Rethinking a Secure Internet of Things

Total Page:16

File Type:pdf, Size:1020Kb

Rethinking a Secure Internet of Things Secure Internet of Things Project Overview Monday, October 26, 2015 Rethinking a Secure Internet of Things http://iot.stanford.edu The Internet will soon connect us to the physical world through personal health monitors, proximity networks, smart homes, smart cars, and automation networks. These new networks provide tremendous opportunity, but also bring tremendous risks. Today, hackers steal credit card numbers; tomorrow, they will be able to control your home, steal your personal medical data, and track you as you walk down the street. Existing approaches to secure computing systems are insufficient for these new cyber-physical applications, as they have very different trust models and network architectures, bridging pervasive local area networks, personal mobile devices, server storage, and web-based applications. The Secure Internet of Things Project (SITP) is a 5-year collaboration between Stanford, UC Berkeley, and the University of Michigan to research fundamentally new, better ways to secure the Internet of Things and make them easy to use. The project seeks to answer three principal questions: Analytics: how will we integrate these enormous streams of physical world instrumentation with all of our existing data? Security: how can pervasive sensing and analytics systems preserve and protect user and system security? Hardware and software systems: what hardware and software systems will make developing new intelligent and secure Internet of Things applications as easy as a modern web application? These three efforts are tightly connected. Internet of Things (IoT) applications will need novel cryptographic protocols that are able to work on tiny, low-power devices yet also scale up to enormous stores of data in the cloud. Furthermore, IoT devices (such a smart lock) might remain in use for 10-20 years, so we must protect today’s devices against attacks from 20 years in the future. The principal investigators of the project met for a 2-day retreat in June of 2015 to lay out a research agenda for the first year of the project. Three broad topics emerged as key problems to tackle: 20-year security, application developer frameworks, and the IoT gateway. 20-year Security What does it mean to secure a computing device for 20 years in the future? 20 years ago the web was beginning to take off: HTTPS didn’t really exist yet and people often had to manually configure their IP addresses in the operating system control panels. Nowadays, we have worms, phishing, cross-site scripting, DNS attacks, and advanced persistent threats (APTs). When we deploy an IoT device, we need to realize that computer security will make similar leaps and transformations in complexity and sophistication in the next 20 years. The larger scale computing infrastructure around IoT devices can evolve quickly (we replace our mobile phones and servers are updated) but the devices themselves remain deployed and so must be ready to adapt and weather these changes in the security landscape. Our work on 20-year security has three major thrusts. The first is designing what a future embedded system-on-a- chip will need in terms of cryptographic primitives. Cryptography tends to be computationally intensive and therefore consume a lot of energy on an embedded device if run in software. Hardware support, however, can make cryptography extremely efficient and cost-effective. But the ciphers and algorithms we will use in 20 years will be very different than those today. In the most extreme future, quantum computers may be real and so IoT devices will need signature schemes that are resistant to quantum attacks. Thankfully, the cost landscape of smaller processes means that embedded SoCs have space to spare, so we can add a lot of programmable cryptographic support. The second thrust is random number generation. Random numbers are the foundation of all cryptography and computer security. While modern processors have hardware circuits to generate random bits from random !1 Secure Internet of Things Project Overview Monday, October 26, 2015 processes such as thermal noise (e.g., the x86 RDRAND and RDSEED instructions), such features are rare in the low power micro-controllers that IoT devices use. Furthermore, correctly and safely generating random bits is subtle and must be done very carefully. A first linchpin of a secure Internet of Things is fast and inexpensive ($ and board area) random number generation that anyone can easily incorporate into a device. Finally, this random number generator should be physically verifiable: someone should be able to look at it with the naked eye and check that it is correct. The major challenge that arises in such a circuit is being able to quantify the minimum entropy each bit provides. It is typical for random bits to be unevenly distributed over 0 and 1. The more uneven the distribution is, the more random bits one must collect to generate the needed randomness. Historically this problem has been solved either in hardware or in software: we are exploring designs that jointly hardware and software which we believe will be able to provide sufficient randomness for an embedded device’s entire lifetime within 1 millisecond of it booting. The third and final thrust is the design and implementation of a new, secure embedded operating system. Embedded systems today are still typically written in low-level C. We learned in the end of the 20th century that this leads to buffer overflow attacks and many other security vulnerabilities. Desktop and server operating systems have since moved to use a variety of techniques and hardware mechanisms to protect against such attacks, but embedded processors do not have these luxuries. Our hypothesis is that using a type-safe