Community



  • Jack Erickson's Blog

    Jack Erickson's Blog

    Is Big Brother Watching You?
    Published. February 21, 2018

    I recently came across a fascinating piece by Paramal Satyal . He is Nepalese although these days he seems to live in France. His piece is largely autobiographical, but what caught my eye was a bit in the middle where he looks at one of the most ordinary web pages he can find. The Le Monde Experiment He took a look at a very unexceptional web page on the Le Monde website: Astronomie : la sonde Juno s’est mise en orbite autour de Jupiter . Yes, it's in French, but you don't need to know...


  • Jason Andrews Blog

    Jason Andrews Blog

    Is Big Brother Watching You?
    Published. February 21, 2018

    I recently came across a fascinating piece by Paramal Satyal . He is Nepalese although these days he seems to live in France. His piece is largely autobiographical, but what caught my eye was a bit in the middle where he looks at one of the most ordinary web pages he can find. The Le Monde Experiment He took a look at a very unexceptional web page on the Le Monde website: Astronomie : la sonde Juno s’est mise en orbite autour de Jupiter . Yes, it's in French, but you don't need to know...


  • Joseph Hupcey Blog

    Joseph Hupcey Blog

    Is Big Brother Watching You?
    Published. February 21, 2018

    I recently came across a fascinating piece by Paramal Satyal . He is Nepalese although these days he seems to live in France. His piece is largely autobiographical, but what caught my eye was a bit in the middle where he looks at one of the most ordinary web pages he can find. The Le Monde Experiment He took a look at a very unexceptional web page on the Le Monde website: Astronomie : la sonde Juno s’est mise en orbite autour de Jupiter . Yes, it's in French, but you don't need to know...


  • Tom Anderson's Blog

    Tom Anderson's Blog

    Is Big Brother Watching You?
    Published. February 21, 2018

    I recently came across a fascinating piece by Paramal Satyal . He is Nepalese although these days he seems to live in France. His piece is largely autobiographical, but what caught my eye was a bit in the middle where he looks at one of the most ordinary web pages he can find. The Le Monde Experiment He took a look at a very unexceptional web page on the Le Monde website: Astronomie : la sonde Juno s’est mise en orbite autour de Jupiter . Yes, it's in French, but you don't need to know...


  • Tech Deseign Forums Blog

    Tech Deseign Forums Blog

    Arm to push integrated SIM for secure IoT
    Published. February 21, 2018

    Arm plans to use its cryptography cores and technology from its Simulity Labs acquisition to SIM-based security into IoT devices....


  • Barr Code

    Barr Code

    C: The Immortal Programming Language
    Published. February 22, 2018

    Barr Group’s 2018 Embedded Systems Safety & Security Survey is now closed and I am in the midst of analyzing the data. This year a portion of my analysis is focused on multi-year trends. One trend that really stands out to me is that the C programming language refuses to give up the ghost. A […]...


  • Michael Jacobs Blog

    Michael Jacobs Blog

    Is Big Brother Watching You?
    Published. February 21, 2018

    I recently came across a fascinating piece by Paramal Satyal . He is Nepalese although these days he seems to live in France. His piece is largely autobiographical, but what caught my eye was a bit in the middle where he looks at one of the most ordinary web pages he can find. The Le Monde Experiment He took a look at a very unexceptional web page on the Le Monde website: Astronomie : la sonde Juno s’est mise en orbite autour de Jupiter . Yes, it's in French, but you don't need to know...


  • Linux and Open Source

    Linux and Open Source

    ?Bogus Linux vulnerability gets publicity
    Published. February 19, 2018

    No, there's not a new security hole that gives attackers complete control over Linux servers. But, if you use a poor password, yes, you can still get hacked. Imagine!...


  • Consumerization: BYOD

    Consumerization: BYOD

    I think I'm endangered in Internet :(
    Published. February 17, 2018

    This is my 1st post on this Forum - Hello My Name is Michael and I'm from Poland :)I have a question about security in Internet.I'm active user of Internet and I have now some anxiety, maybe unjustified, but I have :(I'm logged in webbrowser on my Google (Gmail) account ......


