• All About Microsoft

    All About Microsoft

    Windows 10 Fall Creators Update: What's coming on the security front
    Published. June 27, 2017

    Microsoft will be adding a number of new security features to Windows 10 Fall Creators Update, but for Enterprise and Windows Server users only....

  • Mocana Device Blog

    Mocana Device Blog

    Why Perimeter-based IoT Security is Not Enough
    Published. June 27, 2017

    Securing IoT machines is more complex and challenging than securing other physical devices. We need to embrace a new approach to security that goes beyond protecting the ingress and egress points of IoT networks....

  • Open Source Initiative blogs

    Open Source Initiative blogs

    Growing The Community
    Published. June 21, 2017

    How can you grow an open source community? Two blog posts from The Document Foundation (TDF) illustrate a proven double-ended strategy to sustain an existing community. Since it was established in 2010, the LibreOffice project has steadily grown under the guidance of The Document Foundation (TDF) where I’ve been a volunteer — most lately as a member of its Board. Starting from a complex political situation with a legacy codebase suffering extensive technical debt, TDF has been able to cultivate...

  • TI E2E Community

    TI E2E Community

    Blog Post: Step 5 to build a smart thermostat using an MCU – adding network connectivity
    Published. June 16, 2017

    Co-authored by Britta Ruelander , systems engineer at TI Internet of Things (IoT) technology makes products like thermostats smarter by connecting them to the network and enabling remote user access. The previous four blog posts of this “How to build a smart thermostat” series have covered key aspects of building a smart thermostat, including analog sensing, analog-to-digital conversion, data processing and human machine interface (HMI). This fifth blog post will discuss how to add network connectivity,...

  • Consumerization: BYOD

    Consumerization: BYOD

    Are you looking for a Security Multi-Device licenses giveaway ?
    Published. June 15, 2017

    Are you looking for a Security Multi-Device licenses giveaway ? Bitdefender products have 30 days money back guarantee, if your computers don't have antivirus software installed or it is expired, you can buy it now with 50% Off from [Bitdefender coupon]( page , if you win one of the 5 ......

  • Green Hills Software

    Green Hills Software

    Green Hills Software Announces Platform for Secure Connected Car to Address Critical Safety and Security Demands
    Published. June 7, 2017

    ISS Device Lifecycle Management Advances from Manufacturing to Operations with Secure Remote Updates and Management...

  • Linux and Open Source

    Linux and Open Source

    ?Why you must patch the new Linux sudo security hole
    Published. June 5, 2017

    Ironically, only the most secure Linux server setups are vulnerable to this newly discovered hole....

  • NextGenLog


    Published. May 17, 2017


  • Denali Memory Blog

    Denali Memory Blog

    Bluetooth 5: Making Your Smart Home a Reality
    Published. December 5, 2016

    We all know the futuristic vision of the world just around the corner. The vision where we tell our smart home that we’ve just left work at the end of a long day, and we’re heading home. Our home then tells the thermostat to warm up or cool down, lights to turn on, and the oven to start baking the lasagna we left in it that morning. We arrive to a warm, brightly lit home, and hot, freshly cooked food. You’ve got the vision, but do you have any idea how many connectivity and networking...

  • Everything USB

    Everything USB

    Ten Novelty Mice Definitely Worth Checking Out
    Published. March 29, 2017

    Fingerprint Security Mouse (2016) Thermaltake’s Black FP is a biometric security gaming mouse whose original design can be traced back to Black V2. Adding […] The post Ten Novelty Mice Definitely Worth Checking Out appeared first on Everything USB....

  • Tech Deseign Forums Blog

    Tech Deseign Forums Blog

    Verification Futures tackles safety and security
    Published. March 8, 2017

    The Verification Futures conference organized by European EDA consultancy TV&S returns for its seventh year in early April with a focus on safety and security in the growing area of cyber-physical systems....

