Community

  • Tom Anderson's Blog

    Tom Anderson's Blog

    CEO Outlook: Cloudy with No Chance of Meatballs
    Published. April 18, 2018

    Recently, the ESD Alliance organized the annual CEO Outlook panel with Simon, Wally, Grant and Dean. I covered the opening statements yesterday , but I figured it would get too long to put everything into a single post, so here's the rest of the evening. There's a bit of false advertising in the photo below, since despite being held on the Cadence campus, and despite attending the panel, Lip-Bu was not on the panel. Bob Smith told me that they deliberately decided not to just have the CEOs...


  • Jack Erickson's Blog

    Jack Erickson's Blog

    CEO Outlook: Cloudy with No Chance of Meatballs
    Published. April 18, 2018

    Recently, the ESD Alliance organized the annual CEO Outlook panel with Simon, Wally, Grant and Dean. I covered the opening statements yesterday , but I figured it would get too long to put everything into a single post, so here's the rest of the evening. There's a bit of false advertising in the photo below, since despite being held on the Cadence campus, and despite attending the panel, Lip-Bu was not on the panel. Bob Smith told me that they deliberately decided not to just have the CEOs...


  • Joseph Hupcey Blog

    Joseph Hupcey Blog

    CEO Outlook: Cloudy with No Chance of Meatballs
    Published. April 18, 2018

    Recently, the ESD Alliance organized the annual CEO Outlook panel with Simon, Wally, Grant and Dean. I covered the opening statements yesterday , but I figured it would get too long to put everything into a single post, so here's the rest of the evening. There's a bit of false advertising in the photo below, since despite being held on the Cadence campus, and despite attending the panel, Lip-Bu was not on the panel. Bob Smith told me that they deliberately decided not to just have the CEOs...


  • Michael Jacobs Blog

    Michael Jacobs Blog

    CEO Outlook: Cloudy with No Chance of Meatballs
    Published. April 18, 2018

    Recently, the ESD Alliance organized the annual CEO Outlook panel with Simon, Wally, Grant and Dean. I covered the opening statements yesterday , but I figured it would get too long to put everything into a single post, so here's the rest of the evening. There's a bit of false advertising in the photo below, since despite being held on the Cadence campus, and despite attending the panel, Lip-Bu was not on the panel. Bob Smith told me that they deliberately decided not to just have the CEOs...


  • Jason Andrews Blog

    Jason Andrews Blog

    CEO Outlook: Cloudy with No Chance of Meatballs
    Published. April 18, 2018

    Recently, the ESD Alliance organized the annual CEO Outlook panel with Simon, Wally, Grant and Dean. I covered the opening statements yesterday , but I figured it would get too long to put everything into a single post, so here's the rest of the evening. There's a bit of false advertising in the photo below, since despite being held on the Cadence campus, and despite attending the panel, Lip-Bu was not on the panel. Bob Smith told me that they deliberately decided not to just have the CEOs...


  • All About Microsoft

    All About Microsoft

    Microsoft introduces Azure Sphere for securing IoT devices
    Published. April 16, 2018

    Microsoft is introducing new custom silicon, a Linux-based embedded OS and cloud service aimed at securing microcontroller-based devices....


  • Consumerization: BYOD

    Consumerization: BYOD

    SQL Injection with ASCII
    Published. April 15, 2018

    Hello,I am in the middle of learning about IT Security. I wonder why sometimes people uses ASCII value for SQL injection attack? Do you know the reason why? Why not using normal ' mark....


  • Open Source Initiative blogs

    Open Source Initiative blogs

    Open Source Election System Certified
    Published. April 12, 2018

    OSI Affiliate Member, The National Association of Voting Officials (NAVO), announced this week the certification of the Prime lll open source election system for the State of Ohio. NAVO spokesperson Brent Turner stated the ballot delivery system is, “the first step toward appropriately secure voting systems replacing the ‘secret software‘ systems that have plagued our democracy“. Turner summarized the current proprietary vendor sold U.S. voting systems as, “antiquated, insecure, and a...


