APPLICATION INFRASTRUCTURE

1NCE and Amazon Web Services join forces for a global IoT Platform

1NCE | January 04, 2022

1NCE and Amazon Web Services join forces for a global IoT Platform
Global IoT Carrier 1NCE and Amazon Web Services (AWS) join forces pushing forward the expansion of 1NCEs IoT platform on a global scale, bringing its cloud native IoT offering closer to its customers worldwide. The collaboration further aims to strengthen ties between the two companies and to develop the Next Level IoT Software speeding up global deployment of IoT projects.

1NCE has developed a unique software offering on AWS that enables IoT developers to quickly integrate cellular IoT connectivity into their own solutions with plug & play functionalities.

The collaboration allows for the expansion of the 1NCE IoT platform via AWS infrastructure globally, significantly increasing its overall platform performance. It will literally bring the 1NCE IoT platform closer to its customers, wherever they are.

"This intensified engagement with AWS also allows us to boost our network and IoT software portfolio at greatly improved conditions and with the appropriate know-how,We can leverage synergies between the AWS infrastructure and our IoT platform which helps us to develop our next Level IoT Software at low costs. This is a prerequisite to implement new features into our existing IoT Flat Rate offering, like protocol conversion, energy management and localization services."

Younes Allaki, Chief Technology Officer (CTO) at 1NCE

1NCE is a global IoT powerhouse funded by Softbank and the German Telecommunication giant Deutsche Telekom with direct access to its networks and roaming partners via 2G, 3G, 4G, LTE, NB-IoT and LTE-M in over 100 countries worldwide. 1NCE enables business customers to easily connect their IoT devices for 10 US$ for 10 years.

With its IoT Flat Rate offering 1NCE has proven to be a real disruptor within the IoT world, 1NCE is leveraging AWS to deliver reliable IoT services by combining secure connectivity with sophisticated software applications.

Due to its close relationship with Deutsche Telekom and Amazon Web Services, 1NCE has obtained a leading position in costs and features counting more than 7,000 customers and 10 million managed connections to date. With "1NCE For All" customers can order up to 100 SIM cards for free exclusively at AWS Marketplace. 1NCE is showcasing its IoT services at this year's CES in LAS Vegas from January 5-7 at booth 10343.

ABOUT 1NCE

1NCE - the inventor of the "IoT Flat Rate" - is a global IoT platform carrier offering fast, secure, and reliable cellular connectivity and software services in more than 100 countries worldwide. 1NCE cooperates with Deutsche Telekom AG and its roaming partners to support all common mobile communication standards such as 2G, 3G, 4G, 5G, NB-IoT and LTE-M.

The 1NCE IoT Flat Rate is designed to last over the entire lifetime of an IoT device with a one-off payment. This makes IoT applications for use cases like smart metering, asset tracking or vehicle telematics affordable and scalable. 1NCE also offers its technology to mobile platform operators as a Platform-as-a-Service solution. The company - headquartered in Cologne, Germany - was founded in 2017 together with Deutsche Telekom AG and has 150 staff in Cologne, Hamburg, Amsterdam, London, Rome, Paris, Warsaw, Hong Kong, and Riga.

Spotlight

Composable Infrastructure is a comprehensive, rack-scale compute environment that further improves performance, efficiency and agility over existing solutions such as Converged Infrastructure (CI) and Hyperconverged Infrastructure (HCI). To help those evaluating composable infrastructures, Evaluator Group has today announced the expansion of research to cover multiple composable infrastructure solutions.

Spotlight

Composable Infrastructure is a comprehensive, rack-scale compute environment that further improves performance, efficiency and agility over existing solutions such as Converged Infrastructure (CI) and Hyperconverged Infrastructure (HCI). To help those evaluating composable infrastructures, Evaluator Group has today announced the expansion of research to cover multiple composable infrastructure solutions.

