MOX expands connectivity across North America within Cologix data centres

MOX Networks, a fiber-optic network specialist, and Cologix, a network-neutral interconnection, ecosystem, and hyperscale edge data centre company, announced a new partnership today aimed at expanding connectivity solutions for their customers across North America. Currently connected to the Cologix Minneapolis data centres, MOX is now offering 1G, 10G, and 100G capacity services to all Cologix customers, with the ability to extend service to several Chicago area data centres and the Seattle metro area.

MOX has also deployed fiber connectivity from the Cologix Columbus data centre, which will be available by the end of Q3. From this location, MOX’s dark fiber connectivity will extend to Ashburn, VA through its exclusive new Columbus to Ashburn route, the first of its kind available through West Virginia. Announced in January, the new Columbus to Ashburn route provides the opportunity to immediately support large bandwidth requirements from the region’s content, cloud, and hyperscale companies.

“Our customers are constantly experiencing the increase of sophisticated user demands for network and connectivity solutions that deliver faster and more reliable data connections across our data centres,” states Laura Ortman, president & CRO, Cologix. “By tapping into the MOX fiber network, our customers have access to the latest performance connectivity solutions across major US markets, in particular in the Columbus data centre market.”

Cologix Columbus is one of the most advanced data centre campuses in the Midwest. Their purpose-built, Tier III Certified facilities are designed for enterprises and large companies that need critical power with 100% uptime, robust connectivity to more than 50 onsite carriers, and a rich ecosystem of major cloud providers including AWS US East (Ohio).

Justin Melnikoff

“When deciding how to best expand our data centre connectivity relationships across North America, Cologix was an ideal partner because they are positioned in key locations along our network paths. Offering new dark fiber from Cologix Columbus data centres opens infinite opportunities for Cologix customers to access the newest, high-quality connectivity through West Virginia, down to Ashburn, VA,” comments Justin Melnikoff, president and COO, MOX.

“Our experience in Cologix Minneapolis demonstrated that our network perfectly supports Cologix customer needs for purpose-built, resilient connectivity options. We are positioned to deliver complex solutions for customers in the cloud, application, gaming, and content spaces, with custom network and connectivity scenarios, improved performance, and cost management.”

Founded in 2013 and privately owned by Dr. Patrick Soon-Shiong, the founder of NantWorks, a network of health and technology companies, MOX was created to build the network that would “converge ultra-low power semiconductor technology, supercomputing, secure advanced networks, and augmented intelligence to transform how we work, play, and live.” Under Melnikoff’s leadership, MOX has built and delivered unique, high capacity network infrastructure across North America and Japan.

Comment on this article below or via Twitter@IoTGN

The post MOX expands connectivity across North America within Cologix data centres appeared first on IoT global network.

Wipro and Nutanix partner to launch digital database services

Nutanix, a provider of cloud computing, and Wipro Limited, a global information technology, consulting and business process services company, announced the launch of Wipro’s Digital Database Services (DDS) powered by Nutanix Era and Nutanix HCI software. This offering will enable enterprises to efficiently manage databases, optimising time and effort of IT teams.

As the data landscape shifts, businesses face constant pressure for innovation resulting in a strain on the company’s IT departments. With legacy infrastructures, databases can be one of the components that hinders time to value and linear scalability, preventing rapid scaling of operations such as transaction processing in which businesses can lose valuable transactions or insights that directly impact their revenue or decision-making capabilities.

Wipro’s Digital Database Services (DDS), built on Nutanix solutions for Databases including Nutanix HCI software and Nutanix Era, allows enterprises and users to provision and manage databases just-in-time, without prior knowledge of hardware, database software and associated configurations. The result is accelerated application release time, allowing database administrators to focus on new innovation instead.

