Archive for RB

Car Technology

GM Ventures Invests in Powermat

GM logoXconomy – Detroit reports that GM Ventures, the Detroit -based car maker’s venture capital arm has invested $5 million in Powermat the Commerce Township, MI start-up. A multiyear, multimillion-dollar deal with Powermat gives General Motors (GM) exclusive rights to place the company’s portable-device charging technology in its cars for a year. according to Micky Bly, the company’s director of hybrid vehicles. The Chevy Volt and certain Cadillac models will be the first GM cars to the Powermat accessories. The New York Times reports that at this year’s CES GM demonstrated four wireless charging positions in the Chevy Volt.

GM Ventures has also invested in Indiana-based electric car startup Bright Automotive and Ann Arbor-based battery developer Sakti3. Also, see this earlier post.

Car Theft by Antenna

Keyless entryMIT’s Technology Review reports that researchers at ETH Zurich in Switzerland have successfully attacked passive keyless entry and start systems from eight different car manufacturers’. The researchers examined 10 car models from eight manufacturers. They were able to take all 10 by intercepting and relaying signals from the cars to their wireless keys because the key transmits its signals up to around 100 meters. The attack works no matter what cryptography and protocols the key and car use to communicate with each other.

The researchers tested a few scenarios. An attacker could watch a parking lot and have an accomplice watch as car owners entered a nearby store. The accomplice would only need to be within eight meters of the targeted owner’s key fob, making it easy to avoid arousing suspicion. In another scenario, a car owner might leave a car key on a table near a window. An antenna placed outside the house was able to communicate with the key, allowing the researchers then to start the car parked out front and drive away.

The researchers concluded that manufacturers will need to add secure technology that allows the car to confirm that the key is in fact nearby.

New Standard for Automotive-Grade Wireless Modules

Connected carSierra Wireless (SWIR) recently introduced what the firm calls, the industry’s first suite of embedded wireless technology modules designed specifically for automotive manufacturers. The Canadian firm is banking on the emerging trend to include telematics, infotainment, navigation assistance, and remote diagnostics in new cars within the next few years according to an article on ITNewsLink.com. The firm believes these applications will need reliable built-in connections to cellular networks. The new Sierra Wireless modules will use 2G and 3G network technologies and frequency bands used worldwide to provide the connectivity customers are demanding.

The manufacturer says these units are the first wireless modules developed from the ground up to achieve compliance with automotive specifications.  ITNewsLink.com says the Sierra Wireless AirPrime AR Series design encompasses:

  • Tolerance for up to 1,000 thermal shock cycles
  • Full certification with ISO 9001:2000 quality standards and ISO/TS 16949:2002 manufacturing processes
  • Extended operating temperature range from -40 to 85 degrees Celsius
  • Compliance with multiple automotive manufacturing and quality processes including AQPQ, PPAP, PCN, and 8D
  • Solder-down form factor and optional Embedded SIM to create a more reliable and less expensive solution
  • An open platform for custom application development, including dedicated APIs for telematics applications.

Wireless Car Sensors Vulnerable to Hackers

Wireless Car Sensors Vulnerable to HackersMIT’s Technology Review reports that hackers could “hijack” the wireless pressure sensors built into many cars’ tires, researchers have found. Criminals might then track a vehicle or force its electronic control system to malfunction, the University of South Carolina and Rutgers University researchers say. The team successfully hijacked two popular tire-pressure-monitoring systems (TPMS).

As automakers add more technology and computers to cars and connect those computers to critical components, in-car systems will need to be secured against hackers, experts warn.

The systems tested by the South Carolina-Rutgers team had very little security in place–they mainly relied on the communications protocol is not widely published. “In doing TPMS this way, [automakers] have left the door open to wireless attackers,” says Travis Taylor, one of the researchers. The team could eavesdrop on communications and, in some circumstances, alter messages in transit. That let the team give false readings to a car’s dashboard. They could also track a vehicle’s movements using the unique IDs of the pressure sensors, and even cause a car’s ECU to fail completely.

