<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Quadros Systems Blog &#187; Internet of Things</title>
	<atom:link href="http://info.quadros.com/tag/internet-of-things/feed/" rel="self" type="application/rss+xml" />
	<link>http://info.quadros.com</link>
	<description>RTOS, Tools, TCP/IP, USB, File Systems for Embedded Development</description>
	<lastBuildDate>Thu, 26 Jun 2014 12:55:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.1</generator>
	<item>
		<title>Is Heartbleed the inevitable result of open source software?</title>
		<link>http://info.quadros.com/blog/is-heartbleed-the-inevitable-result-of-open-source-software/</link>
		<comments>http://info.quadros.com/blog/is-heartbleed-the-inevitable-result-of-open-source-software/#comments</comments>
		<pubDate>Tue, 22 Apr 2014 18:05:15 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[blog]]></category>
		<category><![CDATA[device security]]></category>
		<category><![CDATA[embedded development]]></category>
		<category><![CDATA[embedded network security]]></category>
		<category><![CDATA[Internet of Things]]></category>

		<guid isPermaLink="false">http://info.quadros.com/?p=9</guid>
		<description><![CDATA[<p>Is open source software safe to deploy? Damien Choizit has written a thoughtful opinion piece in Software Development Times in the aftermath of the Heartbleed OpenSSL debacle. He writes, &#8220;the question on everyone’s mind is, &#8216;What does this mean for open-source software development?&#8217; The truth of the matter is, Heartbleed wasn’t the real problem. Rather, it was with how we currently view and deploy open-source and outsourced code.&#8221; Choizit goes on to blame, not the OpenSSL team, but the mindless OEM and ODM development teams who blindly use open source software with the assumption that it must be solid. At Quadros Systems we have long been skeptical of the lemming-like move to open source without a commensurate look at what is really in the code. The lure of &#8220;free&#8221; software has blinded many to some of the inherent risks. 1. Does the ready availability of open source software and the ability by malicioius hackers to study it make it more prone to trapdoors and backdoors? 2. Do developers assume that because it is open source, thousands of others must have already checked out the code, so it must be safe? In this new era of &#8220;the Internet of Everything&#8221; your embedded device may be more vulnerable than ever.</p>
<p>The post <a rel="nofollow" href="http://info.quadros.com/blog/is-heartbleed-the-inevitable-result-of-open-source-software/">Is Heartbleed the inevitable result of open source software?</a> appeared first on <a rel="nofollow" href="http://info.quadros.com">Quadros Systems Blog</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p class="HeaderLabels arial_12_14">Is open source software safe to deploy? Damien Choizit has written a <a title="thoughtful opinion piece" href="http://sdt.bz/content/article.aspx?ArticleID=70095&amp;page=1" target="_blank">thoughtful opinion piece</a> in Software Development Times in the aftermath of the Heartbleed OpenSSL debacle.</p>
<p class="HeaderLabels arial_12_14"><span id="content_Placeholder_articleBody_Label" class="arial_12_14 normalLink" style="width: 400px;">He writes, &#8220;the question on everyone’s mind is, &#8216;What does this mean for open-source software development?&#8217; The truth of the matter is, Heartbleed wasn’t the real problem. Rather, it was with how we currently view and deploy open-source and outsourced code.&#8221; </span></p>
<p><span class="arial_12_14 normalLink" style="width: 400px;"><img id="img-1398111466428" class="alignLeft" style="float: left;" title="" src="http://info.quadros.com/Portals/62908/images/heartbleed-resized-600.png" alt="describe the image" width="295" height="319" border="0" />Choizit goes on to blame, not the OpenSSL team, but the mindless OEM and ODM development teams who blindly use open source software<span class="arial_12_14 normalLink" style="width: 400px;"> with the assumption that it must be solid.</span></span></p>
<p>At Quadros Systems we have long been skeptical of the lemming-like move to open source without a commensurate look at what is really in the code. The lure of &#8220;free<span class="arial_12_14 normalLink" style="width: 400px;"><span class="arial_12_14 normalLink" style="width: 400px;">&#8221; software has blinded many to some of the inherent risks.</span></span></p>
<p>1. Does the ready availability of open <span class="arial_12_14 normalLink" style="width: 400px;"><span class="arial_12_14 normalLink" style="width: 400px;">source software and the ability by malicioius hackers to study it make it more prone to trapdoors and backdoors?</span></span></p>
<p>2. Do developers assume that because it is open source, thousands of others must have already checked out the code, so it must be safe?</p>
<p>In this new era of &#8220;the Internet of Everything<span class="arial_12_14 normalLink" style="width: 400px;"><span class="arial_12_14 normalLink" style="width: 400px;">&#8221; your embedded device may be more vulnerable than ever.</span></span></p>
<p>The post <a rel="nofollow" href="http://info.quadros.com/blog/is-heartbleed-the-inevitable-result-of-open-source-software/">Is Heartbleed the inevitable result of open source software?</a> appeared first on <a rel="nofollow" href="http://info.quadros.com">Quadros Systems Blog</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://info.quadros.com/blog/is-heartbleed-the-inevitable-result-of-open-source-software/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Are security issues lurking in your embedded device?</title>