  • Mocana Device Blog

    Mocana Device Blog

    Introducing Mocana TrustCenter - Simple, Scalable and Automated IoT Security Lifecycle Management
    Published. April 11, 2018

    Today, Mocana ™ announced the launch of Mocana TrustCenter™, a new services platform that provides a system of cybersecurity to manage security across the lifecycle of IoT and industrial control devices. This is the first end-to-end platform for the management of cybersecurity across the IoT device security lifecycle for development, manufacturing, device onboarding, management and update. Mocana TrustCenter is a services platform that is hosted on a private cloud or public cloud IaaS. It includes...


  • Verification Horizons Blog

    Verification Horizons Blog

    Accellera Proposes a New Working Group
    Published. April 6, 2018

    Accellera to explore the need for an IP Security Assurance Standard In the era of SoC design where major design intellectual property (IP) blocks come from multiple sources and are combined to create an SoC or major block to be incorporated into yet another SoC, how can one test such systems to ensure they are […]...


  • Linux and Open Source

    Linux and Open Source

    ?Symantec may violate Linux GPL in Norton Core Router
    Published. April 5, 2018

    A top Linux security programmer, Matthew Garrett, has discovered Linux in Symantec's Norton Core Router. It appears Symantec has violated the GPL by not releasing its router's source code....


  • Denali Memory Blog

    Denali Memory Blog

    NVMe Express 1.3: Addressing the Storage Needs of the Data Revolution from Enterprise to Client
    Published. April 2, 2018

    The amount of data we are generating and consuming has exploded in recent years.   Social media, applications, multimedia streaming, 24-hour connectivity has us talking about Zettabytes of data in the data center that folks want to not only store, but analyze and access rapidly. SSDs were great to address mechanical inefficiencies of HDD.  However, the constraints of the SCSI protocol still meant that you can only address needs one at a time since there is only one queue in which to...


  • TI E2E Community

    TI E2E Community

    Blog Post: How many electric motors are in your car?
    Published. March 29, 2018

    At the recent Motors & Drive Systems Conference, I discussed electric motor applications in automobiles. The U.K. and France have already set dates to outlaw internal combustion engines (ICE), with China also studying when to ban ICE vehicles. Volvo has already announced that its new cars will have electric drives starting in 2019. So the writing is on the wall that powerful electric motors, also known as traction motors, will play a significant and increasing role as the engine propelling the vehicle....


  • Wireless Sensor Networks Blog

    Wireless Sensor Networks Blog

    Best Wireless Outdoor Solar Powered Motion-Sensing Security Light
    Published. March 2, 2018

    Motion lights outside are for more than just making it easy to see your way from the back door to the pool during the night. In this post, we will look at the 5 Best Wireless Outdoor Solar Powered Motion-Sensing Security Light. We start off with a basic introduction to these lights and the let […] The post Best Wireless Outdoor Solar Powered Motion-Sensing Security Light appeared first on Wireless Sensor Networks....


  • Tech Deseign Forums Blog

    Tech Deseign Forums Blog

    Accellera begins IP security-assurance standards effort
    Published. March 19, 2018

    Accellera Systems Initiative has begun a project that may result in the creation of a standard to address security assurance for semiconductor IP cores....


  • Green Hills Software

    Green Hills Software

    Green Hills Software's INTEGRITY-178 tuMP Multicore Operating System is the First Operating System Certified as Conforming to the FACE Technical Standard
    Published. January 1, 1970

    Proven Industry Leader in Safe and Secure Operating Systems completes all FACE Conformance Activities for both Armv8 and Power Architectures making it the first FACE Technical Standard 2.1.1 conformant Operating System and the first ever FACE Conformant Multicore Operating System...


  • Barr Code

    Barr Code

    C: The Immortal Programming Language
    Published. February 22, 2018

    Barr Group’s 2018 Embedded Systems Safety & Security Survey is now closed and I am in the midst of analyzing the data. This year a portion of my analysis is focused on multi-year trends. One trend that really stands out to me is that the C programming language refuses to give up the ghost. A […]...


