Security
Subscribe Now

Thwarting the Software Piracy and IP Theft Epidemic

In this week’s episode of Fish Fry, we take an in-depth look at software piracy and IP theft with Ted Miracco (CEO – SmartFlow Compliance) and David Locke Hall (Author – Crack99: The Takedown of a $100 Million Chinese Software Pirate). Ted, David, and I discuss the challenges of unlicensed software usage and the what can be done to stem the tide of IP theft. Also this week, we check out … Read More → "Thwarting the Software Piracy and IP Theft Epidemic"

Must PUFs Degrade Over Time?

A few weeks ago, we talked about software security, and a question was raised about the reliability of physically unclonable functions, or PUFs.  We noted at the time that Intrinsic ID agreed that the issue exists, but that they had a solution that more than compensated. Today we take a look at the whole issue in more detail. Possibly too much detail. Put your wonk hat … Read More → "Must PUFs Degrade Over Time?"

Saving Private Fish Fry

In this week’s episode of Fish Fry, we’re headed into the world of common standards, common form factors, SOSA, and MORA. (Don’t worry, there are even more acronyms on the horizon!) First up, my first guest Rodger Hosking (Pentek) and I chat about the newest technologies in embedded software radio. We discuss how common standards and common form factors are pushing new initiatives in military and … Read More → "Saving Private Fish Fry"

Artificial Intelligence and the Need for Speed

This week’s episode of Fish Fry is all about artificial intelligence, machine vision, and basketball! Pulin Desai (Cadence Design Systems) and I discuss a couple of use cases that require a mix of both vision and artificial intelligence and why our “need for speed” has pushed for new design requirements in the mobile, AR/VR, surveillance, automotive and drone/robotics markets. We also … Read More → "Artificial Intelligence and the Need for Speed"

A Tale to Make Your Blood Run Cold

For many of us in the Northern Hemisphere it is winter, so a good time to close the curtains, gather round the fire and tell stories that make the blood run cold and the hairs on the back of your neck rise in horror. And this is one such story.

It was a peaceful day in the international company’s computer operations centre until, at 13.07, the monitoring … Read More → "A Tale to Make Your Blood Run Cold"

Policy and Regulations in the IoT World

Watching the tech industry over the last few decades, it’s easy to come to the conclusion that all of the inventions have come solely through the efforts of single-minded entrepreneurs determined to win, even if it means losing in the attempt. While lots of that has happened, this worldview, just like the notion that the Wild West was won solely by rugged individualists with no help from anyone, … Read More → "Policy and Regulations in the IoT World"

October 3, 2018
October 1, 2018
September 10, 2018
August 15, 2018
August 9, 2018
July 23, 2018
June 13, 2018
June 7, 2018
May 25, 2018
May 22, 2018
May 15, 2018
May 7, 2018
April 26, 2018
April 18, 2018
April 12, 2018
April 4, 2018
March 21, 2018
March 19, 2018
March 8, 2018
March 5, 2018
March 2, 2018
featured blogs
Oct 19, 2018
Any engineer who has designed an IC-based solution likely used some sort of HW development tool. Semiconductor manufacturers have a long history of providing engineers with the HW tools needed to test their silicon. Evaluation platforms, like the Xilinx® Zynq UltraScale+ ...
Oct 19, 2018
CC BY-SA 3.0 Lukealderton When people typically think of multi-board PCB design, they tend to picture racks of boards in server farms or the components of a gaming rig. But what if your typical rigid boards don'€™t fit within the physical envelope of your multi-board applic...
Oct 16, 2018
  IC Insights has just published the September Update to The 2018 McClean Report, and one figure (reproduced below) puts yet another nail into the coffin for poor old Moore'€™s Law. Now please take care. There'€™s a vertical line between the 200mm wafers on the left ...
Oct 12, 2018
At the end of the day, your products are only as good as their in-the-field performance. It doesn'€™t matter how well they performed in a controlled environment....
chalk talks
Security ICs Deliver a Stronger Level of Protection – Mouser and Maxim Integrated   Physically unclonable functions (PUFs) are like fingerprints for semiconductor devices. And, for security applications, PUFs are an outstanding, secure way to uniquely identify an individual device. In this episode of Chalk Talk, Amelia Dalton chats with Scott Jones from Maxim Integrated about physically unclonable functions, and how you can use them to secure … Read More → "Security ICs Deliver a Stronger Level of Protection – Mouser and Maxim Integrated"
MAXQ1061: A Turnkey Solution for Embedded Systems Security – Mouser and Maxim IntegratedSecurity should NOT be an afterthought in your embedded designs. It’s important to have a well-conceived security strategy implemented from the top down. in this episode of Chalk Talk, Amelia Dalton chats with Reza Ahmadi of Maxim Integrated about the MAXQ1061 turnkey solution for embedded systems security. It’ll help you sleep better at night. Click … Read More → "MAXQ1061: A Turnkey Solution for Embedded Systems Security – Mouser and Maxim Integrated"