Tag Archive for: IoT

SaaS, IoT, AI and Cloud will continue to accelerate Indian IT: ETILC Members


Housing a global IT powerhouse, India’s economy witnessed a temporary stagflation last year. The consecutive waves of COVID-19 and the rising streaks of infections lead the economy into attrition, forcing companies to adopt cost-cutting measures, even in the IT sector. The sector witnessed a high attrition rate of 8.03% during April to June this year.

However, despite slowing down the financial ecosystem, the statewise lockdowns also had an upside; the pandemic drove companies worldwide to expand their investments in their respective digital infrastructure. The IT sector accounted for 8% of India’s GDP in 2020, which is a substantial increase from its contribution of 1.2% in 1998. In 2019-20, India held the position of the largest sourcing destination in the IT-BPM industry globally.

Growing Demand

As per Gartner’s predictions, IT spending in India will amount upto $98.5 billion by 2021. With the imposition of home isolation due to the pandemic, more and more people started accessing digital services from home. To make ends meet, the IT sector has been constantly keeping up with these demands by providing online services to businesses.

“India is at the cusp of creating massive employment opportunities in the IT/BPM sector, owing to tech like citizen development, AI and cloud”

— Ram Singampalli, COO, Hexaware Tech

The consequent demand and trust in the sector has facilitated companies like Cognizant, Infosys, and Wipro, Tanla Solutions, and HCL Tech with digital expansion as well as increased revenue. Moreover, Tech Mahindra experienced a growth of 39.2% with its net profit at Rs 1,353.2 crore for Q1 FY 2021-2022. Wipro witnessed revenue growth of 22.3% with Tata Consultancy Services at 18.5% growth.

As per the latest Naukri JobSpeak report, the Indian job market witnessed 57 per cent Y-o-Y growth as of September. The IT/software sector in particular grew by 138 per cent (Y-o-Y). Additionally, with thickening technological intervention and the gradual post-covid reopening, retail and hospitality industries also saw an increase in hiring by 82 per cent and 70 per cent, respectively. As digital innovation expands, the scope of job creation and acquisition will also…

Source…

The S in IoT stands for security (and much more) [Podcast+Transcript] – Naked Security


DOUG AAMOTH. Cryptographic bugs, sensible cybersecurity regulations, a cryptocurrency conundrum, and a new Firefox sandbox.

All that and more on the Naked Security podcast.

[MUSICAL MODEM]

Welcome to the podcast, everybody.

I am Doug. He is Paul…


PAUL DUCKLIN. I wouldn’t have said “conundrum”, Doug.

I might have said “catastrophe” or “business as usual”… but let’s leave that until later, shall we?


DOUG. I was slightly diplomatic, but yes, “catastrophe” probably would have been better… stay tuned for that one.

Well, we like to start the show with a Fun Fact, and the Fun Fact for this week is that on its patent application, the name for the computer mouse was not-quite-as-succinct: “X-Y position indicator for a display system.”

When asked about the origin of the mouse name, its inventor, Douglas Engelbart, recalled, “I just looked like a mouse with a tail, and we all called it that.”


DUCK. The other name to remember, there is, of course, Bill English, who is essentially the co-inventor.

Engelbart came up with the idea of the mouse, based on a device called a planimeter, which had fascinated him when he was a kid.

And he went to Bill English, his colleague, and said, “Can you build one of these?”

Apparently it was carved out of mahogany… you’ve seen the pics, Doug.


DOUG. It’s lovely, yes.


DUCK. It’s quite chunky!

And is it true – I think you’ve said this on a previous podcast – that they had the cable coming out of the wrong side at first?


DOUG. At first they did, coming out of the wrist end, yes.


DUCK. And when they flipped it round, obviously, it’s a tail… it can only be a mouse!


DOUG. Well, thank you for that, Mr. Engelbart.

Despite the instances of repetitive stress injury and carpal tunnel syndrome… other than that, the mouse has gone swimmingly.