  • MyEclipse

    MyEclipse

    Angular 5 Authentication: Getting Started
    Published. February 6, 2018

    In this tutorial, we are going to build an Angular 5 authentication system using Google’s Cloud Firestore. Most of the applications we build require some kind of authentication, and the simplest and fastest way to get started with that is by using the Firestore – a flexible, scalable database for mobile, web and server development. […] The post Angular 5 Authentication: Getting Started appeared first on Genuitec....


  • Electronics Engineering Video Blog Podcast

    Electronics Engineering Video Blog Podcast

    EEVblog #1048 – Ledger Nano S Crypto Hardware Wallet
    Published. December 31, 2017

    A review and teardown of the Ledger Nano S crypto currency hardware wallet. Installation, setup, and transferring bitcoin cash, ethereum, and ripple. And a comparison with the Trezor, which one is better? Buy them HERE Secure chip HERE Verify your Ledger Nano S hardware HERE Forum HERE...


  • Gabe On EDA

    Gabe On EDA

    ARM TechCon Report on IoT, Automotive, and Security
    Published. November 1, 2017

    ARM TechCon Report on IoT, Automotive, and Security Gabe Moretti Wed, 11/01/2017 - 07:58...


  • Branden Williams' Security Coverage Blog

    Branden Williams' Security Coverage Blog

    What’s the craic on KRACK?
    Published. October 19, 2017

    For those who are not familiar with the Irish slang, read this. We got another fun named vulnerability this week that goes after WPA2 encryption, something that is ubiquitous but not impenetrable. Key Reinstallation Attacks, or KRACK for short, exposes a weakness in the WPA2 protocol. It’s an attack on the protocol itself, so anything […]...


  • scalability.org

    scalability.org

    Disk, SSD, NVMe preparation tools cleaned up and on GitHub
    Published. September 14, 2017

    These are a collection of (MIT licensed) tools I’ve been working on for years to automate some of the major functionality one needs when setting up/using new machines with lots of disks/SSD/NVMe. The repo is here: https://github.com/joelandman/disk_test_setup . I will be adding some sas secure erase and formatting tools into this. These tools wrap other […]...


  • Frank Schirrmeister Blog

    Frank Schirrmeister Blog

    How to Get to a Trillion Devices in the Internet of Things in 2035
    Published. September 12, 2017

    Next month at Arm TechCon, one of the key discussion topics with be the internet of things (IoT), especially after Masayoshi Son, Arm's "parent" Softbank’s CEO, took the stage last year and boldly predicted that “more important, in the next 20 years, we will see 1 trillion internet of things devices.” So that means 1 trillion devices in 2035. That’s not too far in the future! Are we on the right track? Well, let’s first clearly identify the target and put it in perspective....


  • NextGenLog

    NextGenLog

    ALL FUTURE BLOGS AT LINK BELOW
    Published. May 17, 2017

    BLOGS...


  • Everything USB

    Everything USB

    Ten Novelty Mice Definitely Worth Checking Out
    Published. March 29, 2017

    Fingerprint Security Mouse (2016) Thermaltake’s Black FP is a biometric security gaming mouse whose original design can be traced back to Black V2. Adding […] The post Ten Novelty Mice Definitely Worth Checking Out appeared first on Everything USB....


  • David Lacey's IT Security Blog

    David Lacey's IT Security Blog

    Calling the odds
    Published. May 20, 2016

    I’ve had some interesting conversations recently with Professor Fred Piper regarding risk probability. The discussion started because I was concerned about assessments of risk probability, as one might routinely use to populate a risk heat map or risk register. What’s the problem? For me, it’s the fact that, as the probability of an incident occurring... The post Calling the odds appeared first on David Laceys IT Security Blog....