systems language can provide a provably secure OS kernel that can allow multiple untrusted applications (e.g., apps loaded onto a smart watch) to run concurrently. Application Development Frameworks A system is only as secure as its hardware and software. Most IoT applications follow a common “MGC” architecture, consisting of four parts: eMbedded devices, a Gateway device such as a mobile phone, and servers (in the cCoud or within the network). These devices span 3-6 orders of magnitude in resources and each use their own languages, operating systems, and application frameworks. Verifying and establishing security properties across this mish-mash of existing systems is intractable. We will research new operating systems, network protocols, and tools that can verify that an application across all of these devices maintains its security properties. Finally, if security is difficult to use, developers will work around it. Our goal is to make secure, powerful Internet of Things applications as easy as a modern web application. Rather than take 10 engineers two years, it should take 3 engineers two months. Making complex cyber-physical applications easy to prototype and deploy will democratize development and lead to a whole new ecosystem of tools, APIs, and software. IoT systems are unique in that they bridge hardware and software even in their earliest stages. Computer science departments across the world are educating hundreds of thousands of students, but most software engineers think hardware is daunting. We will are researching how to support “software-defined hardware”, that is, enabling software engineers to specify an entire IoT device by specifying what libraries and features their code needs. Our current approaches center on using new dark data synthesis techniques to automatically read in thousands of data sheets and populate a rich database with their important properties. Libraries can specify the constraints on components they require, and hardware generation uses these constraints to query the database for possible components. The IoT Gateway A gateway is a critical part of almost every IoT application. It provides the bridge between a low-power wireless network and the broader Internet. A gateway can be everything from a simple IP router (your WiFi access point for a Nest device) to a complex application platform that runs applications, has complex user interfaces, and orchestrates between embedded devices and the cloud (your mobile phone). We are exploring what features and abstractions a gateway should provide, both to applications as well as users. These efforts currently focus on two major problems: communication visibility and application sandboxing. Suppose in the future you have 100 or 1,000 IoT devices scattered through your home. What are they doing? Today, they are black boxes. You cannot, for example, see what data your Nest thermostat is sending, as it is encrypted end-to-end with Nest servers. Unlike laptops and phones, you cannot install new security certificates on the thermostat that let you look at its data. We posit that a fundamental requirement for IoT systems is that their !2 Secure Internet of Things Project Overview Monday, October 26, 2015 owner should be able to see how their devices are communicating and what they are saying. Technically, IoT gateways should provide information on what services and systems their IoT devices are sending data to and receiving data from. This data should remain private to the owner of the gateway, although they can share it freely with others: aggregating such data can provide valuable insights on what is normal behavior and what they might be doing. This ability to inspect traffic should go beyond just seeing how many bytes are sent; gateways, when property authorized by the owner of the device, should have the ability to snoop inside traffic. That is, gateways need the ability to relax secrecy in order to audit and monitor what devices are saying about their owners. This ability to snoop should not violate integrity; while a gateway can see the traffic a thermostat sends to a server, it cannot forge data. Achieving these twin goals of relaxing secrecy while maintaining integrity requires new cryptographic and protocol mechanisms.
Recommended publications
  • Personalized Smart Residency with Human Activity Recognition a Thesis Submitted to the Graduate School in Partial Fulfillment Of
    PERSONALIZED SMART RESIDENCY WITH HUMAN ACTIVITY RECOGNITION A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE DEGREE MASTER IN COMPUTER SCIENCE BY SUDAD H. ABED DR. WU SHAOEN – ADVISOR BALL STATE UNIVERSITY MUNCIE, INDIANA December 2016 DEDICATION To our greatest teacher, the person who took us out of the darkness to the light, the person who carried discomfort on his shoulders for our comfort, our prophet Mohammad; To the pulse of my heart, the secure and warm lap, the one who stayed up to ensure my wellness, my mother; To the man who devoted his life to me, my first friend, the one who I will always go to for advice, my father; To those whom I stood up miss every day, the companions who have stood by me through the good times and the bad, my brothers and sisters; I dedicate my work to you. i ACKNOWLEDGMENT First of all, and most importantly, I thank Allah for all the strength, blessings, and mercy he has been given me. I want to pay a special warm thanks to my teacher and thesis advisor Dr. Shaoen Wu for his guidance, answers, and patience every time I needed him during my work on the thesis. I want to acknowledge my appreciation to Dr. Shaoen Wu for all his effort and support in helping me complete this work. I want to thank my committee members, Dr. David Hua and Dr. Jeff Zhang for all their suggestions and recommendations. Also, I want to thank the chairperson of the Computer Science Department, Dr.