It is an aptly named peripheral, and speaking of things that are aptly named: we have a Mozilla bug called “BigSig”.

So, I wonder what that could be about?


DUCK. Strictly speaking, it’s CVE-2021-43527.

It was found by well known serial bug-hunting expert from Google, Tavis Ormandy.

It was an old school buffer overflow that nobody had noticed for years and…

Source…

Rising Popularity of IoT: Expanding Challenges for Security Leaders



Read Article


By Argha Bose, Head Cyber Security and Risk Business, TATA Advanced Systems Limited- Cyber Security Practice

Security risks in the world of IoT or the Internet of Things are constantly on the rise with the growth in its popularity. Although IoT has provided businesses with opportunities to create more value and improve efficiencies, the continual connectivity (along with constant information sharing) has provided adversaries with options to compromise the integrity and confidentiality of sensitive data. Consequently, the risks have grown significantly.

There is a broad range of smart devices available nowadays, which are being widely used by individuals in every business vertical. These connected devices include Alexa-enabled digital assistants, smartwatches/fitness bands, smart bulbs, etc. While, if we talk about IoT technology on the industrial level, multiple organizations had already incorporated IIoT and are reaping its benefits. For instance, Magna Steyr, an Austrian automotive manufacturer, is using the concept of smart factories to offer production flexibility. Also, ABB, a power and robotics firm, is utilizing connected, low-cost sensors to observe the maintenance of its robots to timely repair parts before they go down.

I believe that the adoption of IoT & IIoT will keep increasing with time. It is expected that the total number of IoT devices globally will reach 30.9 billion by 2025 (Source: Statista), while the global IIoT market is projected to reach USD 1.1 trillion by 2028 (Source: Grand View Research). Hence, it becomes important for us to step up and understand the security challenges of IoT technology so that the defence can be strengthened.

IoT: Things of Benefit for Threat Actors
Cyber attacks are not new to IoT, the difference is that they are becoming complex than before along with the increasing IT threat landscape. Threats actors view connected devices as an extremely valuable asset because of several reasons, including:

• Interoperability Issue: Industrial IoT (IIoT) environments usually include numerous devices, software, hardware and legacy equipment, which were primarily not designed to work collaboratively. This engenders a…

Source…

Sensors Data Management, IoT Mining and Analytics


Definition of Internet of Things (IoT )

The Internet of Things stands for IoT. Things refer to the items we use in our daily lives (e.g., domestic appliances and electronics). These items, termed the Internet of Things, are accessible or connected through the Internet. A network of physical items incorporated in the software, electrical devices and sensor systems that allow these things to gather and share data may be characterized as the Internet of Things.

The IoT objective is to increase the connectivity of the Internet from ordinary devices such as computers, mobile telephones, and electrical gadgets. Due to various technology convergence, real-time analytics, machine education, computer computer science, commodity sensors, and embedded systems, things have evolved. The Internet is supplemented by traditional areas of embedded systems, wireless sensor networks, control systems, automation (including building automation and home automation), and others. IoT technology is the most synonymous consumer technology with goods that support one or more common ecosystems under the idea of “smart home,” incorporating gadgets and appliances (for example lighting systems, thermostats, security systems, cameras, etc.). In medical systems, the IoT can also be employed.

The growing risk of the IoT is a series of severe issues, in particular in the field of privacy and safety.

 

Fig.1: Description image for IoT (Source: https://www.tutorialandexample.com/iot-tutorial/)

 

2. Sensors Data Management

Data management is the process of collecting and improving the whole accessible data. Different gadgets send enormous quantities and types of information from different applications. The management of all this IoT data requires creating and implementing architectures, rules, practices, and methods that satisfy the whole demands of the data life cycle.

Things are controlled by intelligent gadgets for task automation so that our time is saved. Smart objects can gather, transmit and comprehend information, and a tool to aggregate information and make conclusions, trends and patterns will be necessary.

 

Fig.2: Steps in IoT data management ( Source:

Source…