Huawei’s All Cloud Networks with a Cloud-based Wireless Network (CloudAir) supporting new radio access technologies in a new architecture (CloudRAN), and network slicing in particular, for upcoming 5G, Future Internet, and In-Network Computing
IT, cloud computing, and the Internet are reshaping the world. Video, cloud services and IoT are also revolutionizing our lifestyle. How can carriers quickly launch new services? How can they achieve business agility? How will they optimize cost structure? These are the three biggest concerns of carriers on the transformation path to All Cloud Networks.
During the process of full cloudification, carriers will have to cloudify equipment, networks, services and the whole operational system if they want to deliver real ROADS experience. Huawei launched its All Cloud strategy in order to help operators succeed in transformation.
All Cloud Network use the principles and technologies of the cloud to reconstructs carrier networks with pooled hardware resources, fully distributed software architecture, and full automation operations for more efficient utilization, more agile services and higher operational efficiency.
The MT2625 platform – the world’s smallest NB IoT module – is spearheading the deployment of IoT tech, with first product launches in association with China Mobile’s eSIM and supporting OneNET, China Mobile’s IoT open platform. (Note, however, that MediaTek’s major competitor, the Huawei Group already delivered such a solution with China Mobile, the M5310 module of only 19 × 18.4 × 2.7mm size using the HiSilicon Hi2110 chip. The already announced MediaTek based module would be only 16mm × 18mm in size)
This makes it easy for device makers to quickly develop and bring innovative NB-IoT devices to market. For an understanding of a current view on eSIM potential see a recent 3d party (in the sense of no direct interest in any chip, device or operator companies) video:
It is all about connectivity! eSIM (Giesecke & Devrient* YouTube channel, Feb 23, 2017)
* Giesecke+Devrient is a global company that offers security technologies, both in the physical and digital spheres.
MediaTek Announces Interoperability Tests with SoftBank to Drive NB-IoT Development in Japan (company press release, TOKYO and HSINCHU, Taiwan – Oct. 3, 2017)
MediaTek furthers its commitment in NB-IoT technology to meet market demand
MediaTek Inc. today announced it will conduct a series of interoperability tests of NarrowBand IoT connectivity (NB-IoT) with SoftBank Corp. (“SoftBank”), a subsidiary of SoftBank Group Corp., in the first quarter of 2018 to pave the way for development of NB-IoT commercial applications in Japan. This interoperability test will further efforts to advance MediaTek’s NB-IoT technology and ready the connectivity standard for global deployment. “MediaTek is proud to be at the forefront of NB-IoT technology innovation, which has the potential to deliver new ways to connect that are both cost effective and power efficient” said Yoshitaka Sakurai, General Manager of MediaTek Japan. “This initiative with SoftBank, along with the unveiling of our MT2625 NB-IoT SoC solution and our collaboration with leading telecommunications companies around the world, demonstrates MediaTek’s commitment to an exciting new era that’s set to fuel the massive growth of the Internet of Things.”
MediaTek has played a pivotal role in the formulation and implementation of the 3GPP LPWA specification for NB-IoT. The company recently unveiled its highly integrated and ultra-low-power MT2625 NB-IoT System-on-Chip (SoC) and announced its collaboration with China Mobile to build the world’s smallest NB-IoT module (16mm X 18mm) around the chipset.
The company’s MT2625 NB-IoT chipset is built to meet the requirements of cost-sensitive and small IoT devices and leverages MediaTek’s advanced power consumption technology to enable IoT devices to work with batteries for years. The highly integrated SoC combines an Arm® Cortex®-M microcontroller (MCU), pseudo-static RAM (PSRAM), flash memory and power management unit (PMU) into a small package to lower the cost of production while also speeding up time-to-market. The MT2625 supports a full frequency band(from 450MHz to 2.1GHz) of 3GPP R13 (NB1) and R14 (NB2) standards for a wide range of IoT applications including smart home control, logistics tracking and smart meters.
For more information about the MediaTek MT2625, please visit: http://www.mediatek.com/products/nbIot/mt2625
MediaTek’s latest technologies will be showcased at CEATEC JAPAN 2017, being held Oct. 3 – 6, 2017 at Makuhari Messe in Chiba, Japan. To see demonstrations and learn more, please visit MediaTek’s booth # D081.
How SoftBank head honcho Masayoshi Son thinks:
The crazy world of Masayoshi Son (Tech in Asia YouTube channel, Aug 25, 2017)
China IoT market scale estimated to exceed CNY1.5 trillion by 2020 (DIGITIMES, Sept 22, 2017)
China’s IoT (Internet of Things) market scale has posted an annual expansion of over 20% over the past few years, and the market value is estimated to exceed CNY1.5 trillion (US$227.6 billion) by 2020 from CNY900 billion in 2016, according to the China Annual IoT Development Report (2016-2017) recently released by China Economic Information Service (CEIS).