  • Branden Williams' Security Coverage Blog

    Branden Williams' Security Coverage Blog

    More Printer Security Talk
    Published. March 7, 2017

    If you don’t have the context, read my previous post on comparing printers to VoIP—i.e., it’s another computer on our network. Now that you are in the right mindset, look around your office and see if you see a printer sitting somewhere. It might even do copies, scanning, and faxing. Super fancy ones might even […]...


    That was fun: mysql update nuked remote access
    Published. February 23, 2017

    Update your packages, they said. It will be more secure, they said. I guess it was. No network access to the databases. Even after turning the database server instance to listen again on the right port, I had to go in and redo the passwords and privileges. So yeah, this broke my MySQL instance for […]...

  • David Lacey's IT Security Blog

    David Lacey's IT Security Blog

    Calling the odds
    Published. May 20, 2016

    I’ve had some interesting conversations recently with Professor Fred Piper regarding risk probability. The discussion started because I was concerned about assessments of risk probability, as one might routinely use to populate a risk heat map or risk register. What’s the problem? For me, it’s the fact that, as the probability of an incident occurring... The post Calling the odds appeared first on David Laceys IT Security Blog....

  • Verification Horizons Blog

    Verification Horizons Blog

    How Formal Techniques Can Keep Hackers from Leaving You in the Cold
    Published. November 15, 2016

    While internet connected vehicles remain a popular target for hackers, the new breed of “smart” devices have the potential to invite the bad guys inside your home and force you to pay them to leave. Specifically, in a DefCon 2016 demo security researchers Andrew Tierney and Ken Munro showed how an internet connected thermostat could […]...

  • Team Verify's Blog

    Team Verify's Blog

    Shameless Promotion: Free Club Formal San Jose (with Lunch) on Wednesday 10/17
    Published. September 24, 2012

    Please join Team Verify and other design and verification engineers at the next "Club Formal" on the Cadence San Jose campus on Wednesday, October 17 at 11:30am . This free, half-day event (including lunch) is a great opportunity to learn more about general advances in formal analysis and assertion-based verification, and to network with others in your field. Based on attendee feedback from previous events, we will deep-dive on the following topics: * How customers are using the new Coverage...

  • Ran Avinun's Blog

    Ran Avinun's Blog

    Cadence System Design and Verification at DAC 2009
    Published. July 6, 2009

    Traditionally in Cadence Marketing there were always two major events you really had to focus on: Sales Kick Off in the winter and the Design Automation Conference (DAC) in the summer. A lot has changed. Starting a few years ago, Cadence added a great deal more: webinars, seminars, segment-specific trade shows, and of course CDNLive! -- all to help you, our customers and users, stay up to date on the latest Cadence technology.Some voices in the past have accused Cadence of "ignoring" the...

  • Frank Schirrmeister Blog

    Frank Schirrmeister Blog

    DAC 2015 – Join Us to Experience the Continuum of Verification and System Development Engines!
    Published. June 4, 2015

    The biggest yearly event in electronic design automation (EDA) is due to take over San Francisco next week, together, apparently, with the Apple developer community, to take over the Moscone Convention Center. This is the first DAC at which all three big EDA vendors will talk about their continuum of verification engines. I will continue to point out (until being stopped) that Cadence was the first vendor to announce its offering in this space – the System Development Suite – at least three years...

  • Robert Dwyer's Blog

    Robert Dwyer's Blog

    Demo: Automatic Floorplan Synthesis in Encounter
    Published. February 26, 2009

    As an Applications Engineer, the first demonstrations you deliver of a new technology are always the most interesting. The questions you receieve are all over the map and your skills in thinking on your feet are put to the test. Personally, I really enjoy this learning phase and as I was putting together this screencast, I was reminded of the first demo I ever gave of First Encounter back in 2001. The primary question in the meeting that I didn't have a good answer for was this: "Does First...

