800x100 Webinar (1)
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 300
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 300
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Moving chips from industrial to industrial IoT

Moving chips from industrial to industrial IoT
by Don Dingee on 05-27-2016 at 4:00 pm

IHS has put out its 1Q2016 Application Market Forecast predicting the highest growth rate segments for semiconductors over the next five years – and what was once old is new yet again. There it is, in the top right corner: industrial, projected to outpace even the automotive sector.… Read More


DAC 2016 – Register Now

DAC 2016 – Register Now
by Bernard Murphy on 05-16-2016 at 7:00 am

DAC is again going to be in Austin (reason enough to go), from June 6[SUP]th[/SUP]-8[SUP]th[/SUP] for the main event. A number of events caught my eye:

  • Monday AM – custom hardware for algorithmic trading. If you want to know more about FinTech (technology for finance) this could be for you
  • Another Monday morning session on Linux
Read More

We All Need To Get Serious About Protecting Company Data With Hardened, Multi-Factor Authentication

We All Need To Get Serious About Protecting Company Data With Hardened, Multi-Factor Authentication
by Patrick Moorhead on 05-11-2016 at 7:00 am

The world is becoming a less and less secure place due to the plethora of hacks that have happened over the course of the past few years. Companies like Sony, T-Mobile, Anthem, Target and their customers have been victims of countless cyber-attacks that resulted in many people’s information being compromised.

These breaches have… Read More


Deep Learning and Security

Deep Learning and Security
by Bernard Murphy on 05-10-2016 at 7:00 am

Deep learning based on neural nets is most commonly thought of as a very promising approach to scene recognition, text recognition and similar areas. Now there is increasing interest in applying this technology to security objectives. There were a number of papers on this topic in a 2015 BlackHat conference and there are several… Read More


Neural nets for Qualcomm Snapdragon

Neural nets for Qualcomm Snapdragon
by Bernard Murphy on 05-06-2016 at 12:00 pm

Neural nets are hot these days. In this forum certainly you can’t swing a cat without hitting multiple articles on the topic – I’ve written some myself. For me there are two reasons for this interest. First, neural nets are amazingly successful at what they do, for example in image recognition where they can beat… Read More


Quantum Code-Cracking Takes Another Hit: Lattice-based Cryptography

Quantum Code-Cracking Takes Another Hit: Lattice-based Cryptography
by Bernard Murphy on 04-24-2016 at 12:00 pm

Public-key crypto-systems rely these days on approaches founded in mathematical methods which are provably hard to crack. The easiest to understand requires factorization of a key based on the product of two large prime numbers. Much has been made recently of the ability of quantum computers to crack this style of encryption.… Read More


10 Predictions for the Future of IoT

10 Predictions for the Future of IoT
by Ahmed Banafa on 04-24-2016 at 7:00 am

A Google search for “Internet of Things” term reveals over 280,000,000 results, thanks to the media making the connection between the smart home, wearable devices, and the connected automobile, IoT has begun to become part of the popular parlance. But that’s not the complete picture, according to Gartner’s… Read More


IOT Security Trends – Is the online world more dangerous??

IOT Security Trends – Is the online world more dangerous??
by Bill McCabe on 04-19-2016 at 12:00 pm

Security threats are the biggest concern among the main concerns on the Internet of Things. Due to its very nature, it is a target of interest for those who want to commit either industrial or national espionage. By hacking into these systems and putting them under a denial of service, or other attacks, an entire network of systems… Read More


Singularity, Semiconductors and Software

Singularity, Semiconductors and Software
by Daniel Payne on 04-15-2016 at 12:00 pm

One of my all-time favorite movies is 2001 A Space Odyssey where one of the leading roles is an AI-based system aboard a spacecraft named Hal that is designed to be a perfect machine yet makes a mistake and then cascades into assaulting and eliminating the human crew members. The future time when semiconductors and software combine… Read More