The CEIS report showed that 36 major IoT enterprises listed on the Shanghai and Shenzhen stock exchange markets, as well as key listed enterprises in three segments, such as smart medicine, smart home and smart transportation, registered aggregate revenues of CNY277.54 billion and combined net profits of CNY16.79 billion in 2016, surging 22.3% and 15.1%, respectively, on year.
The report pointed out that the global IoT development has witnessed some new features and trends. First, the global development of IoT technologies and applications has been in high gear, and is quickly moving into the era of Internet of Everything (IoE). Advanced countries have kept strengthening their strategic IoT deployments, while application scenarios for IoT technologies have been constantly enriched. In addition, the accelerated construction of open source IoT ecosystems has fueled continued expansion of the IoT industrial scale.
Some 400,000 NB-IoT base stations to be operational by year-end
Second, China’s “13th Five-Year” IoT roadmap has been unveiled, with the NB-IoT construction upgraded to a national strategy; and the Information Communication Industry Development Plan-IoT (2016-2020), released early this year, has become a guiding document for the development of China’s IoT industry in the next five years. It’s estimated that NB-IoT networks will cover municipalities, provincial capitals and other key cities in China by the end of 2017, when a total of 400,000 base stations will be operational around the country.
Third, the accelerated integration of IoT and new technologies such as cloud computing, big data, AI (artificial intelligence), 5G and LPWAN (low power wide area network) has significantly driven industrial innovations and upgrades. China’s IoT industry ecology has been optimized comprehensively, and the platform-based development and application of IoT in diverse fields has also been enhanced greatly, while the application value of IoT has been widely recognized to facilitate extensive IoT applications.
Fourth, the open source innovation ecosystems of IoT is taking shape gradually, and business revenues and profits of leading listed enterprises have posted stable growth. With platforms, alliances and open source communities serving as carriers, China IoT enterprises are actively engaged in cross-field and transnational cooperation in IoT R&Ds, applications and promotions.
Fifth, the degree of IoT industry clustering in China cities has been further strengthened, which is conducive to building the cities to smart ones through IoT applications.
NB-IOT: NARROW-BAND IOT (MediaTek subsite, June 21, 2017)
Chrome is pushing for mobile productivity and cloud adoption with the next generation convertibles: main targets are SMBs, as well as education and retail solutions
– March 22, 2017: Entry level Chrome OS based commercial and consumer products built on Rockchip RK3288-C SoC which also includes the basic information about the current state-of-the-art in security, in supporting Android apps as well as in building solutions for engaging customers in public spaces with “smart signs” costing on par with traditional signage (i.e. the overall value proposition of the platform)
– March 22, 2017: Android security which is especially important as with the upcoming “Android apps on Chrome OS” (currently Beta) the whole Google Play store apps will become available on Chrome as well (in the upcoming Chrome OS 58 and 59)
The next generation of Chromebook: The new category of computing originally launched in 2011 has now been redefined (2+ min) (more…)
Once you have regular security problems on your Windows 10 PC like me, and you are essentially already close to 100% using web applications only like me, than it is time to move over to the Chrome OS platform. And this could be done now with a rock bottom cost. This is what I’ve found by examining the latest Chrome OS platform information as well as the entry level hardware represented by devices built on Rockchip RK3288-C SoC (a low-end quadcore 64-bit ARM SoC with lowest cost IP inside, so the SoC is the lowest cost too).
There is a “hidden” advantage as well. The “Android apps on Chrome OS” is in Beta now, but when the current Android Framework in Chrome OS will move from support of Android Marshmallow [6.0] to Android Nougat [7.0] Coming to Chrome OS 58 or 59 all Google Play store apps will be available properly on Chrome devices as well. In a companion post I’ve examined the current state-of-the-art of Android security as well, and that is looking much better than that of current Windows 10. So as far as all this information is concerned such a platform change looks like the final solution for my current security issues on Win10.
There is a further impetus from yesterday’s news on Microsoft Edge comes last in browser security battle By 18 hours ago from techradar: (more…)
February 14, 2017, RSA Conference: Delivering Secure, Client-Side Technology to Billions of Users Adrian Ludwig, Director of Android Security, Google.
Google aims to make the web safe for all. Director of Android Security Adrian Ludwig will discuss the progress they’ve made, the gaps that remain and how client-side security can make the web more secure.
30 Aug 2016, WIRED UK: How Google is putting security at the heart of Android By ADRIAN LUDWIG. Google’s director of Android Security explains the operating system’s built-in security features
Android has been the fastest growing operating system of all time.
The total ecosystem is huge: 400 companies partner with 500 carriers to produce over 4,000 distinct phones, tablets, and TVs running Android.
When we founded Android, the idea was somewhat crazy — build an open standard for hardware makers. Android is open-sourced and provided for free on all hardware.
This makes it possible for hardware makers to build a wide variety of different devices (phones, tablets, and even watches) while simultaneously making it easier for developers to build one app that works across any of these different devices.
Having an open ecosystem and over a billion users means that we take security very seriously. From the very beginning, security has been baked into the heart of Android. For example:
All Android applications run in what we call an “Application Sandbox.” Just like the walls of a sandbox keep the sand from getting out, each application is housed within a virtual ‘sandbox’ to keep it from accessing anything outside itself. This means that even if a user were to accidentally install a piece of malware, it’s forbidden from accessing any other app on the device.
The latest security technology
Android devices use leading hardware and software security technologies such as encryption, application signing, system integrity checks, SELinux, ASLR, and TrustZone to protect user data and the device.
More control in Android M
Users are even more safe with the new permissions model in Android M by giving them more control over what apps are allowed to access. Apps trigger requests for permissions at the time they need to do something.
For example, if your photo posting app wants to access your photo roll, it has to ask you first. So if a flashlight app starts asking for access to your phone book, you can just say no.
Google Play — our official marketplace for Android apps and games — is also an important part of Android security. Before applications become available in Google Play, they undergo an application security review process to confirm that they comply with Google Play policies, prohibiting potentially harmful applications. We suspend developer accounts and apps that violate our policies.
Third Party Verify Apps Feature
Since Android allows alternative app stores other than Google Play, our users often download apps from third-party app stores. In order to help make this third-party experience secure, we also have a feature called Verify Apps that warns the user or blocks potentially harmful apps, even if the app wasn’t from the Play Store.
It will check apps when you install them and periodically scans for potentially harmful apps to keep users safe. Over 1 billion devices are protected with Google Play which conducts 200 million security scans of devices per day.
The results of these efforts have made malware relatively rare on Android. Based on our research, fewer than one per cent of Android devices had a Potentially Harmful App (PHA) installed in 2014, and fewer than 0.15 per cent of devices that only install from Google Play had a PHA installed.
In future installments, we’ll talk more about how we work with the broader security community to protect Android users, and offer a few tips for you to protect your phone as well.
THE CONTRIBUTION FROM THE PARTNERS COMMUNITY
31 Aug 2016, WIRED UK: How Google’s bug bounties reward you for hunting out flaws in its Android software By ADRIAN LUDWIG. Google’s head of Android Security explains how bug bounties keep the OS secure.
Our last post looked at the ways in which we protect users against harmful software inside of Android and through our app store Google Play.
Android, however, is an open ecosystem used by more than 1.4 billion people around the world, so it makes sense to tap into all of those Android partners, developers, users, and researchers to help locate vulnerabilities and problems. This is the advantage of an open ecosystem: we can work with the broader security community who help us improve security and make Android stronger.
The priority for this approach is that we must be transparent about how exactly Android works. Android is open source, and this means we publish the latest programming source code for Android here.
Anyone can review the code to identify potential security risks. Anyone can build a device using this open source code (as well as add their own customisations). And anyone can suggest modifications or improvements to the core open source project.
Secondly, we work hard to encourage research on Android. We have come up with many ways to incentivise people to poke around in our code and find problems.
In 2010, Google started what we call security reward programs to pay security researchers who find major flaws. In 2014 alone we paid more than $1.5 million to security researchers who found vulnerabilities in Chrome and other Google products.
The success of this program led us to extend it directly to Android. In 2014, we started Google Patch Rewards — an experimental program to reward proactive security improvements for a few of our open-source projects. Rewards for qualifying submissions range from $500 for one-line improvements, up to $10,000 for complicated, high-impact improvements that almost certainly prevent major vulnerabilities in the affected code.
Then in 2015, we started the Android Security Rewards Program to help reward the contributions of security researchers who invest their time and effort in helping us make Android more secure. Through this program we provide monetary rewards and public recognition for vulnerabilities disclosed to the Android Security Team.
The reward level is based on the bug severity, increasing for higher quality reports that include reproduction code, test cases, and patches. In the last six months of 2015, we paid more than $200,000 to researchers for their work, including our largest single payment of $37,500 to an Android security researcher. This was part of the total $2 million paid out to researchers across all the programs.