  • MyEclipse

    MyEclipse

    Angular 5 Authentication: Getting Started
    Published. February 6, 2018

    In this tutorial, we are going to build an Angular 5 authentication system using Google’s Cloud Firestore. Most of the applications we build require some kind of authentication, and the simplest and fastest way to get started with that is by using the Firestore – a flexible, scalable database for mobile, web and server development. […] The post Angular 5 Authentication: Getting Started appeared first on Genuitec....


  • Open Source Initiative blogs

    Open Source Initiative blogs

    Happy Anniversary—The Next 20 Years of Open Source Begins Today
    Published. February 3, 2018

    Open Source Software—yes, we did coin the term (thanks Christine Peterson) and started the movement—is software that can be freely used, changed, and shared (in modified or unmodified form) by anyone. Thirty-five years ago when Richard Stallman decided that he could no longer tolerate proprietary software, and started the free software movement, software freedom was misunderstood and dismissed. Twenty years ago a group of free software advocates gathered in California and decided that software...


  • Electronics Engineering Video Blog Podcast

    Electronics Engineering Video Blog Podcast

    EEVblog #1048 – Ledger Nano S Crypto Hardware Wallet
    Published. December 31, 2017

    A review and teardown of the Ledger Nano S crypto currency hardware wallet. Installation, setup, and transferring bitcoin cash, ethereum, and ripple. And a comparison with the Trezor, which one is better? Buy them HERE Secure chip HERE Verify your Ledger Nano S hardware HERE Forum HERE...


  • TI E2E Community

    TI E2E Community

    Blog Post: Driving automotive innovation with Jacinto™ automotive processors
    Published. December 20, 2017

    Texas Instruments has a long-standing history of development in signal processing and automotive processors. To date, we have shipped more than 150 million units to the automotive market , and along the way, we have seen original equipment manufacturers (OEMs) design innovative advanced driver assistance systems (ADAS) and infotainment applications that push the limits of current technologies. TI will continue to develop scalable, cost-effective automotive system on chips (SoCs) with the performance...


  • Wireless Sensor Networks Blog

    Wireless Sensor Networks Blog

    Arch Rock has joined the IPv6 Forum
    Published. December 19, 2017

    Arch Rock Corp., the first company to offer the IEEE 802.15.4 low-power wireless sensor network (WSN) systems incorporating IPv6—the latest and most scalable version of the ubiquitous Internet Protocol—has joined the IPv6 Forum. The IPv6 Forum was formed in 1999 to help create a high-quality and secure next-generation Internet with equitable worldwide access. Arch Rock… The post Arch Rock has joined the IPv6 Forum appeared first on WSN Blog....


  • Green Hills Software

    Green Hills Software

    Green Hills Software Expands Automotive Integrated Cockpit Coverage to NXP i.MX 8 Families
    Published. November 28, 2017

    Trusted Software Foundation and Advanced Development Tools Available for 64-bit Software-Defined Cockpits...


  • All About Microsoft

    All About Microsoft

    Enterprise, Education users get six more months of support for Windows 10 1511
    Published. November 14, 2017

    Microsoft will continue to provide security updates to Windows 10 Enterprise and Education users still on 1511. Here's how and why....


  • Gabe On EDA

    Gabe On EDA

    ARM TechCon Report on IoT, Automotive, and Security
    Published. November 1, 2017

    ARM TechCon Report on IoT, Automotive, and Security Gabe Moretti Wed, 11/01/2017 - 07:58...


  • Branden Williams' Security Coverage Blog

    Branden Williams' Security Coverage Blog

    What’s the craic on KRACK?
    Published. October 19, 2017

    For those who are not familiar with the Irish slang, read this. We got another fun named vulnerability this week that goes after WPA2 encryption, something that is ubiquitous but not impenetrable. Key Reinstallation Attacks, or KRACK for short, exposes a weakness in the WPA2 protocol. It’s an attack on the protocol itself, so anything […]...


