DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations

The Latest Big Data Topics

article thumbnail
Internet of Doom: The Security Vulnerabilities of Connected Devices
Security in the Internet of Things is a fairly common concern these days - you know, Heartbleed, toasters, that kind of thing - but you may not even have considered the greatest threat to your connected devices: classic 1990s first person shooters. That's the scenario presented in this recent experiment from Context Information Security. By taking advantage of a web interface that require no user authentication, the Context team managed to get Doom up and running on a Canon Pixma printer. Obviously Doom is not the point in itself, so much as an illustration of the vulnerability, but it definitely gets the idea across. According to Michael Jordon at Context, the vulnerability was fairly serious: At first glance the functionality seems to be relatively benign, you could print out hundreds of test pages and use up all the ink and paper, so what? The issue is with the firmware update process. While you can trigger a firmware update you can also change the web proxy settings and the DNS server. If you can change these then you can redirect where the printer goes to check for a new firmware. So what protection does Canon use to prevent a malicious person from providing a malicious firmware? In a nutshell - nothing... Jordon's post goes into detail on how the encryption was broken. Canon was contacted and informed of the problem, and responded that it would be fixed, but Jordon warns that it's not a unique scenario. While this particular technique is not currently a common concern, it demonstrates the reality of security concerns when it comes to IoT devices. Once everything is connected, how many devices will be vulnerable? How confident can we be that the creators of these devices will be cognizant of these issues? As a potential catch-all solution, Context offers a strange bit of advice: Context recommends that you do not put your wireless printers on the Internet, or any other ‘Internet of Things’ device. So, there you go - one way to be sure. The Internet of Things can't help but be secure if you get rid of that whole "Internet" part.
May 22, 2023
by Alec Noller
· 7,003 Views · 1 Like
article thumbnail
Intel Releases Edison Development Platform for IoT
if you've been looking forward to intel's edison development platform since it was announced, your time has come. at the idf 2014 keynote a few days ago, edison was released. intel has brought us iot. it's a slick little package. you can't read about it anywhere without hearing about how small it is - it's the size of a postage stamp, you see. it's small! (via anandtech ) if it's the specs you're looking for, intel can help . edison includes: ...a 22-nm intel® atom™ soc, formerly silvermont that includes a dual core, dual threaded cpu at 500 mhz and a 32-bit intel® quark™ processor mcu at 100 mhz... [and] 40 gpios and includes: 1 gb lpddr3, 4 gb emmc, and dual-band wifi and bluetooth® low energy... and it supports: ...development with arduino* and c/c++, followed by node.js, python, rtos, and visual programming support in the near future. it'll be retailing for $50. that's a pretty manageable hit to take in your iot budget - after all, it's just 1/7th the price of that shiny new apple watch .
May 22, 2023
by Alec Noller
· 6,008 Views · 1 Like
article thumbnail
Integration Key to IIoT Success
Lack of integration is responsible for IIoT failure.
September 12, 2019
by Tom Smith CORE
· 13,982 Views · 3 Likes
article thumbnail
Devs and Data, Part 2: Ingesting Data at High Velocity
We take a look at how developer and data pros ingest data and how they work with one of the Vs of big data, velocity.
February 22, 2019
by Jordan Baker
· 5,511 Views · 1 Like
article thumbnail
Improving Query Speed to Make the Most Out of Your Data
Our struggle with data warehouses when data becomes overwhelming.
February 16, 2023
by Junfei Liu
· 3,195 Views · 2 Likes
article thumbnail
Important Data Structures and Algorithms for Data Engineers
Explore important data structures and algorithms that data engineers should know, including their uses and advantages.
March 8, 2023
by Amlan Patnaik
· 4,548 Views · 2 Likes
article thumbnail
Importance of Kubernetes in IoT Applications
With Kubernetes, development teams can quickly validate, roll out, and deploy changes to loT services.
August 25, 2022
by Vidushi Gupta
· 4,782 Views · 2 Likes
article thumbnail
Implications of IoT for IT Professionals
Whether it’s for large enterprises or SMBs, IT professionals must commit to constant learning to find their place in the industry’s future
January 21, 2019
by William Chalk
· 10,458 Views · 4 Likes
article thumbnail
How Your Application Architecture Has Evolved
This post discusses how application architecture has evolved over the years. From monolithic, service-oriented, to microservices, and event-driven architecture (EDA)
October 11, 2021
by Himanshu Gupta
· 9,979 Views · 2 Likes
article thumbnail
How to Use TensorFlow in OpenWhisk: Sample Application
Learn how we used TensorFlow, OpenWhisk, and Kubernetes together to create a model that recognizes certain types of flowers.
December 5, 2017
by Niklas Heidloff CORE
· 3,992 Views · 2 Likes
article thumbnail
How to Test and Benchmark Database Clusters
In this post, we'll look at the best practices for NoSQL database benchmarking and a stress testing tool you can use to fail fast with your database projects.
February 2, 2022
by Peter Corless
· 3,711 Views · 4 Likes
article thumbnail
Using Refinitiv's Amazon EC2 Machine Image For a Real-Time Application
Learn how to set up and run an example application of Refinitiv's Amazon EC2 machine image .
Updated December 14, 2020
by Wasin Waeosri
· 23,874 Views · 10 Likes
article thumbnail
How to Set Up a Data Lake Architecture With AWS
Get started with your data lake with AWS.
October 7, 2019
by Gaurav Mishra
· 28,511 Views · 6 Likes
article thumbnail
How to Reduce Cloud Cost by 99% for EDA Kafka Applications
Learn how to save money on your cloud bill by switching from Kafka to another open-source Java queue implementation.
June 12, 2022
by Per-Åke Minborg
· 4,281 Views · 5 Likes
article thumbnail
How to Prepare for Your DevOps Interview
Here's the interview prep you should conduct to be ready for the DevOps hotseat.
Updated September 11, 2019
by John Taylor
· 48,186 Views · 15 Likes
article thumbnail
How to Make Chatbots More Intelligent With Contextual Intelligence
Are you looking for ways to make your chatbots more intelligent? Read here how Contextual Intelligence can help.
Updated August 4, 2020
by Amit Dua
· 6,753 Views · 5 Likes
article thumbnail
How to Integrate Arduino and Google Cloud Platform
Learn more about integrating Arduino and GCP in this beginner tutorial!
December 2, 2019
by Francesco Azzola CORE
· 34,860 Views · 5 Likes
article thumbnail
How to Get Started With the Smart Parking
Smart parking is an innovative and much-needed solution that can be easily fulfilled with IoT. Keep reading to know how you can get started.
December 28, 2022
by Kamal R
· 4,248 Views · 1 Like
article thumbnail
How to Fix a Humax HDR Fox T2 PVR That Will Not Stays Powered On
When you attempt to power on your Humax the standby orange light goes blue for a moment and then powers off automatically again — here's how to fix it!
December 11, 2019
by Merrick Chaffer
· 13,902 Views · 3 Likes
article thumbnail
Using Arduino's New Oplà Kit to Read Remote Sensors and Display the Data in Your Home
A tutorial using the Oplà Kit to have 2 different IoT devices communicate with each other. This is the third part of the articles about IoT, Heroku, and Arduino.
May 13, 2021
by Luca Cipriani CORE
· 16,898 Views · 3 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: