part of #Free6Gtraining initiative (https://www.free6gtraining.com/)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
6G and Beyond-5G Page: https://www.3g4g.co.uk/6G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Free 6G Training Blog: https://www.free6gtraining.com/
This presentation and video looks at the concept of Open RAN, White Bix RAN and Virtualized RAN (vRAN). It looks at the motivation to move away from traditional architectures where the vendor supplies their own proprietary hardware and software to the new Open RAN architecture movement. Business case from an MNO / SP point of view is discussed and the results from joint Open RAN RFI by Telefonica and Vodafone is discussed.
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...Mavenir
Dean Bubley, Founder of Disruptive Analysis and well known industry analyst, and Aniruddho Basu, Mavenir SVP/GM of Global Emerging Business, showcase the future of Private LTE & 5G Networks. Presentation from the "Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enterprises" webinar.
A detailed look at 5G security by experts from wenovator, Dr. Anand R. Prasad & Hans Christian Rudolph.
This webinar covers:
(1) 5G security
(2) Private networks security and
(3) Open vRAN security
To learn more about wenovator, visit their website: https://www.wenovator.com/
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Security Page: https://www.3g4g.co.uk/Security/
5G Page: https://www.3g4g.co.uk/5G/
Security Blog Posts: https://blog.3g4g.co.uk/search/label/Security
Free Training Videos: https://www.3g4g.co.uk/Training/
Intermediate: 5G Applications Architecture - A look at Application Functions ...3G4G
In this tutorial we look at the 5G Applications architecture. We discuss 5G applications, application functions and application servers and how they fit together in a 5G Service Based Architecture
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
How to build high performance 5G networks with vRAN and O-RANQualcomm Research
5G networks are poised to deliver an unprecedented amount of data from a richer set of use cases than we have ever seen. This makes efficient networking in terms of scalability, cost, and power critical for the sustainable growth of 5G. Cloud technologies such as virtualization, containerization and orchestration are now powering a surge of innovation in virtualized radio access network (vRAN) infrastructure with modular hardware and software components, and standardized interfaces. While commercial off-the-shelf (COTS) hardware platforms provide the compute capacity for running vRAN software, hardware accelerators will also play a major role in offloading real-time and complex signal processing functions. Together, COTS platforms and hardware accelerators provide the foundation for building the intelligent 5G network and facilitate innovative new use cases with the intelligent wireless edge.
- There is a rich roadmap of 5G technologies coming in the second half of the 5G decade with the 5G Advanced evolution
- 6G will be the future innovation platform for 2030 and beyond building on the 5G Advanced foundation
- 6G will be more than just a new radio design, expanding the role of AI, sensing and others in the connected intelligent edge
- Qualcomm is leading cutting-edge wireless research across six key technology vectors on the path to 6G
In this deck, Greg Wahl from Advantech presents: Transforming Private 5G Networks.
Advantech Networks & Communications Group is driving innovation in next-generation network solutions with their High Performance Servers. We provide business critical hardware to the world's leading telecom and networking equipment manufacturers with both standard and customized products. Our High Performance Servers are highly configurable platforms designed to balance the best in x86 server-class processing performance with maximum I/O and offload density. The systems are cost effective, highly available and optimized to meet next generation networking and media processing needs.
“Advantech’s Networks and Communication Group has been both an innovator and trusted enabling partner in the telecommunications and network security markets for over a decade, designing and manufacturing products for OEMs that accelerate their network platform evolution and time to market.” Said Advantech Vice President of Networks & Communications Group, Ween Niu. “In the new IP Infrastructure era, we will be expanding our expertise in Software Defined Networking (SDN) and Network Function Virtualization (NFV), two of the essential conduits to 5G infrastructure agility making networks easier to install, secure, automate and manage in a cloud-based infrastructure.”
In addition to innovation in air interface technologies and architecture extensions, 5G will also need a new generation of network computing platforms to run the emerging software defined infrastructure, one that provides greater topology flexibility, essential to deliver on the promises of high availability, high coverage, low latency and high bandwidth connections. This will open up new parallel industry opportunities through dedicated 5G network slices reserved for specific industries dedicated to video traffic, augmented reality, IoT, connected cars etc. 5G unlocks many new doors and one of the keys to its enablement lies in the elasticity and flexibility of the underlying infrastructure.
Advantech’s corporate vision is to enable an intelligent planet. The company is a global leader in the fields of IoT intelligent systems and embedded platforms. To embrace the trends of IoT, big data, and artificial intelligence, Advantech promotes IoT hardware and software solutions with the Edge Intelligence WISE-PaaS core to assist business partners and clients in connecting their industrial chains. Advantech is also working with business partners to co-create business ecosystems that accelerate the goal of industrial intelligence."
Watch the video: https://wp.me/p3RLHQ-lPQ
* Company website: https://www.advantech.com/
* Solution page: https://www2.advantech.com/nc/newsletter/NCG/SKY/benefits.html
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
The Internet of Things is bringing a massive surge of smart, connected devices that will enable new services and efficiencies across industries. This requires wireless technologies to scale up or down depending on the application performance needs—to connect virtually anything. And now, LTE is evolving for low-throughput, delay-tolerant IoT use cases. The new narrowband LTE technologies (eMTC & NB-IoT) will deliver lower complexity, longer battery life, and deeper coverage for wide-area IoT applications.