  • Team Verify's Blog

    Team Verify's Blog

    Shameless Promotion: Free Club Formal San Jose (with Lunch) on Wednesday 10/17
    Published. September 24, 2012

    Please join Team Verify and other design and verification engineers at the next "Club Formal" on the Cadence San Jose campus on Wednesday, October 17 at 11:30am . This free, half-day event (including lunch) is a great opportunity to learn more about general advances in formal analysis and assertion-based verification, and to network with others in your field. Based on attendee feedback from previous events, we will deep-dive on the following topics: * How customers are using the new Coverage...


  • Ran Avinun's Blog

    Ran Avinun's Blog

    Cadence System Design and Verification at DAC 2009
    Published. July 6, 2009

    Traditionally in Cadence Marketing there were always two major events you really had to focus on: Sales Kick Off in the winter and the Design Automation Conference (DAC) in the summer. A lot has changed. Starting a few years ago, Cadence added a great deal more: webinars, seminars, segment-specific trade shows, and of course CDNLive! -- all to help you, our customers and users, stay up to date on the latest Cadence technology.Some voices in the past have accused Cadence of "ignoring" the...


  • Robert Dwyer's Blog

    Robert Dwyer's Blog

    Demo: Automatic Floorplan Synthesis in Encounter
    Published. February 26, 2009

    As an Applications Engineer, the first demonstrations you deliver of a new technology are always the most interesting. The questions you receieve are all over the map and your skills in thinking on your feet are put to the test. Personally, I really enjoy this learning phase and as I was putting together this screencast, I was reminded of the first demo I ever gave of First Encounter back in 2001. The primary question in the meeting that I didn't have a good answer for was this: "Does First...


  • Team Specman Blog

    Team Specman Blog

    Sign Up For Free Verification Sessions -- Only A Few Days Left
    Published. July 19, 2010

    Mark your calendar and sign up for the two upcoming free verification sessions sponsored by Cadence. Space is limited. So, please sign up today! JULY 21 st All-Day, Hands-on technical workshop in Irvine, CA Topic: Advanced Verification Techniques using e /SV Workshop Learn how to architect an advanced testbench using OVM/UVM that contains generation, coverage and checking and much, much more..... This workshop will focus on introducing attendees to advanced verification techniques using the latest...


  • Adam Sherer Blog

    Adam Sherer Blog

    Xilinx SoC FPGAs Ideal Fit For OVM and MDV
    Published. June 24, 2009

    Processor-based FPGAs represent 40% of all the design starts today and will rise to > 50% in 2011 (Gartner, March 2009). In the same time period, the number of ASIC-based SoC starts is about an order of magnitude smaller. Sure, many of the FPGA starts use 8-bit processors and have a small amount of logic, but the high-end SoCs -- represented by product families such as the Xilinx(R) Virtex(R)-6 and Spartan(R)-6 -- are growing fast. That is exactly the type of design we've targeted with the...


  • Electrical Engineers  Talk Tech

    Electrical Engineers Talk Tech

    Does Secure Erase Actually Work?
    Published. July 18, 2016

    Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documents recommend it. In Part 1 of this blog (“How Does One … Continue reading →...


  • Rands In Repose

    Rands In Repose

    Turn on 2FA before it’s too late
    Published. July 17, 2016

    Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required… More#...


  • Steven Brown's Blog

    Steven Brown's Blog

    What Memory Best Fits Your Application?
    Published. May 27, 2016

    With highly effective DDR4 and LPDDR4 class memories, it’s not always easy to know what kind of memory will best fit the needs of your application? What is the optimal compromise between keeping costs in check and optimizing performance? To answer that we have to take a step back and look at the history of the DDRs. In the PC memory area, we have the DDR2, DDR3 and DDR4. On the LPDDR front there are LPDDR2, LPDDR3, LPDDR4. Figure 1: History of DDR Memory The DDR4 standard took from 7 to 10 years...


  • Steven Brown's Blog

    Steven Brown's Blog

    What Memory Best Fits Your Application?
    Published. May 27, 2016

    With highly effective DDR4 and LPDDR4 class memories, it’s not always easy to know what kind of memory will best fit the needs of your application? What is the optimal compromise between keeping costs in check and optimizing performance? To answer that we have to take a step back and look at the history of the DDRs. In the PC memory area, we have the DDR2, DDR3 and DDR4. On the LPDDR front there are LPDDR2, LPDDR3, LPDDR4. Figure 1: History of DDR Memory The DDR4 standard took from 7 to 10 years...