Related News

SolarWinds Updates APM for Enhanced Visibility into the IT Infrastructure

SolarWinds | June 20, 2020

AppOptics service map within SolarWinds APM Suite now enables DevOps teams to visualize dynamic relationships between services and their dependencies. The goal is to make it easier to conduct root cause analysis at a time when the dependencies between software and infrastructure have never been greater or complex. In many cases, IT teams today are relying on separate tools to monitor applications and IT infrastructure. Jim Hansen, vice president of products for application management at SolarWinds, said the AppOptics service map within SolarWinds APM Suite now enables DevOps teams to visualize dynamic relationships between services and their dependencies. IT teams can view metrics such as average latency, requests per minute, error rate and CPU usage as time series data within a service trace topology. The goal is to make it easier to conduct root cause analysis at a time when the dependencies between software and infrastructure have never been greater or complex. DevOps teams can view which services and dependencies are causing resource constraints, surface unknown dependencies and misconfigurations in services and determine how business transactions are flowing across application services, said Hansen. Hansen noted that in the wake of the economic downturn brought on by the COVID-19 pandemic there is a lot more interest in reducing the total cost of IT. Read more: REELING FROM RANSOMWARE ATTACK, EHEALTH SASKATCHEWAN SAYS RESTRUCTURING IT INFRASTRUCTURE SolarWinds has also added a web transaction recorder to its Pingdom monitoring tool to capture how an end user interacts with a web application without requiring developers to write and deploy scripts. ~ Jim Hansen VP SolarWinds In many cases, IT teams today are relying on separate tools to monitor applications and IT infrastructure, which often not only results in higher costs but also fails to provide enough context, he said. At the same time, responsibilities within IT teams are converging. According to a recent survey of 227 IT professionals in North America conducted by SolarWinds, 54% of respondents said they are spending more time managing applications and services than infrastructure and hardware. The survey also notes there are more IT teams than ever using log analytics (58%) and tracing (24%). SolarWinds has also added a web transaction recorder to its Pingdom monitoring tool to capture how an end user interacts with a web application without requiring developers to write and deploy scripts. The recorder captures each step made during a transaction and automatically translates the information into a script that can automatically play back, said Hansen. The challenge is making it possible for IT teams to apply APM services more broadly even when consumption of those services scales up and down in ways that are not always predictable, noted Hansen. Finally SolarWinds has enhanced its Loggly tool, adding the ability to automate indexing and parsing to deliver time to value faster, he said. Hansen said SolarWinds via its software-as-a-service (SaaS) platform, is trying to make APM simultaneously more affordable and accessible. The challenge is making it possible for IT teams to apply APM services more broadly even when consumption of those services scales up and down in ways that are not always predictable, noted Hansen. There are no shortages of options when it comes to APM platforms these days, and most are accessed via SaaS platforms. SolarWinds has been making the case for an APM service that costs substantially less than rivals while providing most of the functionality required by the average IT team. Many teams have limited their adoption of APM platforms to only their most mission-critical because of the cost involved. As APM services become more affordable, there should be a corresponding increase in reliance on APM services at a time when IT is becoming more complex to manage daily. Read more: BITBOX USA, EDGEMICRO CONTINUE THEIR PARTNERSHIP TO OPTIMIZE DISTRIBUTED EDGE INFRASTRUCTURE MANAGEMENT

Read More

APPLICATION INFRASTRUCTURE

Anuket, an open source project to accelerate compliance with infrastructure, interoperability and 5G deployments, is being launched by LF Networking.

prnewswire | January 27, 2021

LF Networking (LFN), which encourages joint effort and operational greatness across open source organizing projects, today declared the making of the Anuket project. A consolidation of CNTT (The Cloud iNfrastructure Telco Taskforce, which gave reference models and structures to both virtual machine and containerized network capacities) and OPNFV (the Open Platform for NFV, which diminished chance to coordinate and convey NFV framework and installed VNF/CNFs), Anuket apparatuses and antiquities engage the worldwide interchanges local area to convey agreeable organization benefits quicker, more dependably and safely, and quicken the change to cloud local foundations. Anuket conveys normalized reference foundation details and conformance structures for virtualized and cloud local organization capacities, empowering quicker and more powerful onboarding into creation, lessening costs, and quickening telecom computerized change. By proceeding with OPNFV's tradition of working upstream with cooperation across other open source projects, (for example, LF Networking, LF Edge, CNCF, LF AI, ODIM and other industry associations and norms bodies) and CNTT's administrator center, the undertaking guarantees innovation meets business and operational requirements. Anuket will likewise protect CNTT's nearby working relationship with GSMA, who will keep on distributing the undertaking's Reference Model work. "It's incredible to see the evolution of what began as the Open Platform for Network Functions Virtualization over six years ago," said Heather Kirksey, vice president of Community and Ecosystem Development at the Linux Foundation. "With Anuket, we are making it easier and more efficient for CSPs to transform their networks and save money, with one, end-to-end platform." "The Anuket project is unique in covering Operator requirements collection and normalisation, subsequent open-source software development, through to Industry certification programs of ecosystem implementations, all under a single initiative," said Walter Kozlowski, Anuket Technical Steering Committee co-chair and Principal, Cloud Infrastructure Architecture, at Telstra. "I am proud to serve in the role of a co-chair of its Technical Steering Committee, and I am excited by the unique opportunity this project creates for my company and for the whole industry, in the area of network transformation and related telco open infrastructure."