On top of our own programs, we also sponsor third-party competitions such as Mobile pwn2own, ZDI’s annual contest that rewards security researchers for highlighting security vulnerabilities on mobile platforms.
Finally, we work closely with our hardware partners so devices can be updated with the latest patches. For more than three years, we have been working with Android manufacturers every month through bulletins of security issues with which they can keep their users secure.
Nexus devices have always been among the first Android devices to receive platform and security updates. Since last year, Nexus devices have been regularly receiving security-focused, over-the-air (OTA) updates each month in addition to the usual platform updates. These fixes are also released to the public via the Android Open Source Project.
For Android, security has always been a priority. We are extremely grateful to the wider research community for helping us find security flaws. It’s great to us — but more importantly, to 1.4 billion people around the world — to see so many people pitching in to make Android safer.
FROM THE USERS THEMSELVES
2 Sept 2016, WIRED UK: How to keep your Android phone safe from prying eyes By ADRIAN LUDWIG. Google’s director of Android Security reveals practical ways to keep your data safe.
Over the course of this dedicated security series we have focused on how security is baked into the very heart of Android.
But the Android operating system also empowers you to take safety into your own hands.
This final piece in our series focuses on how each and every Android phone user can play an active role when it comes to safety on the internet. Today, smartphones have become nearly indispensable. So it’s important to keep your phone, but also its contents, secure.
We’re going to walk you through some top ways to keep your mobile security skills as sharp as possible. These are simple but highly effective ways to keep you safe, such as finding your phone if it’s lost, keeping your personal information secured, and making sure the apps and games you download are safe.
One of the most basic threats to mobile security is pretty simple and is probably something that has happened to all of us: losing your own phone. We entrust our phones with some of our most personal data – texts from loved ones, family photos, work emails, bank account information, and more. In the wrong hands, that data could cause trouble but when your phone goes missing, it’s not always easy to figure out where to start, who to call, or how to keep your information safe.
Find Your Phone is a new Android feature that will help you if your phone is ever lost or stolen. In a few simple steps, you can not only locate your phone, but also lock and call it, secure your account, leave a callback number on the screen, and more. The feature can be used to find lost Android and iOS devices, and soon, you’ll also be able to access it by searching Google for “I lost my phone.”
You can use Find Your Phone in My Account, or just by searching ‘find my phone’ on any Google browser. Plus, it works for both Android and iOS devices.
A second easy thing you can do if you don’t want anyone who picks up your phone or tablet to have access to your stuff is to switch on your mobile device lock. On an Android phone or tablet, you can pick a PIN, a password, or a pattern.
For added security, you should also set your device to automatically lock when it goes to sleep. You can take this even one step further and customise your settings so that your patterns and passwords are not visible when you’re entering them.
Download apps from trusted stores and marketplaces and help ensure your phone is safe when it’s in your own hands. Some apps can affect your device’s security, so only download them from places you trust. We work to make sure that all apps available on Google Play pass stringent policy checks, including checks for potentially harmful behaviour.
If you have Google Play installed, you’re automatically protected from potentially harmful apps with the Verify Apps feature. It’s turned on by default and warns you before you install an application we believe is potentially harmful. It’ll also check your device once a week for potentially harmful apps. If you see a warning from Verify Apps, we recommend not installing that app.
In the last year, we’ve significantly improved our machine learning and event correlation to detect potentially harmful behaviour. We protect users from malware and other Potentially Harmful Apps (PHAs), by checking more than 6 billion installed applications per day. We protect users from network-based and on-device threats by scanning 400 million devices per day. And we protect hundreds of millions of Chrome users on Android from unsafe websites with Safe Browsing.
We have also continued to make it even more difficult to get PHAs into Google Play. Last year’s enhancements reduced the probability of installing a PHA from Google Play by over 40 per cent compared to 2014. Within Google Play, install attempts of most categories of PHAs declined. Data Collection decreased over 40 per cent to 0.08 per cent of installs, spyware dropped 60 per cent to 0.02 per cent of installs and hostile downloaders also decreased 50 per cent to 0.01 per cent of installs.
Overall, PHAs were installed on fewer than 0.15 per cent of devices that only get apps from Google Play. About 0.5 per cent of devices that install apps from both Play and other sources had a PHA installed during 2015, similar to the data in last year’s report.
It’s critical that we also protect users who install apps from sources other than Google Play. Our Verify Apps service protects these users and we improved the effectiveness of the PHA warnings provided by Verify Apps by over 50 per cent. In 2015, we saw an increase in the number of PHA install attempts outside of Google Play, and we disrupted several coordinated efforts to install PHAs onto user devices from outside of Google Play.