5G will connect virtually everything around us to transform a wide range of industries — manufacturing, automotive, logistics, and many more, and we are on track to make 5G NR — the global 5G standard — a commercial reality by 2019. However, this first phase of 5G mainly focuses on enhanced mobile broadband services, which will contribute to part of the total projected $12T 5G economy. 5G NR will continue to evolve in Release 16 and beyond to further expand 5G’s reach to new devices, services, and ecosystem players.
A big challenge for mobile network operators in the new, ever-evolving 5G era is the signaling security of the standardized protocols used in order to exchange data. Telecommunication companies face this challenge and have to be on the verge every time there is a potential hacker attack. What is the best way to approach these striking threats and even to be ready before it occurs?
In our webinar, Positive Technologies will offer you several breakthrough strategies on how to deal with security flaws in telecom.
Our expert will show you the evolution of protocol security, share insights into the potential activities of a hacker and give useful advice about compliance with security standards.
5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approachCapgemini
Fixed Wireless Access (FWA) is considered to be the first promising B2C use-case for 5G, offering customers a “fiber-like” experience. Capgemini explores several deployment sceneries, an analysis of Verizon’s 5G Home launch and the momentum it’s causing in the market, as well as the key components that need to be addressed when building a 5G FWA strategy. To learn more about Capgemini Invent’s expertise in 5G, contact our experts:
Pierre Fortier
Principal Consultant, Capgemini Invent
Pierre.Fortier@capgemini.com
Marouane Bikour
Senior Consultant, Capgemini Invent
Marouane.bikour@capgemini.com
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
Rapid technological advances in the past made possible the miniaturization of network devices to meet the cost and power consumption requirements in IoT and M2M scenarios. What is missing in this picture is a radio technology with both long range capability and a very low cost footprint. Existing radio technologies such as 3G/4G or Short Range Radio do not aptly meet the requirements of IoT scenarios because they are either too expensive or are not able to provide the required range. Other wireless technologies are geared towards high bandwidth which is in most cases not a requirement for IoT.
Emerging LPWAN technologies such as ETSI LTN or LoRAWAN are poised for filling the gap by providing long range (up to 40km) and low power connectivity. These technologies allow low cost radio devices and operation thus enabling scaling up IoT applications.
5G network is surging the growth of IOT for building up new applications and business execution models. Implementation of the latest techniques, IOT, requires new performance standards such as security, great connectivity, low latency, ultra-authentic, the extent of wireless communication, etc., to boost cellular operations.
This is the report part 2 of presentation. It talks about the basic functional architecture, 5G architecture, 5G network layers and the hardware & software components of 5G.
A detailed look at 5G security by experts from wenovator, Dr. Anand R. Prasad & Hans Christian Rudolph.
This webinar covers:
(1) 5G security
(2) Private networks security and
(3) Open vRAN security
To learn more about wenovator, visit their website: https://www.wenovator.com/
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Security Page: https://www.3g4g.co.uk/Security/
5G Page: https://www.3g4g.co.uk/5G/
Security Blog Posts: https://blog.3g4g.co.uk/search/label/Security
Free Training Videos: https://www.3g4g.co.uk/Training/
Intermediate: 5G Applications Architecture - A look at Application Functions ...3G4G
In this tutorial we look at the 5G Applications architecture. We discuss 5G applications, application functions and application servers and how they fit together in a 5G Service Based Architecture
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
How to build high performance 5G networks with vRAN and O-RANQualcomm Research
5G networks are poised to deliver an unprecedented amount of data from a richer set of use cases than we have ever seen. This makes efficient networking in terms of scalability, cost, and power critical for the sustainable growth of 5G. Cloud technologies such as virtualization, containerization and orchestration are now powering a surge of innovation in virtualized radio access network (vRAN) infrastructure with modular hardware and software components, and standardized interfaces. While commercial off-the-shelf (COTS) hardware platforms provide the compute capacity for running vRAN software, hardware accelerators will also play a major role in offloading real-time and complex signal processing functions. Together, COTS platforms and hardware accelerators provide the foundation for building the intelligent 5G network and facilitate innovative new use cases with the intelligent wireless edge.
- There is a rich roadmap of 5G technologies coming in the second half of the 5G decade with the 5G Advanced evolution
- 6G will be the future innovation platform for 2030 and beyond building on the 5G Advanced foundation
- 6G will be more than just a new radio design, expanding the role of AI, sensing and others in the connected intelligent edge
- Qualcomm is leading cutting-edge wireless research across six key technology vectors on the path to 6G
In this deck, Greg Wahl from Advantech presents: Transforming Private 5G Networks.
Advantech Networks & Communications Group is driving innovation in next-generation network solutions with their High Performance Servers. We provide business critical hardware to the world's leading telecom and networking equipment manufacturers with both standard and customized products. Our High Performance Servers are highly configurable platforms designed to balance the best in x86 server-class processing performance with maximum I/O and offload density. The systems are cost effective, highly available and optimized to meet next generation networking and media processing needs.
