Community



  • Consumerization: BYOD

    Consumerization: BYOD

    Cyber security assessment
    Published. November 24, 2017

    Hey guys! it would be great if somebody here could advise me asap. I have an e-commerce website that was running well. . A week ago, the website got hacked and several pointless pages have been added to it. We found it and removed all pages as soon as we ......


  • Tech Deseign Forums Blog

    Tech Deseign Forums Blog

    Maxim uses own PUF for low-cost crypto devices
    Published. November 20, 2017

    Maxim has used its own mismatch-based PUF technology to support a new line of low-cost security devices....


  • TI E2E Community

    TI E2E Community

    Blog Post: Modern, sleek and durable touch on metal HMIs
    Published. November 16, 2017

    Many industrial and consumer electronic product designers use metal in their designs due to its modern look and durability. However, implementing human machine interfaces (HMIs) on metal surfaces is challenging, as it requires machining and cutting a hole to accommodate a mechanical button. In addition to compromising the aesthetics of the design, mechanical buttons are also prone to failure in moist, dusty or dirty conditions. Touch through metal allows for sleek touch sensing designs that are waterproof,...


  • All About Microsoft

    All About Microsoft

    Enterprise, Education users get six more months of support for Windows 10 1511
    Published. November 14, 2017

    Microsoft will continue to provide security updates to Windows 10 Enterprise and Education users still on 1511. Here's how and why....


  • Jack Erickson's Blog

    Jack Erickson's Blog

    How's Technology in Israel?
    Published. November 13, 2017

    Last week was the last CDNLive of 2017 (cats have nine lives, Cadence had nine CDNlives this year). CDNLive Israel was all day last Monday. That's actually the second day of the week there, since the weekend is Friday and Saturday, and Sunday is a normal working day. You probably weren't there, but Israel has lots of outposts of semiconductor companies, lots of startups, venture capital, and just technology in general. I went there to get a snapshot of the semiconductor ecosystem in one day....


  • Jason Andrews Blog

    Jason Andrews Blog

    How's Technology in Israel?
    Published. November 13, 2017

    Last week was the last CDNLive of 2017 (cats have nine lives, Cadence had nine CDNlives this year). CDNLive Israel was all day last Monday. That's actually the second day of the week there, since the weekend is Friday and Saturday, and Sunday is a normal working day. You probably weren't there, but Israel has lots of outposts of semiconductor companies, lots of startups, venture capital, and just technology in general. I went there to get a snapshot of the semiconductor ecosystem in one day....


  • Joseph Hupcey Blog

    Joseph Hupcey Blog

    How's Technology in Israel?
    Published. November 13, 2017

    Last week was the last CDNLive of 2017 (cats have nine lives, Cadence had nine CDNlives this year). CDNLive Israel was all day last Monday. That's actually the second day of the week there, since the weekend is Friday and Saturday, and Sunday is a normal working day. You probably weren't there, but Israel has lots of outposts of semiconductor companies, lots of startups, venture capital, and just technology in general. I went there to get a snapshot of the semiconductor ecosystem in one day....


  • Tom Anderson's Blog

    Tom Anderson's Blog

    How's Technology in Israel?
    Published. November 13, 2017

    Last week was the last CDNLive of 2017 (cats have nine lives, Cadence had nine CDNlives this year). CDNLive Israel was all day last Monday. That's actually the second day of the week there, since the weekend is Friday and Saturday, and Sunday is a normal working day. You probably weren't there, but Israel has lots of outposts of semiconductor companies, lots of startups, venture capital, and just technology in general. I went there to get a snapshot of the semiconductor ecosystem in one day....


  • Michael Jacobs Blog

    Michael Jacobs Blog

    How's Technology in Israel?
    Published. November 13, 2017

    Last week was the last CDNLive of 2017 (cats have nine lives, Cadence had nine CDNlives this year). CDNLive Israel was all day last Monday. That's actually the second day of the week there, since the weekend is Friday and Saturday, and Sunday is a normal working day. You probably weren't there, but Israel has lots of outposts of semiconductor companies, lots of startups, venture capital, and just technology in general. I went there to get a snapshot of the semiconductor ecosystem in one day....