“Normally, these [attacks would] result in small problems,” Mr. Taylor says. “But I see practical danger and damage that can happen from TPMS exploitation.” “The security and privacy problems that the researchers identify in TPMS systems are likely just one among many that will challenge the automotive industry in the years to come,” says Stefan Savage, a UC San Diego professor of computer science and engineering.

Ford Installs Sync Software via Wi-Fi

Ford Installs Sync Software via Wi-FiThe Detroit Bureau reports that Ford is the first automaker to use Wi-Fi to send software to vehicles along an assembly line. The automaker is sending infotainment software to Wi-Fi enabled MyFord Touch-equipped vehicles like the Edge.

Ford installed  Wi-Fi technology at its Oakville, Ontario, plant where it builds the Ford Edge and Lincoln MKX. Next up for Wi-Fi updates will be the upcoming Ford Explorer, built in Chicago, and then plants that build the Focus around the world.

Wi-Fi capability eliminates the need for building, stocking multiple SYNC hardware modules, thus reducing manufacturing complexity and saving cost.  “Using wireless software installation via Wi-Fi, we can stock just one type of SYNC module powering MyFord Touch and loaded with a basic software package,” explained Sukhwinder Wadhwa, SYNC global platform manager. “We eliminate around 90 unique part numbers, each of which would have to be updated every time a change is made – this system really boosts quality control.”

“Turning an assembly plant – with steel beams everywhere and high-voltage cabling throughout; everything you could imagine that would interfere with a radio signal – into an access point that would achieve 100 percent success was a huge challenge,” Mr. Wadhwa said.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

China Creates Cloud Computing City

China Creates Cloud Computing CityComputerWorld says that China is employing IBM (IBM) to help it build a city-sized cloud computing center based in northern China’s Hebei Province. The cloud computing center is being built in Langfang, a city between Beijing and Tianjin in the new Langfang Range International Information Hub, IBM spokeswoman Harriet Ip told ComputerWorld. The complex will open in 2016 and be comparable in size to the Pentagon.

IBM will be supplying its data design services, while the Chinese firm Range Technology Development, (Google translation) an Internet data center services provider, founded in 2009, will also be working on the project. There will initially be seven low-slung data centers, spanning up to one million square feet, with room for three more units on either side. There are reports that it includes a residential area, most likely for the staff working at the data centers. A ComputerWorld article says the facility will mainly serve government departments from China’s capital and across the country, but will also be open to banks and private enterprises.

ChinaComputerWorld cites IDC data that says despite such large-scale projects, China’s IT budget is five times lower than the US’s. IDC says China’s IT budget is growing at a higher pace than in the US. The research house days China’s full-year growth for 2011 will be $112 billion, while the US IT market will be $564 billion.

China’s IT industry isn’t that big at this point and “there is a lot of reliance on the vendors” to design data centers, Dale Sartor, an engineer at the U.S. Department of Energy’s Lawrence Berkeley National Laboratory, visited about eight data centers in China last year told ComputerWorld. Mr. Sartor expects to see accelerating data center development in China, particularly involving very large centers delivering cloud services. Large data centers may soon be the norm. DoE, Sator  says,

I got a sense that the cloud is going to be huge in China for both efficiency reasons as well as the ability to control … If everything was cloud computing and the government owns it, it’s much easier to keep your finger on the Internet and other issues than [by using] a very distributed model.

China’s rapid IT growth has been a plus for IBM, which said its growth in that country in 2010 was up 25% over the year before. According to ComputerWorld, IBM’s data-center business in China has tripled in the last four years. In 2010, China overtook Japan as IBM’s second-largest data center market, with the U.S. as the company’s number one market.

In terms of size, the data centers will be among the world’s biggest. The largest known data center complex is a 1.1-million-square-foot facility in Chicago owned by Digital Realty Trust, according to Data Center Knowledge, which has ranked the data centers by size.

rb-

Not the same Cloud City that Lando Calrissian ran.

