Telematics, an interdisciplinary field that encompasses telecommunications, vehicular technologies, road transportation, road safety, electrical engineering (sensors, instrumentation, wireless communications, etc.), and computer science (multimedia, Internet, etc.); is a very important part of IoT (Internet-of-Things). As a member of Intel IoT Solutions Alliance, acrosser will continue to invest more resources in researching and developing In-Vehicle PC products and solutions which play key roles in Telematics applications. Moreover, Acrosser will integrate hardware and third-party software together to provide all its customers with total solutions for their telematics projects.
Typically, Acrosser In-Vehicle PCs are utilized in fleet management, route planning, driver coaching, vehicle location tracking, passenger infotainment systems, onboard surveillance, telemedicine implementation, fuel economy, and in lowering overall costs. For 2018, Acrosser Technology will expand its In-Vehicle PC applications to include other markets such as the railway and train markets. To meet the special needs of these markets, Acrosser will integrate PoE (Power-over-Ethernet) solutions to its 2018 new In-Vehicle PC product line which facilitates faster deployment of mobile networking on vehicles by eliminating the need for power outlets at every end-point.
Currently, Acrosser In-Vehicle Computers feature Powered by Intel® Core i™, Intel Pentium™, and Intel® Atom™ CPUs. Every product is built with remarkable quality, designed to successfully survive rugged environments, and all models provide unique features and functions to cater to various industries. Moreover, all Acrosser In-Vehicle PCs are designed to meet and fulfill every need and requirements from customers in accomplishing the desired results of efficient Telematics.
Acrosser Technology not only provides In-Vehicle Computer products with high reliability and availability but also with the best scalability and manageability in the industry. Acrosser Technology is your best choice for building Telematics applications in today’s IoT environment.
April 11, 2017, Taipei– acrosser Technology Co., Ltd. (Acrosser) proudly announces its first new product in 2017, the ANR-C236N1, a powerful 1U rackmount server with unique Dual-Protection feature which allows simultaneously supporting both hot swappable HDD/SSD and the highly-effective redundant power supply. This Dual-Protection can eliminate unnecessary failures, reduce the chance of system errors, and improve server efficiency, as well as the IT staff efficiency.
Whether it is the web server, mail server, UTM or any other network application platform, stability and reliability are absolutely the first 2 priority considerations for buyers. Even for a short period, mechanical failure will cause great loss in business. To meet these needs, the new and powerful Acrosser ANR-C236N1 series server comes with its unique Dual-Protection feature which protects your server/network to run safety 24/7. The ANR-C236N1 is equipped with a hot-swappable HDD/SSD for RAID 0/1 which allows your IT staff to remove the malfunctioning HDD/SDD without shutting down the machine, thereby eliminating machine downtime. The other feature of Dual-Protection is the ANR-C236 is also equipped with 1+1 redundant power supply units (RPSU) which avoids the unexpected power failure and increase the power supply product life by balancing the power output.
In addition to the Acrosser unique Dual-Protection, this brand new rackmount server comes with the latest Intel® server chipset C236 PCH, which supports the latest Intel® Xeon® E3-1200 V5 server processor, and the 6th generation CPU Skylake-S Core i7/i5/i3/Pentium series. Moreover, the ANR-C236N1 designed for Skylake-S is forward compatible with Intel® 7th generation CPUKabylake. In addition, the ANR-C236N1 series provides a more flexible server platform & system expansion versatility with 12x GbE copper LANs (4-pair bypass), 2x 10G fiber networks (SFP+) , 1 x expandable network interface modules (Exp. NIM), 1 Console, 2x USB 3.0, 2 x USB 2.0, 1x HDMI and 1 x Exp. PCIe slot. Furthermore, ANR-C236N1 series is equipped with an LCM display which shows 100 x 16 Pixels in Graphic Mode and 16-character x 2-line in Character Mode. In the power system, a set of 1+1 redundant power supply units (RPSU) come with AC-IN (100~ 240V) , enabling reliable options for system recovery. The ANR-C236N1 power system comes with a special Smart Fan System which increases or decreases fan speed to develop efficient and cost-effective power systems.
Acrosser had committed its valuable resources to further develop its advanced network product lines. Because of these efforts, the ANR-C236N1 had developed as a perfect service/network machine for most business networking applications. Acrosser Technology not only provides products with high reliability and availability, but also networking appliances and products with the best scalability and manageability in the industry. Acrosser Technology is your best choice for building servers and workstations in today’s workplace.
If a firewall goes down, nobody can access the cloud. About 63 percent of embedded computer attacks strike the shared infrastructure as it’s the first thing the attack will hit.“Prior to recent attacks on Embedded Computer financial institutions in the U.S., there was not much awareness or knowledge of embedded computer attacks and other cyber threats,” Kenig says. “However, once the first bank became a victim, immediately embedded computer all the other institutions started to learn more about the attacks, search for solutions, then deploy those solutions quickly. When I look at military cloud security solutions, there are many vendors and partners providing tools and solutions, but not many providing availability security embedded computer attacks are hurting the availability of online services and many antivirus vendors and embedded computer do not focus on the availability aspect.”
