Author's Latest Posts


112G XSR And LR SerDes PHYs


The virtuous cycle of increased computing power enabling new applications which demand more computing power continues unabated. Today, applications spanning AI, autonomous vehicles, video streaming, AR and VR all demand more bandwidth, lower latencies and higher speeds. In response, the SoCs powering the terabit routers and switches at the heart of the network must run even faster. The upgrade ... » read more

The Blockchain – Not As Secure As You Think


The blockchain has the potential to touch all aspects of our everyday lives, from buying and trading cryptocurrency, to securing vital healthcare records, to proving that a tomato really is organic. The security challenges, specifically the vulnerability of private keys faced by the cryptocurrency market, prove that before the transformative impact of blockchain technology can be realized, a co... » read more

Introduction to Side-Channel Attacks


Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). An attacker does not need to know specific implementation details of the cryptographic device to perform these attacks and extract keys. As all physical electronic systems routinely leak information, effe... » read more

Hidden Signals: The Memories And Interfaces Enabling IoT, 5G, And AI


This IDC Technology Spotlight Report, sponsored by Rambus, highlights key, often hidden, memory and interface technologies that are enabling high performance electronic systems to serve the disruptive trends of the next decade like IoT, 5G, and Artificial Intelligence. The report discusses: Data and the importance of connectivity, both from the physical (analog) world to the digital wor... » read more

All Aboard: The Journey to Mobile Ticketing


As technology evolves, it shapes the world around it. This is evident in public transportation where smartphones represent the next evolution for ticketing. A recent Juniper Research report notes that mobile and wearable ticket purchases are projected to exceed 14 billion in 2018. This accounts for 54% of total digital ticket sales across transport and events sectors. Embracing mobile ticketing... » read more

Securing Crypto Assets on the Blockchain with Vaultify Trade


The rapid expansion of the cryptocurrency ecosystem demonstrates the power of the blockchain to revolutionize financial services and beyond. Thus, a secure foundation of trust and transparency is needed – starting with a new approach for blockchain implementations. Vaultify Trade provides that secure foundation of trust and transparency. Learn how the blockchain works Understand how t... » read more

Architecting a Hardware-Managed Hybrid DIMM Optimized for Cost/Performance


Authors: Fred Ware,(1) Javier Bueno,(2) Liji Gopalakrishnan,(1) Brent Haukness,(1) Chris Haywood,(1) Toni Juan,(2) Eric Linstadt,(1) Sally A. McKee,(3) Steven C. Woo,(1) Kenneth L. Wright,(1) Craig Hampel,(1) Gary Bronner.(1) (1) Rambus Inc. Sunnyvale, California (2) Metempsy, Barcelona, Spain (3) Clemson University, South Carolina Rapidly evolving workloads and exploding data volumes ... » read more

Hack the Vote: The Simulation of Vote Hacking at DEF CON


DEF CON, started in 1992 by the Dark Tangent, is the world’s largest running and underground hacking conference held annually at Caesar’s Palace in Las Vegas. It is a convention attended by various people from hackers, to journalists, to lawyers, to cybersecurity professionals, to federal government employees. At the second annual DEF CON Voting Village, a part of the convention that seeks ... » read more

The Blockchain – Not As Secure As You Think


The blockchain has the potential to touch all aspects of our everyday lives, from buying and trading cryptocurrency, to securing vital healthcare records, to proving that a tomato really is organic. The security challenges, specifically the vulnerability of private keys faced by the cryptocurrency market, prove that before the transformative impact of blockchain technology can be realized, a co... » read more

5 Reasons Why E-Commerce Sites Need A Token Gateway


Card-on-file is fundamental to the digital commerce ecosystem, as it facilitates the delivery of payment methods such as one-click ordering and recurring payments. As merchants and PSPs move towards implementing card-on-file EMV payment tokenization, solutions that simplify integration and ongoing maintenance, while adding additional value, can deliver considerable competitive advantages. ... » read more

← Older posts