 

Is your data center that big?

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Wireless Charging Amped Up

Wireless Charging Amped UpThose of us tired of dealing with tangled cord and bulky wall warts may get some relief in the near future. iSuppli Corp. is predicting that a flood of new electronic gizmos with wireless charging capabilities will be inundating the market. The market research firm believes that the global market for wireless charging devices for smartphones like the RIM (RIMM) Torch, tablet computers such as the Apple (AAPL) iPad2 media players like the Apple iPod Touch will drive the global market for wireless charging devices to 234.9 million units in 2014, up 65% from 3.6 million in 2010, according to iSuppli.

iSuppli table Tina Teng, senior analyst for wireless research at iSuppli told Itnewslink.com, “Over the next five years, wireless charging devices will find their way into an increasing number of applications, including mobile phones, portable media players, digital still cameras, and mobile PCs.”

Mobile phones will drive wireless charging acceptance according to Ms. Teng, ” …mobile phones will contribute the largest share of revenue to wireless charging-not only because of the large volume of mobile devices expected to benefit from the technology, but also because of participation by name brands in manufacturing the device, providing much-needed market recognition in the process.”

“Genius of Electricity,” 1915, Gilded Bronze, Bedminster, NJ. Photography Lee sandstead"Despite the optimism, iSuppli believes there are still barriers to the widespread adoption of wireless charging. Manufacturers will have to make wireless charging in their devices down to the circuit board level which will drive down costs. The wireless charging industry will need to adopt a common standard to ensure interoperability among products. Currently, all products are proprietary. Skins made by one company, will not work with the charger pad of another. “Until the industry finds a standard to follow, the wireless charging industry will be fragmented, and consumers will hesitate to adopt any solution that could be compromised by the rival companies,” Itnewslink.com quotes Ms. Teng, “However, an open, standardized system will create a healthier competitive environment and prompt manufacturers to join forces-which will enhance consumer awareness and lead to adoption in the markets.”

There are four wireless charging technologies. The wireless charging technologies include Near-field magnetic resistance, Far-field magnetic resistance, Conductive magnetic resistance, and Inductive magnetic resistance wireless charging systems.

  • Far-field magnetic resonance, a technology that has raised safety as well as health concerns and for which no commercial products are available for the time being.
  • Inductive wireless charging uses the principle of electromagnetic induction where current generated from the induced magnetic field in the receiver coil charges devices is the most widely wireless charging technology adopted by the value chain.  the technology enjoys wide support from semiconductor vendors, device manufacturers, accessories makers as well as retailers according to the Wireless Design and Development website. The most successful proponent of magnetic induction is Powermat, a Michigan-based company which I wrote about in 2010, that also owned 62 percent share of the wireless charging market as reported by Wireless Design and Development.

iSuppli notes that most companies are not ready with commercial products yet, several high-profile manufacturers are looking at producing wireless charging solutions. The companies include Texas Instruments (TXN) and ST-Ericsson from the semiconductor side; Nokia Corp (NOK) and Research In Motion Ltd. from the device manufacturer side; and Logitech (LOGI) and Case-Mate from the accessory manufacturer side.

Product-specific wireless charging systems consist of a charger as well as a so-called “skin” or receiver sold for specific devices. These product-specific devices contrast with aftermarket solutions, which are universal chargers and various skins that can be used with multiple consumer electronics. Growth is also projected for aftermarket wireless charging, with revenue rising at a massive five-year Compound Annual Growth Rate (CAGR) of 133.4 percent.

Rats nest of cablesrb-

I hate the cluttered cluster of cables on my desk. The wireless chargers should clean up that mess, but until the manufacturers get their act together and build in some interoperability from the factory, they still got a problem.

What do you think?

Is wireless charging a practical technology?

