per iplm mdx banner semiwiki ip management experts (1) (3)
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 302
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 302
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Why Can’t My Car be Like My iPhone?

Why Can’t My Car be Like My iPhone?
by Roger C. Lanctot on 03-16-2016 at 12:00 pm

Car companies must gaze with envy at Apple in the midst of its current confrontation with the Federal Bureau of Investigation in the U.S. over access to data on the iPhone of a terrorist. If only, they must say, if only we had Apple-like security for our cars.

By and large, when law enforcement agencies around the world need or want to… Read More


Intel Adds ‘Authenticate’ Multi-Factor Security Feature

Intel Adds ‘Authenticate’ Multi-Factor Security Feature
by Patrick Moorhead on 03-11-2016 at 7:00 am

Last summer, Intel launched their 14nm, 6th Generation Core processors, code-named ‘Skylake’, alongside Microsoft’s new Windows 10 operating system. As things usually go in the enterprise world, the commercial 6th Generation of Intel’s Core vPro processors weren’t too far behind with increased security and manageability… Read More


e-Armageddon

e-Armageddon
by Bill Montgomery on 03-09-2016 at 12:00 pm

CNN: International, Final Report. Wednesday, December 25th, 2019 : The events that have unfolded in the last 72 hours have devastated the entire civilized world, and have left society as we know it on the brink of collapse. I’m told that our networks are now shutting down, and that the report I am about to file will be likely be the finalRead More


Post-making new Things stand out on the IoT

Post-making new Things stand out on the IoT
by Don Dingee on 03-07-2016 at 4:00 pm

Sales says this next IoT project is going to be huge. Engineering isn’t so sure. Marketing says we should pilot it to find out. If it were just software, it might not be such a problem, but with hardware comes investment tradeoffs. Without guaranteed volumes of millions of units, are ASICs a realistic option to hit aggressive size,… Read More


A Little More Quantum Computing

A Little More Quantum Computing
by Bernard Murphy on 02-25-2016 at 7:00 am

There’s another domain in Quantum Computing (QC) which periodically attracts headlines – Quantum Key Distribution (QKD). I thought this worth covering because it does not depend on the ability to do parallel computation on superposition states, so may not be as much at the mercy of limited coherence times. And ultimately… Read More


Apple Google FaceBook and Person of Interest!

Apple Google FaceBook and Person of Interest!
by Daniel Nenni on 02-24-2016 at 12:00 pm

Apple, Google, and FaceBook are making significant investments in artificial intelligence (deep learning) and other advertising (snooping) enabling technology to better serve (exploit) their customers (us) and make trillions of dollars for their offshore accounts. This reminds me (in a very creepy way) of the TV series “Person… Read More


Should terrorists prefer iPhone (thanks to privacy)?

Should terrorists prefer iPhone (thanks to privacy)?
by Eric Esteve on 02-23-2016 at 10:00 am

The case between Apple and the FBI may not be as limpid as it could be. If you ask me if Apple, or any US or Europe based supplier of high tech system should help the FBI (or any similar organization) and provide the technical support needed to extract information belonging to a terrorist, my answer would be definitely YES.

I don’t know… Read More


Why Apple’s Fight is Fruitless!

Why Apple’s Fight is Fruitless!
by Maria Miccoli on 02-19-2016 at 7:00 am

The article suggested by LinkedIn is titled “Should Apple fight a court order to unencrypt iPhones? #unlockiPhone”. However, my question is this, why didn’t the FBI just go to the NSA for what they needed? Why didn’t the FBI just hire the latest hacker who was able to hack the iphone and give him the same deal other hackers… Read More


Quantum Computing – A Quick Review

Quantum Computing – A Quick Review
by Bernard Murphy on 02-09-2016 at 4:00 pm

This topic comes up periodically but for me had always been one of those things I’d get around to understanding better someday. A recent blog in SemiWiki got me looking a little harder and determined to write a blog to get this out of my system, if for no other reason than getting rid of excess tabs on my browser. So here’s my quick review.… Read More


Complexity And Security

Complexity And Security
by Bernard Murphy on 02-08-2016 at 7:00 am

From time to time when talking about security, it is useful to look at the big picture, but not to further lament the imminent collapse of the sky. We all know that the problem is big and we’re really not on top of it. A more productive discussion would be about what we can do to reduce the scope of the problem. And that has to start … Read More