		<link>http://info.quadros.com/blog/are-security-issues-lurking-in-your-embedded-device/</link>
		<comments>http://info.quadros.com/blog/are-security-issues-lurking-in-your-embedded-device/#comments</comments>
		<pubDate>Wed, 01 May 2013 13:10:25 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[blog]]></category>
		<category><![CDATA[device security]]></category>
		<category><![CDATA[embedded network security]]></category>
		<category><![CDATA[Ethernet]]></category>
		<category><![CDATA[Internet of Things]]></category>

		<guid isPermaLink="false">http://info.quadros.com/?p=26</guid>
		<description><![CDATA[<p>s embedded and machine to machine (M2M) devices evolve, new issues are rapidly emerging that affect both legacy systems and those being planned. Network security is one of those. Malicious attacks on Supervisory Control and Data Acquisition (SCADA) and other industrial control and smart grid networks are a major concern. Recently the Industrial Control Systems Cyber Security team noted that there are now several new, publicly available exploit tools that specifically target Internet accessible industrial control system and programmable logic controllers (PLCs). Targeted systems include those from Rockwell Automation, GE, and Schneider Electric. And this is just the beginning of an evolving threat with malicious hacking to industrial espionage, and even cyber-terrorism. According to a new study from VDC Research security is the now the number three concern for M2M OEMs after cost and performance. There is now an exposed soft underbelly in many deployed M2M systems that is vulnerable to hacking, denial of service (DoS) or other unwanted intrusion. Most of these systems were not designed to withstand the kinds of sophisticated cyber-attacks we are seeing today. According to VDC most engineers did not even considered security in their prior designs. Even today embedded engineers are looking to add connectivity without factoring in the potential security risks. Many of these systems are home-grown and do not have the benefit of a commercial real-time operating system or proven security software. Quadros Systems has been actively supplying security for M2M and embedded systems for many years. Our SSL/TLS package provides application level security to HTTP and FTP protocols. And our IPsec/Internet Key Exchange (IKE) package offers encryption security at the IP layer. Last week we announced our most recent solution to address the network security: an embedded firewall. We have partnered with Icon Labs to offer three stage protection to customers using the RTXC Quadnet Ethernet-TCP/IP stack: static filtering, rules-based filtering and threshold filtering. Floodgate Packet Filter has been used to provide security for industrial control applications, small footprint industrial firewall appliances and MCU based control devices. It  provides Stateful Packet Inspection (SPI) and rules based filtering to protect embedded devices from real-world cyber-attacks.  Rules-based filtering utilizes white-listing and black-listing to define system criteria such as port number, protocol, or source IP address for protection. Floodgate also features Stateful Packet Inspection (SPI) that provides dynamic packet filtering based on the state of the connection to a device. The combined solution will add a layer of protection against threats such as packet floods, request storms, port scans, malformed IP packets and corrupted Ethernet frames. It is designed to meet ANSI/ISA/IEC/TS 62443 standards for cyber security. The system is designed explicitly for use in embedded devices with limited memory and processor speeds that require secure network implementation certified to standards such as the ISASP 99 which is measured by the Wurldtech Achilles® Test Platform. Get more details on network security options from Quadros Systems: Embedded Firewall Application Security (SSL/TLS) IP layer Security Achilles Test Suite Consulting Services</p>
<p>The post <a rel="nofollow" href="http://info.quadros.com/blog/are-security-issues-lurking-in-your-embedded-device/">Are security issues lurking in your embedded device?</a> appeared first on <a rel="nofollow" href="http://info.quadros.com">Quadros Systems Blog</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>s embedded and machine to machine (M2M) devices evolve, new issues are rapidly emerging that affect both legacy systems and those being planned. Network security is one of those.</p>
<p>Malicious attacks on Supervisory Control and Data Acquisition (SCADA) and other industrial control and smart grid networks are a major concern. Recently the Industrial Control Systems Cyber Security team <a href="http://ics-cert.us-cert.gov/pdf/ICS-ALERT-12-046-01A.pdf">noted</a> that there are now several new, publicly available exploit tools that specifically target Internet accessible industrial control system and programmable logic controllers (PLCs). Targeted systems include those from Rockwell Automation, GE, and Schneider Electric. And this is just the beginning of an evolving threat with malicious hacking to industrial espionage, and even cyber-terrorism.</p>
<p>According to a new study from <a title="VDC Research" href="http://www.vdcresearch.com/market_research/embedded_software/research_reports.aspx" target="_self">VDC Research</a> security is the now the number three concern for M2M OEMs after cost and performance.</p>
<p><img class="alignnone wp-image-27 size-full" title="" src="http://info.quadros.com/wp-content/uploads/2014/06/m2m-security-results-VDC-resized-600.png" alt="M2M Conflicts" width="600" height="371" /></p>
<p>There is now an exposed soft underbelly in many deployed M2M systems that is vulnerable to hacking, denial of service (DoS) or other unwanted intrusion. Most of these systems were not designed to withstand the kinds of sophisticated cyber-attacks we are seeing today. According to VDC most engineers did not even considered security in their prior designs.</p>
<p>Even today embedded engineers are looking to add connectivity without factoring in the potential security risks. Many of these systems are home-grown and do not have the benefit of a commercial real-time operating system or proven security software.</p>
<p>Quadros Systems has been actively supplying security for M2M and embedded systems for many years. Our SSL/TLS package provides application level security to HTTP and FTP protocols. And our IPsec/Internet Key Exchange (IKE) package offers encryption security at the IP layer.</p>
<div id="attachment_28" style="width: 407px" class="wp-caption alignleft"><a href="http://info.quadros.com/wp-content/uploads/2014/06/Firewall-Diagram.png"><img class="wp-image-28 " title="" src="http://info.quadros.com/wp-content/uploads/2014/06/Firewall-Diagram-524x1024.png" alt="embedded firewall" width="397" height="778" /></a><p class="wp-caption-text">(click for larger view)</p></div>
<p>Last week we announced our most recent solution to address the network security: an embedded firewall. We have partnered with Icon Labs to offer three stage protection to customers using the RTXC Quadnet Ethernet-TCP/IP stack: static filtering, rules-based filtering and threshold filtering.</p>
<p>Floodgate Packet Filter has been used to provide security for industrial control applications, small footprint industrial firewall appliances and MCU based control devices. It  provides Stateful Packet Inspection (SPI) and rules based filtering to protect embedded devices from real-world cyber-attacks.  Rules-based filtering utilizes white-listing and black-listing to define system criteria such as port number, protocol, or source IP address for protection. Floodgate also features Stateful Packet Inspection (SPI) that provides dynamic packet filtering based on the state of the connection to a device.</p>
<p>The combined solution will add a layer of protection against threats such as packet floods, request storms, port scans, malformed IP packets and corrupted Ethernet frames. It is designed to meet ANSI/ISA/IEC/TS 62443 standards for cyber security. The system is designed explicitly for use in embedded devices with limited memory and processor speeds that require secure network implementation certified to standards such as the ISASP 99 which is measured by the Wurldtech Achilles® Test Platform.</p>
<p>Get more details on network security options from Quadros Systems:</p>
<p><a title="Embedded Firewall" href="http://quadros.com/products/networking-software/embedded-network-security/#firewall">Embedded Firewall</a></p>
<p><a title="Application Security" href="http://quadros.com/products/networking-software/embedded-network-security/#ssl-tls">Application Security</a> (SSL/TLS)</p>
<p><a title="IP Layer Security" href="http://quadros.com/products/networking-software/embedded-network-security/#ipsec">IP layer Security</a></p>
<p><a title="Achilles Test Suite Consulting" href="http://quadros.com/products/networking-software/embedded-network-security/#achilles">Achilles Test Suite Consulting Services</a></p>
<p>The post <a rel="nofollow" href="http://info.quadros.com/blog/are-security-issues-lurking-in-your-embedded-device/">Are security issues lurking in your embedded device?</a> appeared first on <a rel="nofollow" href="http://info.quadros.com">Quadros Systems Blog</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://info.quadros.com/blog/are-security-issues-lurking-in-your-embedded-device/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Are you well-positioned for the Internet of Things?</title>
		<link>http://info.quadros.com/blog/are-you-well-positioned-for-the-internet-of-things/</link>
		<comments>http://info.quadros.com/blog/are-you-well-positioned-for-the-internet-of-things/#comments</comments>
		<pubDate>Wed, 17 Apr 2013 20:40:32 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[blog]]></category>
		<category><![CDATA[embedded systems]]></category>
		<category><![CDATA[Ethernet]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[software]]></category>

		<guid isPermaLink="false">http://info.quadros.com/?p=31</guid>