“Advantech’s Networks and Communication Group has been both an innovator and trusted enabling partner in the telecommunications and network security markets for over a decade, designing and manufacturing products for OEMs that accelerate their network platform evolution and time to market.” Said Advantech Vice President of Networks & Communications Group, Ween Niu. “In the new IP Infrastructure era, we will be expanding our expertise in Software Defined Networking (SDN) and Network Function Virtualization (NFV), two of the essential conduits to 5G infrastructure agility making networks easier to install, secure, automate and manage in a cloud-based infrastructure.”
In addition to innovation in air interface technologies and architecture extensions, 5G will also need a new generation of network computing platforms to run the emerging software defined infrastructure, one that provides greater topology flexibility, essential to deliver on the promises of high availability, high coverage, low latency and high bandwidth connections. This will open up new parallel industry opportunities through dedicated 5G network slices reserved for specific industries dedicated to video traffic, augmented reality, IoT, connected cars etc. 5G unlocks many new doors and one of the keys to its enablement lies in the elasticity and flexibility of the underlying infrastructure.
Advantech’s corporate vision is to enable an intelligent planet. The company is a global leader in the fields of IoT intelligent systems and embedded platforms. To embrace the trends of IoT, big data, and artificial intelligence, Advantech promotes IoT hardware and software solutions with the Edge Intelligence WISE-PaaS core to assist business partners and clients in connecting their industrial chains. Advantech is also working with business partners to co-create business ecosystems that accelerate the goal of industrial intelligence."
Watch the video: https://wp.me/p3RLHQ-lPQ
* Company website: https://www.advantech.com/
* Solution page: https://www2.advantech.com/nc/newsletter/NCG/SKY/benefits.html
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
The Internet of Things is bringing a massive surge of smart, connected devices that will enable new services and efficiencies across industries. This requires wireless technologies to scale up or down depending on the application performance needs—to connect virtually anything. And now, LTE is evolving for low-throughput, delay-tolerant IoT use cases. The new narrowband LTE technologies (eMTC & NB-IoT) will deliver lower complexity, longer battery life, and deeper coverage for wide-area IoT applications.
5G will connect virtually everything around us to transform a wide range of industries — manufacturing, automotive, logistics, and many more, and we are on track to make 5G NR — the global 5G standard — a commercial reality by 2019. However, this first phase of 5G mainly focuses on enhanced mobile broadband services, which will contribute to part of the total projected $12T 5G economy. 5G NR will continue to evolve in Release 16 and beyond to further expand 5G’s reach to new devices, services, and ecosystem players.
A big challenge for mobile network operators in the new, ever-evolving 5G era is the signaling security of the standardized protocols used in order to exchange data. Telecommunication companies face this challenge and have to be on the verge every time there is a potential hacker attack. What is the best way to approach these striking threats and even to be ready before it occurs?
In our webinar, Positive Technologies will offer you several breakthrough strategies on how to deal with security flaws in telecom.
Our expert will show you the evolution of protocol security, share insights into the potential activities of a hacker and give useful advice about compliance with security standards.
5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approachCapgemini
Fixed Wireless Access (FWA) is considered to be the first promising B2C use-case for 5G, offering customers a “fiber-like” experience. Capgemini explores several deployment sceneries, an analysis of Verizon’s 5G Home launch and the momentum it’s causing in the market, as well as the key components that need to be addressed when building a 5G FWA strategy. To learn more about Capgemini Invent’s expertise in 5G, contact our experts:
Pierre Fortier
Principal Consultant, Capgemini Invent
Pierre.Fortier@capgemini.com
Marouane Bikour
Senior Consultant, Capgemini Invent
Marouane.bikour@capgemini.com
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
Rapid technological advances in the past made possible the miniaturization of network devices to meet the cost and power consumption requirements in IoT and M2M scenarios. What is missing in this picture is a radio technology with both long range capability and a very low cost footprint. Existing radio technologies such as 3G/4G or Short Range Radio do not aptly meet the requirements of IoT scenarios because they are either too expensive or are not able to provide the required range. Other wireless technologies are geared towards high bandwidth which is in most cases not a requirement for IoT.
Emerging LPWAN technologies such as ETSI LTN or LoRAWAN are poised for filling the gap by providing long range (up to 40km) and low power connectivity. These technologies allow low cost radio devices and operation thus enabling scaling up IoT applications.
5G network is surging the growth of IOT for building up new applications and business execution models. Implementation of the latest techniques, IOT, requires new performance standards such as security, great connectivity, low latency, ultra-authentic, the extent of wireless communication, etc., to boost cellular operations.
This is the report part 2 of presentation. It talks about the basic functional architecture, 5G architecture, 5G network layers and the hardware & software components of 5G.
Digital Nasional Berhad (DNB) has been established to accelerate the availability and adoption of 5G to support the transformation of Malaysia. The rollout of the 5G network has kicked off with the provision of 5G coverage in the Malaysian capital. This 5G network, will empower Malaysians to embrace the new digital economy.
