Internet of Nano-Things, Things and Everything: Future Growth Trends

Total Page:16

File Type:pdf, Size:1020Kb

Internet of Nano-Things, Things and Everything: Future Growth Trends future internet Review Internet of Nano-Things, Things and Everything: Future Growth Trends Mahdi H. Miraz 1 ID , Maaruf Ali 2, Peter S. Excell 3,* and Richard Picking 3 1 Centre for Financial Regulation and Economic Development (CFRED), The Chinese University of Hong Kong, Sha Tin, Hong Kong, China; [email protected] 2 International Association of Educators and Researchers (IAER), Kemp House, 160 City Road, London EC1V 2NX, UK; [email protected] 3 Faculty of Art, Science and Technology, Wrexham Glyndwrˆ University, Wrexham LL11 2AW, UK; [email protected] * Correspondence: [email protected]; Tel.: +44-797-480-6644 Received: 22 June 2018; Accepted: 25 July 2018; Published: 28 July 2018 Abstract: The current statuses and future promises of the Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano-Things (IoNT) are extensively reviewed and a summarized survey is presented. The analysis clearly distinguishes between IoT and IoE, which are wrongly considered to be the same by many commentators. After evaluating the current trends of advancement in the fields of IoT, IoE and IoNT, this paper identifies the 21 most significant current and future challenges as well as scenarios for the possible future expansion of their applications. Despite possible negative aspects of these developments, there are grounds for general optimism about the coming technologies. Certainly, many tedious tasks can be taken over by IoT devices. However, the dangers of criminal and other nefarious activities, plus those of hardware and software errors, pose major challenges that are a priority for further research. Major specific priority issues for research are identified. Keywords: internet of things (IoT); internet of everything (IoE); internet of nano-things (IoNT); bio internet of nano-things (BIoNT); medical internet of things (MIoT); consumer internet of things (CIoT); industrial internet of things (IIoT); human internet of things (HIoT); narrow band internet of things (NB-IoT); identity of things (IDoT); connectedness; gartner hype cycle; cyber-physical system (CPS); tactile internet; future internet 1. Introduction The applications and usage of the Internet are multifaceted and expanding daily. The Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano-Things (IoNT) are new approaches for incorporating the Internet into the generality of personal, professional and societal life, plus the impersonal world of inanimate quasi-intelligent devices. This paper examines the current state of these technologies and their multidimensional applications by surveying the relevant literature. The paper also evaluates the various possible future applications of these technologies and foresees further developments and how these will both challenge and change the way that future life will be lived. This paper presents an update on our previous work [1] presented at the Internet Technologies and Applications Conference in 2015 (Wrexham, UK) by extending the survey duration to reflect the current technological advances since 2015. New dimensions of discussion have also been added such as the future challenges IoT is currently facing. The discussion on IoT, in Section2, has been further expanded by adding sub-categories of IoT based on the scope of its usage as well as the components of typical IoT systems, with a listing of the top ten IoT segments for 2018 based on a survey of 1600 enterprise IoT projects. The discussion on IoNT has been augmented by the inclusion of discussion of the Internet Future Internet 2018, 10, 68; doi:10.3390/fi10080068 www.mdpi.com/journal/futureinternet Future Internet 2018, 10, 68 2 of 28 of Bio-Nano-Things (IoBNT), limitations and challenges of IoNT and presentation of examples of earlier research advances in the field. The deliberation on “Future Internet” has been extended as well as updated to reflect new research, associated challenges and future trends. Section6, namely “Challenges and Impediments to IoT”, has been added, scrutinizing 21 of the most significant current and future challenges. The paper first provides a critical discussion on IoT, IoE and IoNT in Sections2–4 respectively. Future Internet 2018, 9, x FOR PEER REVIEW 2 of 27 Section5 portrays the Future Internet that is predicted to be mediated by adoption of IoT. Challengesof the Internet and Impediments of Bio-Nano-Things to IoT are (IoBNT), covered limitations in Section and6. Sectionchallenges7 ends of IoNT the paperand presentation with up-to-date of concludingexamples discussions. of earlier research advances in the field. The deliberation on “Future Internet” has been extended as well as updated to reflect new research, associated challenges and future trends. Section 6, 2. Internetnamely of “Challenges Things (IoT) and Impediments to IoT”, has been added, scrutinizing 21 of the most significant currentThe term and “Internet future challenges. of Things” or “Internet of Objects” has come to represent electrical or electronic The paper first provides a critical discussion on IoT, IoE and IoNT in Sections 2–4 respectively. devices, of varying sizes and capabilities, that are connected to the Internet, but excluding those Section 5 portrays the Future Internet that is predicted to be mediated by adoption of IoT. Challenges primarily involved in communications with human beings, i.e., the traditional Internet. The scope of and Impediments to IoT are covered in Section 6. Section 7 ends the paper with up-to-date concluding the connectionsdiscussions. is ever broadening beyond basic machine-to-machine communication (M2M) [2]. IoT devices employ a broad array of networking protocols, applications and network domains [3]. The rising2. Internet preponderance of Things (IoT) of IoT technology is facilitated by physical objects being linked to the Internet by variousThe types term of “Internet short-range of Things” wireless or technologies“Internet of suchObjects” as: RFID,has come UWB, to represent ZigBee, sensorelectrical networks or and throughelectronic location-based devices, of varying technologies sizes and [capabilities,4]. The emergence that are ofconnected IoT as a to distinctive the Internet, entity but wasexcluding achieved, accordingthose primarily to the Internet involved Business in communications Solutions Group with human (IBSG), beings, actually i.e., whenthe traditional more inanimate Internet. The objects werescope connected of the toconnections the Internet is thanever humanbroadening users beyond [5]. According basic machine-to-machine to this definition, communication this occurred in mid-2008.(M2M)This [2]. is an accelerating ongoing process, especially with the rollout of Cisco’s “Planetary Skin”, theIoT Smart devices Grid employ and intelligent a broad array vehicles of networking [5]. IoT will protocols, make applications the impact ofand the network Internet domains even more pervasive,[3]. The personal rising preponderance and intimate of in IoT the technology daily lives is of facilitated people. by physical objects being linked to the InternetIoT devices by various are not types currently of short-range strongly wireless standardized technologies in how such they as: RFID, are connected UWB, ZigBee, to the sensor Internet, networks and through location-based technologies [4]. The emergence of IoT as a distinctive entity apart from their networking protocols; however, this could be a relatively short-term inhibiting factor. was achieved, according to the Internet Business Solutions Group (IBSG), actually when more IoT may be employed with added management and security features to link, for example, vehicle inanimate objects were connected to the Internet than human users [5]. According to this definition, electronics,this occurred home in environmental mid-2008. This management is an accelerating systems, ongoing telephone process, networks especially and with control the rollout of domestic of utilityCisco’s services. “Planetary The expanding Skin”, the scopeSmart Grid of IoT and and intelligent how it canvehicles be used [5]. IoT to interconnect will make the various impact of disparate the networksInternet is showneven more inFigure pervasive,1[5]. personal and intimate in the daily lives of people. FigureFigure 1. IoT1. IoT can can be be viewed viewed as as a a NetworkNetwork of of Networks. Networks. Adapted Adapted from from [5].[ 5]. IoT devices are not currently strongly standardized in how they are connected to the Internet, apart from their networking protocols; however, this could be a relatively short-term inhibiting factor. IoT may be employed with added management and security features to link, for example, vehicle electronics, home environmental management systems, telephone networks and control of Future Internet 2018, 9, x FOR PEER REVIEW 3 of 27 Future Internet 2018, 10, 68 3 of 28 domestic utility services. The expanding scope of IoT and how it can be used to interconnect various disparate networks is shown in Figure 1 [5]. BasedBased onon thethe typetype ofof use, use, IoTIoT can can be be further further categorizedcategorized asas IndustrialIndustrial InternetInternet ofof ThingsThings (IIoT)(IIoT) andand ConsumerConsumer InternetInternet ofof ThingsThings (CIoT),(CIoT), alternativelyalternatively knownknown asas HumanHuman InternetInternet ofof ThingsThings (HIoT),(HIoT), asas shown shown in in Figure Figure2 :2: FigureFigure 2.2.IIoT IIoT andandCIoT, CIoT, adapted adapted from from Moor Moor Insights Insights & & Strategy’s Strategy’s Report Report [ 6[6].]. AA generic
Recommended publications
  • Against Transhumanism the Delusion of Technological Transcendence