    [Show full text]
  • Cloud Computingcomputing
    NetworkingNetworking TechnologiesTechnologies forfor BigBig DataData andand InternetInternet ofof ThingsThings. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this lecture are at: http://www.cse.wustl.edu/~jain/tutorials/gitma15.htm Washington University in St. Louis http://www.cse.wustl.edu/~jain/tutorials/gitma15.htm ©2015 Raj Jain 10-1 OverviewOverview 1. What are Things? 2. What’s Smart? 3. Why IoT Now? 4. Business/Research Opportunities in IoT 5. Why, What, and How of Big Data: It’s all because of advances in networking 6. Recent Developments in Networking and their role in Big Data (Virtualization, SDN, NFV) Washington University in St. Louis http://www.cse.wustl.edu/~jain/tutorials/gitma15.htm ©2015 Raj Jain 10-2 CloudCloud ComputingComputing August 25, 2006: Amazon announced EC2 Birth of Cloud Computing in reality (Prior theoretical concepts of computing as a utility) Web Services To Drive Future Growth For Amazon ($2B in 2012, $7B in 2019) - Forbes, Aug 12, 2012 Cloud computing was made possible by computing virtualization Networking: Plumbing of computing IEEE: Virtual Bridging, … IETF: Virtual Routers, … ITU: Mobile Virtual Operators, … Washington University in St. Louis http://www.cse.wustl.edu/~jain/tutorials/gitma15.htm ©2015 Raj Jain 10-3 WhatWhat areare Things?Things? Thing Not a computer Phone, watches, thermostats, cars, Electric Meters, sensors, clothing, band-aids, TV,… Anything, Anywhere, Anytime, Anyway, Anyhow (5 A’s) Ref: http://blog.smartthings.com/iot101/iot-adding-value-to-peoples-lives/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/tutorials/gitma15.htm ©2015 Raj Jain 10-4 InternetInternet ofof ThingsThings Less than 1% of things around us is connected.
    [Show full text]
  • The Best Smart Home Devices for Your Google Home
    3/30/2018 The best Google Home devices: Philips Hue, Nest Cam IQ, and more - Business Insider The best smart home devices for your Google Home CHRISTIAN DE LOOPER, INSIDER PICKS JAN. 23, 2018, 3:00 PM The Insider Picks team writes about stuff we think you'll like. Business Insider has affiliate partnerships, so we get a share of the revenue from your purchase. Google/Business Insider The Insider Pick: http://www.businessinsider.com/best-google-home-devices?op=1&r=UK&IR=T/#the-best-light-bulbs-that-work-with-google-home-1 1/15 3/30/2018 The best Google Home devices: Philips Hue, Nest Cam IQ, and more - Business Insider If you’ve chosen the Google Assistant as your smart home helper, you need the best smart home products that work with the Google Home, Mini, and Max. We've tested smart light bulbs, outlets, light switches, security cameras, and thermostats to find the best ones you can buy. The smart home is on the rise, and there are a growing number of awesome smart home devices that will help you live like the Jetsons. Companies like Google, Amazon, and Apple are all working hard with partners to expand their smart home ecosystems and bring digital assistants like Google Assistant, Amazon's Alexa, and Apple's Siri into the home. Most Android fans have chosen Google Home as their go-to smart home system, and for good reason. It integrates well with other Google products, can be easily set up and controlled from your smartphone, and allows for a more uniform experience with the Google Assistant.
    [Show full text]
  • Google Nest FAQ's
    Google Nest FAQ’s Professional Installer October 2020 Let’s go! | Confidential and Proprietary | Do not distribute Welcome to the Google Nest FAQ’s Here you will find some Frequently Asked Questions from both Branch Staff and Installers. Please use this information to assist with Google Nest sales and questions. Need any help? For assistance with technical aspects related to the Google Nest product range, including installation and any other issues related to the Pro Portal, Pro Finder and Pro network, contact the Nest Pro support team: Contact Us form at pro.nest.com/support 0808 178 0546 Monday to Friday – 08:00‑19:00 Saturday to Sunday – 09:00‑17:00 For help to grow your business with Google Nest, product-specific questions and sales support,contact the Field team: [email protected] 07908 740 199 | Confidential and Proprietary | Do not distribute Topics to be covered Product-specific ● Nest Thermostats ● Nest Protect ● Nest Cameras ● Nest Hello video doorbell ● Nest Aware and Nest Aware Plus ● Nest Speakers and Display ● Nest Wi-Fi Other ● Nest Pro ● Returns and Faults ● General Questions ● Product SKUs ● Additional resources | Confidential and Proprietary | Do not distribute Nest Thermostats ● What’s the difference between Nest 3rd Gen Learning Thermostat and Nest Thermostat E? The 3rd Generation Nest Learning Thermostat is a dual channel (heating and hot water) and Nest Thermostat E is a single channel (heating only) as well as design, features, wiring and price. ● How many Thermostats does my customer need for a multi zone system? As the 3rd Gen Nest Learning Thermostat is a dual channel thermostat it will control both Heating and Hot Water.
