Learn how IoT, cloud, social networks and last but not least, humans, can be integrated into a seamless integration of cooperative organisms both cybernetic and biological. This has been enabled by recent advances in IoT device capabilities, messaging frameworks, presence and collaboration services, where devices can share information and make independent and human assisted decisions based upon social status from other entities.
In his session at @ThingsExpo, Michael Heydt, founder of Seamless Thingies, discussed and demonstrateed how devices and humans can be integrated from a simple cluste...| By Joshua Drake | Article Rating: |
|
| October 3, 2001 12:00 AM EDT | Reads: |
16,696 |
PortSentry is an easy-to-install application that is designed to assist a Linux user in their attempts to stop those cold-hearted crackers from breaching the mighty fortress that is your Linux machine. Specifically, PortSentry runs as a daemon on the protected host. When running, it listens to TCP/UDP ports that you specify. If it detects a port scan, it will block the scanning IP from connecting to your machine.
| Don't log in as root |
|---|
You should only log in as root when absolutely required. If you can use the su command with the -c flag to achieve your result, do so. If you are unsure on the syntax for the su command is, please see the man page. |
PortSentry has proven so effective at what it does, it is included in many of the newer Linux distributions. These include Turbo Linux, Red Hat, and Debian. You can download PortSentry free of charge from any number of places. As we are going to install PortSentry from scratch, we are going to download the source from Psionic Software. We will not be performing an especially exhaustive overview of PortSentry. If you are interested in more details than this article provides, I suggest you visit Psionic Software's Web site (see resources below).
After you have downloaded the 45 kilobyte software package, you will want to unpack it in an appropriate place on your machine. As usual, assumptions are made that you understand the basics of Linux and its associated commands such as tar.
When you have unpacked the source, enter the source directory and type make linux. Yes, it is really that simple! PortSentry should compile clean on any modern Linux platform. Yes, Red Hat 6.2 is modern (although I have my suspicions about 7.1). After PortSentry has compiled, use the following command to install the application into its directory structure (/usr/local/psionic): su -c "make install". You will need the root password to execute this command.
Now that we have installed PortSentry, we will run through the basic configuration. The configuration file for PortSentry is called portsentry.conf, and it is located in /usr/local/psionic/portsentry/. You will either have to make use of su -c or be the root user to edit the portsentry.conf file.
The configuration file for PortSentry is large, but it is not complicated. The first section in the file we discuss looks like this:
# Un-comment these if you are really anal:#TCP_PORTS="1,7,9,11,15,70,79,80,109,110,111,119,138,139,143,512,513,[...]"
#UDP_PORTS="1,7,9,66,67,68,69,111,137,138,161,162,474,513,517,518,[...]"
#
# Use these if you just want to be aware:
TCP_PORTS="1,11,15,79,111,119,143,540,635,1080,1524,[...]"
UDP_PORTS="1,7,9,69,161,162,513,635,640,641,700,37444,[...]"
#
# Use these for just bare-bones
#TCP_PORTS="1,11,15,110,111,143,540,635,1080,1524,2000,[...]"
#UDP_PORTS="1,7,9,69,161,162,513,640,700,32770,32771,[...]"
Like shell scripts, and some programming languages, you comment the configuration file using the # symbol. If you were to run PortSentry as it sits now, it would monitor the ports identified by the "Use these if you just want to be aware" comment. This is the setting that most people will probably want to use. The first set is extremely restrictive, and the third is lackluster from a security perspective.
If you choose to use the default port settings, I suggest you remove port 143 from the listing. The 143 port is used for IMAP.
The next part of the configuration file we explore looks like this:
####################### Configuration Files#
######################
#
# Hosts to ignore
IGNORE_FILE="/usr/local/psionic/portsentry/portsentry.ignore"
# Hosts that have been denied (running history)
HISTORY_FILE="/usr/local/psionic/portsentry/portsentry.history"
# Hosts that have been denied this session only (temporary until next
restart)
BLOCKED_FILE="/usr/local/psionic/portsentry/portsentry.blocked"
This area of the file is used to specify where you would like the configuration files to reside. If you use the default settings, the configuration files will remain in the /usr/local/psionic directory tree. However, you may want to move these to another location. It is popular to use the /etc/portsentry on several Linux distributions.