Read More

Hackers Using Google's Cloud Infrastructure to Dupe Users with Phishing Emails

Google | June 02, 2020

According to Cyware, researchers at Trustwave recently discovered numerous hackers infecting users with malware by targeting them via Google's Cloud infrastructure. By leveraging Google Cloud’s infrastructure in their campaigns, threat actors have attached Google Firebase storage URLs to various phishing emails. Once a user clicks on the Firebase link in the email, they are directed to a fake login page that requests their login credentials. According to Cyware, researchers at Trustwave recently discovered numerous hackers infecting users with malware by targeting them via Google's Cloud infrastructure. A number of phishing campaigns uncovered by the team of researchers found that threat actors are using Google Firebase storage URLs to dupe users into giving up their login credentials. By leveraging Google Cloud’s infrastructure in their campaigns, threat actors have attached Google Firebase storage URLs to various phishing emails. Once a user clicks on the Firebase link in the email, they are directed to a fake login page that requests their login credentials. Once an unsuspecting user has entered their credentials, she fake page shares them with the hackers. Per Trustwave: “This phishing campaign although low in volume seems to be targeting a range of industries, as well as being detected by our spam traps. Some exemplar phishing messages used in this campaign are illustrated here. The major themes include payment invoice, upgrade email account, release pending messages, verify account, account error, change password, etc.” Trustware also observed threat actors using the coronavirus pandemic and internet banking lures to trick victims into accessing fake vendor-payment forms designed to harvest users’ login credentials. Other tactics the hackers used included Microsoft Outlook and Office 365 phishing pages that harvest corporate login credentials. Read more: NET ONE SYSTEMS ADOPTS JUNIPER'S CONTRAIL ENTERPRISE SOLUTION TO FURTHER NETWORKING INFRASTRUCTURE The use of cloud infrastructure is gaining popularity among cyber criminals as they are not easily flagged by security controls, Cyware explained, adding, Because of the large user base of Google cloud services, such phishing emails can often be overlooked by the security teams. ~ Google The use of cloud infrastructure is gaining popularity among cyber criminals as they are not easily flagged by security controls,” Cyware explained, adding, Because of the large user base of Google cloud services, such phishing emails can often be overlooked by the security teams. To combat such phishing attempts, individuals and tech leaders should ensure that they’re up to date on hackers’ latest endeavors. As one might imagine, the more knowledgeable a user is, the better prepared they are to avoid falling victim to nefarious phishing campaigns. Hackers have been abusing Google’s cloud computing service to redirect and intercept web and mail traffic on an array of vulnerable consumer routers. Google Cloud’s infrastructure in their campaigns, threat actors have attached Google Firebase storage URLs to various phishing emails. Once a user clicks on the Firebase link in the email, they are directed to a fake login page that requests their login credentials. The fraudulent emails cut through industries to take control of the Firebase’s data storage API in a Google Cloud Storage bucket and secretly keep malicious URLs in phishing emails, which then direct users to fraudulent pages. Fahim Abbasi, a researcher at Trustware, spoke about these phishing campaigns in his blog post and mentioned, while these campaigns deployed common phishing baits, the adoption of Google Firebase storage URLs made them look unique and authentic. He added, actors have taken undue advantage of Google’s reputation and cloud infrastructure to carry out phishing credential harvesting pages. Additionally, Abbasi also presented about nine examples with major themes of the phishing campaigns, which include release pending messages, payment invoice, verify account, upgrade email account, change password, account error, and several other similar to these. Google Cloud Platform (GCP), offered by Google, is a suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products, such as Google Search, Gmail and YouTube. Alongside a set of management tools, it provides a series of modular cloud services including computing, data storage, data analytics and machine learning. Registration requires a credit card or bank account details. Google Cloud Platform provides infrastructure as a service, platform as a service, and serverless computing environments. In April 2008, Google announced App Engine, a platform for developing and hosting web applications in Google-managed data centers, which was the first cloud computing service from the company. The service became generally available. Since the announcement of the App Engine, Google added multiple cloud services to the platform. Read more: COVID-19 HAS ACCELERATED THE LONG-DUE INVESTMENTS INTO DIGITAL INFRASTRUCTURE

Read More