News Article | October 28, 2016
Pokemon Go may have been good for Nintendo, but more than a few enterprise-level security managers have a different opinion about the now-viral app. As to why, TechRepublic's Brandon Vigliarolo offers several reasons in his post Pokemon Go: is it a BYOD security nightmare? As Vigliarolo's title alludes, the problem is deeper than the actual application and its immense popularity. To use a well-worn cliche, it may be the piece of straw that breaks the camel's back. Securing BYOD, in particular, mobile devices, is fast becoming a problem of epidemic proportion. "It's clear there is no stopping BYOD, so the only possible solution is to deal with it," writes SolarWinds' Vinod Mohan in a Cyber Defense Magazine post. "But dealing with BYOD poses a great challenge for IT security teams at organizations, as they have to assess the various threats associated with it while also implementing proper security measures and policies to prevent security lapses and mishaps." Mohan goes on to mention the two most challenging areas related to BYOD involve networking the devices: dicey network access and network management mayhem. Most organizations have Wi-Fi, thus employees know the Wi-Fi access password. Unless there are systems (Mobile Device Management) in place to control what devices access the network, employees can easily connect their personal devices to the company network. "However, if the device is not equipped with the required level of malware protection, it can be potentially dangerous to network security," explains Mohan. "Also, if the Wi-Fi password is exposed or leaked, any unauthorized outsider crossing over the organization's Wi-Fi space can gain immediate network access and pose security risks." Before BYOD, security managers had a good idea of what devices were attaching to the company's network; now all bets are off. "There are more IP-enabled devices to monitor, more IP addresses to manage, more IP conflicts to resolve, and more end-points to monitor network bandwidth usage," adds Mohon. Something else to consider: Within a few years it's predicted there will be over over six billion IoT devices making connections to these same networks. SEE: BYOD (Bring Your Own Device) Policy (Tech Pro Research) Besides being overwhelmed by the influx of BYOD and IoT devices, there are concerns about the current security protection methods. Adrian Shaw and Ludovic Jacquin of HP Labs Bristol in their HP blog post mention that individual mobile devices are typically secured by installed tools (antivirus, personal firewall, parental control, etc.), but the approach is far from headache-free because: Along with Shaw and Jacquin at HP Labs, scientists and engineers at several European research institutions and two major telecommunications companies came together to address the problem of securing BYOD and IoT devices. After three years of collaborative effort, the consortium members have their answer: SECURED (SECURity at the network EDge). The project is described as: The SECURED consortium members include Hewlett-Packard Labs, Telefonica I+D, Politecnico di Torino, the Barcelona Supercomputing Centre, Universitat Politècnica de Catalunya (UPC), the United Nations, VTT Technical Research Centre of Finland, and the Cypriot telco PrimeTel. Shaw and Jacquin, in their HP Labs post, offer this high-level view of SECURED: Besides improving the security of computing devices attaching to an organization's infrastructure, Shaw and Jacquin suggest that SECURED will facilitate the following: The SECURED project (Figure A) is described in more detail in these papers: Exploiting the network for securing personal devices (PDF) and Offloading security applications into the network (PDF). BYOD and IoT devices are here to stay. Platforms like SECURED should help those responsible for an organization's digital security battle the inevitable issues.
Avery M.P.,Bristol Center for Functional Nanomaterials |
Avery M.P.,University of Bristol |
Klein S.,HP Labs Bristol |
Richardson R.,University of Bristol |
And 4 more authors.
International Conference on Digital Printing Technologies | Year: 2014
The rheology of dense, aqueous pastes of soda-lime glass frit and a polysaccharide binder, designed for use in a recently developed glass 3D-printing process, is reported. Pastes containing either xanthan gum or 2-hydroxyethyl cellulose binder and glass frit with average particle sizes of either 38-63 μm or 150-250 μm were investigated using a controlled stress rheometer over an applied stress range of (10.66-942.2 Pa). The pastes exhibited yield behaviour followed by shear-thinning as the applied stress was increased, in a similar manner to highly concentrated polysaccharide solutions. The yield stress was found to be reduced for pastes containing xanthan gum binder and larger glass particles. The physical properties (Young's modulus, opacity and density) of glass produced by kiln-firing pastes used for glass 3D-printing are also reported. Paste composition was varied to investigate the effect of micro scale changes on the macro scale glass properties. The average glass particle diameter in the frit was varied in the range 38-250 μm and glass produced from 'pastes' containing frit-only, frit with binder and frit with binder and water were compared. © 2014 Society for Imaging Science and Technology.
Thomas M.R.,University of Bristol |
Hallett J.E.,University of Bristol |
Klein S.,HP Labs Bristol |
Mann S.,University of Bristol |
And 2 more authors.