  • John Day

    John Day

    V2X-Enhanced GNSS Improves Vehicle Positioning Reliability
    Published. May 22, 2016

    Another step toward semi- and fully-autonomous vehicles. STMicroelectronics and Israel-based V2X developer Autotalks, have fused GNSS (Global Navigation Satellite System) technology and V2X ranging. The firms say their V2X-Enhanced GNSS ensures authenticated and secure vehicle localization for extreme accuracy and reliability of positioning information, especially in urban canyons, tunnels, and parking structures where accurate absolute […]...


  • Urban Work Bench

    Urban Work Bench

    WordPress Resources at SiteGround
    Published. May 7, 2016

    WordPress is an award-winning web software, used by millions of webmasters worldwide for building their website or blog. SiteGround is proud to host this particular WordPress installation and provide users with multiple resources to facilitate the management of their WP websites: Expert WordPress Hosting SiteGround provides superior WordPress hosting focused on speed, security and customer … Continue reading "WordPress Resources at SiteGround"...


  • Technology Review Feed - Energy Top Stories

    Technology Review Feed - Energy Top Stories

    Obama’s Last Nuclear Summit Meets as the Threat of Terrorism Looms
    Published. March 31, 2016

    Barack Obama has made nuclear security a centerpiece of his administration, but experts say the risk of nuclear terrorism is ratcheting up....


  • Windows Embedded Standard

    Windows Embedded Standard

    June 2012 Security Updates are Live on ECE for XPe and Standard 2009
    Published. July 3, 2012

    The June 2012 Security Updates are now available on the ECE for Microsoft® Windows® XP Embedded with Service Pack 3 and Windows® Embedded Standard 2009. The list below applies to Standard 2009 only: KB2604121 – Vulnerabilities in .NET Framework Could Allow Remote Code Execution KB2656405 – Combined Security Update for Microsoft Office, Windows, .NET Framework,......


  • Stephane Boucher's DSP Blog

    Stephane Boucher's DSP Blog

    Mathematics and Cryptography
    Published. December 14, 2015

    The mathematics of number theory and elliptic curves can take a life time to learn because they are very deep subjects.  As engineers we don't have time to earn PhD's in math along with all the things we have to learn just to make communications systems work.  However, a little learning can go a long way to helping make our communications systems secure - we don't need to know......


  • Conversation Central

    Conversation Central

    Security Standards for the Cloud
    Published. June 15, 2010

    Guests: Jeff Green, Senior Vice President McAfee Labs, McAfee, and James Wendorf, IEEE-SA Industry Connections Program Manager Hosts: Harry Gries, Social Media Specialist and Customer Support, Xuropa, and Karen Bartleson, Sr. Director, Community Marketing, Synopsys Learn from Jeff Green about the standard efforts happening at IEEE around the measurement of cloud security. Learn about the differences […]...


  • John Coyne's Embedded Blog

    John Coyne's Embedded Blog

    Webcast: The New 'Standard' in Embedded: Windows 7 Componentized for Devices
    Published. June 29, 2010

      Hey Campers – Join me Tomorrow at 10AM PDT as I present a webcast on Windows Embedded Standard 7. we’ll go into the features we’ve included with this release that help you create an immersive device, and make it reliable, and secure. Should be...(read more)...


  • Rainer Makowitz << The Embedded Beat

    Rainer Makowitz << The Embedded Beat

    Securing telematics and infotainment
    Published. January 11, 2012

    By Rainer Makowitz — The Consumer Electronics Show 2012 is once again demonstrating to what extent consumer devices either enter the car or they get converted into their automotive equivalent and added to the feature list. The biggest expectations on value for the driver are in the field of infotainment and assist functions. Whether access […]...