As we continue our non-stop trip to port scanning detection euphoria, we should address what our protected host should do if it detects a scan. This is done in the Dropping Routes section, which looks like this:
# ipfwadm support for Linux#KILL_ROUTE="/sbin/ipfwadm -I -i deny -S $TARGET$ -o"
#
# ipfwadm support for Linux (no logging of denied packets)
#KILL_ROUTE="/sbin/ipfwadm -I -i deny -S $TARGET$"
#
# ipchain support for Linux
#KILL_ROUTE="/sbin/ipchains -I input -s $TARGET$ -j DENY -l"
#
# ipchain support for Linux (no logging of denied packets)
#KILL_ROUTE="/sbin/ipchains -I input -s $TARGET$ -j DENY"
#
# iptables support for Linux
#KILL_ROUTE="/usr/local/bin/iptables -I INPUT -s $TARGET$ -j DROP"
#
If you are using a version of Linux that still makes use of the ipfwadm command, you are in need of an upgrade. Otherwise if you are using a 2.2 kernel within Linux, choose the following:
# ipchain support for Linux#KILL_ROUTE="/sbin/ipchains -I input -s $TARGET$ -j DENY -l"
Finally, if you are using a 2.4 kernel within Linux choose, instead use the following:
# iptables support for Linux#KILL_ROUTE="/usr/local/bin/iptables -I INPUT -s $TARGET$ -j DROP"
Remember that you must uncomment (remove the #) the line in order for it to be active. Be sure to only uncomment the KILL_ROUTE command, and not the preceding comment.
The KILL_ROUTE command is (IMHO) the most powerful part of PortSentry. The way KILL_ROUTE works is this: if PortSentry detects a scan, the KILL_ROUTE command is executed. Via the default configuration of PortSentry, this means that all future TCP/IP packets from the scanning host will be dropped, or denied. In other words, all your potential hacker hears on the other line is, "I'm sorry, all circuits are busy! Please try your call again later." Fortunately for the protected host, it won't matter if the attacker tries again later. The circuits will always be busy for him.
The last thing to talk about is how to actually run PortSentry. PortSentry should be part of the normal system start-up, and the easiest way to make PortSentry start up automatically is to put it in your rc.local file. If you are running a newer version of RedHat or Mandrake, they may have a service script you can use instead. If you are using the rc.local file to start PortSentry, you can add to it the following lines:
echo "Starting PortSentry" /usr/local/psionic/portsentry/portsentry -atcp /usr/local/psionic/portsentry/portsentry -audp echo "Done"
There are other options available to PortSentry, but they are outside the scope of this article. Fortunately, most of the defaults for the PortSentry configuration file will suffice on a Linux machine. However, I strongly suggest that you review the included documentation. The documentation is reasonably thorough, and can give you some hints about what NOT to do.
Published October 3, 2001 Reads 16,696
Copyright © 2001 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
More Stories By Joshua Drake
Joshua Drake is the co-founder of Command Prompt, Inc., a PostgreSQL and Linux custom development company. He is also the current author of the Linux Networking HOWTO, Linux PPP HOWTO, and Linux Consultants HOWTO. His most demanding project at this time is a new PostgreSQL book for O'Reilly, 'Practical PostgreSQL'
Learn how IoT, cloud, social networks and last but not least, humans, can be integrated into a seamless integration of cooperative organisms both cybernetic and biological. This has been enabled by recent advances in IoT device capabilities, messaging frameworks, presence and collaboration services, where devices can share information and make independent and human assisted decisions based upon social status from other entities.
In his session at @ThingsExpo, Michael Heydt, founder of Seamless Thingies, discussed and demonstrateed how devices and humans can be integrated from a simple cluste...Jan. 6, 2016 06:30 PM EST |
By Liz McMillan Organizations already struggle with the simple collection of data resulting from the proliferation of IoT, lacking the right infrastructure to manage it. They can't only rely on the cloud to collect and utilize this data because many applications still require dedicated infrastructure for security, redundancy, performance, etc.