Molecular Crystals and Liquid Crystals | Year: 2015
Stable suspensions of gold nanorods in 4-cyano-4′-pentylbiphenyl (5CB) have been prepared by capping the nanoparticles with polyethylene glycol (PEG). Small angle X-ray scattering has been used to characterize the orientational order of the gold nanorods and the properties of any aggregates. It was found that the nanorods had a very high degree of orientational order with respect to the director of the 5CB matrix and this could be redirected by an applied electric field at 2kHz. Two different PEG molecular weights were investigated and it was found that the lower (1.9kDa) gave exceptionally high order parameters, above 0.9. © 2015 Copyright Taylor & Francis Group, LLC.
Cuadrado F.,Queen Mary, University of London |
Navas A.,Technical University of Madrid |
Duenas J.C.,Technical University of Madrid |
Vaquero L.M.,HP Labs Bristol
Proceedings - IEEE INFOCOM | Year: 2014
Federated clouds can expose the Internet as a homogeneous compute fabric. There is an opportunity for developing cross-cloud applications that can be deployed pervasively over the Internet, dynamically adapting their internal topology to their needs. In this paper we explore the main challenges for fully realizing the potential of cross-cloud applications. First, we focus on the networking dimension of these applications. We evaluate what support is needed from the infrastructure, and what are the further implications of opening the networking side. On a second part, we examine the impact of a distributed deployment for applications, assessing the implications from a management perspective, and how it affects the delivery of quality of service and non-functional requirements. © 2014 IEEE.
Klein S.,HP Labs Bristol |
Avery M.,University of Bristol |
Adams G.,HP Labs Bristol |
Pollard S.,HP Labs Bristol |
Simske S.,HP Labs Fort Collins
HP Laboratories Technical Report | Year: 2014
Replication, or making exact copies with consistent results, is at the heart of manufacturing. It is used in mass production of all kinds of items, from foodstuff to cars, from houses to books. But it is also used to reproduce already existing objects. In the 18th and 19th centuries plaster casting was used to bring the wonders of the world to private collections and museums. In the cast court of the Victoria and Albert Museum in London, a life sized replica of Trajan's column  can be admired. The combination of a 3D scanner and printer offers the possibility of a new way to make a three dimensional copy of an existing object. Whereas in a plaster cast, where high fidelity is achieved by creating a physical mould from the original object, scanning does not require physical contact to the original. This can be an advantage when the object is fragile, but can lead to loss of fidelity during the reproduction process. We discuss the difficulties in achieving a truly high fidelity copy of even simple objects when a scanner and 3D printer are used for object replication. Copyright © 2014 Hewlett-Packard Development Company, L.P.
Wolter K.,Northumbria University |
Reinecke P.,HP Labs Bristol |
Krauss T.,Free University of Berlin |
Happ D.,Free University of Berlin |
Eitel F.,Free University of Berlin
Proceedings - Winter Simulation Conference | Year: 2012
In this paper we analyze the quality of wireless data transmission. We are primarily interested in the importance of the distance between sender and receiver when measuring data loss rate and the length of lossy and loss-free periods. The ultimate purpose of this type of study is to quantify the effects of mobility. We have sampled data and find that distance certainly is an important indicator but the loss rate of packets is also determined by other factors and does not always monotonically increase with the distance. We further find that while the distribution of the length of lossy periods mostly shows an exponential decay the distribution of the length of loss-free periods does not even always monotonically decrease. Both, the packet loss probability and the distribution of the length of loss-free periods can be well represented using probabilistic models. We fit simple Gilbert-Elliot models as well as phase-type distributions to the data using different fitting tools and provide loss models that can easily be used in simulation and testbed studies. © 2012 IEEE.
Haber S.,HP Labs Princeton |
Horne W.,HP Labs Princeton |
Manadhata P.,HP Labs Princeton |
Mowbray M.,HP Labs Bristol |
Rao P.,HP Labs Princeton
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2013
A capturing group is a syntax used in modern regular expression implementations to specify a subexpression of a regular expression. Given a string that matches the regular expression, submatch extraction is the process of extracting the substrings corresponding to those subexpressions. Greedy and reluctant closures are variants on the standard closure operator that impact how submatches are extracted. The state of the art and practice in submatch extraction are automata based approaches and backtracking algorithms. In theory, the number of states in an automata-based approach can be exponential in n, the size of the regular expression, and the running time of backtracking algorithms can be exponential in ℓ, the length of the string. In this paper, we present an O(ℓc) runtime automata based algorithm for extracting submatches from a string that matches a regular expression, where c > 0 is the number of capturing groups. The previous fastest automata based algorithm was O(nℓc). Both our approach and the previous fastest one require worst-case exponential compile time. But in practice, the worst case behavior rarely occurs, so achieving a practical speed-up against state-of-the-art methods is of significant interest. Our experimental results show that, for a large set of regular expressions used in practice, our algorithm is approximately twice as fast as Java's backtracking based regular expression library and approximately twenty times faster than the RE2 regular expression engine. © 2013 Springer-Verlag Berlin Heidelberg.