  • Open Source Initiative blogs

    Open Source Initiative blogs

    Open Source Initiative Announces DigitalOcean Corporate Sponsorship
    Published. November 8, 2017

    Cloud services platform will provide both financial and in-kind contributions to support OSI infrastructure and new collaboration platform. PALO ALTO, Calif. - Nov. 8, 2017 -- The Open Source Initiative® (OSI), dedicated to increasing the awareness and adoption of open source software, is delighted to welcome DigitalOcean as a Premium Sponsor. DigitalOcean, a cloud services platform designed for developers, will provide both financial support and hosting for several OSI community-driven services. A...


  • MyEclipse

    MyEclipse

    Create a Cryptocurrency Dashboard with Angular
    Published. November 7, 2017

    With Bitcoin’s record-breaking surge past the $7000 mark, we thought this would the perfect time to build a cryptocurrency dashboard with Angular. Cryptocurrency is a digital asset designed to work as a medium of exchange, using cryptography to secure the transactions and to control the creation of additional units of the currency. While Bitcoin is […] The post Create a Cryptocurrency Dashboard with Angular appeared first on Genuitec....


  • Linux and Open Source

    Linux and Open Source

    ?The 10 best ways to secure your Android phone
    Published. November 3, 2017

    Malware makers, phishers, they really are all out to get you. Here's how to stop them in their tracks....


  • Gabe On EDA

    Gabe On EDA

    ARM TechCon Report on IoT, Automotive, and Security
    Published. November 1, 2017

    ARM TechCon Report on IoT, Automotive, and Security Gabe Moretti Wed, 11/01/2017 - 07:58...


  • Branden Williams' Security Coverage Blog

    Branden Williams' Security Coverage Blog

    What’s the craic on KRACK?
    Published. October 19, 2017

    For those who are not familiar with the Irish slang, read this. We got another fun named vulnerability this week that goes after WPA2 encryption, something that is ubiquitous but not impenetrable. Key Reinstallation Attacks, or KRACK for short, exposes a weakness in the WPA2 protocol. It’s an attack on the protocol itself, so anything […]...


  • Barr Code

    Barr Code

    New BlueBorne Security Flaw Affects Embedded Systems Running Linux
    Published. October 16, 2017

    A major security flaw in the Bluetooth communications protocol was recently discovered and has since been confirmed as exploitable in the real world. It is important that designers of embedded systems are aware of this security issue potentially affecting their products. So-called “BlueBorne” is an attack that can be performed over the air against an […]...


  • Mocana Device Blog

    Mocana Device Blog

    How Secure is the Car of the Future?
    Published. October 10, 2017

    Modern cars are well on their way to revolutionizing the automotive industry. Intel’s 2017 whitepaper reports that “the newest cars on the road are equipped with active safety features that help protect drivers and passengers, heads-up displays that makes it easy to read instruments, and in-vehicle infotainment that makes the trip more enjoyable.” But with an IoT-enabled automobile comes greater security risks. And by 2020, analysts estimate that there will be more than 250 million connected...


  • scalability.org

    scalability.org

    Disk, SSD, NVMe preparation tools cleaned up and on GitHub
    Published. September 14, 2017

    These are a collection of (MIT licensed) tools I’ve been working on for years to automate some of the major functionality one needs when setting up/using new machines with lots of disks/SSD/NVMe. The repo is here: https://github.com/joelandman/disk_test_setup . I will be adding some sas secure erase and formatting tools into this. These tools wrap other […]...