    [Show full text]
  • A Case Study on Nest's “Smart Home Energy” Business Model: Based on Strategic Choices for Connected Product
    A CASE STUDY ON NEST’S “SMART HOME ENERGY” BUSINESS MODEL: BASED ON STRATEGIC CHOICES FOR CONNECTED PRODUCT SONG, MINZHEONG Hansei University E-mail: [email protected] Abstract - The purpose of this study is to investigate Nest’s business strategy, because simple Nest products have a big potential of connected one and have synergy with Google’s current assets such as artificial intelligence. It makes sense to be developing them together. The key activities based on strategic choices for monetizing connected product are investigated. Nest’s capacity and functionality is to offer a seamless integration of devices, platforms, and services and the “Works with Nest” offers an ecosystem fulfilling the needs of different partners. For utilizing and monetizing customer data, Nest also provides a seamless end-to-end customer experience supported by product incentives. Nest also introduces open APIs to connect its smart devices to the wider IoT and open to “If This, Then That.” With those activities Nest builds Nest homeincluding energy. In terms of smart home energy (SHE), all Nest products were designed to work together and if there is a carbon monoxide leak, the Nest Protect can send a command to the Nest Thermostat to turn off the heat. The Nest app also controls them from one single place. Thanks to the support of numerous partners and third-party developers, Nest has partnered with 32 energy providers as of 2017. These partners provide energy from renewable and non-renewable energy sources. Nest emphasizes how the consumer can benefit from sharing data with their energy and insurance provider.
    [Show full text]
  • 1-The Age of the Data Product
    M.Sc.IT Sem II Unit-IV Big Data and Analytics 1-The Age of the Data Product 1.1-What Is a Data Product? The traditional answer to this question is usually “any application that combines data and algorithms.” But frankly, if you’re writing software and you’re not combining data with algorithms, then what are you doing? After all, data is the currency of programming! More specifically, we might say that a data product is the combination of data with statistical algorithms that are used for inference or prediction. Many data scientists are also statisticians, and statistical methodologies are central to data science. Armed with this definition, you could cite Amazon recommendations as an example of a data product. Amazon examines items you’ve purchased, and based on similar purchase behavior of other users, makes recommendations. In this case, order history data is combined with recommendation algorithms to make predictions about what you might purchase in the future. You might also cite Facebook’s “People You May Know” feature because this product “shows you people based on mutual friends, work and education information ... [and] many other factors”—essentially using the combination of social network data with graph algorithms to infer members of communities. Indeed, defining data products as simply the combination of data with statistical algorithms seems to limit data products to single software instances (e.g., a web application), which hardly seems a revolutionary economic force. Although we might point to Google or others as large-scale economic forces, the combination of a web crawler gathering a massive HTML corpus with the PageRank algorithm alone does not create a data economy.
    [Show full text]
  • Aura: an Iot Based Cloud Infrastructure for Localized Mobile Computation Outsourcing
    Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing Ragib Hasan, Md. Mahmud Hossain, and Rasib Khan ragib, mahmud, rasib @cis.uab.edu { } Department of Computer and Information Sciences University of Alabama at Birmingham, AL 35294, USA Abstract—Many applications require localized computation in near the client’s mobile phone so that all communications order to ensure better performance, security, and lower costs. In occur over one or two network hops from the client, and the recent years, the emergence of Internet-of-Things (IoT) devices data never has to traverse over the public Internet. On the has caused a paradigm shift in computing and communication. other hand, building cloud infrastructures is very expensive, IoT devices are making our physical environment and infrastruc- requiring hundreds of millions of dollars to set up and operate tures smarter, bringing pervasive computing to the mainstream. cloud data centers, making it impossible and economically With billions of such devices slated to be deployed in the next five years, we have the opportunity to utilize these devices in infeasible to have data centers located near clients. For such converting our physical environment into interactive, smart, and localized computing facilities, we need a lightweight system intelligent computing infrastructures. In this paper, we present for outsourced computation that can be incorporated into each Aura – a highly localized IoT based cloud computing model. Aura building or physical infrastructure, making it available at a close allows clients to create ad hoc clouds using the IoT and other distance from clients. To achieve this, in this paper, we present computing devices in the nearby physical environment, while Aura – a system for outsourced computation on lightweight ad providing the flexibility of cloud computing.