    Edition 1.0 Against Transhumanism The delusion of technological transcendence Richard A.L. Jones Preface About the author Richard Jones has written extensively on both the technical aspects of nanotechnology and its social and ethical implications; his book “Soft Machines: nanotechnology and life” is published by OUP. He has a first degree and PhD in physics from the University of Cam- bridge; after postdoctoral work at Cornell University he has held positions as Lecturer in Physics at Cambridge University and Profes- sor of Physics at Sheffield. His work as an experimental physicist concentrates on the properties of biological and synthetic macro- molecules at interfaces; he was elected a Fellow of the Royal Society in 2006 and was awarded the Institute of Physics’s Tabor Medal for Nanoscience in 2009. His blog, on nanotechnology and science policy, can be found at Soft Machines. About this ebook This short work brings together some pieces that have previously appeared on my blog Soft Machines (chapters 2,4 and 5). Chapter 3 is adapted from an early draft of a piece that, in a much revised form, appeared in a special issue of the magazine IEEE Spectrum de- voted to the Singularity, under the title “Rupturing the Nanotech Rapture”. Version 1.0, 15 January 2016 The cover picture is The Ascension, by Benjamin West (1801). Source: Wikimedia Commons ii Transhumanism, technological change, and the Singularity 1 Rapid technological progress – progress that is obvious by setting off a runaway climate change event, that it will be no on the scale of an individual lifetime - is something we take longer compatible with civilization.
    [Show full text]
  • Research Journal of Pharmaceutical, Biological and Chemical Sciences
    ISSN: 0975-8585 Research Journal of Pharmaceutical, Biological and Chemical Sciences A Novel Framework for Fall Detection by Using Ambient Sensors and Voice Recording. P Megana Santhoshi1*, and Mythili Thirugnanam2. 1PhD scholar, School of Computer Science and Engineering (SCOPE), VIT University, Tamil Nadu, India 2School of Computer Science and Engineering (SCOPE), VIT University, Vellore-632014, Tamil Nadu, India. ABSTRACT Now a day’s falls are the second ruling cause to unintentional injury death of elderly person. Fall detection methods are introduced to assist the elderly person. For any type of patient irrespective of age, first one to two hours treatment is crucial at the time of emergency. Before starting the treatment, it would be very helpful if caregivers know exact injury type. This paper aims to propose a framework on IoT and cloud computing based fall detection scheme using ambient sensors along with voice recording. With the help of voice clip and fall alarm, patient had a feasibility to inform exact injury to hospital. Hospital people will facilitate relevant department services to start quick treatment. Keywords: Ambience based fall detection; voice recorder based health system; wireless sensor networks (WSN’s); IoT (Internet of Things); Cloud computing; smart health care system. *Corresponding author September – October 2016 RJPBCS 7(5) Page No. 2097 ISSN: 0975-8585 INTRODUCTION The number of persons above the age of 60 years is huge growing, especially in India. As per Indian government ministry of statistics, India is the second population country in the world having 1.21 Billion people. In that 35.5% of people are at or over the age of 60.
    [Show full text]
  • The Upside of Disruption Megatrends Shaping 2016 and Beyond Contents
    The upside of disruption Megatrends shaping 2016 and beyond Contents 4 Foreword 5 From disruption to megatrends 6 EY on disruption 8 Section 1: Understanding disruption 1. How did disruption become mainstream? 2. How is our understanding of disruption changing? 3. What are the root causes of disruption? 4. Why is responding to disruption so critical? 5. Why is it so difficult to respond to disruption? 6. How do businesses seize the upside of disruption? 7. How does disruption lead to megatrends? 18 Section 2: Megatrends 2016 1. Industry redefined 2. The future of smart 3. The future of work 4. Behavioral revolution 5. Empowered customer 6. Urban world 7. Health reimagined 8. Resourceful planet 52 How will you seize the upside of disruption? The upside of disruption Megatrends shaping 2016 and beyond 3 Foreword From disruption to megatrends Welcome to EY’s The Upside of Disruption. Disruption is As disruption becomes an everyday occurrence, we explore its everywhere and the future is uncertain — no one knows what the primary causes and the megatrends that are shaping our future world will look like even a decade from now. Our response is to help organizations find the opportunity in this challenge and ask: Disruption is fundamentally changing the way the world works. Today’s businesses, how do you seize the upside of disruption? government and individuals are responding to shifts that would have seemed unimaginable even a few years ago. Artificial intelligence and robotics are reinventing This report has been produced by EYQ, a new initiative from EY that will bring the workforce.
