Author's Latest Posts


Architecting a Hardware-Managed Hybrid DIMM Optimized for Cost/Performance


Authors: Fred Ware,(1) Javier Bueno,(2) Liji Gopalakrishnan,(1) Brent Haukness,(1) Chris Haywood,(1) Toni Juan,(2) Eric Linstadt,(1) Sally A. McKee,(3) Steven C. Woo,(1) Kenneth L. Wright,(1) Craig Hampel,(1) Gary Bronner.(1) (1) Rambus Inc. Sunnyvale, California (2) Metempsy, Barcelona, Spain (3) Clemson University, South Carolina Rapidly evolving workloads and exploding data volumes ... » read more

Hack the Vote: The Simulation of Vote Hacking at DEF CON


DEF CON, started in 1992 by the Dark Tangent, is the world’s largest running and underground hacking conference held annually at Caesar’s Palace in Las Vegas. It is a convention attended by various people from hackers, to journalists, to lawyers, to cybersecurity professionals, to federal government employees. At the second annual DEF CON Voting Village, a part of the convention that seeks ... » read more

The Blockchain – Not As Secure As You Think


The blockchain has the potential to touch all aspects of our everyday lives, from buying and trading cryptocurrency, to securing vital healthcare records, to proving that a tomato really is organic. The security challenges, specifically the vulnerability of private keys faced by the cryptocurrency market, prove that before the transformative impact of blockchain technology can be realized, a co... » read more

5 Reasons Why E-Commerce Sites Need A Token Gateway


Card-on-file is fundamental to the digital commerce ecosystem, as it facilitates the delivery of payment methods such as one-click ordering and recurring payments. As merchants and PSPs move towards implementing card-on-file EMV payment tokenization, solutions that simplify integration and ongoing maintenance, while adding additional value, can deliver considerable competitive advantages. ... » read more

The Rising Need for Satellite Security


Satellites today contain highly complex embedded microelectronics systems complete with processing, data storage, and data receiving/transmitting capabilities. Further, they are controlled by ground stations, computers in data centers. They are therefore susceptible to threats prevalent in cloud computing architectures including insider threats, malicious downloads, etc. As such, satellite secu... » read more

Real-Time Payments And How To Secure Them


In today’s digital, on-demand world, we have instant access to information, products and services. Digitization and digitalization has driven this change, and we are now accustomed to almost instant payments via cards, web services and apps. The development of instantaneous payments between bank accounts is therefore a natural evolution. Download this eBook to: Learn how to combat fra... » read more

Mobile Scan-And-Go Technology


Brick-and-mortar merchants are in the midst of a period of unprecedented disruption. Long-term structural trends mean that retailers must address decreasing revenues and escalating costs, while evolving the in-store experience to meet the demands of the connected consumer. For this reason, transformative technologies such as mobile scan-and-go solutions are coming to the fore, with deployments ... » read more

The CryptoManager Root Of Trust


In January 2018, Meltdown and Spectre were independently disclosed by multiple security researchers, including senior Rambus technology advisor Paul Kocher and senior Rambus security engineer Mike Hamburg. The two security flaws exploit critical vulnerabilities across a wide range of modern processors, including Intel, ARM and AMD. Notably, however, existing RISC-V processors remain unaffected ... » read more

Do Superconducting Processors Really Need Cryogenic Memories?


Cryogenic, superconducting digital processors offer the promise of greatly reduced operating power for server-class computing systems. This is due to the exceptionally low energy per operation of Single Flux Quantum circuits built from Josephson junction devices operating at the temperature of 4 Kelvin. Unfortunately, no suitable same-temperature memory technology yet exists to complement these... » read more

Tokenization Beyond Payments


Tokenization is a process by which sensitive data is replaced with unique identification credentials that retain all essential information about the data without exposing said sensitive data to attacks. While traditional payment methods pass critical identification information through several points, tokenization minimizes the amount of data a business needs to keep on hand. Becoming popular wi... » read more

← Older posts Newer posts →