Source: https://www.digital-nasional.com.my/white-papers
What Makes 5G Network Different - Digital Nasional BerhadDigitalNational
5G network is here and set to change our world for the better. It is true that 5G represents the fifth generation of mobile networks, but it is so much more than just another ‘G’. Read more
Digital transformation has increased the importance of the network, particularly the edge, where customers, employees, cloud applications and IoT devices connect to the enterprise. The legacy static and non-dierentiated network edge of years past is no longer suicient for many reasons, so as companies embark on digital-transformation plans, their networks must evolve.
Migration from 4G to 5G: A Complete synopsis guide on 4G to 5G migration.Utkarsh Jaiswal
Migration from 4G to 5G: A Complete synopsis guide on 4G to 5G migration. This guide has step by step process to build your synopsis on 4G to 5G migration
IoT is a new technology that was born a few years ago that based on the internet network which connects all IoT network terminals together to transfer data over the network between terminals (devices) abd take an action according to these data.
5G is a set of emerging global telecommunications standards, generally using high-frequency spectrum, to offer network connectivity with reduced latency and greater speed and capacity relative to its predecessors, most recently 4G LTE (Long-Term Evolution).
Importantly, 5G describes a collection of standards and technologies used to build tomorrow’s cutting-edge network infrastructure. In fact, many of the standards that will be officially considered 5G are still being decided on by working groups like the 3GPP, a collaborative body made up of various telecommunications associations.
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
The Internet of Things (IoT) has emerged as a fundamental cornerstone in the digitalization of both industry and society as a whole. It represents a huge opportunity not only in economic terms, but also from a global challenges perspective – making it easier for governments, non-governmental organizations and the private sector to address pressing food, energy, water and climate related issues.
5G and the IoT are closely intertwined. One of the biggest innovations within 5G is support for the IoT in all its forms, both by addressing mission criticality as well as making it possible to connect low-cost, long-battery-life sensors.
With this in mind, we decided to create a special issue of Ericsson Technology Review solely focused on IoT opportunities and challenges. I hope it provides you with valuable insights about the IoT-related opportunities available to your organization, along with ideas about how we can overcome the challenges ahead.
Experience the transformative power of IoT as networks evolve to overcome challenges, enabling billions of devices to operate simultaneously and automating diverse business processes.
The Future of 6G Wireless Networks Opportunities, Requirements, and Challenge...ijtsrd
The evolution of wireless communication has led to the rapid advancement of generations of networks, from 1G to the current 5G standard. As society becomes more interconnected and reliant on wireless technologies, the demand for faster, more reliable, and versatile networks continues to grow. This paper explores the potential landscape of 6G wireless networks, delving into the opportunities they present, the essential requirements they must fulfil, and the significant challenges they must overcome. Drawing insights from current technological trends and projecting into the future, this paper aims to provide a comprehensive overview of what the next generation of wireless networks might require. 6G will human interaction of DARQ. Manish Verma "The Future of 6G Wireless Networks: Opportunities, Requirements, and Challenges: A ChatGPT Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-5 , October 2023, URL: https://www.ijtsrd.com/papers/ijtsrd60072.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/60072/the-future-of-6g-wireless-networks-opportunities-requirements-and-challenges-a-chatgpt-analysis/manish-verma
Designing Impactful Services and User Experience - Lim Wee KheeNUS-ISS
In this engaging talk, we explore crafting impactful user-centric services, revealing the design principles that drive exceptional experiences. From empathetic customer journeys to innovative interfaces, learn how design can create meaningful connections, inspiring you to revolutionise your approach and drive lasting change in user satisfaction and brand success.
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...NUS-ISS
In today's digital age, the key to true transformation lies in our people. This talk will highlight the importance of digital fluency, emphasizing that everyone in an organization is now a digital professional. By synergizing the fundamental digital skills ranging from an agile mindset to making data-informed decisions and design thinking, we will discuss how a digitally skilled workforce can propel organizations to drive digital transformation with new heights of value creation. Though widespread workforce upskilling presents its challenges, this talk offers innovative organizational learning approaches that may pave the way to success. Join us to find out how to shape the future of your organization where success is defined not just by technology but by a workforce fully equipped with digital competencies, ready to take on whatever the future holds.
How the World's Leading Independent Automotive Distributor is Reinventing Its...NUS-ISS
In this captivating session, we'll unveil the profound impact of AI, poised to revolutionise the business landscape. Prepare to shift your perspective, as we transition from the lens of a data scientist to the visionary mindset of a product manager. We're about to demystify the captivating world of Generative AI, dispelling myths and illuminating its remarkable potential. We will also delve into the pioneering applications that Inchcape is leading, pushing the boundaries of what's achievable. Join us for an exhilarating journey into the future of AI, where professionalism meets unparalleled excitement, and innovation takes center stage!
The Importance of Cybersecurity for Digital TransformationNUS-ISS
In the rapidly evolving landscape of digital transformation, the importance of cybersecurity cannot be overstated. As organizations embrace digital technologies to enhance their operations, innovate, and connect with customers in new and dynamic ways, they simultaneously become more vulnerable to cyber threats.