  • Mocana Device Blog

    Mocana Device Blog

    How Secure is the Car of the Future?
    Published. October 10, 2017

    Modern cars are well on their way to revolutionizing the automotive industry. Intel’s 2017 whitepaper reports that “the newest cars on the road are equipped with active safety features that help protect drivers and passengers, heads-up displays that makes it easy to read instruments, and in-vehicle infotainment that makes the trip more enjoyable.” But with an IoT-enabled automobile comes greater security risks. And by 2020, analysts estimate that there will be more than 250 million connected...


  • scalability.org

    scalability.org

    Disk, SSD, NVMe preparation tools cleaned up and on GitHub
    Published. September 14, 2017

    These are a collection of (MIT licensed) tools I’ve been working on for years to automate some of the major functionality one needs when setting up/using new machines with lots of disks/SSD/NVMe. The repo is here: https://github.com/joelandman/disk_test_setup . I will be adding some sas secure erase and formatting tools into this. These tools wrap other […]...


  • Frank Schirrmeister Blog

    Frank Schirrmeister Blog

    How to Get to a Trillion Devices in the Internet of Things in 2035
    Published. September 12, 2017

    Next month at Arm TechCon, one of the key discussion topics with be the internet of things (IoT), especially after Masayoshi Son, Arm's "parent" Softbank’s CEO, took the stage last year and boldly predicted that “more important, in the next 20 years, we will see 1 trillion internet of things devices.” So that means 1 trillion devices in 2035. That’s not too far in the future! Are we on the right track? Well, let’s first clearly identify the target and put it in perspective....


  • NextGenLog

    NextGenLog

    ALL FUTURE BLOGS AT LINK BELOW
    Published. May 17, 2017

    BLOGS...


  • Denali Memory Blog

    Denali Memory Blog

    Bluetooth 5: Making Your Smart Home a Reality
    Published. December 5, 2016

    We all know the futuristic vision of the world just around the corner. The vision where we tell our smart home that we’ve just left work at the end of a long day, and we’re heading home. Our home then tells the thermostat to warm up or cool down, lights to turn on, and the oven to start baking the lasagna we left in it that morning. We arrive to a warm, brightly lit home, and hot, freshly cooked food. You’ve got the vision, but do you have any idea how many connectivity and networking...


  • Everything USB

    Everything USB

    Ten Novelty Mice Definitely Worth Checking Out
    Published. March 29, 2017

    Fingerprint Security Mouse (2016) Thermaltake’s Black FP is a biometric security gaming mouse whose original design can be traced back to Black V2. Adding […] The post Ten Novelty Mice Definitely Worth Checking Out appeared first on Everything USB....


  • David Lacey's IT Security Blog

    David Lacey's IT Security Blog

    Calling the odds
    Published. May 20, 2016

    I’ve had some interesting conversations recently with Professor Fred Piper regarding risk probability. The discussion started because I was concerned about assessments of risk probability, as one might routinely use to populate a risk heat map or risk register. What’s the problem? For me, it’s the fact that, as the probability of an incident occurring... The post Calling the odds appeared first on David Laceys IT Security Blog....


  • Verification Horizons Blog

    Verification Horizons Blog

    How Formal Techniques Can Keep Hackers from Leaving You in the Cold
    Published. November 15, 2016

    While internet connected vehicles remain a popular target for hackers, the new breed of “smart” devices have the potential to invite the bad guys inside your home and force you to pay them to leave. Specifically, in a DefCon 2016 demo security researchers Andrew Tierney and Ken Munro showed how an internet connected thermostat could […]...


  • Team Verify's Blog

    Team Verify's Blog

    Shameless Promotion: Free Club Formal San Jose (with Lunch) on Wednesday 10/17
    Published. September 24, 2012

    Please join Team Verify and other design and verification engineers at the next "Club Formal" on the Cadence San Jose campus on Wednesday, October 17 at 11:30am . This free, half-day event (including lunch) is a great opportunity to learn more about general advances in formal analysis and assertion-based verification, and to network with others in your field. Based on attendee feedback from previous events, we will deep-dive on the following topics: * How customers are using the new Coverage...


