editor's blog archive
Subscribe to EE Journal Daily Newsletter

Securing the core

A Franco-German announcement brings improved security to SoCs for the IoT

Following Jim Turley’s report on Arm and ARC adding security to their small processor cores, and Bryon Moyer’s on-going series on IoT security, comes news of more core security for the IoT.

Cortus, the French based 32-bit core IP company has signed a deal with Cellnetrix, a German based company specialising in software security for embedded devices, which will see the CellSIM secure embedded operating system running on Cortus APS processor cores. Cortus’ cores are in sensors, communications and security applications, the … Read More → "Securing the core"

Through-The-Looking-Glass Security

Aliceroom3.jpgBuckle up folks, because we’re about to take a ride through the looking glass, where computations can happen in an obscure way sure to confuse unauthorized snoops, until we arrive at an answer and can pop back through the glass into our normal world.

It’s become a truism that using hardware for security is best. But what if that’s not an option? Doing calculations and manipulations of keys and … Read More → "Through-The-Looking-Glass Security"

Toyota Unintended Acceleration

The Toyota Unintended Acceleration case has seen a lot of discussion, but much of it is, to put it mildly, not terribly well informed.  Last week at the UK’s High Integrity Software conference (look at the slides here http://his-2015.co.uk/slides )  I heard an authoritative speaker.  Prof. Philip Koopman is regularly asked to act as an expert witness on behalf of people claiming against Toyota, and acted as such in the Bookout/Schwarz trial in 2013 when a jury decided that that defects in Toyota’s … Read More → "Toyota Unintended Acceleration"

What shape do you want your Pi?

Raspberry Pi has been one of those events that leave you breathless. You will recall that the board was designed as a teaching aid, to get people interested in building systems. However, according to the Raspberry Pi Foundation a fair number of the over seven million boards that have been sold have been used in commercial projects. The feed-back they are getting is that while the standard board is great for getting prototypes up and working, for volume productions, for volume production, there was a need for a more flexible approach.

To meet this Element 14 is now … Read More → "What shape do you want your Pi?"

Sensory Listens to Your Voice

Today we’ve put up a piece on designing audio subsystems, but there’s more news than that in the audio world. If you read our earlier piece on QuickLogic’s EOS device, and if you were paying attention to details, you might recall a quick mention of a company called Sensory that had partnered with QuickLogic for audio algorithms. Sensory subsequently released a product called TrulyHandsFree, and I connected … Read More → "Sensory Listens to Your Voice"

Four weeks of argument over a second

Today (November 2nd) the International Telecommunication Union’s World Radiocommunication Conference meets in Geneva. It will run until the 27th and, apparently, during much of that time, there will be bitter arguments about the leap second. As we discussed in Just a Second http://www.eejournal.com/archives/articles/20150924-justasecond/ a few weeks ago, now that we measure the second using atomic frequencies, it is clear that the earth doesn’ … Read More → "Four weeks of argument over a second"

featured blogs
Jul 25, 2017
All chips need to cold reset on every power-up. Warm resets, however, are a bit more complicated. Take a smartphone screen, for example. The screen may power down while the phone is idle. However, the user will want it to return to their pre-set brightness level on power-up. ...
Jul 25, 2017
One of the largest differentiators of Samtec.com is its incredible variety of technical documentation, the vast majority of which is available without even logging in. While this level of availability is great for users, because of the sheer amount of documentation available,...
Jun 20, 2017
For data-center architects it seems like a no-brainer. For a wide variety of applications, from the databases behind e-commerce platforms to the big-data tools in search engines to suddenly-fashionable data analytics to scientific codes, the dominant limitation on application...