    [Show full text]
  • Big Data Insights Into Energy and Resource Usage in the Live-In Lab Apartments
    Big data insights into energy and resource usage in the Live-in Lab apartments Elisabeth Danielsson Amanda Koskinen Bachelor of Science Thesis KTH School of Industrial Engineering and Management Energy Technology EGI-2016 SE-100 44 STOCKHOLM Abstract This report aims to find ways of getting insights into energy and resource usage in a home with big data, based on the project Live-in Lab. Live-in Lab is a project that aims to increase the innovation pace in the building and construction sector when developing environmental technology. This is done by conducting implementation and research at the same time in a living lab that will be the home of about 300 students. The main objectives of this report is to find out what is possible to measure in the apartments that is related to energy, with what technologies and how the data can be analyzed to generate maximal insight and utility. The methodology used originates from the field of product realization. A literature study was carried out to learn more about energy usage in a home, big data and state of the art of similar projects as well as available technologies that can be used to collect data with. The technologies were in- vestigated in four different levels; Social data and IoT, Infrastructure mediated systems, Direct environment components and Wearable devices. The result comprises eleven purposed solutions that get insights in pat- terns of water consumption, ventilation, light, movements inside and outside the apartment, consumption patterns among others. To be able to get max- imal insights and utility it was studied how the purposed solutions could be combined.
    [Show full text]
  • LINUX JOURNAL (ISSN 1075-3583) Is Published Monthly by Belltown Media, Inc., PO Box 980985, Houston, TX 77098 USA
    SSH TUNNELS AND ENCRYPTED VIDEO STREAMING ™ WATCH: ISSUE OVERVIEW V APRIL 2016 | ISSUE 264 LinuxJournal.com Since 1994: The Original Magazine of the Linux Community + STUNNEL Intro to Pandas The Python Data Analysis SECURITY Library for Databases A Look at printf A Super- Protect Useful Scripting Your Desktop Command Environment What’s the with Qubes Kernel Space of Democracy? BE SMART ABOUT CREATING A SMART HOME LJ264-April2016.indd 1 3/22/16 10:12 AM NEW! Self-Audit: Agile Checking Product Assumptions Development at the Door Practical books Author: Author: Ted Schmidt for the most technical Greg Bledsoe Sponsor: IBM Sponsor: people on the planet. HelpSystems Improve Finding Your Business Way: Mapping Processes with Your Network an Enterprise to Improve !""#$!%&'"( Job Scheduler Manageability Author: Author: Mike Diehl Bill Childers Sponsor: Sponsor: Skybot InterMapper DIY Combating Commerce Site Infrastructure Sprawl Author: Reuven M. Lerner Author: Sponsor: GeoTrust Bill Childers Sponsor: Puppet Labs Download books for free with a Get in the Take Control simple one-time registration. Fast Lane of Growing with NVMe Redis NoSQL http://geekguide.linuxjournal.com Author: Server Clusters Mike Diehl Author: Sponsor: Reuven M. Lerner Silicon Mechanics Sponsor: IBM & Intel LJ264-April2016.indd 2 3/22/16 10:12 AM NEW! Self-Audit: Agile Checking Product Assumptions Development at the Door Practical books Author: Author: Ted Schmidt for the most technical Greg Bledsoe Sponsor: IBM Sponsor: people on the planet. HelpSystems Improve Finding Your Business Way: Mapping Processes with Your Network an Enterprise to Improve !""#$!%&'"( Job Scheduler Manageability Author: Author: Mike Diehl Bill Childers Sponsor: Sponsor: Skybot InterMapper DIY Combating Commerce Site Infrastructure Sprawl Author: Reuven M.