  • Ran Avinun's Blog

    Ran Avinun's Blog

    Cadence System Design and Verification at DAC 2009
    Published. July 6, 2009

    Traditionally in Cadence Marketing there were always two major events you really had to focus on: Sales Kick Off in the winter and the Design Automation Conference (DAC) in the summer. A lot has changed. Starting a few years ago, Cadence added a great deal more: webinars, seminars, segment-specific trade shows, and of course CDNLive! -- all to help you, our customers and users, stay up to date on the latest Cadence technology.Some voices in the past have accused Cadence of "ignoring" the...


  • Robert Dwyer's Blog

    Robert Dwyer's Blog

    Demo: Automatic Floorplan Synthesis in Encounter
    Published. February 26, 2009

    As an Applications Engineer, the first demonstrations you deliver of a new technology are always the most interesting. The questions you receieve are all over the map and your skills in thinking on your feet are put to the test. Personally, I really enjoy this learning phase and as I was putting together this screencast, I was reminded of the first demo I ever gave of First Encounter back in 2001. The primary question in the meeting that I didn't have a good answer for was this: "Does First...


  • Adam Sherer Blog

    Adam Sherer Blog

    Xilinx SoC FPGAs Ideal Fit For OVM and MDV
    Published. June 24, 2009

    Processor-based FPGAs represent 40% of all the design starts today and will rise to > 50% in 2011 (Gartner, March 2009). In the same time period, the number of ASIC-based SoC starts is about an order of magnitude smaller. Sure, many of the FPGA starts use 8-bit processors and have a small amount of logic, but the high-end SoCs -- represented by product families such as the Xilinx(R) Virtex(R)-6 and Spartan(R)-6 -- are growing fast. That is exactly the type of design we've targeted with the...


  • Team Specman Blog

    Team Specman Blog

    Sign Up For Free Verification Sessions -- Only A Few Days Left
    Published. July 19, 2010

    Mark your calendar and sign up for the two upcoming free verification sessions sponsored by Cadence. Space is limited. So, please sign up today! JULY 21 st All-Day, Hands-on technical workshop in Irvine, CA Topic: Advanced Verification Techniques using e /SV Workshop Learn how to architect an advanced testbench using OVM/UVM that contains generation, coverage and checking and much, much more..... This workshop will focus on introducing attendees to advanced verification techniques using the latest...


  • Chris A. Ciufo on All Things Embedded

    Chris A. Ciufo on All Things Embedded

    Does Secure Erase Actually Work?
    Published. July 18, 2016

    Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documents recommend it. In Part 1 of this blog (“How Does One … Continue reading →...


  • Rands In Repose

    Rands In Repose

    Turn on 2FA before it’s too late
    Published. July 17, 2016

    Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required… More#...


  • Steven Brown's Blog

    Steven Brown's Blog

    What Memory Best Fits Your Application?
    Published. May 27, 2016

    With highly effective DDR4 and LPDDR4 class memories, it’s not always easy to know what kind of memory will best fit the needs of your application? What is the optimal compromise between keeping costs in check and optimizing performance? To answer that we have to take a step back and look at the history of the DDRs. In the PC memory area, we have the DDR2, DDR3 and DDR4. On the LPDDR front there are LPDDR2, LPDDR3, LPDDR4. Figure 1: History of DDR Memory The DDR4 standard took from 7 to 10 years...


  • Steven Brown's Blog

    Steven Brown's Blog

    What Memory Best Fits Your Application?
    Published. May 27, 2016

    With highly effective DDR4 and LPDDR4 class memories, it’s not always easy to know what kind of memory will best fit the needs of your application? What is the optimal compromise between keeping costs in check and optimizing performance? To answer that we have to take a step back and look at the history of the DDRs. In the PC memory area, we have the DDR2, DDR3 and DDR4. On the LPDDR front there are LPDDR2, LPDDR3, LPDDR4. Figure 1: History of DDR Memory The DDR4 standard took from 7 to 10 years...