  • Frank Schirrmeister Blog

    Frank Schirrmeister Blog

    How to Get to a Trillion Devices in the Internet of Things in 2035
    Published. September 12, 2017

    Next month at Arm TechCon, one of the key discussion topics with be the internet of things (IoT), especially after Masayoshi Son, Arm's "parent" Softbank’s CEO, took the stage last year and boldly predicted that “more important, in the next 20 years, we will see 1 trillion internet of things devices.” So that means 1 trillion devices in 2035. That’s not too far in the future! Are we on the right track? Well, let’s first clearly identify the target and put it in perspective....


  • Electronics Engineering Video Blog Podcast

    Electronics Engineering Video Blog Podcast

    EEVblog #1006 – Trezor Bitcoin Hardware Wallet Teardown
    Published. July 14, 2017

    What’s inside the Trezor hardware bitcoin wallet? A teardown to look at any physical hardware security, and a look at a possible side channel power line attack. For a new stable attempt at cryptocurrency, check out Corion UPDATE: A technical detailed reply from the Trezor developer! CLARIFICATION: SatoshiLabs does not hold your wallet private key, ......


  • Green Hills Software

    Green Hills Software

    Green Hills Software Announces Platform for Secure Connected Car to Address Critical Safety and Security Demands
    Published. June 7, 2017

    ISS Device Lifecycle Management Advances from Manufacturing to Operations with Secure Remote Updates and Management...


  • NextGenLog

    NextGenLog

    ALL FUTURE BLOGS AT LINK BELOW
    Published. May 17, 2017

    BLOGS...


  • Denali Memory Blog

    Denali Memory Blog

    Bluetooth 5: Making Your Smart Home a Reality
    Published. December 5, 2016

    We all know the futuristic vision of the world just around the corner. The vision where we tell our smart home that we’ve just left work at the end of a long day, and we’re heading home. Our home then tells the thermostat to warm up or cool down, lights to turn on, and the oven to start baking the lasagna we left in it that morning. We arrive to a warm, brightly lit home, and hot, freshly cooked food. You’ve got the vision, but do you have any idea how many connectivity and networking...


  • Everything USB

    Everything USB

    Ten Novelty Mice Definitely Worth Checking Out
    Published. March 29, 2017

    Fingerprint Security Mouse (2016) Thermaltake’s Black FP is a biometric security gaming mouse whose original design can be traced back to Black V2. Adding […] The post Ten Novelty Mice Definitely Worth Checking Out appeared first on Everything USB....


  • David Lacey's IT Security Blog

    David Lacey's IT Security Blog

    Calling the odds
    Published. May 20, 2016

    I’ve had some interesting conversations recently with Professor Fred Piper regarding risk probability. The discussion started because I was concerned about assessments of risk probability, as one might routinely use to populate a risk heat map or risk register. What’s the problem? For me, it’s the fact that, as the probability of an incident occurring... The post Calling the odds appeared first on David Laceys IT Security Blog....


  • Verification Horizons Blog

    Verification Horizons Blog

    How Formal Techniques Can Keep Hackers from Leaving You in the Cold
    Published. November 15, 2016

    While internet connected vehicles remain a popular target for hackers, the new breed of “smart” devices have the potential to invite the bad guys inside your home and force you to pay them to leave. Specifically, in a DefCon 2016 demo security researchers Andrew Tierney and Ken Munro showed how an internet connected thermostat could […]...


  • Team Verify's Blog

    Team Verify's Blog

    Shameless Promotion: Free Club Formal San Jose (with Lunch) on Wednesday 10/17
    Published. September 24, 2012

    Please join Team Verify and other design and verification engineers at the next "Club Formal" on the Cadence San Jose campus on Wednesday, October 17 at 11:30am . This free, half-day event (including lunch) is a great opportunity to learn more about general advances in formal analysis and assertion-based verification, and to network with others in your field. Based on attendee feedback from previous events, we will deep-dive on the following topics: * How customers are using the new Coverage...


