A CIA Perspective on Privacy and Security

A CIA Perspective on Privacy and Security
by Bernard Murphy on 04-15-2016 at 7:00 am

It may seem odd to look to the CIA for viewpoints in this area but in in many ways they are just as concerned as we are. After all, in aggregate, widespread identity theft and hacking both internally and by foreign nationals, theft, electronic ransom and other illicit acts are as much a threat to the security of the country as they are … Read More


Growing Security Concerns Due To Internet of Things (IoT)

Growing Security Concerns Due To Internet of Things (IoT)
by Faisal Mushtaq on 03-27-2016 at 4:00 pm

It is believed that by 2020, there will be about 50 billion connected devices across the world, more than 7 times the present human population. The growth of digital devices is increasing exponentially because both users and technology are getting smarter every next day and the compatibility between the two is improving phenomenally… Read More


The Apple FBI Battle: Laws and Ethics Simply Can’t Keep Up With Technology

The Apple FBI Battle: Laws and Ethics Simply Can’t Keep Up With Technology
by Vivek Wadhwa on 03-22-2016 at 8:00 pm

The battle between the FBI and Apple over the unlocking of a terrorist’s iPhone will likely require Congress to create new legislation. That’s because there really aren’t any existing laws which encompass technologies such as these. The battle is between security and privacy, with Silicon Valley fighting for privacy. The debates… Read More


Autonomy at Odds with Security

Autonomy at Odds with Security
by Roger C. Lanctot on 03-17-2016 at 4:00 pm

It’s funny that we all now believe that Google got the automated driving ball rolling. The reality is that the government started it all with the Defense Advanced Research Projects Agency (DARPA) and its famous DARPA Grand Challenge, which consisted of three tests (in 2004, 2005 and 2007) of driverless cars in different driving… Read More


Intel Adds ‘Authenticate’ Multi-Factor Security Feature

Intel Adds ‘Authenticate’ Multi-Factor Security Feature
by Patrick Moorhead on 03-11-2016 at 7:00 am

Last summer, Intel launched their 14nm, 6th Generation Core processors, code-named ‘Skylake’, alongside Microsoft’s new Windows 10 operating system. As things usually go in the enterprise world, the commercial 6th Generation of Intel’s Core vPro processors weren’t too far behind with increased security and manageability… Read More


Post-making new Things stand out on the IoT

Post-making new Things stand out on the IoT
by Don Dingee on 03-07-2016 at 4:00 pm

Sales says this next IoT project is going to be huge. Engineering isn’t so sure. Marketing says we should pilot it to find out. If it were just software, it might not be such a problem, but with hardware comes investment tradeoffs. Without guaranteed volumes of millions of units, are ASICs a realistic option to hit aggressive size,… Read More


3 IoT demos highlight Atmel SAMA5

3 IoT demos highlight Atmel SAMA5
by Don Dingee on 03-04-2016 at 4:00 pm

At the high end of the Atmel product spectrum resides SAMA5 based on an ARM Cortex-A5 core. With an MMU supporting Linux or Android, plus on-the-fly memory encryption and ARM TrustZone in some variants, the SAMA5 family is drawing interest from IoT app developers. We’ll look at three examples, all illustrating how important seamless… Read More


A Little More Quantum Computing

A Little More Quantum Computing
by Bernard Murphy on 02-25-2016 at 7:00 am

There’s another domain in Quantum Computing (QC) which periodically attracts headlines – Quantum Key Distribution (QKD). I thought this worth covering because it does not depend on the ability to do parallel computation on superposition states, so may not be as much at the mercy of limited coherence times. And ultimately… Read More


Quantum Computing – A Quick Review

Quantum Computing – A Quick Review
by Bernard Murphy on 02-09-2016 at 4:00 pm

This topic comes up periodically but for me had always been one of those things I’d get around to understanding better someday. A recent blog in SemiWiki got me looking a little harder and determined to write a blog to get this out of my system, if for no other reason than getting rid of excess tabs on my browser. So here’s my quick review.… Read More


Complexity And Security

Complexity And Security
by Bernard Murphy on 02-08-2016 at 7:00 am

From time to time when talking about security, it is useful to look at the big picture, but not to further lament the imminent collapse of the sky. We all know that the problem is big and we’re really not on top of it. A more productive discussion would be about what we can do to reduce the scope of the problem. And that has to start … Read More