		<description><![CDATA[<p>Kaivan Karimi of Freescale has written an excellent overview of the Internet of Things (IoT): &#8220;Will the Internet of Things (IoT) turn your smart phone into the center of the universe?&#8221; We agree with his assessment that the smart phone may be one of the many hubs or gateways used to query or analyze Big Data from sensing and other smart devices but it is much more likely that Wi-Fi and Weightless will win out as the networks of choice for IoT over the LTE network (or its successors). Wireless network operators are clearly positioning themselves as key players in the evolving IoT space as are Internet ISPs and cable providers. And Verizon is well positioned in telematics, as well. But The IoT future is much larger than connecting consumer appliances and personal information devices. And it is larger than telematics. Karimi says that rolling out IoT is like rolling out the largest control data network in the world: Home Automation, Education, Supply Chain, Auto Safety, Security, Goods Tracking, Farms, Energy Management, Transportation, Health, Lighting&#8211;these are only some of the sub-networks that will form the massive IoT. Chris Rezendez from INEX Advisors writes in the March 12 Issue of the Boston Business Journal, &#8220;IoT, M2M connected device solutions are about as broad as you can imagine. All form factor, configuration and functional footprint of unattended, headless, embedded and discrete devices with some combination of sensing, processing and communications.&#8221; Quadros Systems has been active in smart devices and intelligent gateways for many years. Our customers are already building out early IoT networks on factory floors, in smart buildings, in hospitals and clinics. And we have new developments underway for network security and enhanced wireless connectivity. As Rezendez writes, &#8220;The people and organizations that heard the gun go off months, or years ago who are hard at work on the nth generation of their solution, expanding into their phase II markets, and simply going about the business of building out IoT and M2M markets.&#8221; Find out more about how Quadros Systems can help position you for success in this active and growing market space. &#160;</p>
<p>The post <a rel="nofollow" href="http://info.quadros.com/blog/are-you-well-positioned-for-the-internet-of-things/">Are you well-positioned for the Internet of Things?</a> appeared first on <a rel="nofollow" href="http://info.quadros.com">Quadros Systems Blog</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Kaivan Karimi of Freescale has written an <a title="excellent overview" href="https://community.freescale.com/community/the-embedded-beat/blog/2013/04/07/will-the-internet-of-things-iot-turn-your-smart-phone-into-the-center-of-the-universe" target="_self">excellent overview</a> of the Internet of Things (IoT): &#8220;Will the Internet of Things (IoT) turn your smart phone into the center of the universe?&#8221;</p>
<p>We agree with his assessment that the smart phone may be one of the many hubs or gateways used to query or analyze Big Data from sensing and other smart devices but it is much more likely that Wi-Fi and Weightless will win out as the networks of choice for IoT over the LTE network (or its successors).</p>
<p>Wireless network operators are clearly positioning themselves as key players in the evolving IoT space as are Internet ISPs and cable providers. And Verizon is well positioned in telematics, as well.</p>
<p>But The IoT future is much larger than connecting consumer appliances and personal information devices. And it is larger than telematics. Karimi says that rolling out IoT is like rolling out the largest control data network in the world: Home Automation, Education, Supply Chain, Auto Safety, Security, Goods Tracking, Farms, Energy Management, Transportation, Health, Lighting&#8211;these are only some of the sub-networks that will form the massive IoT.</p>
<p><img class="aligncenter size-full wp-image-32" title="" src="http://info.quadros.com/wp-content/uploads/2014/06/IoT.jpg" alt="Internet of Things" width="600" height="360" /></p>
<p>Chris Rezendez from INEX Advisors writes in the <a title="March Issue of the Boston Business Journal" href="http://www.bizjournals.com/boston/blog/techflash/2013/03/why-iot-and-m2m-markets-need-no-hype--.html" target="_self">March 12 Issue of the Boston Business Journal</a>, &#8220;IoT, M2M connected device solutions are about as broad as you can imagine. All form factor, configuration and functional footprint of unattended, headless, embedded and discrete devices with some combination of sensing, processing and communications.&#8221;</p>
<p>Quadros Systems has been active in smart devices and intelligent gateways for many years. Our customers are already building out early IoT networks on factory floors, in smart buildings, in hospitals and clinics. And we have new developments underway for network security and enhanced wireless connectivity.</p>
<p>As Rezendez writes, &#8220;The people and organizations that heard the gun go off months, or years ago who are hard at work on the nth generation of their solution, expanding into their phase II markets, and simply going about the business of building out IoT and M2M markets.&#8221;</p>
<p><a href="http://quadros.com/contact-us/" target="_blank">Find out more</a> about how Quadros Systems can help position you for success in this active and growing market space.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://info.quadros.com/blog/are-you-well-positioned-for-the-internet-of-things/">Are you well-positioned for the Internet of Things?</a> appeared first on <a rel="nofollow" href="http://info.quadros.com">Quadros Systems Blog</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://info.quadros.com/blog/are-you-well-positioned-for-the-internet-of-things/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