    [Show full text]
  • Future Emerging Technology Trends
    Federal Department of Defence, Civil Protection and Sport DDPS armasuisse Science and Technology Emerging Technology Trends 2015 Thun 2015 Credits Editor Federal Department of Defence, Civil Protection and Sport DDPS armasuisse Science and Technology Research Management and Operations Research www.armasuisse.ch/wt www.deftech.ch Author Dr. Quentin Ladetto Research Director - Technology Foresight [email protected] Release 1.3 Compiled on Tuesday 21st June, 2016 at 16:43 Front page: Emerging sun - view of the Earth from space Foreword As the rate of development in technology is accelerating and civil investments are pushing boundaries always closer to what was considered science-fiction until recently, the exploitation of dual-use technologies is growing in the defence & security ecosystem. If technology is not the only driver in the evolution of warfare, it is the enabler, not to say the trigger, of most of the changes that occurred at the turning point between generations. For a country like Switzerland, Technology Foresight is paramount to identify the opportuni- ties and threats a technology can represent for the different military capabilities building our national armed forces. Rather than picking winners, the Technology Foresight program must provide a comprehensive overview to ensure an early warning about novel relevant technological advances. Identifying potentialities provides the time to build the necessary competences, skills and expertise, in the various fields. In that sense, Technology Foresight must be an integrated element of the doctrine, planing and procurement processes of the armed forces. Only with this strategic futuristic vision, the Swiss armed forces are able to handle, economi- cally and operatively, the evolutions and challenges to come.
    [Show full text]
  • Physical Selection in Ubiquitous Computing
    ESPOO 2007 VTT PUBLICATIONS 663 VTT PUBLICATIONS 663 Physical Selection in Ubiquitous Computing VTT PUBLICATIONS 645 Laitila, Arja. Microbes in the tailoring of barley malt properties. 2007. 107 p. + app. 79 p. 646 Mäkinen, Iiro. To patent or not to patent? An innovation-level investigation of the propensity to patent. 2007. 95 p. + app. 13 p. 1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890 647 Mutanen, Teemu. Consumer Data and Privacy in Ubiquitous Computing. 2007. 82 p. 1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890 1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890 1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890 + app. 3 p. 1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890 1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890 1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890 648 Vesikari, Erkki. Service life management system of concrete structures in nuclear 1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890 1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890 1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890 power plants. 2007. 73 p. 1234567890123456789012345678901212345678901234567890123456789012123456789012345678901234567890
    [Show full text]
  • Personalized Health Care: Opportunities, Pathways, Resources
    Personalized Health Care: Opportunities, Pathways, Resources genomics • health information technology • evidence/clinical delivery September 2007 PERSONALIZED HEALTH CARE: OPPORTUNITIES, PATHWAYS, RESOURCES September 2007 United States Department of Health and Human Services CONTENTS Foreword by HHS Secretary Michael Leavitt...............................................................................................1 Opportunities: Envisioning a New Kind of Health Care .............................................................................3 Challenges: Prerequisites to Achieving Personalized Health Care ..........................................................7 Pathways: Building Blocks of Personalized Health Care...........................................................................9 Resources: HHS Programs Supporting Personalized Health Care .........................................................15 I. Expansion of the Science Base Human Genomics Research............................................................................................................15 Genome-Wide Association Studies .................................................................................................16 Genes, Environment and Health Initiative .......................................................................................18 Human Genome Epidemiology Network..........................................................................................19 National Health and Nutrition Examination Survey..........................................................................20
    [Show full text]
  • Internet of Things: a Scientometric Review
