3 Reasons Why is Cybersecurity Losing

3 Reasons Why is Cybersecurity Losing
by Matthew Rosenquist on 12-11-2016 at 12:00 pm

AAEAAQAAAAAAAAiRAAAAJDAxZTg4NTZjLWIxYmItNGI1Zi04NWZmLWQ5ZTI4NjFhMzgxZQ

Cyber threats are currently outpacing the defenders but it does not need to be the case. Attacks are increasing in number and type, with the overall impacts are becoming greater. Cybersecurity is struggling to keep our digital lives and assets protected from the onslaught of attacks but facing great challenges. By understanding… Read More


Webinar: ARM Security Solution for IoT

Webinar: ARM Security Solution for IoT
by Daniel Nenni on 12-08-2016 at 4:00 pm

Yossi Weisblum will be presenting ARM’s IoT security solution during the Open Silicon webinar that I am moderating next week. Yossi manages product marketing for ARM’s CryptoCell subsystem. He has an extensive background in product marketing across several platforms, including connectivity, wireless, multimedia and mobile.… Read More


Design for Ultra-Low Power LTE: CEVA Webinar

Design for Ultra-Low Power LTE: CEVA Webinar
by Bernard Murphy on 12-08-2016 at 7:00 am

You might have thought that ultra-low power communication for the IoT was limited to standards like BT5 and 802.15.4 (eg in ZigBee and Thread) which depend on gateways to cellular networks and limit reach, especially deep inside buildings. But now there’s a new standard for ultra-low power and ultra-low cost based on LTE, known… Read More


Dark data to fuel warp speed growth for #IoT

Dark data to fuel warp speed growth for #IoT
by Diya Soubra on 12-07-2016 at 7:00 am

In my world of semiconductors, dark silicon refers to transistors that are present in the chip but that can not be turned on due to thermal constraints. A valid resource that is available but not used. In the case of #IoT we have a lot of data already out there that I would label as dark data, it exists but no one outside the network owner… Read More


Hack This? Making Software a Moving Target

Hack This? Making Software a Moving Target
by Bernard Murphy on 12-06-2016 at 4:00 pm

It sometimes seems that the black hats are always one step ahead of the white hats in the never-ending security game. One of the especially invidious ways hackers have found to evade detection is through mutation – changing the code in a virus on each copy, defeating classical signature detection methods and potentially requiring… Read More


These 2 Markets to Drive IC Market Growth through 2020

These 2 Markets to Drive IC Market Growth through 2020
by Daniel Payne on 12-02-2016 at 8:00 pm

Spotting trends is an essential insight for marketing folks, general managers and C-level executives in our semiconductor industry. You could read hundreds of press releases, attend dozens of conferences, and interview all of the major thought leaders to help spot an emerging trend, or you could subscribe to a service like ICRead More


Car Connectivity Lost

Car Connectivity Lost
by Roger C. Lanctot on 12-01-2016 at 12:00 pm

The frustration in the room was palpable yesterday at the annual Vehicle Connectivity Workshop gathering of the Telecommunications Industry Association (TIA). The prospect of dedicated short range communication (DSRC) technology achieving its long-sought mandate to connect cars and infrastructure hung tantalizingly… Read More


IOT – Think Big – Start Small – Scale Quickly

IOT – Think Big – Start Small – Scale Quickly
by Bill McCabe on 11-30-2016 at 12:00 pm

There’s an old philosophy that business coaches often use. It’s the saying that you think big, start small, and then scale quickly. If you follow it closely, you have the potential to make a lasting impression in an industry and achieve actual results in the process.

Let’s look at this in terms of the internet of things to see how it … Read More


The New Reality for IoT Security

The New Reality for IoT Security
by Matthew Rosenquist on 11-28-2016 at 4:00 pm

Recent Distributed Denial of Service (DDoS) attacks are forcing a shift in Internet-of-Things (IoT) security thinking. The dangers are expanding as attackers are taking advantage of billions of IoT devices, conscripting them into their botnet armies for massive DDoS attacks.… Read More


Is your #IoT cup half empty or half full?

Is your #IoT cup half empty or half full?
by Diya Soubra on 11-25-2016 at 7:00 am

While the optimist and the pessimist argued about whether the cup was half empty or half full, I drank it !

I had seen the above statement a while ago and it jumped to mind while I was considering the state of #IoT today. That funny statement describes exactly the mindset of the players in the market. While the majority argue back and forth… Read More