    [Show full text]
  • Hardware Warranty Center - Product Documentation Help
    2/22/2021 Hardware Warranty Center - Product Documentation Help Hardware Warranty Center This article is about replacements under manufacturer's warranty. Learn how to le a claim using device protection from the Google Store (formerly Nexus Protect). You can also explore your options if you’re outside the manufacturer warranty. We want to make sure you know how to get help if your device or accessory is or becomes defective through no fault of your own. You may be able to return the device or accessory for a refund, exchange, or repair. Just tell us which device or accessory you have and we'll tell you who to contact for warranty claims. Nothing in this section affects your legal rights. Select your device or accessory Nest Speakers and Displays Google Home Google Home Mini Google Home Max Google Nest Mini (2nd gen) Google Nest Audio Google Nest Hub Google Nest Hub Max Streaming Chromecast Chromecast (3rd generation) Chromecast with Google TV Connectivity Google Wi Google Wi (refurbished and purchased on gStore) Google Nest Wi Safety and Security Nest Hello Nest Protect Nest Protect (refurbished and purchased on gStore) Nest Secure https://support.google.com/product-documentation/troubleshooter/3070579#ts=6012658%2C10346899 1/4 2/22/2021 Hardware Warranty Center - Product Documentation Help Cameras Nest Cam Indoor (refurbished and purchased on gStore) Nest Cam IQ Nest Cam Outdoor Nest Cam Nest Cam IQ Outdoor Thermostats Nest Thermostat If there are any differences between this online Limited Warranty and the Limited Warranty included in the box with your product then this online Limited Warranty will supersede the terms of your in-the-box warranty.
    [Show full text]
  • Copyrighted Material
    index A NFC (near field communication), A/B testing, 82–84 91–93 ACID (atomicity, consistency, isolation, RFID (radio-frequency durability) principles, 33 identification), 91–93 adjacent possible, 201–202 sensors, 90–91 Adner, Ron, The Wide Lens: A New Strategy for Innovation, 202 B The Age of the Platform (Simon), xv bad data, 162–163 Amazon Bayesian methods of analysis, 81–82 Best Buy price matching, 198 Beane, Billy, xv–xvi Big Data statistics, 98–99 Howe, Art, and, xvii–xviii Google and Amazon model, 127–128 sabermetrics and, xvi–xvii shipping fee error, 14 Best Buy, 198 analysis, 77–79 Bezos, Jeff, 19–20 A/B testing, 82–84 Bhambhri, Anjul, 17 data visualization, 84–86 BI (business intelligence), 68–70 heat maps, 86–87 Big Brother, 187 Tableau software, 85 Big Data time series analysis, 87–88 acceptance gains within Visually software, 85 organization, 171 predictive analytics, 100–102, 136–137 bad data and, 162–163 LDMU (Law of Diminishing capabilities, 79–80 Marginal Utility), 103 characteristics, 50–52 LLN (Law of Large Numbers), checklist, 177 102–103 community knowledge, 173 regression analysis, 80–82 as complement, 56–57 sentiment analysis, 97–98 completeness, 65–68 text analytics, 95–97 conferences and, 173 Anderson, Chris consumers, 63–64 Free: The Future of a Radical Price, 14 current presence, 50–51 “Tech Is Too Cheap to Meter,” 14 data model evolution, 172–173 Angry Birds, 62 definition, 49–50 Apache COPYRIGHTEDdynamism, MATERIAL 62 Cassandra, 124 evolution, 201–203 Hadoop (See Hadoop) experiments, 169–171 Apple, Big Data
    [Show full text]
  • CDP Climate Change Response 2021
    CDP Climate Change Response 2021 Published July 2021 Alphabet, Inc. - Climate Change 2021 C0. Introduction C0.1 (C0.1) Give a general description and introduction to your organization. This is our 15th consecutive year responding to the CDP Climate Change questionnaire. We began calculating our annual carbon footprint in 2006. Every year since 2009, we’ve publicly reported the results to CDP. As our founders Larry and Sergey wrote in the original founders' letter, "Google is not a conventional company. We do not intend to become one." That unconventional spirit has been a driving force throughout our history, inspiring us to tackle big problems, and invest in moonshots like artificial intelligence ("AI") research and quantum computing. Alphabet is a collection of businesses—the largest of which is Google—which we report as two segments: Google Services and Google Cloud. We report all non-Google businesses collectively as Other Bets. Our Other Bets include earlier stage technologies that are further afield from our core Google business. Our mission to organize the world’s information and make it universally accessible and useful is as relevant today as it was when we were founded in 1998. Since then, we’ve evolved from a company that helps people find answers to a company that helps you get things done. We’re focused on building an even more helpful Google for everyone, and we aspire to give everyone the tools they need to increase their knowledge, health, happiness and success. Google Services We have always been a company committed to building helpful products that can improve the lives of millions of people.
    [Show full text]