  • Ran Avinun's Blog

    Ran Avinun's Blog

    Cadence System Design and Verification at DAC 2009
    Published. July 6, 2009

    Traditionally in Cadence Marketing there were always two major events you really had to focus on: Sales Kick Off in the winter and the Design Automation Conference (DAC) in the summer. A lot has changed. Starting a few years ago, Cadence added a great deal more: webinars, seminars, segment-specific trade shows, and of course CDNLive! -- all to help you, our customers and users, stay up to date on the latest Cadence technology.Some voices in the past have accused Cadence of "ignoring" the...


  • Robert Dwyer's Blog

    Robert Dwyer's Blog

    Demo: Automatic Floorplan Synthesis in Encounter
    Published. February 26, 2009

    As an Applications Engineer, the first demonstrations you deliver of a new technology are always the most interesting. The questions you receieve are all over the map and your skills in thinking on your feet are put to the test. Personally, I really enjoy this learning phase and as I was putting together this screencast, I was reminded of the first demo I ever gave of First Encounter back in 2001. The primary question in the meeting that I didn't have a good answer for was this: "Does First...


  • Adam Sherer Blog

    Adam Sherer Blog

    Xilinx SoC FPGAs Ideal Fit For OVM and MDV
    Published. June 24, 2009

    Processor-based FPGAs represent 40% of all the design starts today and will rise to > 50% in 2011 (Gartner, March 2009). In the same time period, the number of ASIC-based SoC starts is about an order of magnitude smaller. Sure, many of the FPGA starts use 8-bit processors and have a small amount of logic, but the high-end SoCs -- represented by product families such as the Xilinx(R) Virtex(R)-6 and Spartan(R)-6 -- are growing fast. That is exactly the type of design we've targeted with the...


  • Team Specman Blog

    Team Specman Blog

    Sign Up For Free Verification Sessions -- Only A Few Days Left
    Published. July 19, 2010

    Mark your calendar and sign up for the two upcoming free verification sessions sponsored by Cadence. Space is limited. So, please sign up today! JULY 21 st All-Day, Hands-on technical workshop in Irvine, CA Topic: Advanced Verification Techniques using e /SV Workshop Learn how to architect an advanced testbench using OVM/UVM that contains generation, coverage and checking and much, much more..... This workshop will focus on introducing attendees to advanced verification techniques using the latest...


  • Chris A. Ciufo on All Things Embedded

    Chris A. Ciufo on All Things Embedded

    Does Secure Erase Actually Work?
    Published. July 18, 2016

    Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documents recommend it. In Part 1 of this blog (“How Does One … Continue reading →...


  • Rands In Repose

    Rands In Repose

    Turn on 2FA before it’s too late
    Published. July 17, 2016

    Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required… More#...


  • Steven Brown's Blog

    Steven Brown's Blog

    What Memory Best Fits Your Application?
    Published. May 27, 2016

    With highly effective DDR4 and LPDDR4 class memories, it’s not always easy to know what kind of memory will best fit the needs of your application? What is the optimal compromise between keeping costs in check and optimizing performance? To answer that we have to take a step back and look at the history of the DDRs. In the PC memory area, we have the DDR2, DDR3 and DDR4. On the LPDDR front there are LPDDR2, LPDDR3, LPDDR4. Figure 1: History of DDR Memory The DDR4 standard took from 7 to 10 years...


  • Steven Brown's Blog

    Steven Brown's Blog

    What Memory Best Fits Your Application?
    Published. May 27, 2016

    With highly effective DDR4 and LPDDR4 class memories, it’s not always easy to know what kind of memory will best fit the needs of your application? What is the optimal compromise between keeping costs in check and optimizing performance? To answer that we have to take a step back and look at the history of the DDRs. In the PC memory area, we have the DDR2, DDR3 and DDR4. On the LPDDR front there are LPDDR2, LPDDR3, LPDDR4. Figure 1: History of DDR Memory The DDR4 standard took from 7 to 10 years...