This talk will discuss the importance of having a well thought through approach in dealing with cybersecurity in the form of a strategy that lays out the various programmes and initiatives that will underpin a secure and resilient digital transformation journey. Not surprisingly, having a pool of well-trained cybersecurity personnel is one of the key ingredient in a cyber strategy as exemplified in Singapore's own national cybersecurity strategy.
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...NUS-ISS
Join us for a deep dive into the art of architecting Customer Experience (CX) measurement frameworks and ensuring that CX metrics are precisely tailored for their intended purpose. In this engaging session, you'll walk away with actionable insights and a tangible plan for refining your measurement strategies. Discover how to craft CX measurement frameworks that align seamlessly with your business objectives, ensuring that your metrics deliver meaningful and robust insights. Whether you're seeking to enhance customer satisfaction, optimise processes, or drive innovation, this session will provide you with potential approaches and practical steps to bolster the effectiveness and relevance of your CX metrics. It's your blueprint for creating a customer-centric roadmap to success.
Understanding GenAI/LLM and What is Google Offering - Felix GohNUS-ISS
With the recent buzz on Generative AI & Large Language Models, the question is to what extent can these technologies be applied at work or when you're studying and how easy is it to manage/develop your own models? Hear from our guest speaker from Google as he shares some insights into how industries are evolving with these trends and what are some of Google's offerings from Duet AI in Google Workspace to the GenAI App Builder on Google Cloud.
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeNUS-ISS
Enterprises striving to unlock value through digital products face a pivotal shift towards product-centric management, a transformation that carries its share of challenges. To navigate this journey successfully, close collaboration between Enterprise Architects and Digital Product Managers is essential. Together, they can craft the ideal strategy to deliver digital products on a grand scale. Join us in this session as we shed light on the critical interactions and activities that foster synergy between Enterprise Architects and Digital Product Managers. Discover how this collaboration paves the way for effective product-centric management, enabling enterprises to harness the full potential of their digital offerings.
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...NUS-ISS
We find ourselves in an era of exponential growth and transformation. The relentless pace of technological advancement is reshaping our world at a rate never seen before, making it increasingly challenging to stay abreast of these rapid developments. Join us for an insightful talk where we embark on a journey to explore the most significant technology trends set to unfold over the next decade. These trends promise to be nothing short of seismic, with the power to reshape every facet of our lives, from the way we work and learn to how we forge relationships and structure our society. Prepare to be enlightened as we delve into a future where the very fabric of our existence is on the brink of transformation. This talk is your compass to navigate the uncharted territory of tomorrow's world, and it's an opportunity you won't want to miss.
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...NUS-ISS
The hottest topic in the tech world right now is generative AI. In this session, we go beyond the hype to delve into honest answers about how generative AI is impacting the future of work. This is an important topic for all digital leaders to have a thorough understanding of when driving digital transformation.
Supply Chain Security for Containerised Workloads - Lee Chuk MunnNUS-ISS
Containers have emerged as an indispensable component of modern cloud-native applications, serving diverse roles from development environments to application distribution and deployment on platforms like Azure's App Service and Kubernetes. In this presentation, we will delve into a suite of powerful tools designed to ensure the adoption of best practices in container management. You'll gain insights into how to scan container images rigorously, identifying and mitigating vulnerabilities effectively. We'll also explore the art of generating comprehensive software bill of materials (SBOM) for your containers and the significance of signing container images for enhanced security. The ultimate goal of this presentation is to empower you with the knowledge and skills necessary to seamlessly integrate these tools and practices into your CI (Continuous Integration) pipelines. By the end of this session, you'll be well-equipped to fortify your container workflows, delivering secure and robust cloud-native applications that thrive in today's dynamic digital landscape.
The future is always uncertain. To be truly future-ready, companies need the ability to quickly learn and adapt and to foster a culture of continuous curiosity and experimentation. But how can we facilitate rapid learning throughout the organisation? What will the future of learning look like for you? How can we ensure our organisations become engines of growth through learning?
The future is always uncertain. To be truly future-ready, companies need the ability to quickly learn and adapt and to foster a culture of continuous curiosity and experimentation. But how can we facilitate rapid learning throughout the organisation? What will the future of learning look like for you? How can we ensure our organisations become engines of growth through learning?
Site Reliability Engineer (SRE), We Keep The Lights On 24/7NUS-ISS
There are many phases in the software development cycle, from requirements to development and testing, but at the tail of the process, is an often overlooked aspect: deployment and delivery. With the paradigm shift of delivering on-site software to offering software-as-a-service, Site Reliability Engineering is beginning to take a greater role in product delivery.
This session aims to give a glimpse of the work that goes into site reliability engineering (SRE) and effort that goes into keeping a service going 24/7.
Product Management in The Trenches for a Cloud ServiceNUS-ISS
More often than not, people’s perception of Product Management is usually centred around the definition, management and prioritisation of software features and functionality. While that is largely true, it is also one of many things that a Product Manager needs to focus on, given limited time and resources.