    S S symmetry Article Internet of Things: A Scientometric Review Juan Ruiz-Rosero 1,* ID , Gustavo Ramirez-Gonzalez 1 ID , Jennifer M. Williams 2 ID , Huaping Liu 2, Rahul Khanna 3 ID and Greeshma Pisharody 3 ID 1 Departamento de Telemática, Universidad del Cauca, Popayán, Cauca 190002, Colombia; [email protected] 2 School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, OR 97331, USA; [email protected] (J.M.W.); [email protected] (H.L.) 3 Intel Corporation, 2111 NE 25th Ave., Hillsboro, OR 97124, USA; [email protected] (R.K.); [email protected] (G.P.) * Correspondence: [email protected]; Tel.: +57-(2)-820-9900 Received: 31 August 2017; Accepted: 23 November 2017; Published: 6 December 2017 Abstract: Internet of Things (IoT) is connecting billions of devices to the Internet. These IoT devices chain sensing, computation, and communication techniques, which facilitates remote data collection and analysis. wireless sensor networks (WSN) connect sensing devices together on a local network, thereby eliminating wires, which generate a large number of samples, creating a big data challenge. This IoT paradigm has gained traction in recent years, yielding extensive research from an increasing variety of perspectives, including scientific reviews. These reviews cover surveys related to IoT vision, enabling technologies, applications, key features, co-word and cluster analysis, and future directions. Nevertheless, we lack an IoT scientometrics review that uses scientific databases to perform a quantitative analysis. This paper develops a scientometric review about IoT over a data set of 19,035 documents published over a period of 15 years (2002–2016) in two main scientific databases (Clarivate Web of Science and Scopus).
    [Show full text]
  • Business Process Management & Enterprise Architecture Track
    BIO - Bioinformatics Track Track Co-Chairs: Juan Manuel Corchado, University of Salamanca, Spain Paola Lecca, University of Trento, Italy Dan Tulpan, University of Guelph, Canada An Insight into Biological Data Mining based on Rarity and Correlation as Constraints .............................1 Souad Bouasker, University of Tunis ElManar, Tunisia Drug Target Discovery Using Knowledge Graph Embeddings .........................................................................9 Sameh K. Mohamed, Insight Centre for Data Analytics, Ireland Aayah Nounu, University of Bristol, UK Vit Novacek, INSIGHT @ NUI Galway, Ireland Ensemble Feature Selectin for Biomarker Discovery in Mass Spectrometry-based Metabolomics ............17 Aliasghar Shahrjooihaghighi, University of Louisville, USA Hichem Frigui, University of Louisville, USA Xiang Zhang, University of Louisville, USA Xiaoli Wei, University of Louisville, USA Biyun Shi, University of Louisville, USA Craig J. McClain, University of Louisville, USA Molecule Specific Normalization for Protein and Metabolite Biomarker Discovery ....................................23 Ameni Trabelsi, University of Louisville, USA Biyun Shi, University of Louisville, USA Xiaoli Wei, University of Louisville, USA HICHEM FRIGUI, University of Louisville, USA Xiang Zhang, University of Louisville, USA Aliasghar Shahrajooihaghighi, University of Louisville, USA Craig McClain, University of Louisville, USA BPMEA - Business Process Management & Enterprise Architecture Track Track Co-Chairs: Marco Brambilla, Politecnico di
    [Show full text]
  • Inorganic Chemistry for Dummies® Published by John Wiley & Sons, Inc
    Inorganic Chemistry Inorganic Chemistry by Michael L. Matson and Alvin W. Orbaek Inorganic Chemistry For Dummies® Published by John Wiley & Sons, Inc. 111 River St. Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2013 by John Wiley & Sons, Inc., Hoboken, New Jersey Published by John Wiley & Sons, Inc., Hoboken, New Jersey Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis- sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley. com/go/permissions. Trademarks: Wiley, the Wiley logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trade- marks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
    [Show full text]
  • THE UNIVERSITY of CALGARY Contextual Locations in the Home by Kathryn Kylie Elliot a THESIS SUBMITTED to the FACULTY of GRADUATE
    THE UNIVERSITY OF CALGARY Contextual Locations in the Home by Kathryn Kylie Elliot A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE CALGARY, ALBERTA DECEMBER, 2006 © Kathryn Kylie Elliot 2006 Approval Page THE UNIVERSITY OF CALGARY FACULTY OF GRADUATE STUDIES The undersigned certify that they have read, and recommend to the Faculty of Graduate Studies for acceptance, a thesis entitled “Contextual Locations in the Home” submitted by Kathryn Kylie Elliot in partial fulfillment of the requirements for the degree of Master of Science. Supervisor, Saul Greenberg Department of Computer Science Sheelagh Carpendale Department of Computer Science External Examiner, Barry Wylant Faculty of Environmental Design University of Calgary Date - ii - Abstract In this thesis, I address the problem of designing technology for communication and coordination information management in the home. First, I use contextual interviews to examine how households currently manage this information. From these interviews, I identify five types of communicative information. I then discuss how these types are created and understood by home inhabitants as a function of contextual locations within the home. The choice of location for a piece of information is important to the functioning of the home, and is highly nuanced. Location helps home inhabitants understand time, ownership and awareness. Finally, I show how this understanding can be applied in design through two case studies in location-based home technology design. This will provide practitioners and designers with a more complete view of information in the home, and a better understanding of how technology embedded within the home can augment communication and coordination of home inhabitants.