  • John Day

    John Day

    V2X-Enhanced GNSS Improves Vehicle Positioning Reliability
    Published. May 22, 2016

    Another step toward semi- and fully-autonomous vehicles. STMicroelectronics and Israel-based V2X developer Autotalks, have fused GNSS (Global Navigation Satellite System) technology and V2X ranging. The firms say their V2X-Enhanced GNSS ensures authenticated and secure vehicle localization for extreme accuracy and reliability of positioning information, especially in urban canyons, tunnels, and parking structures where accurate absolute […]...


  • Urban Work Bench

    Urban Work Bench

    WordPress Resources at SiteGround
    Published. May 7, 2016

    WordPress is an award-winning web software, used by millions of webmasters worldwide for building their website or blog. SiteGround is proud to host this particular WordPress installation and provide users with multiple resources to facilitate the management of their WP websites: Expert WordPress Hosting SiteGround provides superior WordPress hosting focused on speed, security and customer … Continue reading "WordPress Resources at SiteGround"...


  • Technology Review Feed - Energy Top Stories

    Technology Review Feed - Energy Top Stories

    Obama’s Last Nuclear Summit Meets as the Threat of Terrorism Looms
    Published. March 31, 2016

    Barack Obama has made nuclear security a centerpiece of his administration, but experts say the risk of nuclear terrorism is ratcheting up....


  • Windows Embedded Standard

    Windows Embedded Standard

    June 2012 Security Updates are Live on ECE for XPe and Standard 2009
    Published. July 3, 2012

    The June 2012 Security Updates are now available on the ECE for Microsoft® Windows® XP Embedded with Service Pack 3 and Windows® Embedded Standard 2009. The list below applies to Standard 2009 only: KB2604121 – Vulnerabilities in .NET Framework Could Allow Remote Code Execution KB2656405 – Combined Security Update for Microsoft Office, Windows, .NET Framework,......


  • Stephane Boucher's DSP Blog

    Stephane Boucher's DSP Blog

    Mathematics and Cryptography
    Published. December 14, 2015

    The mathematics of number theory and elliptic curves can take a life time to learn because they are very deep subjects.  As engineers we don't have time to earn PhD's in math along with all the things we have to learn just to make communications systems work.  However, a little learning can go a long way to helping make our communications systems secure - we don't need to know......


  • EDA Blog

    EDA Blog

    Flower Technology and EnSilica collaborate on ASIC mining solutions for cryptocurrencies like Bitcoin
    Published. April 17, 2014

    Bitcoin and other cryptocurrencies that are based on scrypt hashing algorithms (Lifecoin, Auroracoin, Dogecoin, and Mastercoin) are on the rise. Scrypt-based cryptocurrency ASIC mining solution start-up Flower Technologies and eSi-RISC soft processor core and encryption and peripherals company EnSilica have partnered to develop the Orchid, which boasts high hashing speed, energy efficiency, and price/performance for […]...


  • Ed Burnette's Dev Connection

    Ed Burnette's Dev Connection

    More Android malware FUD is the only thing that is sprouting
    Published. August 8, 2012

    Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....


  • Conversation Central

    Conversation Central

    Security Standards for the Cloud
    Published. June 15, 2010

    Guests: Jeff Green, Senior Vice President McAfee Labs, McAfee, and James Wendorf, IEEE-SA Industry Connections Program Manager Hosts: Harry Gries, Social Media Specialist and Customer Support, Xuropa, and Karen Bartleson, Sr. Director, Community Marketing, Synopsys Learn from Jeff Green about the standard efforts happening at IEEE around the measurement of cloud security. Learn about the differences […]...


  • Laptops and Desktops Blog

    Laptops and Desktops Blog

    Fujitsu adds Intel Broadwell processors to new enterprise tablets, laptops
    Published. January 28, 2015

    The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features....


