Posts

Showing posts from September 6, 2016

Huawei explore creating its own chipsets and mobile operating system based on Android

Image
Our global economic environment is very demanding. This reality requires flexibility in costs and productivity.
A vendor like Huawei paves its strong way aiming to become the top global smartphone vendor in five years’ time. In effect, the company can leverage its successive YoY rises in smartphone shipments.
According to ABI Research, to become a global electronics brand, the company will need to gain a strong foothold in the U.S. and western European markets.
On its attempt to expand its reach by creating its own chipsets and mobile operating system based on Android, one can expect that, its own chipsets for a number of its smartphone models may help it continue its upward trajectory. Huawei can avoid the need to rely on chipsets from IC suppliers, and can control its costs. 
When it comes to create its own operating system, it is clear that, Huawei probably believes that it reached critical mass in terms of its volume sales and so now has the means to create its own ecosystem.
Huawei do…

The impact of security-policy orchestration technology within enterprise organizations

Image
Cyber resiliency is at the core of stakes. Many experts in the cyber security industry forecast that, Security Policy Orchestration and Automation will lead next-generation cybersecurity for enterprises.
With this new architecture, we move from static defense to agile and adaptive response, in our ever-connected environment where cyber threats are increasingly sophisticated. 
Orchestration is a conceptual architecture for maintaining business functions and operations despite adverse cyber conditions. Orchestration platforms focus on automating management.
Established network security companies are increasingly offering orchestration for their product base: FireEye, ForeScout, Tufin, Tripwire, among others. Newer firms, such as Phantom, are investing in the market from a unique orchestration perspective. 
According to ABI Research, Security policy orchestration will hit $1 billion in its global revenues by 2020.

Natural language processing technology within enterprises

Image
A set of dataset converges on the reality that, natural language processing will prove particularly beneficial in use cases and verticals that demand hands-free functionality, such as in healthcare, oil and gas, factory floors, and construction. 
For those who are unfamiliar, Enterprise voice adoption often requires customized dictionaries, applications, and tools. Specialists such as Nuance Communications are developing industry-specific voice packages.
ABI Research predicts that consumers who engage with voice functionality on a monthly basis will grow to more than one billion by 2021, an 80% CAGR.

Here is what Internet of Things (IoT) devices need to perform cryptographic authentication

Image
In our ever-connected world where most connected devices are not being built with security in mind, as many IoT device manufacturers lack the funding, expertise, and awareness to properly implement it, it is clear that, hardware-based embedded security solutions play an important role.
In effect, IoT devices need a trusted platform, like an Embedded Secure Element (eSE), Trusted Execution Environment (TEE), or Trusted Platform Module (TPM) to perform cryptographic authentication.
For those who are unfamiliar, each platform performs security-critical functions and provides Roots of Trust (RoT), which are critical components to security architecture and allow for efficiently deployed and managed data protection across the entire data life cycle.
TPM chips can be ideal for combating IoT security challenges. Vendors producing TPM chips include Atmel, Broadcom, Infineon, Nuvoton, and STMicroelectronics.