IoT Comms Software Is Hard

Page 1 of 3 Next >
View comments: threaded view | newest first | oldest first
nimantha.d
User Rank
Supply Network Guru
Re: Yeah
nimantha.d   4/29/2014 1:54:47 AM
NO RATINGS

@Rich: Yes indeed you are inviting for trouble. It's a risk which should not be taken at any cost. 

tech4people
User Rank
Supply Network Guru
Re: Yeah
tech4people   4/29/2014 8:55:37 AM
NO RATINGS

Nimantha,

Its a risk only if ,you have one layer of Protection at the Endpoint.

Usually,most Endpoints have Multiple Layers of Protection in place today.

For instance if you have an Anti-Virus/Anti-Malware Solution on your PC;it will Scan the Attachment before Downloading it on your machine(You have to specify this in the Settings but can and should be done).

 

 

tech4people
User Rank
Supply Network Guru
Re: Yeah
tech4people   4/29/2014 8:53:23 AM
NO RATINGS

Rich,

What you are alluding to can happen often over slow Internet connections.

What I have found out is reducing the Number of Open Tabs (or Downloads) usually helps to stop this problem dead in its tracks.

 

tech4people
User Rank
Supply Network Guru
Very interesting points.
tech4people   4/29/2014 9:10:18 AM
NO RATINGS

 

I really liked both these points put here-

 

If you choose to host your back office on Amazon Web Services or GAE you are paying proportional to resource use. Optimizing resources is of great interest if your product is connected 24/7 and frequently communicating.

Hosting service providers strongly encourage the use of established frameworks such as HTTP, REST, and HTML. If you choose a standard or protocol that isn't in the mainstream, development effort may be substantially increased.

For the simple reason that we are looking at devices with much-much less computing than what we are used to-Laptops,Smartphones,etc.


Accordingly the resource and Internet needs will also be very different.

Most such devices will probably be transmitting small bytes of Information every few minutes or so.

For that you don't really need MBPS bandwidth now.

Do You?

 

 

tech4people
User Rank
Supply Network Guru
Re: Yeah
tech4people   4/29/2014 12:57:17 PM
NO RATINGS

Rich,

In that case,one will have to check Symantec's Drill Down Menu to see whether or not they give you options to Scan Encrypted Connections.

If they don't then Its time to change your Endpoint Manager.

 

Hospice_Houngbo
User Rank
Supply Network Guru
Security 101
Hospice_Houngbo   4/29/2014 11:21:34 PM
NO RATINGS

"Encrypting traffic and validating at least your server endpoint is a given to protect against this type of situation."


That is Security 101 and every system admin knows that.

"Encryption is a great way to keep valuable data safe—whether you're transmitting it over the Internet, backing it up on a server, or just carrying it through airport security on your laptop." (See How to encrypt almost anythig?)

tech4people
User Rank
Supply Network Guru
Re: Security 101
tech4people   4/30/2014 7:26:30 AM
NO RATINGS

Houngbo,

Problem here is a little unusual.

He wants an Encrypted Connection but ,the Current AV refuses to scan the communication if the channel stays encrypted.

I have suggested he consider changing his AV Provider.

 

nimantha.d
User Rank
Supply Network Guru
Re: Security 101
nimantha.d   4/30/2014 1:43:11 PM
NO RATINGS

From what I gain out of this is that its something to do with the signals. Consulting the service provider is the key

tech4people
User Rank
Supply Network Guru
Re: Security 101
tech4people   5/13/2014 1:01:32 PM
NO RATINGS

Nimantha,

What happens when your Service Provider refuses to help you out?

That's when you really,really get into Deep-Deep trouble.

 

Wale Bakare
User Rank
Supply Network Guru
Re: Security 101
Wale Bakare   5/17/2014 3:21:01 PM
NO RATINGS

Absolutely, service providers have a big role to play in IOT space. Apparently, there is need for more broadband availability

tech4people
User Rank
Supply Network Guru
Re: Security 101
tech4people   5/20/2014 11:21:31 AM
NO RATINGS

Wale,

I don't think its so much an issue about just Bandwidth per se.

We need better Bandwidth Filtering Tools in place(to curb behavior of Botnets,DDOS attacks,unauthorized File Sharing,unauthorized Video traffic,etc) before we expand our Bandwith pipes further.

Remember that there is no end to expanding the Data pipes if we don't control how we Data today.

It will end up being an absolute No sum(but very-very expensive) Game going ahead.

 

tech4people
User Rank
Supply Network Guru
Re: Yeah
tech4people   4/30/2014 7:17:59 AM
NO RATINGS

Kaspersky is a much better option in that case.

Even some of the Smaller Providers(who have more integrated MDM Solutions) like Guidance,Fireeye,Entrust,etc do a much better job than Symantec today.

Problem is that Symantec spends more on Marketing than R&D today.

 

tech4people
User Rank
Supply Network Guru
Re: Yeah
tech4people   4/30/2014 7:20:52 AM
NO RATINGS

Rich,

I'll bet you do!

LOL!!!

So Do I!!!

nimantha.d
User Rank
Supply Network Guru
Re: Yeah
nimantha.d   4/30/2014 1:52:47 PM
NO RATINGS

@tec4people- yes even I would follow the same steps

nimantha.d
User Rank
Supply Network Guru
Re: Yeah
nimantha.d   4/30/2014 1:41:13 PM
NO RATINGS

Thank you for sharing it Rich. Useful indeed

tech4people
User Rank
Supply Network Guru
Re: Security 101
tech4people   5/13/2014 12:59:45 PM
NO RATINGS

Rich,

If that's the case then well you know better what to do there...



Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EBN Dialogue / LIVE CHAT
EBN Dialogue enables you to participate in live chats with notable leaders and luminaries. Open to the entire EBN community of electronics supply chain experts, these conversations see ideas shared, comments made, and questions asked and answered in real time. Listed below are upcoming and archived chats. Stay tuned and join in!
Upcoming Dialogues
REMIND ME
Live Chat 10/30: Top 10 Metrics That Enhance Procurement Performance
We'll be talking about the 10 most important procurement performance metrics, from the old standards to new and emerging best-practices.
10/30/2014
Remind Me
Live Chat 11/06: Enterprise Risks, Intellectual Property & Supply Chains
Enterprise risk management (ERM) frameworks can be useful to identify, assess, and manage intellectual property (IP) risks that arise in supply chain compliance. We'll look at real-world examples and strategies for mitigating those risks.
11/6/2014
Remind Me
Archived Dialogues
Live Chat 10/16: Applying a Macroeconomic Lens to the Supply Chain
EBN blogger Apek Mulay will be our guest as we talk about how macroeconomic reforms have the potential to impact the supply chain.
Live Chat 9/25: Minimizing Risk in the Global Supply Chain
Dave Bowen, CEO of e-sourcing firm MarketMaker4, will be our guest as we explore ways to minimize and manage geo-political and corporate risk in supply chain and sourcing through the use of technology.
Latest Poll
EBN Newswire
FORT WORTH, TX   10/24/2014
Allied Electronics Releases 2015 Catalogue
NEU ISENBURG, GERMANY   10/24/2014
Arrow Receives Its First Responsible Recycling ...
Twitter Feed
EBN Online Twitter Feed