This session aims to provide an unfiltered view of how Product Management looks like in the context of Enterprise Cloud Applications development, the challenges confronting Product Managers, and the tradeoff decisions to be made in order to overcome these challenges.
All this, while shipping a working product with each release that will surprise and delight the end user.
Overview of Data and Analytics Essentials and FoundationsNUS-ISS
As companies increasingly integrate data across functions, the boundaries between marketing, sales and operations have been blurring. This allows them to find new opportunities that arise by aligning and integrating the activities of supply and demand to improve commercial effectiveness. Instead of conducting post-hoc analyses that allow them to correct future actions, companies generate and analyze data in near real-time and adjust their operations processes dynamically. Transitioning from static analytics outputs to more dynamic contextualized insights means analytics can be delivered with increased relevance closer to the point of decision.
This talk will cover the analytics journey from descriptive, predictive and prescriptive analytics to derive actionable and timely insights to improve customer experience to drive marketing, salesforce and operations excellence.
With the use of Predictive Analytics, companies are able to predict future trends based on existing available data. The actionable business predictions can help companies achieve cost savings, higher revenue, better resource allocation and efficiency. Predictive analytics has been used in various sectors such as banking & finance, sales & marketing, logistics, retail, healthcare, F&B, etc. for various purposes.
Get set to learn more about the different stages of predictive analytics modelling such as data collection & preparation, model development & evaluation metrics, and model deployment considerations will be discussed.
In this digital transformation era, we have seen the rise of digital platforms and increased usages of devices particularly in the area of wearables and the Internet of Things (IoT). Given the fast pace change to the IoT landscape and devices, data has become one of the important source of truth for analytics and continuous streaming of data from sensors have also emerged as one of the fuel that revolutionise the emergence of IoT. These includes health telematics, vehicle telematics, predictive maintenance of equipment, manufacturing quality management, consumer behaviour, and more. With this, we will give you an introduction on how to leverage the power of data science and machine learning to understand and explore feature engineering of IoT and sensor data.
Diagnosing Complex Problems Using System ArchetypesNUS-ISS
In today’s VUCA world, we are faced with problems coming in fast and furious. In order to resolve such problems quickly, we need to first understand the problems. One of the techniques to understand complex problem is through the use of system archetypes. System archetypes are patterns of behaviour of a system. Let’s us explore some of the system archetypes in this session as well as tips on how to resolve them.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
5G and IoT Security
1. 5G and IoT Security
Nicholas Ho, NUS-ISS
Ng Kok Leong, NUS-ISS
11 August 2020
#ISSLearningFest
2. Agenda
• Introduction to IoT & 5G – Dr Nicholas Ho
• 5G and IoT Security – Ng Kok Leong
#ISSLearningFest
3. Introduction to IoT & 5G
Nicholas Ho, NUS ISS
11 August 2020
#ISSLearningFest
4. About Nicholas Ho
• nicholas.ho@nus.edu.sg
• Lecturer at NUS ISS; Courses covered include:
Envisioning Smart Urban IoT Solutions
Humanizing Smart Systems
Autonomous Robots and Vehicles
• BEng and PhD degree from School of Mechanical
Engineering, NUS
• Specialized in architecture, design & development
Internet-of-Things (IoT) & Cyber-Physical System (CPS)
Augmented/Virtual Reality
Artificial Intelligence
#ISSLearningFest
5. Contents
• What is IoT?
• Possible IoT Involvement in Autonomous Systems?
• Introduction to 5G
• 5G Involvement in the IoT Realm
#ISSLearningFest
6. What is IoT?
This section will enable you to briefly understand what IoT is and its applications
#ISSLearningFest
7. Introducing Internet-of-Things (IoT)
What is IoT?
Internet connects all people, so it is
called “the Internet of People”
IoT connects all things, so it is
called “the Internet of Things”
Remember the key elements of IoT:
1. Connect devices
2. Process (i.e. data collection,
analysis and management)
3. Act
#ISSLearningFest
9. IoT Example 1: Tado° Smart Thermostat
#ISSLearningFest
• Full features
• Full controls
• More potential usability issues
• Little features
• Limited controls
• Less potential usability issues
10. IoT Example 2: Berg Cloud Wash
#ISSLearningFest
Source: https://vimeo.com/87522764
Mechanical
Washing
Machine Panel
Cloud-
connected
Washing
Machine Panel
School of thought:
What major problem could
IoT possibly solve?
12. Possible IoT Involvement in
Autonomous Systems?
This section will explain how IoT can be involved within autonomous robots and within
autonomous vehicles in the far future
#ISSLearningFest
13. IoT Application Example in Autonomous Robots
#ISSLearningFest
Source:
https://www.youtube.com/
watch?v=Mog3UgQvHIo
Is IoT crucial in
the autonomous
movement here?
In which areas IoT
is crucial within
this autonomous
security robot?
14. Current Autonomous Vehicle (AV) System
#ISSLearningFest
Source:
https://www.youtube.com/
watch?v=x4jg4E7LrZE
Is IoT crucial in
the autonomous
driving here?