  • Rainer Makowitz << The Embedded Beat

    Rainer Makowitz << The Embedded Beat

    Securing telematics and infotainment
    Published. January 11, 2012

    By Rainer Makowitz — The Consumer Electronics Show 2012 is once again demonstrating to what extent consumer devices either enter the car or they get converted into their automotive equivalent and added to the feature list. The biggest expectations on value for the driver are in the field of infotainment and assist functions. Whether access […]...


  • Windows Embedded Blog

    Windows Embedded Blog

    How many embedded devices are you using each day?
    Published. October 20, 2011

    We all use embedded devices throughout the day without thinking about how many ‘smart’ systems are around us, from the in-car entertainment system, digital photo frame, home automation/security, digital signage, medical systems and more… When you start counting the number of devices you actually use each day the total number can be quite surprising! - Mike...


  • Microchip Coupon Codes & Discounts

    Microchip Coupon Codes & Discounts

    Save 30% off the ICP2GANG-DS Production Quality ICSP Secure GANG Programmer from Softlog
    Published. December 26, 2011

    The ICP2GANG-DS Production Quality ICSP Secure GANG Programmer is a 4-channel in-circuit programmer (expandable up to 64 channels) that operates with a PC or as a standalone unit and simultaneously programs Microchip® 8-bit PIC MCUs and serial EEPROMs. The secure programming feature dramatically reduces the risk of unauthorized reconstruction of hex files, and also limits […]...


  • CCIE Journey

    CCIE Journey

    CCIE Security v4 Advanced Technology Class over @ INE Started today
    Published. September 25, 2013

    If you are prepping for the lab this is something I am sure you are going to want to catch. Starting tomorrow, September 24th 2013 at 10:00 PDT (17:00 GMT), I will begin the running the new CCIE Security Advanced Technologies Class for the newest version 4.0 blueprint. Online streaming of tomorrow’s class is free […]...


  • John Coyne's Embedded Blog

    John Coyne's Embedded Blog

    Webcast: The New 'Standard' in Embedded: Windows 7 Componentized for Devices
    Published. June 29, 2010

      Hey Campers – Join me Tomorrow at 10AM PDT as I present a webcast on Windows Embedded Standard 7. we’ll go into the features we’ve included with this release that help you create an immersive device, and make it reliable, and secure. Should be...(read more)...


  • FPGA Blog

    FPGA Blog

    Connectivity kit for high-performance applications enables accelerated productivity
    Published. February 13, 2014

    Xilinx, Inc. has announced its new 40 Gbps platform Virtex-7 FPGA VC709 Connectivity Kit. This kit enables designers to streamline productivity for high-bandwidth/performance applications, such as high frequency trading appliances, network interface cards for security, and network monitoring. Read more Connectivity kit for high-performance applications enables accelerated productivityTwitter @fpgablog : : Free Publications : : […]...


  • Siliconcowboy's Blog

    Siliconcowboy's Blog

    Comment on Were the Five Recent/Worst Mass Murderers in the US Democrats? by Harry Lee Hedgecock
    Published. June 25, 2014

    Wow, just Wow. You're satisfied your point was made because we admit these lunatics shouldn't have had guns. LMAO Just because we agree these lunatics shouldn't have had guns, does not mean we think our 2nd amendment rights should be circumvented and trampled on just to make sure they don't have guns. "Those willing to give up freedom in exchange for security,deserves neither". ...


  • Joel on Software

    Joel on Software

    Free as in Fortune Cookies
    Published. January 28, 2015

    Trello has been out for less than two years and it’s been growing like wildfire. We recently hit 1.5 million members, of whom about 1/3 perform some action every month, and our MongoDB database now contains more than 70 million cards on 3.7 million boards. So the obvious question I get all the time is, “How exactly are you supposed to make money with that?” You may have noticed that Trello is free. Not “free trial,” not “freemium,” but just plain old free. Some people have justifiably...



Share and Enjoy:
  • Digg
  • Sphinn
  • del.icio.us
  • Facebook
  • Mixx
  • Google