Ideal Memory IP For IoT Applications


The endless possibilities for IoT applications are driving a new wave of imaginative thinking, and for good reason. Recent surveys estimate the number of IoT devices by 2020 will be in the 50 billion units range. The numbers are far too high to ignore and, hence, we have entered a new era of imaginative and creative thinking! To put this in perspective, IoT applications are growing many time... » read more

The Deep And Dark Webs


From time to time we hear a snippet or two about the “other” Web – the dark side of the Internet and the Web. For the most part, until something happens that brings the activity within that arena to the surface (such as the recent Silk Road exposure where anything was available for a price), that segment quietly hums along. But that is about to change. Once the IoE evolution gets tract... » read more

The Growing Price Of A Click


I have been staring at computer screens for a long time. I remember when AOL was the biggest thing to come along since 16-bit computing. I have always been an anti-spam/junk advocate. With snail mail, I could just pitch it. With radio and TV ads, I could turn down the volume or switch channels. But it got impractical to walk away from my computer every time an ad popped up on a new page. So ... » read more

Conspiracy Theory


The last couple of months have seen some interesting blips pop up on the security radar screen. To me, the most interesting on is the claim by Hugo Teso, a commercial pilot and security consultant and trained commercial pilot who claims to have developed an Android app that can remotely attack and take full control of an aircraft. The story goes that he was able to cobble together hardware and ... » read more

Tech Talk: Mobile Security (Part 1)


Simon Blake-Wilson, of Rambus' Cryptography Research Division, talks with Semiconductor Engineering about mobile security and how the risk will escalate with the IoT in banking, data centers, entertainment and devices themselves. [youtube vid=EJ75T-SEp4U] » read more

Why Every Chip Can Be Hacked With This Tool


As explained by Darth Vader in the classic Star Wars saga, the line between good and evil can be very thin. What is sometimes developed for the benefit technology, in the hands of the wrong people, can be devastating. That may seem a bit melodramatic when it comes to discussions around focused ion beam (FIB) applications in semiconductors, but the analogy is quite real. Focused ion beam tec... » read more

Newer posts →