15. IoT can Help Shape the AV Industry
#ISSLearningFest
Interaction model for IoT-based ecosystem for an autonomous vehicle
16. IoT can Help Shape the AV Industry (Cont)
#ISSLearningFest
Is the current technology
good enough that we can
implement this concept?
Why or Why Not?
What's the solution to
this problem?
17. Introduction to 5G
This section will enable you to briefly understand what 5G is and its applications
#ISSLearningFest
18. What is 5G?
#ISSLearningFest
5G uses radio waves or radio frequency (RF) energy to transmit
and receive voice and data connecting our communities
5G = 5th generation of mobile networks,
an advanced version of the 4G LTE
networks
Designed to meet the very large growth in
data and connectivity of today’s modern
society, IoT with billions of connected
devices, and tomorrow’s innovations
5G will initially operate in conjunction with
existing 4G networks before evolving to
fully standalone networks in subsequent
releases and coverage expansions
19. Summarized Advantages of 5G
1. High bandwidth (how big is the
“data door”? Affects the data speed)
• At least 1GB/s
2. Low latency (how fast can the data
move from one source to another?)
• Can be as low as 1 ms response time
3. Dense connections (how many
devices can be connected at the
same time?)
• Can connect up to 100 times more than
4G allows
• Highly supports mass IoT adoption
#ISSLearningFest
21. Some of the Technologies that Made 5G Possible
#ISSLearningFest
Millimeter Waves
(spectrum above 6 GHz)
Small Cell Networks
(Limited range per small cell
[aka mini base station]:
10 meters to a few hundred meters)
22. Applications of 5G
#ISSLearningFest
5G will provide the speed, low latency and
connectivity to enable a new generation of
applications, services and business
opportunities that have not been seen before
23. 5G Involvement in the IoT Realm
This section will explain how 5G can be involved within the IoT World in future
#ISSLearningFest
24. 5G Supporting a Smart City
#ISSLearningFest
Source:
https://www.sageautomation.com
/blog/what-will-5g-mean-for-
smart-city-transport-infrastructure
25. 5G Supporting Urban Farming IoT
#ISSLearningFest
https://www.channelnewsasia.com/news/singapore/covid10-singapore-food-
security-farming-innovation-12649468
5G could also play an
important role to sustain
and ensure feasibility of
Urban Farming
operations in SG
26. 5G Supporting VR/AR Systems
#ISSLearningFest
https://www.hollywoodreporter.com/behind-screen/fifa-
world-cup-bbc-testing-live-vr-hdr-streaming-1115756
https://cnalifestyle.channelnewsasia.com/travel/
virtual-reality-travel-12601122
27. SUMMARY - Key Element of 5G & IoT
• While the internet connects all people, IoT connects all things
• Key elements of IoT: Connect, Process, Act
• AVs are unable to fully rely on the current LTE networks for driving
purposes because of its insufficient levels of real-time capability and
robustness of connectivity. Hence, the need for 5G
• 5G is an advanced version of the 4G LTE networks; known as the 5th
generation of mobile networks
• Main advantages of 5G include: (a) High bandwidth (b) Low latency,
and (c) Dense connections
• 5G plays a very crucial role, especially for IoT applications within
the communities and businesses/industries in the future
#ISSLearningFest
28. 5G and IoT Security
Ng Kok Leong, NUS-ISS
11 August 2020
#ISSLearningFest
29. About Ng Kok Leong
• kokleong@nus.edu.sg
• Lecturer at NUS ISS; Courses covered include:
Information Systems Security (ISC2 CISSP)
Cloud Security (ISC2 CCSP)
Systems Security (ISC2 SSCP)
Security Architecture
IoT Security
• Master degree in Computer Science &
Information Systems, NUS
• Master degree in Business Administration,
University of Melbourne
#ISSLearningFest
39. 5G Security Issue – More Software
#ISSLearningFest
Image: infocus.delltechnologies.com
• 5G network utilizes
NFV and SDN. Going
software will increase
attack surface at
telecom backend.
• Telecom operator will
have to ensure setup
and operation are
secured.
40. CVE registered vulnerability trend, Oct 2019
#ISSLearningFest
Image: https://portswigger.net
Software Challenges
• Many high profile
compromises, local and
abroad, can trace the root
causes to inadequate
practices of security
controls.
• To address a software
backend, 5G telecom
operator has allocate
adequate resources to gain
assurance in cyber security.
41. IoT Network – short range & long range
#ISSLearningFestImage: www.embien.com
Protocol standard
creators design security
into zigbee protocol,
sigfox protocol etc.
43. Expect vulnerability
• Vulnerability from design flaw and implementation flaw.
• Known and unknown vulnerability.
#ISSLearningFest
• On defense side,
• Discover and mitigate vulnerability
• Build in multiple layers of defense, e.g.
Vulnerability != compromise
Preventive => Detective => Corrective
52. Autonomous System security issues
#ISSLearningFest
Eykholt et al. (2018). Physical Adversarial
Examples for Object Detectors.
Examples,
• Use physical adversarial patch to
cause failure to see stop sign
(refer image on left).
• Fake sensor information to
confuse neighboring vehicle.