  • John Day

    John Day

    V2X-Enhanced GNSS Improves Vehicle Positioning Reliability
    Published. May 22, 2016

    Another step toward semi- and fully-autonomous vehicles. STMicroelectronics and Israel-based V2X developer Autotalks, have fused GNSS (Global Navigation Satellite System) technology and V2X ranging. The firms say their V2X-Enhanced GNSS ensures authenticated and secure vehicle localization for extreme accuracy and reliability of positioning information, especially in urban canyons, tunnels, and parking structures where accurate absolute […]...


  • Urban Work Bench

    Urban Work Bench

    WordPress Resources at SiteGround
    Published. May 7, 2016

    WordPress is an award-winning web software, used by millions of webmasters worldwide for building their website or blog. SiteGround is proud to host this particular WordPress installation and provide users with multiple resources to facilitate the management of their WP websites: Expert WordPress Hosting SiteGround provides superior WordPress hosting focused on speed, security and customer … Continue reading "WordPress Resources at SiteGround"...


  • Technology Review Feed - Energy Top Stories

    Technology Review Feed - Energy Top Stories

    Obama’s Last Nuclear Summit Meets as the Threat of Terrorism Looms
    Published. March 31, 2016

    Barack Obama has made nuclear security a centerpiece of his administration, but experts say the risk of nuclear terrorism is ratcheting up....


  • Windows Embedded Standard

    Windows Embedded Standard

    June 2012 Security Updates are Live on ECE for XPe and Standard 2009
    Published. July 3, 2012

    The June 2012 Security Updates are now available on the ECE for Microsoft® Windows® XP Embedded with Service Pack 3 and Windows® Embedded Standard 2009. The list below applies to Standard 2009 only: KB2604121 – Vulnerabilities in .NET Framework Could Allow Remote Code Execution KB2656405 – Combined Security Update for Microsoft Office, Windows, .NET Framework,......


  • Stephane Boucher's DSP Blog

    Stephane Boucher's DSP Blog

    Mathematics and Cryptography
    Published. December 14, 2015

    The mathematics of number theory and elliptic curves can take a life time to learn because they are very deep subjects.  As engineers we don't have time to earn PhD's in math along with all the things we have to learn just to make communications systems work.  However, a little learning can go a long way to helping make our communications systems secure - we don't need to know......


  • EDA Blog

    EDA Blog

    Flower Technology and EnSilica collaborate on ASIC mining solutions for cryptocurrencies like Bitcoin
    Published. April 17, 2014

    Bitcoin and other cryptocurrencies that are based on scrypt hashing algorithms (Lifecoin, Auroracoin, Dogecoin, and Mastercoin) are on the rise. Scrypt-based cryptocurrency ASIC mining solution start-up Flower Technologies and eSi-RISC soft processor core and encryption and peripherals company EnSilica have partnered to develop the Orchid, which boasts high hashing speed, energy efficiency, and price/performance for […]...


  • Ed Burnette's Dev Connection

    Ed Burnette's Dev Connection

    More Android malware FUD is the only thing that is sprouting
    Published. August 8, 2012

    Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....


  • Conversation Central

    Conversation Central

    Security Standards for the Cloud
    Published. June 15, 2010

    Guests: Jeff Green, Senior Vice President McAfee Labs, McAfee, and James Wendorf, IEEE-SA Industry Connections Program Manager Hosts: Harry Gries, Social Media Specialist and Customer Support, Xuropa, and Karen Bartleson, Sr. Director, Community Marketing, Synopsys Learn from Jeff Green about the standard efforts happening at IEEE around the measurement of cloud security. Learn about the differences […]...


  • Laptops and Desktops Blog

    Laptops and Desktops Blog

    Fujitsu adds Intel Broadwell processors to new enterprise tablets, laptops
    Published. January 28, 2015

    The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features....