The DDS offering from Wipro, powered by Nutanix, empowers customers to consolidate their database workloads onto a shared infrastructure to manage database sprawl. It drives efficiency, agility, cost-effectiveness, and scalability across the enterprise by automating and simplifying database administration. Additional benefits delivered by the joint solution include:

  • Cost reduction: Reduction of acquisition and operating costs of database, consolidation and effective utilisation of resources (control sprawl, better lifecycle management), better utilisation of database administrators’ time by allowing them to focus on innovations and optimisations.
  • Rapid provisioning: Delivery of services in minutes as compared to days; business lines, database administrators, or non-IT users can consume services through a self-service portal, reducing overall time.
  • Innovative pricing: The as-a-service model makes cost predictable and easily dispersed to business units, ensuring service quality and customer satisfaction.
  • Reusability: The solution integrates with other third-party cloud management platform and orchestration tools to help reuse existing investment.
  • Supportability: Support for multiple database technologies and versions.
  • Automation: Enabling greater efficiency and faster change delivery with better quality and predictability.

Satish Yadavalli, vice president, cloud and infrastructure services, Wipro Limited said, “Wipro’s joint offering with Nutanix brings agility, speed and flexibility for core and digital applications delivered as-a-service. Wipro’s Digital Database Services (DDS) powered by Nutanix HCI platform and Era delivers end-to-end services from transition, modernisation, continuous deployment and automated lifecycle management operations of enterprise, open source and NoSql databases.

Integrations are simplified as developers and application owners have access to a repository of customised services APIs. With this joint solution, we are confident of helping our joint customers optimise the Database resources and license cost.”

Bala Kuchibhotla, vice president and general manager, Nutanix Era and Business Critical Apps, Nutanixsaid, “Legacy database management is traditionally complex and requires massive amounts of resources from database administrators, taking away time they could be spending on more critical initiatives.

With data volumes growing exponentially year-over-year, provisioning, protecting, patching, performance and copy data management operations are becoming even more tedious and expensive. Our partnership with Wipro, will help develop efficient and elegant Database-as-a-Service solutions for our customers to further our mission of enabling any organisation to embrace the power of the cloud.”

Comment on this article below or via Twitter@IoTGN

The post Wipro and Nutanix partner to launch digital database services appeared first on IoT global network.

Number of voice assistant devices in use to overtake world population by 2024

A new report from Juniper Research has found that consumers will interact with voice assistants on over 8.4 billion devices by 2024; overtaking the world’s population and growing 113% compared to the 4.2 billion devices expected to be in use by year end 2020. Despite this, monetisation of the voice assistants themselves remains a challenge.

Need for behaviour changes restricts the space

The new research, Voice Assistant Market: Player Strategies, Monetisation & Market Size 2020-2024, finds that automotive voice assistants and those connected to TVs will have the high rate of growth, largely thanks to the ability to use voice assistants through peripherals, rather than new hardware. However, this depends on changing consumer behaviour; less than half of TVs capable of voice assistant functions will actually use the function, even in years’ time.

“Ingrained habits of how devices are used will restrict opportunities for voice assistants and voice commerce,” remarked research co-author James Moar. “Vendors should focus on driving usage almost as much as promoting device sales.”

Multiple devices, with limited reach for Most

Despite a proliferation of different voice assistant devices, Juniper Research expects that smartphones will continue their dominance of the space. Other devices will be comparatively underused in many markets. Despite having more than double the population of North America, the number of voice assistant devices in Europe will only exceed North America by 2022, and then only marginally, thanks to fewer devices being launched into those markets.

The research notes that while several voice assistant vendors are pivoting towards productivity and office usage, this will be a relatively small market. Less than 354 million PCs will have active voice assistants, particularly following Microsoft shifting Cortana away from being a full voice assistant. Juniper Research recommends that voice assistant companies targeting the PC market emphasise voice as part of wider ecosystem of device and data management, with more automation than consumer voice assistants.

Juniper Research provides research and analytical services to the global hi-tech communications sector; providing consultancy, analyst reports and industry commentary.

