Krebs on Security
Email Provider VFEmail Suffers ‘Catastrophic’ Hack
Published. February 12, 2019Email provider VFEmail has suffered what the company is calling "catastrophic destruction" at the hands of an as-yet unknown intruder who trashed all of the company's primary and backup data in the United States. The firm's founder says he now fears some 18 years' worth of customer email may be gone forever....
IEEE Tech Talk Blog
Scientists Discover a New Kind of Magnet
Published. February 7, 2019Its magnetic properties come from spin excitons, and could someday improve the speed and power consumption of data storage devices...
MS Storage, Backup, & Recovery
Azure Backup now supports PowerShell and ACLs for Azure Files
Published. January 22, 2019We are excited to reveal a set of new features for backing up Microsoft Azure file shares natively using Azure Backup. All backup-related features have also been released to support file shares connected to Azure File Sync....
MS Security
Azure Backup for virtual machines behind an Azure Firewall
Published. January 14, 2019This blog post primarily discusses how Microsoft Azure Firewall and Azure Backup can be leveraged to provide comprehensive protection to your data. The former protects your network, while the latter backs up your data to the cloud....
NVMExpress
NVM Express® Participates in the First NVMe™ Technology Industry Event
Published. December 18, 2018By Jonmichael Hands, NVM Express Marketing Co-Chair 2018 was a huge year for NVMe™. NVMe SSD shipments now make up the majority of SSD revenue and capacity shipments, and some analysists are showing that the industry average ASP of NVMe is now equivalent of SATA, driven by hyperscale deployments. It was also a huge year [...]...
Micron Storage Blog
AMAX® Total Computing Solutions Finds That Micron’s 5210 ION QLC SSD Simplifies and Accelerates deep Learning with their StorMax™ NFS
Published. November 15, 2018Designing a new drive and running benchmarks in the lab is one thing, but putting it through a real work test is completely different. We decided to reach out to the experts....
Electronics Engineering Video Blog
EEVblog #1144 – Padauk Programmer Reverse Engineering
Published. November 11, 2018David looks at the pins on the Padauk PMS150 programmer for potential reverse engineering. TLDR; It doesn’t look easy to reverse engineer this protocol, it’s messy with lots of voltage levels, as Padauk said it would be. Just buy the programmer for now! There is also a Flash/EEPROM re-programmable version of the chip, the PFS154C. ......
scalability.org
WordPress is recovering (was very sick)
Published. August 1, 2018Please note: WordPress appears to be failing badly at this stage. I’ll be working on a fix this week, and likely will create a new site out of different, less buggy code. I’ve checked the DB, moved it to a different machine, restored from a known working backup. It appears a recent update of WP ... Read moreWordPress is recovering (was very sick)...
The Moth
How I Record Screencasts
Published. November 8, 2012I get this asked a lot so here is my brain dump on the topic. What A screencast is just a demo that you present to yourself while recording the screen. As such, my advice for clearing your screen for demo purposes and setting up Visual Studio still applies here (adjusting for the fact I wrote those blog posts when I was running Vista and VS2008, not Windows 8 and VS2012). To see examples of screencasts, watch any of my screencasts on channel9. Why If you are a technical presenter, think of...
PCB Signal and Power Integrity Tech Corner
SERDES Channel Compliance: Easier Said than Done?
Published. June 13, 2018Data transfers can be done in two distinct ways, parallel (DDR2/3) and serial (PCIE/USB). As the speeds of data transfer increase, hardware engineers face newer design challenges. To keep up with the new speeds, designers must adhere to many well-established industry standards. But that is easier said than done… Until now. With the latest release […]...
Laptops and Desktops Blog
Intel boosts class-leading speed with Optane SSD 905P drives
Published. May 6, 2018Starting at $599, the new drive family promises improved performance and offers greater capacity for workstation users and desktop enthusiasts....
Stack Overflow
EEPROM Wear Leveling
Published. July 5, 2017A problem that occurs from time to time is the need for an embedded system to keep track of the number of doodads it has processed since it was put in to service. Clearly you can’t keep this value in RAM as it will be lost when power is removed. Thus the obvious solution is […]...