  • Rainer Makowitz << The Embedded Beat

    Rainer Makowitz << The Embedded Beat

    Securing telematics and infotainment
    Published. January 11, 2012

    By Rainer Makowitz — The Consumer Electronics Show 2012 is once again demonstrating to what extent consumer devices either enter the car or they get converted into their automotive equivalent and added to the feature list. The biggest expectations on value for the driver are in the field of infotainment and assist functions. Whether access […]...


  • Windows Embedded Blog

    Windows Embedded Blog

    How many embedded devices are you using each day?
    Published. October 20, 2011

    We all use embedded devices throughout the day without thinking about how many ‘smart’ systems are around us, from the in-car entertainment system, digital photo frame, home automation/security, digital signage, medical systems and more… When you start counting the number of devices you actually use each day the total number can be quite surprising! - Mike...


  • Microchip Coupon Codes & Discounts

    Microchip Coupon Codes & Discounts

    Save 30% off the ICP2GANG-DS Production Quality ICSP Secure GANG Programmer from Softlog
    Published. December 26, 2011

    The ICP2GANG-DS Production Quality ICSP Secure GANG Programmer is a 4-channel in-circuit programmer (expandable up to 64 channels) that operates with a PC or as a standalone unit and simultaneously programs Microchip® 8-bit PIC MCUs and serial EEPROMs. The secure programming feature dramatically reduces the risk of unauthorized reconstruction of hex files, and also limits […]...


  • CCIE Journey

    CCIE Journey

    CCIE Security v4 Advanced Technology Class over @ INE Started today
    Published. September 25, 2013

    If you are prepping for the lab this is something I am sure you are going to want to catch. Starting tomorrow, September 24th 2013 at 10:00 PDT (17:00 GMT), I will begin the running the new CCIE Security Advanced Technologies Class for the newest version 4.0 blueprint. Online streaming of tomorrow’s class is free […]...


  • John Coyne's Embedded Blog

    John Coyne's Embedded Blog

    Webcast: The New 'Standard' in Embedded: Windows 7 Componentized for Devices
    Published. June 29, 2010

      Hey Campers – Join me Tomorrow at 10AM PDT as I present a webcast on Windows Embedded Standard 7. we’ll go into the features we’ve included with this release that help you create an immersive device, and make it reliable, and secure. Should be...(read more)...


  • FPGA Blog

    FPGA Blog

    Connectivity kit for high-performance applications enables accelerated productivity
    Published. February 13, 2014

    Xilinx, Inc. has announced its new 40 Gbps platform Virtex-7 FPGA VC709 Connectivity Kit. This kit enables designers to streamline productivity for high-bandwidth/performance applications, such as high frequency trading appliances, network interface cards for security, and network monitoring. Read more Connectivity kit for high-performance applications enables accelerated productivityTwitter @fpgablog : : Free Publications : : […]...


  • Siliconcowboy's Blog

    Siliconcowboy's Blog

    Comment on Were the Five Recent/Worst Mass Murderers in the US Democrats? by Harry Lee Hedgecock
    Published. June 25, 2014

    Wow, just Wow. You're satisfied your point was made because we admit these lunatics shouldn't have had guns. LMAO Just because we agree these lunatics shouldn't have had guns, does not mean we think our 2nd amendment rights should be circumvented and trampled on just to make sure they don't have guns. "Those willing to give up freedom in exchange for security,deserves neither". ...


  • Joel on Software

    Joel on Software

    Free as in Fortune Cookies
    Published. January 28, 2015

    Trello has been out for less than two years and it’s been growing like wildfire. We recently hit 1.5 million members, of whom about 1/3 perform some action every month, and our MongoDB database now contains more than 70 million cards on 3.7 million boards. So the obvious question I get all the time is, “How exactly are you supposed to make money with that?” You may have noticed that Trello is free. Not “free trial,” not “freemium,” but just plain old free. Some people have justifiably...



Share and Enjoy:
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google