For more insights, download the free whitepaper, Hey Siri, How Will You Make Money?.

Comment on this article below or via Twitter@IoTGN

The post Number of voice assistant devices in use to overtake world population by 2024 appeared first on IoT global network.

Number of voice assistant devices in use to overtake world population by 2024

A new report from Juniper Research has found that consumers will interact with voice assistants on over 8.4 billion devices by 2024; overtaking the world’s population and growing 113% compared to the 4.2 billion devices expected to be in use by year end 2020. Despite this, monetisation of the voice assistants themselves remains a challenge.

Need for behaviour changes restricts the space

The new research, Voice Assistant Market: Player Strategies, Monetisation & Market Size 2020-2024, finds that automotive voice assistants and those connected to TVs will have the high rate of growth, largely thanks to the ability to use voice assistants through peripherals, rather than new hardware. However, this depends on changing consumer behaviour; less than half of TVs capable of voice assistant functions will actually use the function, even in years’ time.

“Ingrained habits of how devices are used will restrict opportunities for voice assistants and voice commerce,” remarked research co-author James Moar. “Vendors should focus on driving usage almost as much as promoting device sales.”

Multiple devices, with limited reach for Most

Despite a proliferation of different voice assistant devices, Juniper Research expects that smartphones will continue their dominance of the space. Other devices will be comparatively underused in many markets. Despite having more than double the population of North America, the number of voice assistant devices in Europe will only exceed North America by 2022, and then only marginally, thanks to fewer devices being launched into those markets.

The research notes that while several voice assistant vendors are pivoting towards productivity and office usage, this will be a relatively small market. Less than 354 million PCs will have active voice assistants, particularly following Microsoft shifting Cortana away from being a full voice assistant. Juniper Research recommends that voice assistant companies targeting the PC market emphasise voice as part of wider ecosystem of device and data management, with more automation than consumer voice assistants.

Juniper Research provides research and analytical services to the global hi-tech communications sector; providing consultancy, analyst reports and industry commentary.

For more insights, download the free whitepaper, Hey Siri, How Will You Make Money?.

Comment on this article below or via Twitter@IoTGN

The post Number of voice assistant devices in use to overtake world population by 2024 appeared first on IoT global network.

Mitigating the cyber risks of IoT and finding solutions

The last decade has seen unprecedented development of the Internet of Things (IoT) landscape, enabled by new distributed network technologies. McKinsey estimates that by 2025, the world will own 50 billion networked devices, up 400% from 2010, and contributing US$11 trillion (€10 trillion) to economies. While this proliferation of IoT devices in recent years has

The post Mitigating the cyber risks of IoT and finding solutions appeared first on IoT Now - How to run an IoT enabled business.

Mitigating the cyber risks of IoT and finding solutions

The last decade has seen unprecedented development of the Internet of Things (IoT) landscape, enabled by new distributed network technologies. McKinsey estimates that by 2025, the world will own 50 billion networked devices, up 400% from 2010, and contributing US$11 trillion (€10 trillion) to economies.

While this proliferation of IoT devices in recent years has created exciting opportunities for businesses, governments and individual consumers, it has created new risks which require mitigation. With such rapid development and implementation of IoT technologies, threats and attacks are a clear concern for individuals as well as organisations globally.

Andrea Gaglione, IoT expert and technology lead at Brit Insurance, examines the potential risks of IoT and his colleague, cyber underwriter Ben Maidment identifies the steps that users, developers and insurers can take to protect themselves from these.

What are the risks?

Crucially, the understanding of the risks and potential cyber vulnerabilities associated with IoT is still evolving – and in order to implement mitigation measures and solutions, these potential risks must be identified. Unfortunately, in many cases, it is increasingly becoming clear that these weak points are only identified after a breach or cyber-attack has taken place.