All About Microsoft
Microsoft adds new SSD disk option to its Azure Data Box Disk appliance
Published. July 12, 2018Microsoft is adding previews of new Azure Box data-migration, Azure Virtual WAN and Azure Firewall services to its line-up....
Engineer Zone
Functional Safety for Lifts (elevators)
Published. June 19, 2018I recently came across a series of standards for lifts (elevators), escalators and moving walkways. I thought it was a good example of a sector specific standard. The standard in question is ISO 22201-1 and was first published in 2017. It uses SIL levels and lists fifty one safety functions and gives a SIL for each one with a maximum SIL of 3. This is one of the nice things about a sector specific standard if one exists. It takes the generic IEC 61508 standard and identifies the requirements which...
Engineer Zone
Shakespeare, Rumrunners, and Pearl Harbor
Published. July 16, 2018It was April 21, 1916 and the people of Chicago were enjoying a beautiful Spring day, their city's grueling winter behind them and the unrelenting heat of summer a few months ahead. The Chicago Cubs baseball team had opened their first season at the two year-old Weegman Park the day before and, despite the Cubs' fifth-place finish the previous season, hopes ran high for a return to the World Series. Overall, 1916 was a grand year for a city intent on burnishing its broad-shouldered reputation. This...
Linux and Open Source
IBM's new Nabla containers are designed for security first
Published. July 16, 2018IBM claims its new container design is more secure than Docker or other containers by cutting operating system calls to the bare minimum and thereby reducing its attack surface as small as possible....
Mocana IoT Security Blog
Securing IoT Device-to-Cloud Communications
Published. July 13, 2018According to IDC, global public cloud spending is expected to exceed $203 billion by 2020. As enterprises make the transition to digital, they perceive the cloud as an enabler of modernization and provider of competitive advantages such as cost savings, scalability, and agility....
Tech Design Forums Blog
Holistic verification change needed for self-driving cars
Published. June 19, 2018Verification of the coming generation of highly autonomous vehicles needs says Peter Davies, director of security concepts at Thales....
Verification Horizons Blog
Accellera Proposes a New Working Group
Published. April 6, 2018Accellera to explore the need for an IP Security Assurance Standard In the era of SoC design where major design intellectual property (IP) blocks come from multiple sources and are combined to create an SoC or major block to be incorporated into yet another SoC, how can one test such systems to ensure they are […]...
Barr Code
C: The Immortal Programming Language
Published. February 22, 2018Barr Group’s 2018 Embedded Systems Safety & Security Survey is now closed and I am in the midst of analyzing the data. This year a portion of my analysis is focused on multi-year trends. One trend that really stands out to me is that the C programming language refuses to give up the ghost. A […]...
Gabe On EDA
ARM TechCon Report on IoT, Automotive, and Security
Published. November 1, 2017ARM TechCon Report on IoT, Automotive, and Security Gabe Moretti Wed, 11/01/2017 - 07:58...
Functional Verification Blog
Sign Up For Free Verification Sessions -- Only A Few Days Left
Published. July 19, 2010Mark your calendar and sign up for the two upcoming free verification sessions sponsored by Cadence. Space is limited. So, please sign up today! JULY 21 st All-Day, Hands-on technical workshop in Irvine, CA Topic: Advanced Verification Techniques using e /SV Workshop Learn how to architect an advanced testbench using OVM/UVM that contains generation, coverage and checking and much, much more..... This workshop will focus on introducing attendees to advanced verification techniques using the latest...
Electrical Engineers Talk Tech
Does Secure Erase Actually Work?
Published. July 18, 2016Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documents recommend it. In Part 1 of this blog (“How Does One … Continue reading →...
Rands In Repose
Turn on 2FA before it’s too late
Published. July 17, 2016Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required… More#...
Stephane Boucher's DSP Blog
Mathematics and Cryptography
Published. December 14, 2015The mathematics of number theory and elliptic curves can take a life time to learn because they are very deep subjects. As engineers we don't have time to earn PhD's in math along with all the things we have to learn just to make communications systems work. However, a little learning can go a long way to helping make our communications systems secure - we don't need to know......
Ed Burnette's Dev Connection
More Android malware FUD is the only thing that is sprouting
Published. August 8, 2012Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....
Community
