Community

  • Krebs on Security

    Krebs on Security


    Email Provider VFEmail Suffers ‘Catastrophic’ Hack
    Published. February 12, 2019

    Email provider VFEmail has suffered what the company is calling "catastrophic destruction" at the hands of an as-yet unknown intruder who trashed all of the company's primary and backup data in the United States. The firm's founder says he now fears some 18 years' worth of customer email may be gone forever....


  • IEEE Tech Talk Blog

    IEEE Tech Talk Blog


    Scientists Discover a New Kind of Magnet
    Published. February 7, 2019

    Its magnetic properties come from spin excitons, and could someday improve the speed and power consumption of data storage devices...


  • MS Storage, Backup, & Recovery

    MS Storage, Backup, & Recovery


    Azure Backup now supports PowerShell and ACLs for Azure Files
    Published. January 22, 2019

    We are excited to reveal a set of new features for backing up Microsoft Azure file shares natively using Azure Backup. All backup-related features have also been released to support file shares connected to Azure File Sync....


  • MS Security

    MS Security


    Azure Backup for virtual machines behind an Azure Firewall
    Published. January 14, 2019

    This blog post primarily discusses how Microsoft Azure Firewall and Azure Backup can be leveraged to provide comprehensive protection to your data. The former protects your network, while the latter backs up your data to the cloud....


  • NVMExpress

    NVMExpress


    NVM Express® Participates in the First NVMe™ Technology Industry Event
    Published. December 18, 2018

    By Jonmichael Hands, NVM Express Marketing Co-Chair 2018 was a huge year for NVMe™. NVMe SSD shipments now make up the majority of SSD revenue and capacity shipments, and some analysists are showing that the industry average ASP of NVMe is now equivalent of SATA, driven by hyperscale deployments. It was also a huge year [...]...


  • Micron Storage Blog

    Micron Storage Blog


    AMAX® Total Computing Solutions Finds That Micron’s 5210 ION QLC SSD Simplifies and Accelerates deep Learning with their StorMax™ NFS
    Published. November 15, 2018

    Designing a new drive and running benchmarks in the lab is one thing, but putting it through a real work test is completely different. We decided to reach out to the experts....


  • Electronics Engineering Video Blog

    Electronics Engineering Video Blog


    EEVblog #1144 – Padauk Programmer Reverse Engineering
    Published. November 11, 2018

    David looks at the pins on the Padauk PMS150 programmer for potential reverse engineering. TLDR; It doesn’t look easy to reverse engineer this protocol, it’s messy with lots of voltage levels, as Padauk said it would be. Just buy the programmer for now! There is also a Flash/EEPROM re-programmable version of the chip, the PFS154C. ......


  • scalability.org

    scalability.org


    WordPress is recovering (was very sick)
    Published. August 1, 2018

    Please note: WordPress appears to be failing badly at this stage. I’ll be working on a fix this week, and likely will create a new site out of different, less buggy code. I’ve checked the DB, moved it to a different machine, restored from a known working backup. It appears a recent update of WP ... Read moreWordPress is recovering (was very sick)...


  • The Moth

    The Moth


    How I Record Screencasts
    Published. November 8, 2012

    I get this asked a lot so here is my brain dump on the topic. What A screencast is just a demo that you present to yourself while recording the screen. As such, my advice for clearing your screen for demo purposes and setting up Visual Studio still applies here (adjusting for the fact I wrote those blog posts when I was running Vista and VS2008, not Windows 8 and VS2012). To see examples of screencasts, watch any of my screencasts on channel9. Why If you are a technical presenter, think of...


  • PCB Signal and Power Integrity Tech Corner

    PCB Signal and Power Integrity Tech Corner


    SERDES Channel Compliance: Easier Said than Done?
    Published. June 13, 2018

    Data transfers can be done in two distinct ways, parallel (DDR2/3) and serial (PCIE/USB). As the speeds of data transfer increase, hardware engineers face newer design challenges. To keep up with the new speeds, designers must adhere to many well-established industry standards. But that is easier said than done… Until now. With the latest release […]...


  • Laptops and Desktops Blog

    Laptops and Desktops Blog


    Intel boosts class-leading speed with Optane SSD 905P drives
    Published. May 6, 2018

    Starting at $599, the new drive family promises improved performance and offers greater capacity for workstation users and desktop enthusiasts....


  • Stack Overflow

    Stack Overflow


    EEPROM Wear Leveling
    Published. July 5, 2017

    A problem that occurs from time to time is the need for an embedded system to keep track of the number of doodads it has processed since it was put in to service. Clearly you can’t keep this value in RAM as it will be lost when power is removed. Thus the obvious solution is […]...


  • All About Microsoft

    All About Microsoft


    Microsoft adds new SSD disk option to its Azure Data Box Disk appliance
    Published. July 12, 2018

    Microsoft is adding previews of new Azure Box data-migration, Azure Virtual WAN and Azure Firewall services to its line-up....