  • Data loss

Security and cyber threats grow exponentially according to the size of the potential ‘attack surface’ and network entry points, something IoT systems therefore are particularly susceptible to. Recent data shows that 26.66 billion IoT devices were active in 2019 and 127 new devices are being connected to the internet every second.

Ben Maidment

As this scales up, the key challenge is the management and protection of all the data that IoT devices capture, use and transmit, especially in light of recent high-profile data breaches and the punitive fines associated with GDPR (General Data Protection Rules) regulation. A primary concern, as with most cyber risks, is the loss or compromise of data, especially customer and personal data. Examples of IoT devices collecting large amounts of personal data which may be particularly vulnerable include smart wearables which monitor, collect and transmit health data.

  • Business disruption and interruption

As supply chains and business processes become more reliant on networked devices to achieve greater efficiency, companies are more at risk of attack. Significant business interruption, through devices being taken offline by a hack can result in a significant loss in revenue in the short term, as well as reputation and trust in the longer term.

In addition to exploiting IoT device vulnerability to enter a network, bad actors can also utilise a series of unsecured IoT devices to divert data and launch Distributed Denial of Service (DDoS) attacks. In 2016, bad actors compromised more than 25,000 digital video recorders and CCTV cameras, diverting their data in order to launch a DDoS attack that brought down the servers of Dyn, a major US DNS provider, which triggered internet outages in the US and Europe bringing down high-profile websites such as Twitter, Netflix, GitHub, and Reddit.

  • Cyber physical

Finally, an emerging risk of IoT (and indeed cyber more broadly) is that of cyber physical, whereby a cyber-attack can result in physical damage. This can range from networked medical devices such as pacemakers, to self-driving cars or expensive industrial processes. A malicious hack of these devices, taking control of these activities could lead to costly and potentially physical damage or danger to life. For example, last year the US Food and Drug Administration issued an alert warning that some insulin pumps are vulnerable to hackers, who could remotely gain access to and potentially change the pump’s settings.

How can we mitigate the risk?

  • Security & privacy by design

Andrea Gaglione

So far, for IoT manufacturers there has been a perceived compromise between the speed of bringing a product to market and the robustness and security of the system. As we have seen with the first wave of IoT, security wasn’t considered a priority requirement, however, we have seen a growing focus on privacy following high profile data breaches and new data regulation.

In our view, security should be paramount in the design of new IoT devices, and continuous measures must be put in place to maintain and improve the security of both new and existing devices.

  • Best practice cyber security

Users themselves, whether individuals, companies or the public sector have a responsibility to adopt best practice when it comes to cyber perils, and awareness and education is critical. Organisations need to balance the desire for the connectivity and efficiency that IoT technologies offer, with the risks that such connectivity creates, particularly given the lack of emphasis on security in the development of such products.

In the same way as they would manage a traditional operating system, individuals should play an active role in shaping company policy on IoT and be responsible and up to date on the threats facing their businesses. Many of these measures have become second nature in traditional IT but are slowly being adopted and considered when considering IoT devices.

Simple steps that users can take to reduce risk (and limit liability in the event of a cyber incident) include: using strong passwords and security keys, updated regularly; monitoring devices and systems to detect and respond to security events, and; continuously updating security of devices with the download of software patches from the manufacturers.

What solutions does insurance provide?

Insurers have a crucial role in mitigating these risks through educating companies to minimise the risks and provide financial and other support should IoT devices be compromised and result in business interruption, physical damage or the theft of data.

Cyber insurance policies can cover the first-party and third-party financial and reputational costs if data or systems have been stolen, damaged or compromised. First party cover includes the cost of investigating and recovering from a cybercrime, from loss of income incurred by a business interruption, reputational rehabilitation and management to extortion payments paid to hackers. Third-party coverage includes damages and settlements, and the cost of legally defending yourself against fines resulting from a breach.