    [Show full text]
  • Building the Cognitive Enterprise: Nine Action Areas
    Research Insights Building the Cognitive Enterprise: Nine Action Areas Core Concepts Australia and New Zealand This Core Concepts Australia and New Zealand document is abridged from the in-depth version, “Building the Cognitive Enterprise: Nine Action Areas, Deep Dive” that also contains full-length case studies. Accelerating your digital transformation for the new normal We are at a tipping point in history where the impact of technology is so significant it can completely transform the way business is done. The convergence of technologies such as artificial intelligence (AI), automation, Internet of Things (IoT), blockchain and 5G have the power to change business models, reinvent processes, and reimagine the way we all work. IBM calls this the emergence of the Cognitive EnterpriseTM. Add the extraordinary pressures in Australia Accelerating change and New Zealand organisations are facing with current global uncertainties, and we find While most organisations had already significant disruption in nearly every industry, embarked on digital transformations, the with some companies barely surviving and pandemic has made the need for change others thriving. much more urgent, with organisations turning to digital technologies to either help solve Since the start of the COVID-19 pandemic, pressing issues or scale up for growth. the rate of change has shifted into warp drive. Office towers emptied, with many people still Before the pandemic, the organisations working remotely. Supply chains were broken, seeking major transformations were typically and many businesses are still scrambling to either those struggling or high performers piece them back together. Industries changed ahead of the curve. Now, we are seeing the overnight, with some enjoying sudden booms business performance bell curve turned and others resigned to months or even years upside down, with even greater discrepancy of suppressed demand.
    [Show full text]
  • Netflix Security Requirements for Android Platforms Version 1.0 December 6, 2010
    Netflix Security Requirements for Android Platforms Version 1.0 December 6, 2010 Netflix Confidential Overall Security Philosophy • Netflix and Partners are working together to create a market for connected platforms and services • For long-term success, this requires a healthy and secure ecosystem – Based on best practices – Transparency between content, service, and platform partners – Proactive cooperation, rapid response • Our mutual success depends on it – Breaches hurt everyone Netflix Confidential Typical Studio Requirements • Platforms must meet agreed-upon robustness specifications (Netflix Robustness Rules, DRM providers’ robustness rules) • Platform partners must submit sample products and security documentation to Netflix for certification. – Netflix must review documentation and assess compliance with robustness specifications • If a platform is breached, Netflix or partner may be required to revoke individual or class of platforms. • In case of extended breach or platform non-compliance, studio has option to suspend availability of content to the Netflix service. – Such action would adversely affect all platforms and all Netflix subscribers. Netflix Confidential Android vs. Studio Requirements • Most Android platforms have been “rooted” – yields full control of system – history suggests this problem will not go away • Once rooting occurs, Linux security model is insufficient to protect content -related assets • Without modification, these platforms do not allow Netflix to meet contractual obligations to studios • We are aggressively working with partners to address this vulnerability Netflix Confidential High-Level Platform Security Concerns • Content Protection – DRM keys – Content keys – AV content • Application Security – Application keys – Access to Netflix APIs & functionality – Non-modifiability – Non-migrateability Netflix Confidential Content Protection: DRM Keys • Group key – typically provisioned in manufacturing – one key for entire class of devices (e.g.
    [Show full text]