Synaptics is an understated innovator in the human interface and end user experience technology space, and many of the hottest smartphones, tablets and PCs have their technology inside. The Samsung Galaxy S7, Apple iPhone 6S, Dell XPS 15, Microsoft Surface and Surface Book, and HP ENVY are just a few of these products I’ve personally… Read More
The CyberSecurity Emperor Has No Clothes
In the past year, I’ve written numerous articles that have a common theme: the security world is badly broken as crypto schemas developed in the 90’s are no defense for today’s sophisticated hackers. For the most part, my blogs have been very well received, and have been picked up and posted by multiple sites and publications worldwide.… Read More
Moving chips from industrial to industrial IoT
IHS has put out its 1Q2016 Application Market Forecast predicting the highest growth rate segments for semiconductors over the next five years – and what was once old is new yet again. There it is, in the top right corner: industrial, projected to outpace even the automotive sector.… Read More
DAC 2016 – Register Now
DAC is again going to be in Austin (reason enough to go), from June 6[SUP]th[/SUP]-8[SUP]th[/SUP] for the main event. A number of events caught my eye:
- Monday AM – custom hardware for algorithmic trading. If you want to know more about FinTech (technology for finance) this could be for you
- Another Monday morning session on Linux
We All Need To Get Serious About Protecting Company Data With Hardened, Multi-Factor Authentication
The world is becoming a less and less secure place due to the plethora of hacks that have happened over the course of the past few years. Companies like Sony, T-Mobile, Anthem, Target and their customers have been victims of countless cyber-attacks that resulted in many people’s information being compromised.
These breaches have… Read More
Deep Learning and Security
Deep learning based on neural nets is most commonly thought of as a very promising approach to scene recognition, text recognition and similar areas. Now there is increasing interest in applying this technology to security objectives. There were a number of papers on this topic in a 2015 BlackHat conference and there are several… Read More
Neural nets for Qualcomm Snapdragon
Neural nets are hot these days. In this forum certainly you can’t swing a cat without hitting multiple articles on the topic – I’ve written some myself. For me there are two reasons for this interest. First, neural nets are amazingly successful at what they do, for example in image recognition where they can beat… Read More
Data Security: Magic vs. Common Sense
I remember when I was a kid and my dad would perform magic tricks. His magic was so bad but at the time I thought it really worked and was real. You know the trick – get a coin, put it in your hand, wave your other hand over the coin, say ‘abra kadabra’ and then put the coin into the other hand when the person isn’t … Read More
Quantum Code-Cracking Takes Another Hit: Lattice-based Cryptography
Public-key crypto-systems rely these days on approaches founded in mathematical methods which are provably hard to crack. The easiest to understand requires factorization of a key based on the product of two large prime numbers. Much has been made recently of the ability of quantum computers to crack this style of encryption.… Read More
10 Predictions for the Future of IoT
A Google search for “Internet of Things” term reveals over 280,000,000 results, thanks to the media making the connection between the smart home, wearable devices, and the connected automobile, IoT has begun to become part of the popular parlance. But that’s not the complete picture, according to Gartner’s… Read More
Achieving Seamless 1.6 Tbps Interoperability for High BW HPC AI/ML SoCs: A Technical Webinar with Samtec and Synopsys