Latest NewsThe Impact Of The New HDcctv AT 2.0 StandardTodd RockoffSourceSecurity.com
August 22, 2014 - Editor's Note: HDcctv Alliance has announced that Dahua has opened its patented HDCVI technology to the global video surveillance industry as the basis for HDcctv's AT 2.0 standard. For additional elaboration on what the move means to the growing market for higher-resolution CCTV, we approached Todd Rockoff, chairman and executive director of HDcctv Alliance....
SourceSecurity.com: Given that Hikvision, the number one competitor in the video market, is unveiling a different technology (i.e., HDTVI), is there any plan to “converge” the two technologies or make them compatible? What might the HDcctv Alliance’s role be to accomplish that?
TR: We are delighted that Hikvision shares our recognition of the growing importance of plug ‘n’ play (PnP) analog HD surveillance equipment....
SourceSecurity.com: Might not a proprietary non-standard technology from the market’s largest player undermine the positive impact of the standard? (i.e., set up a Beta vs. VHS type competition?)
TR: Absolutely! It compares to having to stock inventory in multiple formats (Beta/VHS or DVD/Blu-Ray/3D Blu-Ray) which inevitably multiplies the costs of running a video shop. And format confusion decreases revenues. A good example is a customer who accidentally brings a 3D Blu-Ray disc home but can't watch it on his DVD player.
Format confusion inevitably has the same kind of impact on the video surveillance market. Therefore, it is in the commercial interest of every company who has invested in HD surveillance equipment to fully support the open, global PnP standards for local-site transport of HD surveillance signals.... ...Full Story
The Connected Car, Part 3: No Shortcuts to Security
Jack M. Germain
TechNewsWorld August 21, 2014 - The connected car is becoming a reality, but the gadget-filled roadways it travels will be paved with several options for in-car technologies. These choices pose challenges for carmakers. Whichever technology wins the race, one of the biggest concerns for OEMs is their electronic security.
The Linux Foundation wants an open source platform in the pole position. The nonprofit consortium already has a fully functional Linux distribution, called "Automotive Grade Linux," or AGL. It is a customizable, open source automotive software stack with Linux at its core.
Google has its own plan for connecting cars to mobile devices and the Internet. Google's Android Auto is a dashboard navigation and entertainment system powered by an Android smartphone. It is very similar in concept to competing designs from Apple and Microsoft....To handle this traffic jam of data, car manufacturers are testing technologies like Broadcom's Automotive Ethernet and The Car Connectivity Consortium (CCC)'s MirrorLink among others. Similarly, QNX Software Systems has a foot or two in some vehicles with its QNX Car Platform for Infotainment.... ...Full Story
UK government backs consortium's search for IOT standard
ComputerWeekly.com August 20, 2014 - The UK government has awarded £1.6m to a consortium of 40 British companies tasked with finding a standard specification for the internet of things (IOT).
The money – awarded by the government’s innovation agency, the Technology Strategy Board – will go towards developing a publicly available universal standard for interoperability for IOT....The HyperCat consortium, comprising BT, ARM, KMPG and other UK companies including Flexeye, will focus on IOT solutions for business....The British Standards Institution will publish an independent publicly available specification (PAS) based on the consortium’s specification.... ...Full Story
6 emerging standards battling it out for the Internet of Things The Boardroom
CBR.com August 20, 2014 - Which group will solve the interoperability problem?
1. The Thread Group
Developed by Google's Nest Labs, ARM and Samsung, Thread is designed to build a low-power mesh network as an alternative to Wi-Fi, Bluetooth and more.
Thread, which uses 2.4GHz unlicensed spectrum, is built on existing standards, such as IEEE 802.15.4, IETF IPv6 and 6LoWPAN, meaning that existing devices which use ZigBee / 6LoWPAN etc. can easily migrate to Thread.... ...Full Story
Army turns to open architecture to plot its future in robotics
FederalNewsRadio August 19, 2014 - The Army's emerging strategy for buying and modernizing its ground based robotics systems relies heavily on open architectures, open standards and open source software....to keep costs down and maximize flexibility, the service is employing a strategy that emphasizes open architectures, reusable, interchangeable components and common, publicly defined interfaces between individual subsystems,...One significant employment of the strategy, which Shyu formally approved last week, will be the replacement of the Army's TALON system, which is nearing the end of its service life. A full-fledged successor, increment two of the Man Transportable Robotic System (MTRS) isn't expected to be fully deployed until 2021. It will enforce a set of open standards and interfaces the Army is adopting, but a "bridging strategy" will also insist on the use of open architectures and technology reuse, while the Army fields intermediate systems in the meantime...."The architectural standard was worked in conjunction with industry. It wasn't something we just thought up ourselves and threw up on the table," she said. "And the plug-and-play interface will be provided to industry to enable competition."