The best forms of cyber insurance are not just a product, but a service which helps to move companies further along the path to compliance and minimise their exposure to risk. An increasing number of insurers – including Brit – offer a number of pre-cyber incident services as part of their policies: clients can have access to online portals which include procedures and plans which can be implemented to lower risks, incident response planning material and check lists for readiness.

The authors are Andrea Gaglione, technology lead and Ben Maidment, cyber class underwriter at Brit Insurance.

Comment on this article below or via Twitter@IoTGN

 

The post Mitigating the cyber risks of IoT and finding solutions appeared first on IoT global network.

Mitigating the cyber risks of IoT and finding solutions

The last decade has seen unprecedented development of the Internet of Things (IoT) landscape, enabled by new distributed network technologies. McKinsey estimates that by 2025, the world will own 50 billion networked devices, up 400% from 2010, and contributing US$11 trillion (€10 trillion) to economies.

While this proliferation of IoT devices in recent years has created exciting opportunities for businesses, governments and individual consumers, it has created new risks which require mitigation. With such rapid development and implementation of IoT technologies, threats and attacks are a clear concern for individuals as well as organisations globally.

Andrea Gaglione, IoT expert and technology lead at Brit Insurance, examines the potential risks of IoT and his colleague, cyber underwriter Ben Maidment identifies the steps that users, developers and insurers can take to protect themselves from these.

What are the risks?

Crucially, the understanding of the risks and potential cyber vulnerabilities associated with IoT is still evolving – and in order to implement mitigation measures and solutions, these potential risks must be identified. Unfortunately, in many cases, it is increasingly becoming clear that these weak points are only identified after a breach or cyber-attack has taken place.

  • Data loss

Security and cyber threats grow exponentially according to the size of the potential ‘attack surface’ and network entry points, something IoT systems therefore are particularly susceptible to. Recent data shows that 26.66 billion IoT devices were active in 2019 and 127 new devices are being connected to the internet every second.

Ben Maidment

As this scales up, the key challenge is the management and protection of all the data that IoT devices capture, use and transmit, especially in light of recent high-profile data breaches and the punitive fines associated with GDPR (General Data Protection Rules) regulation. A primary concern, as with most cyber risks, is the loss or compromise of data, especially customer and personal data. Examples of IoT devices collecting large amounts of personal data which may be particularly vulnerable include smart wearables which monitor, collect and transmit health data.

  • Business disruption and interruption

As supply chains and business processes become more reliant on networked devices to achieve greater efficiency, companies are more at risk of attack. Significant business interruption, through devices being taken offline by a hack can result in a significant loss in revenue in the short term, as well as reputation and trust in the longer term.

In addition to exploiting IoT device vulnerability to enter a network, bad actors can also utilise a series of unsecured IoT devices to divert data and launch Distributed Denial of Service (DDoS) attacks. In 2016, bad actors compromised more than 25,000 digital video recorders and CCTV cameras, diverting their data in order to launch a DDoS attack that brought down the servers of Dyn, a major US DNS provider, which triggered internet outages in the US and Europe bringing down high-profile websites such as Twitter, Netflix, GitHub, and Reddit.

  • Cyber physical

Finally, an emerging risk of IoT (and indeed cyber more broadly) is that of cyber physical, whereby a cyber-attack can result in physical damage. This can range from networked medical devices such as pacemakers, to self-driving cars or expensive industrial processes. A malicious hack of these devices, taking control of these activities could lead to costly and potentially physical damage or danger to life. For example, last year the US Food and Drug Administration issued an alert warning that some insulin pumps are vulnerable to hackers, who could remotely gain access to and potentially change the pump’s settings.

How can we mitigate the risk?

  • Security & privacy by design

Andrea Gaglione

So far, for IoT manufacturers there has been a perceived compromise between the speed of bringing a product to market and the robustness and security of the system. As we have seen with the first wave of IoT, security wasn’t considered a priority requirement, however, we have seen a growing focus on privacy following high profile data breaches and new data regulation.