Do you have a wireless charging rig?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Foxconn – The Empire Apple Made

Foxconn - The Empire Apple MadeFoxconn is now the biggest exporter out of China. The firm churns out products like iPads, iPhones and PlayStations for Americans. Among its clients are Apple, Cisco (CSCO), Dell, HP, IBM, Microsoft (MSFT), Nokia (NOK) and Sony (SNE). Most American consumers never head of Foxconn, which is also known as Hon Hai Precision Industry, until employees began to commit suicide by leaping off its buildings. However, the firm has a long history.

Apple Computers logoTerry Gou aka the ‘general’ founded Foxconn in 1974 with a $7,500 loan from his mother. According to a recent BusinessWeek article, his first world headquarters was a rented shed in a gritty Taipei suburb called Tucheng, which means Dirt City in Mandarin. Mr. Gou, then 23, had done three years of vocational training and served in the military. He then worked for two years as a shipping clerk, where he got a firsthand view of Taiwan’s booming export economy and figured he ought to stop pushing paper and get into the game. With the cash from his mother, he bought a couple of plastic molding machines and started making channel-changing knobs for black-and-white televisions. His first customer was Chicago-based Admiral TV, and he soon got deals to supply RCA, Zenith, and Philips (PHG).

Atari 2600Mr. Gou’s first step into American consumer electronics came in 1980 when he started supplying Atari with connectors that linked the joystick cable to its 2600 video-game console. At the height of the Atari craze, Hon Hai was producing connectors for the 15,000 video-game consoles that Atari’s Taiwanese plant made daily. BusinessWeek says Mr. Gou wasn’t content to be a mere supplier of dumb parts. He applied for patents on the technology his company developed, and he kept pressing into new areas.

In the early ’80s, Mr. Gou took an 11-month tour of the U.S. covering 32 states, during which he dropped in on companies unannounced. BuisnessWeek reports that during this trip, he spent three days in Raleigh, N.C., motel close to an IBM (IBM) facility to get an appointment after which he came away with a firm order for connectors. “He is really one of the top sales guys in the world,” Max Fang, the former head of procurement for Dell in Asia who did business with Mr. Gou and was his regular golf partner told BuisnessWeek. “He is very aggressive and always on your tail.”

IBM logoMr. Gou was early to recognize that China offered an almost limitless supply of cheap labor and was not deterred by the primitive infrastructure or the Communist government. He set up shop in a suburb of Shenzhen across the border from Hong Kong.  In 1991, Mr. Gou listed Hon Hai Precision on the Taiwan Stock Exchange to fund expansion, mostly into China. By 1996, Mr. Gou told BuisnessWeek, it was clear to him that China would become a manufacturing juggernaut, and he started investing heavily in his facilities at Longhua Science & Technology Park aka “Foxconn City.”

Compaq logoIn 1996, Mr. Gou offered to build the chassis for Compaq‘s desktop computers at a fraction of what it would cost Compaq to do the job itself.  “He had this vision and the guts to do anything in a big way,” Mr. Fang is quoted in BuisnessWeek. “When I first visited the factory, I saw the whole value chain nicely and effectively designed, starting from a big coil of sheet metal at one end that was cut, formed, welded, and stamped to make the top and bottom of the chassis. Then they did the in-line subassembly, adding a floppy drive, the power supply, and cables. It was all shipped to customers who only had to install the motherboard, CPU, memory, and hard drive. After this revolution by Terry, final computer assembly was easy.”

BuisnessWeek says that to sustain an efficient Chinese workforce, Mr. Gou quickly discovered that he had to offer housing, food, and health care, additional costs that kept most of his competitors out of the country. He had to do everything himself. Michael Marks, then chief executive officer of contract-manufacturing giant Flextronics (FLEX), saw Foxconn’s Shenzhen operations taking shape in the late 1990s, “They were making wire out of ingots of copper,” says Mr. Marks. “They had chicken farms to lay the eggs for the cafeteria. One building had 2,000 toolmakers. We had none at the time. But we did after that.”