ANR-IB75N1/A/B is a rackmount platform (440x372x44mm) which can be installed in the 19” rack. It can carry a 3rd generation Intel Core i i3, i5, i7, or Pentium processors to deliver higher efficiency, increased processing throughput, and improved performance on applications. ANR-IB75N1/A/B also comes equipped with a maximum 16GB DDR3 memory and optional 2 or 4 x SFP and 8 x LAN ports. System Integrators can select different configurations for their network appliances. It offers the best P/P ratio in applications like the UTM, IDS/IPS, VPN, Firewall, Anti-Virus, Anti-Spam, RSA gateway, QoS, streaming.
ANR-IB75N1/A/B uses 80 Plus PSU which reduces energy consumption and helps protect the environment. The software and hardware configurable LAN bypass feature also prevents communication breaks due to power loss or system hang-ups. In addition to Intel long life support chipsets, ANR-IB75N1/A/B is designed with a long-term support of 5 years.
ANR-IB75N1/A/B is available now. For more information, please contact acrosser Technology, Acrosser USA, and ACROSSER worldwide retailers in your area.
Virtualization trends in commercial computing offer benefits for cost, reliability, and security, but pose a challenge for military operators who need to visualize lossless imagery in real time.
10 GbE technology enables a standard zero client solution for viewing pixel-perfect C4ISR sensor and graphics information with near zero interactive latency. For C4ISR systems, ready access to and sharing of visual information at any operator position can increase situational awareness and mission effectiveness. Operators utilize multiple information sources including computers and camera feeds, as well as high-fidelity radar and sonar imagery.
In recent years, building, maintaining, and evolving proprietary network systems for telecom-grade applications that are highly available and “always on” have become increasingly prohibitive from the perspective of cost, risk management, time to revenue, and so on. The custom-built approach becomes even less cost effective as Communications Service Providers (CSPs) move toward offering cloud-based services, where they have to compete with non-traditional providers that offer such services on networks built using Commercial Off-The-Shelf (COTS) building blocks.
A change in market dynamics is causing a fundamental paradigm shift in industry’s thinking: Instead of continuing to invest precious Research and Development (R&D) resources and dollars to build expensive, special-purpose proprietary systems with the hope that they will never fail, industry leaders are now assuming that there will be hardware and software failures and thus designing systems and applications that continue to provide end-user service in the presence of such failures.
HARTING Mitronics AG, Switzerland, a company of the HARTING Group, Germany, is noted for its expertise in Molded Interconnect Device (MID) technology, a 3D contour-following electromechanical embedded technology. A hearing aid (Figure 2) currently in production at Siemens Audiological (Medical), Germany, using MID technology was runner-up for the Hermes Award for product innovation at the Hannover Messe Fair, and won the MID Industrial Prize at Productronica in Munich. With MID technology, Siemens Medical can use three directional stereoscopic microphones and ear-to-ear wireless communication to enable simultaneous 3D hearing with optimized adaptive noise cancellation in a device smaller than traditional hearing aids, so it is practically embedded in the human ear. HARTING Mitronics used a laser system from LPKF, Germany, in a laser direct structuring process to produce the MID devices.
IDC is predicting that 15 billion intelligent devices will be connected to the Internet by 2015. This explosion in connected embedded devices has spawned a new generation of hackers targeting mobile devices, automobiles, medical equipment, and other systems. Alan discusses what these latest security threats to embedded devices look like and what steps companies should take to protect their devices from attacks launched via the Internet.
ECD: What are some common threats and attacks against connected embedded devices?
GRAU: We are seeing a surge in attacks against embedded devices. Attacks range from simple automated probes to sophisticated attacks targeting specific features of the embedded devices.
IP and Web attacks that have long been used against enterprise networks and Web servers are now being used to attack embedded devices. Hackers have compromised medical devices, reprogrammed printers, and even hacked antitheft and vehicle control systems in cars. The list of possible attacks is limited only by the creativity of hackers.
A few other common threats are dictionary attacks, where hackers attempt to log in and gain control of the embedded device using weak or default passwords, and insider attacks, where disgruntled employees steal passwords and sell them to hackers.
ECD: What steps can designers take to protect their devices from these attacks?
GRAU: Security needs to be considered from the very beginning of the design phase. Engineers must assess the possible attack vectors available to hackers. Each interface provided by the device is a potential attack vector for hackers. Wi-Fi, Ethernet, Bluetooth, serial communication, and even debug ports have been targeted by hackers. Once the risks are determined, engineers can begin designing security measures for the identified risks.
