Smartphone Security: For Your Eyes Only

Fans of the Olympics here in the United States were treated to a great Samsung commercial throughout the broadcast. The commercial stars the genius, multi-award-winning actor Christoph Waltz, showing how Americans can multitask with the amazing new Galaxy Note7. Yes, THAT Galaxy Note7. The 90-second long commercial is a delight to watch, but it must have cost Samsung some serious bucks to produ... » read more

What Is Cyberwarfare?

Cyberwarfare is emerging as the most sophisticated battleground of the 21st century. In fact, the military in all major countries make it a priority. Collectively they are spending tens of billions of dollars on education and building a knowledgebase of how attacks can be perpetrated and what defenses are needed. The entire effort is based on technology, both legacy and new, starting on the ... » read more

Using DNA Differently

As the Internet of Everything creeps closer and closer, technologies from wireless to biometrics are undergoing metamorphosis. On the biometrics front, there is a vast array of applications, from fingerprints to facial recognition—even finger vein recognition. But the one that is garnering a lot of attention these days is DNA sequencing, and a subset called rapid DNA sequencing. Both are b... » read more

Nymi: Wearable Authentication

If you had one device that could log into all your electronics automatically, allowing you to make electronic payments more securely based on your heart beat rhythms, would you use it? That's the question a startup named Nymi is asking—and a lot of other companies are watching. The company began its life in 2011 using a biometric electrocardiogram developed at the University of Toronto. ... » read more

The Real Value In Customizing Instructions

One element that distinguishes devices for the emerging IoT market from the mobile devices of the mature handheld market is power. Specifically, while the latter can accept a battery recharge cycle of days, the former demands years between battery recharge/replacement. Where the two devices resemble one another is their need for high performance. While embedded CPU cores have concentrated o... » read more

Biometrics For The IoT

In part one of this topic we started at the top with an overview of biometrics and its base technology. Now, let’s ratchet that up a notch and drill down a bit into some of the details. While biometrics has a lot of potential tools, presently there are only two that are in wide-scale deployment—fingerprint and facial scanning. “Of those two, fingerprints account for 60% to 70% of all a... » read more

Is The IoT Safe To Use?

By Ernest Worthman & Ed Sperling Data security has been a problem since well before the invention the computer, and it has been getting progressively more difficult to contain every year for the past eight decades. It was made much worse when computing was decentralized with the introduction of the IBM PC in 1981, made worse again when networking was introduced into corporations by Novell'... » read more

Get Ready For More Biometrics

Security involving scans of fingerprints, palms, faces, or some other variant has been common in movies for years, and many phones and computers now offer fingerprint scans instead of a password login. But as security risks rise with the rollout of the [getkc id="76" comment="Internet of Things"]/Internet of Everything, that technology will need to become much more pervasive and sophisticated. ... » read more

Industry Scorecard For 2014

At the end of last year, Semiconductor Engineering asked the industry about the developments they expected to see in 2014. If you care to refresh your memory, they were categorized under markets, semiconductors and development tools. Now it is time to look back and see how accurate those predictions were and where they fell short. Markets The obvious trend, at the beginning of the year, wa... » read more

Online Everyone Is Anonymous…For Now

Every time you go online you leave a digital footprint. You store cookies and the sites you visit store your IP address, but at least for now there is no way to narrow down exactly who visited a site, whether the person you’re talking with is really who they claim to be, or even to prove it was you at the keyboard when you do use your real name. There has been much discussion about forcing... » read more