Dell logoFoxconn was transforming the industry. It was shipping bare-bones computers to IBM, Hewlett-Packard (HPQ), and Apple (AAPL). In 1998, when Mr. Gou won his first order from Dell (DELL) to make the chassis for its desktops, Dell insisted he do it in the U.S., close to the final market. “I bought a company in Kansas City. We quickly needed tooling shops and stamping,” Mr. Gou told BuisnessWeek. “That factory was a money loser, but Terry had to build it to accommodate Dell against his own will,” recalls Mr. Fang. “For Foxconn, it bought a ticket into the Dell business.”

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Digital Ants May Secure Networks

Researchers have developed “digital” ants to defend networks from worms and other malware. According to DarkReading scientists from Wake Forest University and the Department of Energy’s Pacific Northwest National Laboratory in Washington state have worked together on the project that mimics the defensive behavior of ants. The researchers developed thousands of different types of digital ants that move through a computer network and search for evidence of a malicious threat.

Digital antsWhen a digital and detects a threat it leaves behind a “scent” or marker to attract other ants, like real ants. Other ants then follow the trail to swarm a potential infection with “swarm intelligence. TechRepublic explains that digital Swarm Intelligence consists of three components:

  • Digital ant: Software designed to crawl through computer code, looking for evidence of malware. There will be 3000 different types of Digital Ants employed.
  • Sentinel is the autonomic manager of digital ants congregated on an individual computer. It receives information from the ants, determines the state of the localhost, and if any further action is required. It also reports to the Sergeant.
  • Sergeant is an autonomic manager of multiple sentinels and is the interface with human supervisors. The size of the network determines the number of Sergeants required.

Like their biological counterparts, each individual ant is not very bright. “We are using the ants to sense something very basic, like a connection rate,” said Errin Fulp, a professor of computer science at Wake Forest. There are about 60 technical details the digital ants can detect and leave a tiny digital trail that says something unusual is going on here, and that other ants should check it out .”Then we collect that evidence which points us to a particular infection or security threat,” said Mr. Fulp.

The swarm intelligence approach to finding specific threats is intended to provide better and quicker detection of threats than current anti-malware software can perform. The researchers developed software capable of running multiple security scans contiguously, with each scan targeting a different threat according to the article. It’s also better able to handle morphed versions of malware, according to the research.

“In nature, we know that ants defend against threats very successfully,” Mr. Fulp, says in DarkReading. “They can ramp up their defense rapidly, and then resume routine behavior quickly after an intruder has been stopped. We were trying to achieve that same framework in a computer system.”

In a test of the technology, the digital ants were able to discover a real computer worm planted by Wake Forest on a network of 64 computers in the lab.

Our idea is to deploy 3,000 different types of digital ants, each looking for evidence of a threat,” Fulp says. “As they move about the network, they leave digital trails modeled after the scent trails ants in nature use to guide other ants. Each time a digital ant identifies some evidence, it is programmed to leave behind a stronger scent. Stronger scent trails attract more ants, producing the swarm that marks a potential computer infection.

The researchers say the digital ant method works best for big networks with a large number of identical machines. And digital ants can’t take over your machine, either: they have to report back to the humans who control their “colony.”

rb-

aardvark chasing antSoooo, computers are going to go from having a bad case of worms to having a case of ants in their pants? Will the ants fall victim to Ant eater malware?

The research seems like a remake of the “good viruses” or “anti-virus viruses” idea that people outside the anti-virus industry mainstream bring out from time to time.

If this idea is commercially viable, they have some obvious advantages, compared to static anti-virus programs:

Digital ants do not consume large amounts of computer resources,

Digital ants do not need lengthy, process-hogging scans.

There’s no need to constantly update digital ants because they adapt to malicious code variants

What do you think?

Are the mainstream anti-malware firms creative enough?

Will digital ants work?

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.