  • Team Specman Blog

    Team Specman Blog

    Sign Up For Free Verification Sessions -- Only A Few Days Left
    Published. July 19, 2010

    Mark your calendar and sign up for the two upcoming free verification sessions sponsored by Cadence. Space is limited. So, please sign up today! JULY 21 st All-Day, Hands-on technical workshop in Irvine, CA Topic: Advanced Verification Techniques using e /SV Workshop Learn how to architect an advanced testbench using OVM/UVM that contains generation, coverage and checking and much, much more..... This workshop will focus on introducing attendees to advanced verification techniques using the latest...

  • Adam Sherer Blog

    Adam Sherer Blog

    Xilinx SoC FPGAs Ideal Fit For OVM and MDV
    Published. June 24, 2009

    Processor-based FPGAs represent 40% of all the design starts today and will rise to > 50% in 2011 (Gartner, March 2009). In the same time period, the number of ASIC-based SoC starts is about an order of magnitude smaller. Sure, many of the FPGA starts use 8-bit processors and have a small amount of logic, but the high-end SoCs -- represented by product families such as the Xilinx(R) Virtex(R)-6 and Spartan(R)-6 -- are growing fast. That is exactly the type of design we've targeted with the...

  • Chris A. Ciufo on All Things Embedded

    Chris A. Ciufo on All Things Embedded

    Does Secure Erase Actually Work?
    Published. July 18, 2016

    Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documents recommend it. In Part 1 of this blog (“How Does One … Continue reading →...

  • Rands In Repose

    Rands In Repose

    Turn on 2FA before it’s too late
    Published. July 17, 2016

    Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required… More#...

  • Steven Brown's Blog

    Steven Brown's Blog

    What Memory Best Fits Your Application?
    Published. May 27, 2016

    With highly effective DDR4 and LPDDR4 class memories, it’s not always easy to know what kind of memory will best fit the needs of your application? What is the optimal compromise between keeping costs in check and optimizing performance? To answer that we have to take a step back and look at the history of the DDRs. In the PC memory area, we have the DDR2, DDR3 and DDR4. On the LPDDR front there are LPDDR2, LPDDR3, LPDDR4. Figure 1: History of DDR Memory The DDR4 standard took from 7 to 10 years...

  • Steven Brown's Blog

    Steven Brown's Blog

    What Memory Best Fits Your Application?
    Published. May 27, 2016

    With highly effective DDR4 and LPDDR4 class memories, it’s not always easy to know what kind of memory will best fit the needs of your application? What is the optimal compromise between keeping costs in check and optimizing performance? To answer that we have to take a step back and look at the history of the DDRs. In the PC memory area, we have the DDR2, DDR3 and DDR4. On the LPDDR front there are LPDDR2, LPDDR3, LPDDR4. Figure 1: History of DDR Memory The DDR4 standard took from 7 to 10 years...

  • Electronics Engineering Video Blog Podcast

    Electronics Engineering Video Blog Podcast

    EEVblog #883 – Orange Pi One vs Raspberry Pi 2
    Published. May 24, 2016

    Dave takes a look at the Orange Pi One $10 single board 4 ARM Cortex A7 processor computer and compares it to the Raspberry Pi 2. Coving the install of the ARMbian flavour of Debian. Beware the security bug! And what is the power/watt efficiency between the two? Schematic HERE Allwinner H3 datasheet Open source ......

  • John Day

    John Day

    V2X-Enhanced GNSS Improves Vehicle Positioning Reliability
    Published. May 22, 2016

    Another step toward semi- and fully-autonomous vehicles. STMicroelectronics and Israel-based V2X developer Autotalks, have fused GNSS (Global Navigation Satellite System) technology and V2X ranging. The firms say their V2X-Enhanced GNSS ensures authenticated and secure vehicle localization for extreme accuracy and reliability of positioning information, especially in urban canyons, tunnels, and parking structures where accurate absolute […]...