  • Engineer Zone

    Engineer Zone


    Functional Safety for Lifts (elevators)
    Published. June 19, 2018

    I recently came across a series of standards for lifts (elevators), escalators and moving walkways. I thought it was a good example of a sector specific standard. The standard in question is ISO 22201-1 and was first published in 2017. It uses SIL levels and lists fifty one safety functions and gives a SIL for each one with a maximum SIL of 3. This is one of the nice things about a sector specific standard if one exists. It takes the generic IEC 61508 standard and identifies the requirements which...


  • Engineer Zone

    Engineer Zone


    Shakespeare, Rumrunners, and Pearl Harbor
    Published. July 16, 2018

    It was April 21, 1916 and the people of Chicago were enjoying a beautiful Spring day, their city's grueling winter behind them and the unrelenting heat of summer a few months ahead. The Chicago Cubs baseball team had opened their first season at the two year-old Weegman Park the day before and, despite the Cubs' fifth-place finish the previous season, hopes ran high for a return to the World Series. Overall, 1916 was a grand year for a city intent on burnishing its broad-shouldered reputation. This...


  • Linux and Open Source

    Linux and Open Source


    IBM's new Nabla containers are designed for security first
    Published. July 16, 2018

    IBM claims its new container design is more secure than Docker or other containers by cutting operating system calls to the bare minimum and thereby reducing its attack surface as small as possible....


  • Mocana IoT Security Blog

    Mocana IoT Security Blog


    Securing IoT Device-to-Cloud Communications
    Published. July 13, 2018

    According to IDC, global public cloud spending is expected to exceed $203 billion by 2020. As enterprises make the transition to digital, they perceive the cloud as an enabler of modernization and provider of competitive advantages such as cost savings, scalability, and agility....


  • Tech Design Forums Blog

    Tech Design Forums Blog


    Holistic verification change needed for self-driving cars
    Published. June 19, 2018

    Verification of the coming generation of highly autonomous vehicles needs says Peter Davies, director of security concepts at Thales....


  • Verification Horizons Blog

    Verification Horizons Blog


    Accellera Proposes a New Working Group
    Published. April 6, 2018

    Accellera to explore the need for an IP Security Assurance Standard In the era of SoC design where major design intellectual property (IP) blocks come from multiple sources and are combined to create an SoC or major block to be incorporated into yet another SoC, how can one test such systems to ensure they are […]...


  • Barr Code

    Barr Code


    C: The Immortal Programming Language
    Published. February 22, 2018

    Barr Group’s 2018 Embedded Systems Safety & Security Survey is now closed and I am in the midst of analyzing the data. This year a portion of my analysis is focused on multi-year trends. One trend that really stands out to me is that the C programming language refuses to give up the ghost. A […]...


  • Gabe On EDA

    Gabe On EDA


    ARM TechCon Report on IoT, Automotive, and Security
    Published. November 1, 2017

    ARM TechCon Report on IoT, Automotive, and Security Gabe Moretti Wed, 11/01/2017 - 07:58...


  • Functional Verification Blog

    Functional Verification Blog


    Sign Up For Free Verification Sessions -- Only A Few Days Left
    Published. July 19, 2010

    Mark your calendar and sign up for the two upcoming free verification sessions sponsored by Cadence. Space is limited. So, please sign up today! JULY 21 st All-Day, Hands-on technical workshop in Irvine, CA Topic: Advanced Verification Techniques using e /SV Workshop Learn how to architect an advanced testbench using OVM/UVM that contains generation, coverage and checking and much, much more..... This workshop will focus on introducing attendees to advanced verification techniques using the latest...


  • Electrical Engineers  Talk Tech

    Electrical Engineers Talk Tech


    Does Secure Erase Actually Work?
    Published. July 18, 2016

    Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documents recommend it. In Part 1 of this blog (“How Does One … Continue reading →...


  • Rands In Repose

    Rands In Repose


    Turn on 2FA before it’s too late
    Published. July 17, 2016

    Two-factor authentication (“2FA”) is intended as another layer of security to your online accounts, so if your password is hacked, your account can’t be accessed without a special code. While I clearly understand the value, I’ve been lazy about enabling on various services since… it’s a hassle. I’ve only enabled it when I’ve been required… More#...


  • Stephane Boucher's DSP Blog

    Stephane Boucher's DSP Blog


    Mathematics and Cryptography
    Published. December 14, 2015

    The mathematics of number theory and elliptic curves can take a life time to learn because they are very deep subjects.  As engineers we don't have time to earn PhD's in math along with all the things we have to learn just to make communications systems work.  However, a little learning can go a long way to helping make our communications systems secure - we don't need to know......


  • Ed Burnette's Dev Connection

    Ed Burnette's Dev Connection


    More Android malware FUD is the only thing that is sprouting
    Published. August 8, 2012

    Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....



Extension Media websites place cookies on your device to give you the best user experience. By using our websites, you agree to placement of these cookies and to our Privacy Policy. Please click here to accept.