breker riscv seminar austin 2025 800x100c
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 306
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 306
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

What the FBI is Saying about Connected Cars

What the FBI is Saying about Connected Cars
by Roger C. Lanctot on 03-24-2016 at 4:00 pm

The U.S. Federal Bureau of Investigation (FBI), in cooperation with the U.S. Department of Transportation, put out a written public service announcement (PSA) last week detailing the agency’s concerns regarding automotive cybersecurity and its recommendations for the driving and vehicle owning public. The PSA followed… Read More


The Apple FBI Battle: Laws and Ethics Simply Can’t Keep Up With Technology

The Apple FBI Battle: Laws and Ethics Simply Can’t Keep Up With Technology
by Vivek Wadhwa on 03-22-2016 at 8:00 pm

The battle between the FBI and Apple over the unlocking of a terrorist’s iPhone will likely require Congress to create new legislation. That’s because there really aren’t any existing laws which encompass technologies such as these. The battle is between security and privacy, with Silicon Valley fighting for privacy. The debates… Read More


Autonomy at Odds with Security

Autonomy at Odds with Security
by Roger C. Lanctot on 03-17-2016 at 4:00 pm

It’s funny that we all now believe that Google got the automated driving ball rolling. The reality is that the government started it all with the Defense Advanced Research Projects Agency (DARPA) and its famous DARPA Grand Challenge, which consisted of three tests (in 2004, 2005 and 2007) of driverless cars in different driving… Read More


Why Can’t My Car be Like My iPhone?

Why Can’t My Car be Like My iPhone?
by Roger C. Lanctot on 03-16-2016 at 12:00 pm

Car companies must gaze with envy at Apple in the midst of its current confrontation with the Federal Bureau of Investigation in the U.S. over access to data on the iPhone of a terrorist. If only, they must say, if only we had Apple-like security for our cars.

By and large, when law enforcement agencies around the world need or want to… Read More


Intel Adds ‘Authenticate’ Multi-Factor Security Feature

Intel Adds ‘Authenticate’ Multi-Factor Security Feature
by Patrick Moorhead on 03-11-2016 at 7:00 am

Last summer, Intel launched their 14nm, 6th Generation Core processors, code-named ‘Skylake’, alongside Microsoft’s new Windows 10 operating system. As things usually go in the enterprise world, the commercial 6th Generation of Intel’s Core vPro processors weren’t too far behind with increased security and manageability… Read More


e-Armageddon

e-Armageddon
by Bill Montgomery on 03-09-2016 at 12:00 pm

CNN: International, Final Report. Wednesday, December 25th, 2019 : The events that have unfolded in the last 72 hours have devastated the entire civilized world, and have left society as we know it on the brink of collapse. I’m told that our networks are now shutting down, and that the report I am about to file will be likely be the finalRead More


Post-making new Things stand out on the IoT

Post-making new Things stand out on the IoT
by Don Dingee on 03-07-2016 at 4:00 pm

Sales says this next IoT project is going to be huge. Engineering isn’t so sure. Marketing says we should pilot it to find out. If it were just software, it might not be such a problem, but with hardware comes investment tradeoffs. Without guaranteed volumes of millions of units, are ASICs a realistic option to hit aggressive size,… Read More


A Little More Quantum Computing

A Little More Quantum Computing
by Bernard Murphy on 02-25-2016 at 7:00 am

There’s another domain in Quantum Computing (QC) which periodically attracts headlines – Quantum Key Distribution (QKD). I thought this worth covering because it does not depend on the ability to do parallel computation on superposition states, so may not be as much at the mercy of limited coherence times. And ultimately… Read More


Apple Google FaceBook and Person of Interest!

Apple Google FaceBook and Person of Interest!
by Daniel Nenni on 02-24-2016 at 12:00 pm

Apple, Google, and FaceBook are making significant investments in artificial intelligence (deep learning) and other advertising (snooping) enabling technology to better serve (exploit) their customers (us) and make trillions of dollars for their offshore accounts. This reminds me (in a very creepy way) of the TV series “Person… Read More