In our view, security should be paramount in the design of new IoT devices, and continuous measures must be put in place to maintain and improve the security of both new and existing devices.

  • Best practice cyber security

Users themselves, whether individuals, companies or the public sector have a responsibility to adopt best practice when it comes to cyber perils, and awareness and education is critical. Organisations need to balance the desire for the connectivity and efficiency that IoT technologies offer, with the risks that such connectivity creates, particularly given the lack of emphasis on security in the development of such products.

In the same way as they would manage a traditional operating system, individuals should play an active role in shaping company policy on IoT and be responsible and up to date on the threats facing their businesses. Many of these measures have become second nature in traditional IT but are slowly being adopted and considered when considering IoT devices.

Simple steps that users can take to reduce risk (and limit liability in the event of a cyber incident) include: using strong passwords and security keys, updated regularly; monitoring devices and systems to detect and respond to security events, and; continuously updating security of devices with the download of software patches from the manufacturers.

What solutions does insurance provide?

Insurers have a crucial role in mitigating these risks through educating companies to minimise the risks and provide financial and other support should IoT devices be compromised and result in business interruption, physical damage or the theft of data.

Cyber insurance policies can cover the first-party and third-party financial and reputational costs if data or systems have been stolen, damaged or compromised. First party cover includes the cost of investigating and recovering from a cybercrime, from loss of income incurred by a business interruption, reputational rehabilitation and management to extortion payments paid to hackers. Third-party coverage includes damages and settlements, and the cost of legally defending yourself against fines resulting from a breach.

The best forms of cyber insurance are not just a product, but a service which helps to move companies further along the path to compliance and minimise their exposure to risk. An increasing number of insurers – including Brit – offer a number of pre-cyber incident services as part of their policies: clients can have access to online portals which include procedures and plans which can be implemented to lower risks, incident response planning material and check lists for readiness.

The authors are Andrea Gaglione, technology lead and Ben Maidment, cyber class underwriter at Brit Insurance.

Comment on this article below or via Twitter@IoTGN

 

The post Mitigating the cyber risks of IoT and finding solutions appeared first on IoT global network.

Vilicom deploys in-building network for 19 new test labs in Manchester

UK-based wireless telecommunications provider, Vilicom has installed an in-building, advanced cellular network at Smart DCC’s new Manchester office, Brabazon House. This, says the company, will be an essential tool in the rigorous testing of the latest smart energy technologies and initiatives at the new site.

The wireless connectivity will be relied on by 19 labs, which will host 2,400 smart meter testing banks; making it one of the radio frequency test facilities in Europe. Every month 70 million messages are transmitted across the national smart meter network and the data helps identify individual smart installations and pinpoint issues.

“This is the critical test bed for smart meter operations in the UK,” says Marc Ibanez, managing director, Vilicom UK.

The new network will provide the infrastructure to support innovation and growth for Smart DCC and its continued efforts in developing smart meter, home automation and electric vehicle projects. The network will allow experimentation and testing to be done in a secure, sandbox environment.

“Brabazon House improves the way the DCC works, accelerating the programme to digitise Britain’s analogue energy industry. Our labs are fitted with robust cellular technology allowing us to test thousands of smart meters in a safe and secure way. This facility enables the DCC to deliver on its purpose of making Britain more connected so we can all lead smarter, greener lives,” states Dan Lambert, COO of Smart DCC.

“Our work with Smart DCC reinforces our commitment as a business to support other like-minded companies in achieving a common goal of making low-carbon energy accessible and sustainable,” adds Ibanez. “We are proud of the work we have conducted with Smart DCC to deliver a secure network for their new hub of operations. We have given Smart DCC the tools to be able to test, understand and innovate their service to their customers.”

Comment on this article below or via Twitter@IoTGN

The post Vilicom deploys in-building network for 19 new test labs in Manchester appeared first on IoT global network.