In his session at 17th Cloud Expo, Emil Sayegh, CEO of Codero Hosting, discussed how in order to resolve the inherent issues, companies need to combine dedicated and cloud solutions through hybrid hosting – a sustainable solution for the data required to manage IoT de...Jan. 6, 2016 05:30 PM EST Reads: 814 |
By Pat Romanski "As a technology provider we believe that business comes first and customers should start thinking that technology is something that helps them to enable new business models," stated Ermanno Bonifazi, Founder and CEO of Solgenia, in this SYS-CON.tv interview at 17th Cloud Expo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.Jan. 6, 2016 03:00 PM EST Reads: 661 |
By Elizabeth White The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.Jan. 6, 2016 10:15 AM EST Reads: 132 |
By Pat Romanski Manufacturing connected IoT versions of traditional products requires more than multiple deep technology skills. It also requires a shift in mindset, to realize that connected, sensor-enabled “things” act more like services than what we usually think of as products.
In his session at @ThingsExpo, David Friedman, CEO and co-founder of Ayla Networks, discussed how when sensors start generating detailed real-world data about products and how they’re being used, smart manufacturers can use the data to create additional revenue streams, such as improved warranties or premium features. Or slash ma...Jan. 6, 2016 09:45 AM EST Reads: 138 |
By Elizabeth White Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of (at least) three separate application components: the software embedded in the device, the backend service, and the mobile application for the end user’s controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target – this makes the integration of these separate pipelines and the coordination of software updates for ...Jan. 6, 2016 08:15 AM EST Reads: 297 |
By Pat Romanski "IoT is really hitting its stride. The adoption rates are increasing and Vitria is in a good position to help people deliver on the value of IoT," explained Mike Houston, Marketing & Product Marketing Professional at Vitria Technology, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.Jan. 5, 2016 11:00 PM EST Reads: 607 |
By Pat Romanski "Storage is growing. All of IDC's estimates say that unstructured data is now 80% of the world's data. We provide storage systems that can actually deal with that scale of data - software-defined storage systems," stated Paul Turner, Chief Product and Marketing Officer at Cloudian, in this SYS-CON.tv interview at 17th Cloud Expo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.Jan. 5, 2016 08:45 PM EST Reads: 565 |
By Pat Romanski "We're seeing a lot of activity in IoT in the healthcare space - a lot of new devices coming in. We are seeing a huge demand in building smart offices, smart infrastructures, smart cloud applications," explained Shrikant Pattathil, President of Harbinger Systems, in this SYS-CON.tv interview at 17th Cloud Expo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.Jan. 5, 2016 08:00 PM EST Reads: 643 |
By Pat Romanski "The problem with IoT today is that people aren't looking to buy IoT, what they're really trying to do is buy a business outcome or trying to figure out ways to improve the business outcome. It just so happens that IoT may be the technology that can help do that," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.Jan. 5, 2016 01:45 PM EST Reads: 580 |
By Pat Romanski Electric power utilities face relentless pressure on their financial performance, and reducing distribution grid losses is one of the last untapped opportunities to meet their business goals. Combining IoT-enabled sensors and cloud-based data analytics, utilities now are able to find, quantify and reduce losses faster – and with a smaller IT footprint. Solutions exist using Internet-enabled sensors deployed temporarily at strategic locations within the distribution grid to measure actual line loads.Jan. 5, 2016 12:00 PM EST Reads: 841 |
By Pat Romanski Consumer IoT applications provide data about the user that just doesn’t exist in traditional PC or mobile web applications. This rich data, or “context,” enables the highly personalized consumer experiences that characterize many consumer IoT apps. This same data is also providing brands with unprecedented insight into how their connected products are being used, while, at the same time, powering highly targeted engagement and marketing opportunities.
In his session at @ThingsExpo, Nathan Treloar, President and COO of Bebaio, explored examples of brands transforming their businesses by tappi...Jan. 5, 2016 07:00 AM EST Reads: 775 |
By Elizabeth White "What is the next step in the evolution of IoT systems? The answer is data, information, which is a radical shift from assets, from things to input for decision making," stated Michael Minkevich, VP of Technology Services at Luxoft, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.Jan. 5, 2016 04:00 AM EST Reads: 565 |
By Pat Romanski Contrary to mainstream media attention, the multiple possibilities of how consumer IoT will transform our everyday lives aren’t the only angle of this headline-gaining trend. There’s a huge opportunity for “industrial IoT” and “Smart Cities” to impact the world in the same capacity – especially during critical situations. For example, a community water dam that needs to release water can leverage embedded critical communications logic to alert the appropriate individuals, on the right device, as soon as they are needed to take action.Jan. 5, 2016 02:00 AM EST Reads: 565 |
By Elizabeth White With the exponential growth of network traffic slowing down data transmission, companies are looking for solutions. Recently, a solution has emerged that can help improve your data speed with data centers on the edge. These micro data center solutions can simplify the lives of many data center owners and operators because they are self-contained, secure computing environments, assembled in a factory and shipped in one enclosure which includes all the necessary power, cooling, security, and management tools. Their flexibility opens up a wave of new applications, made possible through reduced la...Jan. 4, 2016 04:20 PM EST Reads: 127 |
By Pat Romanski WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications.
