Author's Latest Posts


The Quantum IoE


The principle of quantum communication (QC) is that it can transfer a quantum state between locations. The significance of that cannot be overstated. This is what we can look to for the delivery of the super-secure communications networks of the future. This kind of secure communications is made to order for the IoE (and, of course, many other platforms). No matter how simple or complex the ... » read more

The Rise Of Dynamic Networks


The Internet of the future, and particularly the [getkc id="260" comment="Internet of Everything"], will be interlaced with millions if not billions of intelligent, dynamic, self-organizing networks. These networks will be full of elements that are capable of autonomic self-registration across these multitudes of networks. It is one thing to put up a security perimeter when you know who the... » read more

Security Made Easier


The FIDO (Fast IDentity Online) Alliance was formed in July 2012 to address the lack of interoperability among strong authentication devices as well as the problems users face with creating and remembering multiple usernames and passwords. The FIDO Alliance’s mission is to change the landscape of authentication by eliminating the reliance on passwords. This is accomplished by developing speci... » read more

The Danger Of Denial


For years now, my diehard Mac-lover friends and this diehard PC fan have bantered back and forth about the superiority of one processor over the other. When Apple switched to the Intel platform in the late 2000s the argument went moot. I was right, they were wrong. PC’s were the best computers. Since then, the arguments about which platform is better have died off. They both do the job, a... » read more

A Primer For The 802.XX Physical Layer


This is the second installment of the 802.XX for the IoE series of articles. The first one was published in the August issue and addressed the Media Access Control (MAC) layer. In this article, we will examine the elements of the physical (PHY) layer of the 802.11 protocol stack. For reference, the protocol stack is shown in figure 1. The best designs, like everything else, are built on a so... » read more

Rising Threats From Differential Power Analysis


Differential power analysis (DPA) has been a threat vector on the chip landscape for a number of years. It was discovered around the mid 1990s by the teams at [getentity id="22671" e_name="Rambus"]’ Cryptography Research Division, and turned out to be a very effective tool for compromising the ubiquitous SIM card environment. “The most traditional market for DPA has been with smart cards... » read more

Lightweight Cryptography For The IoE


This is the age where technology is expected to do more, faster, anonymously, and often invisibly. And it's supposed to use less power, with smaller footprints, unobtrusively and intuitively. And all that needs to be protected with cryptography. That's the goal, at least. But as Simon Blake-Wilson, vice president of products and marketing for [getentity id="22671" e_name="Rambus"]' Cryptogra... » read more

802.XX And The IoE


Ever since the first 802.11 standard was published in 1997, it has evolved to become the de facto protocol for much of the wireless networking across a wide range of devices and implementations. Today the protocol family includes 802.b 802.11a, 802.11g, 802.11n, and 802.11ac, respectively. Some of these will play a very important role in the IoE. There are other 802.xx protocols (such as 802.15... » read more

The Deep And Dark Webs


From time to time we hear a snippet or two about the “other” Web – the dark side of the Internet and the Web. For the most part, until something happens that brings the activity within that arena to the surface (such as the recent Silk Road exposure where anything was available for a price), that segment quietly hums along. But that is about to change. Once the IoE evolution gets tract... » read more

The Growing Price Of A Click


I have been staring at computer screens for a long time. I remember when AOL was the biggest thing to come along since 16-bit computing. I have always been an anti-spam/junk advocate. With snail mail, I could just pitch it. With radio and TV ads, I could turn down the volume or switch channels. But it got impractical to walk away from my computer every time an ad popped up on a new page. So ... » read more

← Older posts Newer posts →