The Army has been working since 2011 to build what it calls the Unmanned Ground Vehicle Interoperability Profile (IOP), a collection of both hardware and software standards that will define how individual subsystems like radios and cameras within a robotic system communicate with one another, plus the hardware specifications those components will need to meet.
The first version of the still-evolving standard set aimed to document all of the interfaces in the systems the service already owns in an effort to break them down into discrete, identifiable modules.... ...Full Story
RISC-V: An Open Standard for SoCs The case for an open ISA
Krste Asanović & David Patterson
EETimes August 14, 2014 - Systems-on-a-chip (SoCs), where the processors and caches are a small part of the chip, are becoming ubiquitous. Thus many more companies today are making chips that include processors than in the past. Given that the industry has been revolutionized by open standards and open-source software -- like TCP/IP and Linux -- why is one of the most important interfaces proprietary?
While instruction set architectures (ISAs) may be proprietary for historical or business reasons, there is no good technical reason for the lack of free, open ISAs....We conclude that the industry would benefit from viable, freely open ISAs just as it has benefited from freely open versions of the software stack. For example, it would enable a real, free, open market of processor designs, which patents on ISA quirks prevent. This could lead to:
Greater innovation via free-market competition from many more designers, including open vs. proprietary implementations of the ISA.
-Shared, open core designs, which would mean shorter time to market, lower cost due reuse, fewer errors given many more eyeballs, and transparency that would make it hard, for example, for government agencies to add secret trap doors.
-Affordable processors for more devices, which would help expand the Internet of Things, whose target cost could be only $1.... ...Full Story
Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls
NIST Techbeat August 13, 2014 - The National Institute of Standards and Technology (NIST) has issued for public comment a draft update of its primary guide to assessing the security and privacy controls that safeguard federal information systems and networks. Public comments are due by Sept. 26, 2014.
NIST publishes two complementary publications that together provide its basic guidance and recommendations for ensuring data security and privacy protection in federal information systems and organizations, a role assigned to NIST under the Federal Information Security Management Act (FISMA). The publications are so famous they are generally known just by their numbers.... ...Full Story
LibreOffice is coming to Android
TechRepublic August 12, 2014 - I've been hoping to see this headline for some time now. At the first LibreOffice Conference, the Document Foundation announced its plans to migrate LibreOffice to mobile devices. The plan didn't include a total rewrite of the code, but repurposing at least 90% of the current code base. That meant the majority of the work was already done. That last remaining 10%? The user interface. The 90% already compiles on Android -- so there is a working model. Of course, what good is a working model without an interface to go along with it?
But the single most important question to ask is "why"? Why is it so important for LibreOffice to make it to the mobile platform? I can answer that with three simple words:
Open Document Format... ...Full Story
The Connected Car, Part 1: The Future Starts Now - Will Linux Drive It?
Jack M. Germain
LinuxInsider August 11, 2014 - Tomorrow's connected cars will go beyond infotainment apps provided by Microsoft, Google or Apple. They will combine cloud-based services that enhance automotive safety and driving convenience with a broad range of supplemental services. These connected cars will be shaking handles with all the appliances in the Internet of Things that car owners will be able to control from behind the wheel.... ...Full Story
TIA is Pioneering New Standard to Address Cybersecurity Concerns of Telecom Networks
Telecom Reseller August 6, 2014 - The Telecommunications Industry Association (TIA), the leading association representing the manufacturers and suppliers of high-tech communications networks, today announced that its TR-42.1 Engineering Committee on Commercial Building Telecommunications Cabling is developing an American National Standards Institute (ANSI)-accredited standard, known as TIA-5017, to address the physical network security of information and communications technology (ICT) networks.... ...Full Story