In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, introduced the technologies required for implementing these ideas and some early experiments performed in the Kurento open source software community in areas such...Jan. 1, 2016 09:30 PM EST Reads: 676 |
By Elizabeth White "At Sensorberg we are providing a cloud-based beacon management platform and this allows you to control the various beacons that you have in your fleet as well as design various campaigns and triggers which the beacons will initiate," explained Daniel Gillard, Business Development Manager at Sensorberg GmbH, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.Jan. 1, 2016 10:00 AM EST Reads: 409 |
By Pat Romanski "IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.Dec. 31, 2015 08:15 PM EST Reads: 494 |
By Liz McMillan There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting.
In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, showed how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants received the download information, scripts, and complete end-to-end walkthrough of the analysis from start to finish, and were also given the practical knowledge ...Dec. 30, 2015 12:00 PM EST Reads: 483 |
By Liz McMillan "We announced CryptoScript, it's a new way of programming a hardware security module, which technically requires standard APIs and very specific knowledge. With CryptoScript we hope to change that a bit," explained Johannes Lintzen, Vice President of Sales at Utimaco, in this SYS-CON.tv interview at 17th Cloud Expo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.Dec. 27, 2015 11:00 AM EST Reads: 393 |

Organizations already struggle with the simple collection of data resulting from the proliferation of IoT, lacking the right infrastructure to manage it. They can't only rely on the cloud to collect and utilize this data because many applications still require dedicated infrastructure for security, redundancy, performance, etc.
In his session at 17th Cloud Expo, Emil Sayegh, CEO of Codero Hosting, discussed how in order to resolve the inherent issues, companies need to combine dedicated and cloud solutions through hybrid hosting – a sustainable solution for the data required to manage IoT de...
"As a technology provider we believe that business comes first and customers should start thinking that technology is something that helps them to enable new business models," stated Ermanno Bonifazi, Founder and CEO of Solgenia, in this SYS-CON.tv interview at 17th Cloud Expo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
Manufacturing connected IoT versions of traditional products requires more than multiple deep technology skills. It also requires a shift in mindset, to realize that connected, sensor-enabled “things” act more like services than what we usually think of as products.
In his session at @ThingsExpo, David Friedman, CEO and co-founder of Ayla Networks, discussed how when sensors start generating detailed real-world data about products and how they’re being used, smart manufacturers can use the data to create additional revenue streams, such as improved warranties or premium features. Or slash ma...
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of (at least) three separate application components: the software embedded in the device, the backend service, and the mobile application for the end user’s controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target – this makes the integration of these separate pipelines and the coordination of software updates for ...
"IoT is really hitting its stride. The adoption rates are increasing and Vitria is in a good position to help people deliver on the value of IoT," explained Mike Houston, Marketing & Product Marketing Professional at Vitria Technology, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
"Storage is growing. All of IDC's estimates say that unstructured data is now 80% of the world's data. We provide storage systems that can actually deal with that scale of data - software-defined storage systems," stated Paul Turner, Chief Product and Marketing Officer at Cloudian, in this SYS-CON.tv interview at 17th Cloud Expo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
"We're seeing a lot of activity in IoT in the healthcare space - a lot of new devices coming in. We are seeing a huge demand in building smart offices, smart infrastructures, smart cloud applications," explained Shrikant Pattathil, President of Harbinger Systems, in this SYS-CON.tv interview at 17th Cloud Expo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
"The problem with IoT today is that people aren't looking to buy IoT, what they're really trying to do is buy a business outcome or trying to figure out ways to improve the business outcome. It just so happens that IoT may be the technology that can help do that," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Electric power utilities face relentless pressure on their financial performance, and reducing distribution grid losses is one of the last untapped opportunities to meet their business goals. Combining IoT-enabled sensors and cloud-based data analytics, utilities now are able to find, quantify and reduce losses faster – and with a smaller IT footprint. Solutions exist using Internet-enabled sensors deployed temporarily at strategic locations within the distribution grid to measure actual line loads.