  • Siliconcowboy's Blog

    Siliconcowboy's Blog

    Comment on Were the Five Recent/Worst Mass Murderers in the US Democrats? by Harry Lee Hedgecock
    Published. June 25, 2014

    Wow, just Wow. You're satisfied your point was made because we admit these lunatics shouldn't have had guns. LMAO Just because we agree these lunatics shouldn't have had guns, does not mean we think our 2nd amendment rights should be circumvented and trampled on just to make sure they don't have guns. "Those willing to give up freedom in exchange for security,deserves neither". ...


  • Ed Burnette's Dev Connection

    Ed Burnette's Dev Connection

    More Android malware FUD is the only thing that is sprouting
    Published. August 8, 2012

    Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....


  • CCIE Journey

    CCIE Journey

    CCIE Security v4 Advanced Technology Class over @ INE Started today
    Published. September 25, 2013

    If you are prepping for the lab this is something I am sure you are going to want to catch. Starting tomorrow, September 24th 2013 at 10:00 PDT (17:00 GMT), I will begin the running the new CCIE Security Advanced Technologies Class for the newest version 4.0 blueprint. Online streaming of tomorrow’s class is free […]...


  • Windows Embedded Blog

    Windows Embedded Blog

    How many embedded devices are you using each day?
    Published. October 20, 2011

    We all use embedded devices throughout the day without thinking about how many ‘smart’ systems are around us, from the in-car entertainment system, digital photo frame, home automation/security, digital signage, medical systems and more… When you start counting the number of devices you actually use each day the total number can be quite surprising! - Mike...


  • Joel on Software

    Joel on Software

    Free as in Fortune Cookies
    Published. January 28, 2015

    Trello has been out for less than two years and it’s been growing like wildfire. We recently hit 1.5 million members, of whom about 1/3 perform some action every month, and our MongoDB database now contains more than 70 million cards on 3.7 million boards. So the obvious question I get all the time is, “How exactly are you supposed to make money with that?” You may have noticed that Trello is free. Not “free trial,” not “freemium,” but just plain old free. Some people have justifiably...


  • Microchip Coupon Codes & Discounts

    Microchip Coupon Codes & Discounts

    Save 30% off the ICP2GANG-DS Production Quality ICSP Secure GANG Programmer from Softlog
    Published. December 26, 2011

    The ICP2GANG-DS Production Quality ICSP Secure GANG Programmer is a 4-channel in-circuit programmer (expandable up to 64 channels) that operates with a PC or as a standalone unit and simultaneously programs Microchip® 8-bit PIC MCUs and serial EEPROMs. The secure programming feature dramatically reduces the risk of unauthorized reconstruction of hex files, and also limits […]...


  • EDA Blog

    EDA Blog

    Flower Technology and EnSilica collaborate on ASIC mining solutions for cryptocurrencies like Bitcoin
    Published. April 17, 2014

    Bitcoin and other cryptocurrencies that are based on scrypt hashing algorithms (Lifecoin, Auroracoin, Dogecoin, and Mastercoin) are on the rise. Scrypt-based cryptocurrency ASIC mining solution start-up Flower Technologies and eSi-RISC soft processor core and encryption and peripherals company EnSilica have partnered to develop the Orchid, which boasts high hashing speed, energy efficiency, and price/performance for […]...


  • Laptops and Desktops Blog

    Laptops and Desktops Blog

    Fujitsu adds Intel Broadwell processors to new enterprise tablets, laptops
    Published. January 28, 2015

    The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features....


  • FPGA Blog

    FPGA Blog

    Connectivity kit for high-performance applications enables accelerated productivity
    Published. February 13, 2014

    Xilinx, Inc. has announced its new 40 Gbps platform Virtex-7 FPGA VC709 Connectivity Kit. This kit enables designers to streamline productivity for high-bandwidth/performance applications, such as high frequency trading appliances, network interface cards for security, and network monitoring. Read more Connectivity kit for high-performance applications enables accelerated productivityTwitter @fpgablog : : Free Publications : : […]...