53. IMDA IoT Cyber Security Guidelines
#ISSLearningFest
Examples of clauses,
1) Secure remote management of devices including
support software / firmware updates using
cryptographically secure methods.
2) Employ proper key management (generation,
exchange, storage, use, destruction, replacement,
etc) techniques
3) Establish hardware root of trust.
4) Employ anti-tamper mechanisms for resistance,
evidence, detection, and / or response.
62. ARM Processor Architecture: M series
Processor Usage Trustzone Tamper
Resistance
Cortex-M0 Smallest Arm processor available
Cortex-M0+ Smallest footprint & lowest power requirements of Cortex-M processors
Cortex-M1 Optimised for FPGA design
Cortex-M3 Exceptional 32-bit performance with low power consumption
Cortex-M4 Control and performance for mixed signal devices
Cortex-M7 Highest performance Cortex-M processor
Cortex-M23 Smallest and lowest power microcontroller with TrustZone security √
Cortex-M33 Ideal blend of real-time determinism, efficiency and security √
Cortex-M35P The first Armv8-M processor with tamper resistance built in √ √
Cortex-M55 Arm’s most AI-capable Cortex-M processor √
#ISSLearningFest
63. Chip with Trustzone for constrained IoT
#ISSLearningFestSource: https://www.nuvoton.com/products/microcontrollers/arm-cortex-m23-mcus/
Micro chip for IoT with TRUSTZONE feature
has became available; which provides Root
of Trust. Hence, facilitating secure firmware
update.
64. IMDA IoT Cyber Security Guidelines
#ISSLearningFest
Examples of clauses,
1) Secure remote management of devices including support
software / firmware updates using cryptographically
secure methods.
2) Employ proper key management (generation, exchange,
storage, use, destruction, replacement, etc) techniques
3) Establish hardware root of trust.
4) Employ anti-tamper mechanisms for resistance, evidence,
detection, and / or response.
√ √
65. Hardware Root of Trust
#ISSLearningFest
Image: www.semanticscholar.org
67. ARM Processor Architecture: M35P
#ISSLearningFest
Source: https://www.zdnet.com/article/arm-launches-
cortex-m35p-processor-to-bring-security-to-silicon/
68. Chip with Trustzone for constrained IoT, since 2018
#ISSLearningFest
Source: https://community.arm.com/developer/ip-products/processors/trustzone-for-armv8-
m/b/blog/posts/microchip-release-first-arm-cortex-m23-based-chip-
SAML11 has trustzone and crypto accelerators (AES, SHA), secure boot
and secure key storage with added chip-level tamper detection
capabilities, to establish a hardware root of trust and secure bootloader
for secure firmware upgrades.
69. IMDA IoT Cyber Security Guidelines
#ISSLearningFest
Examples of clauses,
1) Secure remote management of devices including support
software / firmware updates using cryptographically
secure methods.
2) Employ proper key management (generation, exchange,
storage, use, destruction, replacement, etc) techniques
3) Establish hardware root of trust.
4) Employ anti-tamper mechanisms for resistance, evidence,
detection, and / or response.
√ √
√
?
70. FIPS 140-2 certification levels (IoT)
• Security level 1
• Physical security cryptographic module has at least one approved security
function or approved algorithm.
• Security level 2
• Capability to illustrate evidence of tampering.
• Security level 3
• Capability to detect access attempts and responding
• Security level 4
• Capability to trigger immediate zeroization of all plaintext critical security
parameters.
#ISSLearningFest
71. FIPS 140-2 certification levels (Cloud)
#ISSLearningFest
https://aws.amazon.com/cloudhsm/
https://azure.microsoft.com/en-us/services/azure-dedicated-hsm/
To put in
perspective, the
Hardware Secure
Module used in
cloud is at level 3.
72. IMDA IoT Cyber Security Guidelines
#ISSLearningFest
Examples of clauses,
1) Secure remote management of devices including support
software / firmware updates using cryptographically
secure methods.
2) Employ proper key management (generation, exchange,
storage, use, destruction, replacement, etc) techniques
3) Establish hardware root of trust.
4) Employ anti-tamper mechanisms for resistance, evidence,
detection, and / or response.
√ √
√
?
73. IoT product builder
• Do they have the tools to build,
Secure firmware update?
Secure key management?
Hardware root of trust?
Detect tamper at chip level (FIPS 140-2 level 2)?
What % of IoT devices in the market are “secured by design”?
#ISSLearningFest
74. 5G & IoT security, where are the weak links?
#ISSLearningFest
76. System owner: Where are the trust boundaries?
#ISSLearningFestImage: www.engineering.com
77. Security goes beyond technology
#ISSLearningFest
Image: www.complianceforge.com
Security professional
Operation
Audit
Who ensure cyber security is being addressed
holistically when deployed to enterprise?
78. Community effort to establish a secure 5G/IoT
ecosystem
#ISSLearningFestEnd-to-end security
Security professional, Operation, Audit
Protocol standard creator,
Equipment product developer
IoT product
developer
Application / Cloud
Service Provider
(shared responsibility model)