Consumer IoT applications provide data about the user that just doesn’t exist in traditional PC or mobile web applications. This rich data, or “context,” enables the highly personalized consumer experiences that characterize many consumer IoT apps. This same data is also providing brands with unprecedented insight into how their connected products are being used, while, at the same time, powering highly targeted engagement and marketing opportunities.
In his session at @ThingsExpo, Nathan Treloar, President and COO of Bebaio, explored examples of brands transforming their businesses by tappi...
"What is the next step in the evolution of IoT systems? The answer is data, information, which is a radical shift from assets, from things to input for decision making," stated Michael Minkevich, VP of Technology Services at Luxoft, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Contrary to mainstream media attention, the multiple possibilities of how consumer IoT will transform our everyday lives aren’t the only angle of this headline-gaining trend. There’s a huge opportunity for “industrial IoT” and “Smart Cities” to impact the world in the same capacity – especially during critical situations. For example, a community water dam that needs to release water can leverage embedded critical communications logic to alert the appropriate individuals, on the right device, as soon as they are needed to take action.
With the exponential growth of network traffic slowing down data transmission, companies are looking for solutions. Recently, a solution has emerged that can help improve your data speed with data centers on the edge. These micro data center solutions can simplify the lives of many data center owners and operators because they are self-contained, secure computing environments, assembled in a factory and shipped in one enclosure which includes all the necessary power, cooling, security, and management tools. Their flexibility opens up a wave of new applications, made possible through reduced la...
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications.
In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, introduced the technologies required for implementing these ideas and some early experiments performed in the Kurento open source software community in areas such...
"At Sensorberg we are providing a cloud-based beacon management platform and this allows you to control the various beacons that you have in your fleet as well as design various campaigns and triggers which the beacons will initiate," explained Daniel Gillard, Business Development Manager at Sensorberg GmbH, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting.
In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, showed how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants received the download information, scripts, and complete end-to-end walkthrough of the analysis from start to finish, and were also given the practical knowledge ...
"We announced CryptoScript, it's a new way of programming a hardware security module, which technically requires standard APIs and very specific knowledge. With CryptoScript we hope to change that a bit," explained Johannes Lintzen, Vice President of Sales at Utimaco, in this SYS-CON.tv interview at 17th Cloud Expo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Every physical object or “thing” that can be embedded with sensors will be embedded with sensors. Whether you call it the Internet of Things, the Internet of Everything, M2M, a smarter planet, the Industrial Internet or something else, the trend is clear. With so much activity and interest, it is unfortunate that a de facto communications standard has not emerged. However, there is progress (or managed conflict) in the right direction.
I recently had a chance to speak at The International Monetary Fund (IMF) big data symposium. I was told to make my presentation a bit provocative, so I opened my session by stating to the economist audience “Aren’t you embarrassed that the CVS across the street knows more about the U.S. economy on a day-to-day basis than you do?” Okay, so maybe that was a bit unfair, but the point behind the comment was not; which is that organizations need to think differently about how they leverage data and analytics to power their key business initiatives. And for the IMF, that means changing how it th...
The Internet of Things or IoT is more than the newest fitness monitor or cool device. It is the process of transparently deploying countless sensors and devices, which produce data that is transformed into valued information.
This happens each time a consumer buys a smart device such as a fitness monitor. The consumer knowingly enables the device to monitor an event, such as a run. In turn, the device creates data, e.g., step count, which is transported across the internet to a cloud application. Analytics are then performed on aggregated data, e.g. friends’ data, to create information, e.g. ...
2015 has been a busy year for us at Electric Cloud, as we continue to innovate on the Product front to transform the way organizations deliver software to market.
2015 saw the launch of ElectricFlow Deploy - the industry's most powerful deploy automation and ARA solution, soon followed by ElectricFlow Release - which provides DevOps teams across the organization an easy way to coordinate software releases, enabling a clear, intuitive, view of your Path to Production and the state of your Release at any given time.