Many embedded devices include security protocols such as Secure Shell (SSH) or Secure Socket Layer (SSL) to ensure secure communication with the device. While that is an important step, it is not sufficient. A firewall is the critical layer of security that is missing in most embedded devices. A firewall allows the creation of policies that define and enforce what communication is allowed with the device. The policies define, at a minimum, with whom the device communicates, which protocols are supported, and which ports are open. An embedded firewall is integrated into the communication stack and blocks packets at the lowest layers of the stack. By enforcing communication policies, many attacks are blocked before a connection is even established.
Consider a Supervisory Control and Data Acquisition (SCADA) controller that incorporates the Icon Labs Floodgate firewall and is configured with communication policies that define a set of trusted senders and block all ports and protocols not used by the device (see Figure 1). If hackers attack the device, they will be blocked because the communication is not originating from a trusted sender. Even if hackers steal passwords from an insider, they will not be able to log in to the device because they are not trusted senders. The firewall will block packets at the IP layer before a log-in is attempted.
Figure 1: The Icon Labs Floodgate embedded firewall enforces communication policies, blocking unwanted packets and protecting embedded devices from attack.
ECD: How difficult is it to port security software to an embedded system? What are the impacts on performance and memory size?
GRAU: Most Embedded Systems require security software that is designed for use with the specific requirements of embedded systems in mind. Security systems for Linux or Windows are generally large, slow, and not easily ported. A product like Floodgate that is designed to be small, fast, and portable between Real-Time Operating Systems (RTOSs), on the other hand, can be easily ported between embedded systems. Floodgate has been ported to devices as small as 8-bit MCUs and can be configured to as little as 15 KB of RAM and 15 KB of ROM.
Performance is another reason to use security software designed for embedded systems. These solutions will be faster and use fewer memory resources than desktop solutions.
ECD: If embedded devices are to be deployed on a closed network, should designers consider security?
GRAU: Security needs to be designed into all embedded devices, regardless of how they will be deployed initially. Many devices originally designed for use on closed systems are later repurposed, and subsequently may be deployed on open networks. For example, many legacy SCADA systems were designed without security because they were built solely for use on closed networks. Today, many of these devices are connected to the Internet and have few, if any, security features to protect them from hackers. The result is scary; embedded devices are serving critical functions in our infrastructure and remain easy targets for hackers.
Stuxnet showed us that closed networks can still be compromised. Hackers can penetrate the network, or, as with Stuxnet, viruses, worms, and other attacks can be introduced through USB drives and other physical media. In addition, there is always the risk of insider attacks. Someone with authorized access to the network could launch an attack against devices on the network.
Enterprise networks are designed using multiple layers of security. Network firewalls protect against attacks from the Internet, security protocols protect communication, and endpoint firewalls and antivirus/antimalware software protect individual nodes on the network. Embedded devices need to follow a similar approach, adding a firewall to the device to provide an extra layer of protection, regardless of how the device will be deployed at the outset.
ECD: Are the built-in security provisions in OSs such as Android adequate for embedded applications?
GRAU: As we all know, Android runs on the Linux OS. However, many people are surprised to learn that in various Android distributions, some Linux security features have been stripped out to reduce memory usage. For example, support for packet filtering using iptables is not included in many Android distributions, meaning that firewall support is not included. So Android may not be as secure as many people believe it to be.
Security is about risk management. Hackers will break into a device or network for many reasons. Some are politically or financially motivated. Others just want to prove they can do it. The number and sophistication of attacks continue to rise. Any device with a network interface, even a device on a private network, is a potential target for attack. If the device has a Wi-Fi interface or is connected to the Internet, it almost certainly will be attacked. Devices with a Web interface will likely be targeted by automated Web hacking tools. Reports estimate that between 20 to 30 percent of all Web traffic is from hackers or other malicious packets.
The embedded world Exhibition&Conference is the world’s biggest exhibition of its kind and the meeting-place of the international embedded community.
Now for the eleventh time in 2013. Exhibitors from all over the world present the entire spectrum of embedded systems: hardware, software, tools and services. “The embedded world Exhibition&Conference is growing continuously and rapidly in the same way that the embedded sector is gaining in importance – the embedded community can look forward to a record event,” says Alexander Mattausch, Exhibition Manager of embedded world.
The embedded world Conference is Europe’s top gathering for all embedded system developers. It is also the mirror and flagship of a community that more than almost any other has become the innovation driver for a whole society.
The Steering Board of international experts has assessed the many papers submitted and assembled a top-class conference programme, which is intended primarily for embedded hardware and software developers.It presents proposals for solutions to present and future challenges. This will provide in-depth coverage of methods that will succeed in shortening the development time of Embedded Systems drastically and reduce the error rate again – an important and pioneering issue that will be tackled at the conference for the first time in an extra session,” says Sturm.
Besides other key themes, the embedded world Conference 2013 focuses on:
Cryptography and Embedded Security
Managing Embedded System Development and Life Cycle