  • Urban Work Bench

    Urban Work Bench

    WordPress Resources at SiteGround
    Published. May 7, 2016

    WordPress is an award-winning web software, used by millions of webmasters worldwide for building their website or blog. SiteGround is proud to host this particular WordPress installation and provide users with multiple resources to facilitate the management of their WP websites: Expert WordPress Hosting SiteGround provides superior WordPress hosting focused on speed, security and customer … Continue reading "WordPress Resources at SiteGround"...

  • Technology Review Feed - Energy Top Stories

    Technology Review Feed - Energy Top Stories

    Obama’s Last Nuclear Summit Meets as the Threat of Terrorism Looms
    Published. March 31, 2016

    Barack Obama has made nuclear security a centerpiece of his administration, but experts say the risk of nuclear terrorism is ratcheting up....

  • Windows Embedded Standard

    Windows Embedded Standard

    June 2012 Security Updates are Live on ECE for XPe and Standard 2009
    Published. July 3, 2012

    The June 2012 Security Updates are now available on the ECE for Microsoft® Windows® XP Embedded with Service Pack 3 and Windows® Embedded Standard 2009. The list below applies to Standard 2009 only: KB2604121 – Vulnerabilities in .NET Framework Could Allow Remote Code Execution KB2656405 – Combined Security Update for Microsoft Office, Windows, .NET Framework,......

  • Stephane Boucher's DSP Blog

    Stephane Boucher's DSP Blog

    Mathematics and Cryptography
    Published. December 14, 2015

    The mathematics of number theory and elliptic curves can take a life time to learn because they are very deep subjects.  As engineers we don't have time to earn PhD's in math along with all the things we have to learn just to make communications systems work.  However, a little learning can go a long way to helping make our communications systems secure - we don't need to know......

  • Barr Code

    Barr Code

    Government-Sponsored Hacking of Embedded Systems
    Published. March 11, 2015

    Everywhere you look these days, it is readily apparent that embedded systems of all types are under attack by hackers. In just one example from the last few weeks, researchers at Kaspersky Lab (a Moscow-headquartered maker of anti-virus and other software security products) published a report documenting a specific pernicious and malicious attack against “virtually […]...

  • MyEclipse


    Genuitec Heads to CeBIT
    Published. February 25, 2015

    We are super-excited to be making our debut appearance at CeBIT’s Developer World in Hannover, Germany March 16-20. Genuitec team member, Emanuel Darlea, will be there meeting up with enterprise IT technologists to talk about how Secure Delivery Center and MyEclipse can make a difference in their organizations. Here are some highlights:Simplify the method for giving teams the IDEs they needMaintain central … Read More The post Genuitec Heads to CeBIT appeared first on Genuitec....

  • Conversation Central

    Conversation Central

    Security Standards for the Cloud
    Published. June 15, 2010

    Guests: Jeff Green, Senior Vice President McAfee Labs, McAfee, and James Wendorf, IEEE-SA Industry Connections Program Manager Hosts: Harry Gries, Social Media Specialist and Customer Support, Xuropa, and Karen Bartleson, Sr. Director, Community Marketing, Synopsys Learn from Jeff Green about the standard efforts happening at IEEE around the measurement of cloud security. Learn about the differences […]...

  • John Coyne's Embedded Blog

    John Coyne's Embedded Blog

    Webcast: The New 'Standard' in Embedded: Windows 7 Componentized for Devices
    Published. June 29, 2010

      Hey Campers – Join me Tomorrow at 10AM PDT as I present a webcast on Windows Embedded Standard 7. we’ll go into the features we’ve included with this release that help you create an immersive device, and make it reliable, and secure. Should be...(read more)...

  • Rainer Makowitz << The Embedded Beat

    Rainer Makowitz << The Embedded Beat

    Securing telematics and infotainment
    Published. January 11, 2012

    By Rainer Makowitz — The Consumer Electronics Show 2012 is once again demonstrating to what extent consumer devices either enter the car or they get converted into their automotive equivalent and added to the feature list. The biggest expectations on value for the driver are in the field of infotainment and assist functions. Whether access […]...