Our shopping experiences continue to change. Today, we use smartphones, tablets and laptops to shop, purchase and track shipments online, from anywhere at any time. We bring mobile devices into retail stores to compare prices and learn more about products on the shelf. We search for available inventories, the nearest store locations, and for new, used, shared and auctioned products and services. These digital transformations are profoundly altering the nature of retailing, and their velocity will only accelerate.
"Internet-of-Things" (IoT) is touted as the next big thing slated to revolutionize how we communicate online or how we work. The majority of the chatter rising from industries nowadays is focused on how to deploy machine-to-machine (M2M) communication and optimally capitalize on the technology. Simply put, IoT is built on the paradigm of cloud computing and data gathering sensors networks. Hence, it provides instantaneous and mobile virtual connection. Proponents of the technology believe that within a few years IoT will make even the smallest speckle of technology in our lives, "smart'. Be it...
Gartner predicts that number of IoT devices in use worldwide will grow from an estimated 5 billion in 2015 to some 25 billion connected devices by 2020. The best business strategies will perfectly balance the ever-growing IoT market opportunities versus a rapidly evolving threat environment. To help IoT solution providers define their 2016 product roadmap, here are some of INSIDE Secure’s top IoT predictions for the year.
Shadow IT is here to stay. IT departments need to appreciate that it is so culturally inbuilt that shutting it down is now impossible; in fact, policies punishing the use of third-party apps would more likely push rogue users deeper into the darkness. The battle that can be won is to better educate staff and make Shadow IT an integral part of the company’s wider security awareness program. Some staff are aware of the problems, and will ignore them, but many just simply won’t understand why what they are doing could affect the whole business.
We know you, dear readers, have been tracking the megatrend of artificial intelligence. There are many issues in this trend that should inform your day-to-day decision-making (we examine AI issues as part of our CAMBRIC construct to help put the trend in the context of other major thrusts in the tech world).
Most AI solutions today are fielded by the big players in IT. For example, Apple's Siri or the capabilities they embedded directly in IOS9, or Google's many savvy search solutions or Amazon's very smart recommendations. Amazon's Echo is also, like Siri, connecting to a very smart cloud ...
The Internet of Things (IoT) has been one of the most prominent IT buzz words of 2015. Whether you are talking about thermostats you can set before you get home, beacons wirelessly suggesting items to buy in your high street clothing store or wearable gadgets like the Apple Watch, IoT is more than just hype. It’s here to stay if consumers have anything to say about it.
However, there is a lot more to IoT than first meets the eye; it is much deeper and has the potential to affect much more than our lives on a personal level. In fact, Gartner has predicted that over 25 billion ‘things’ will be ...
The application performance monitoring industry underwent a lot of big changes in 2015.
And 2016 won't be any different. From changing consumer behavior to new tools and developments in the application performance space - there's a lot to keep an eye on in the New Year.
Here are five ways application performance monitoring will change in 2016:
Changing consumers and the device mesh
IoT is the next development of how the Internet is applied to the world. TAM for M2M/IoT is estimated at $19 trillion. The IoT device count is in the billions but will not traverse the service providers’ networks. Service providers and vendors are struggling to understand how to map the TAM dollars to real use cases, optimal technology approaches, and profitable business models.
In his session at @ThingsExpo, Dennis Ward, IoT analyst, strategist at DWE, focused on the SP transformations that will occur. In Phase I SP infrastructure virtualization. In Phase II SPs will focus on monetization. ...
The Internet of Things (IoT) continues to be a major topic of discussion in the tech industry. Many people want to know: how is the IoT influencing me already? That’s one of the themes of this week’s conversation between Electric Cloud CTO Anders Wallgren and Software Engineering Daily Host Jeff Meyerson.
IoT continues to grow, with the proliferation of smart homes, wearables, smart cars, mHealth devices and more. For example, new cars today come pre-wired with hundreds of millions of lines of code already, and much of the embedded software is already connected to the Internet. This always-on...
Data has changed our world.. From our cars, homes, pets, and even our own bodies, data has opened our eyes to behavior patterns and allowed us to catch on to small issues before they become bigger problems. This phenomenon has made huge waves in the healthcare industry, including reducing operational costs, improving independent living, and increasing early detection of diseases. With the wildfire set by the Internet of Things, healthcare data from wearables and other mHealth devices are helping patients take a more informed and active role in their healthcare, and give doctors more insight in...