  • Siliconcowboy's Blog

    Siliconcowboy's Blog

    Comment on Were the Five Recent/Worst Mass Murderers in the US Democrats? by Harry Lee Hedgecock
    Published. June 25, 2014

    Wow, just Wow. You're satisfied your point was made because we admit these lunatics shouldn't have had guns. LMAO Just because we agree these lunatics shouldn't have had guns, does not mean we think our 2nd amendment rights should be circumvented and trampled on just to make sure they don't have guns. "Those willing to give up freedom in exchange for security,deserves neither". ...

  • Ed Burnette's Dev Connection

    Ed Burnette's Dev Connection

    More Android malware FUD is the only thing that is sprouting
    Published. August 8, 2012

    Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....

  • CCIE Journey

    CCIE Journey

    CCIE Security v4 Advanced Technology Class over @ INE Started today
    Published. September 25, 2013

    If you are prepping for the lab this is something I am sure you are going to want to catch. Starting tomorrow, September 24th 2013 at 10:00 PDT (17:00 GMT), I will begin the running the new CCIE Security Advanced Technologies Class for the newest version 4.0 blueprint. Online streaming of tomorrow’s class is free […]...

  • Windows Embedded Blog

    Windows Embedded Blog

    How many embedded devices are you using each day?
    Published. October 20, 2011

    We all use embedded devices throughout the day without thinking about how many ‘smart’ systems are around us, from the in-car entertainment system, digital photo frame, home automation/security, digital signage, medical systems and more… When you start counting the number of devices you actually use each day the total number can be quite surprising! - Mike...

  • Joel on Software

    Joel on Software

    Free as in Fortune Cookies
    Published. January 28, 2015

    Trello has been out for less than two years and it’s been growing like wildfire. We recently hit 1.5 million members, of whom about 1/3 perform some action every month, and our MongoDB database now contains more than 70 million cards on 3.7 million boards. So the obvious question I get all the time is, “How exactly are you supposed to make money with that?” You may have noticed that Trello is free. Not “free trial,” not “freemium,” but just plain old free. Some people have justifiably...

  • Microchip Coupon Codes & Discounts

    Microchip Coupon Codes & Discounts

    Save 30% off the ICP2GANG-DS Production Quality ICSP Secure GANG Programmer from Softlog
    Published. December 26, 2011

    The ICP2GANG-DS Production Quality ICSP Secure GANG Programmer is a 4-channel in-circuit programmer (expandable up to 64 channels) that operates with a PC or as a standalone unit and simultaneously programs Microchip® 8-bit PIC MCUs and serial EEPROMs. The secure programming feature dramatically reduces the risk of unauthorized reconstruction of hex files, and also limits […]...

  • EDA Blog

    EDA Blog

    Flower Technology and EnSilica collaborate on ASIC mining solutions for cryptocurrencies like Bitcoin
    Published. April 17, 2014

    Bitcoin and other cryptocurrencies that are based on scrypt hashing algorithms (Lifecoin, Auroracoin, Dogecoin, and Mastercoin) are on the rise. Scrypt-based cryptocurrency ASIC mining solution start-up Flower Technologies and eSi-RISC soft processor core and encryption and peripherals company EnSilica have partnered to develop the Orchid, which boasts high hashing speed, energy efficiency, and price/performance for […]...

  • Laptops and Desktops Blog

    Laptops and Desktops Blog

    Fujitsu adds Intel Broadwell processors to new enterprise tablets, laptops
    Published. January 28, 2015

    The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features....

  • FPGA Blog

    FPGA Blog

    Connectivity kit for high-performance applications enables accelerated productivity
    Published. February 13, 2014

    Xilinx, Inc. has announced its new 40 Gbps platform Virtex-7 FPGA VC709 Connectivity Kit. This kit enables designers to streamline productivity for high-bandwidth/performance applications, such as high frequency trading appliances, network interface cards for security, and network monitoring. Read more Connectivity kit for high-performance applications enables accelerated productivityTwitter @fpgablog : : Free Publications : : […]...