Mitigating DDoS Attacks With Secure IoT Endpoints


IoT life-cycle management should be implemented via a hardware root-of-trust to ensure secure updates of firmware and cryptographic keys. A hardware root-of-trust with a cryptographic identifier also allows each IoT device to be uniquely and cryptographically verified to determine if it is authorized to connect to a specific cloud service. Spoofed or unauthorized devices are easily identified b... » read more

April’19 Startup Funding: Corporate Gushers


It was another rich month for startups, large and small. In April’s top 11 funding rounds, five were investments by big corporations or corporate venture capital funds—an investor consortium led by the SoftBank Vision Fund, PayPal, Ford Motor, NTT DoCoMo, and HAPSMobile, a joint venture of SoftBank Group and AeroVironment. Those 11 investments totaled $3.74 billion. Intel Capital was als... » read more

IoT Device Security Makes Slow Progress


Semiconductor Engineering sat down with Chris Jones, vice president of marketing at Codasip; Martin Croome, vice president of business development at GreenWaves Technologies; Kevin McDermott, vice president of marketing at Imperas; Scot Morrison, general manager, embedded platform technology at Mentor, a Siemens Business; Lauri Koskinen, CTO at Minima; and Mike Borza, principal security technol... » read more

The Week In Review: IoT


Consortia Optimal+ said this week that it has joined the Industrial Internet Consortium. “The Industrial Internet of Things (IIoT) will have a tremendous impact on industries worldwide. The application of smart manufacturing, combined with the collection and analysis of in-use/field stage data, will deliver powerful insights to brand owners and enable them to achieve dramatic improvements in... » read more

New IP Risks


The world is being flooded with Internet-enabled devices, from smart toothbrushes to smart appliances to smart aircraft, and everything in between. Some of this is expected to be connected to the Internet, and some has been for quite some time. But devices such as smart toothbrushes and smart socks pose a whole new challenge. The issue is that even low-end chips need some sort of IP, but if ... » read more

The Week In Review: Design/IoT


Tools Cadence uncorked the next generation of its custom design platform optimized for advanced 10nm FinFET designs. Features include multi-patterning and color-aware layout, electrically aware design, and module generator (ModGen)-based device array flow. Deals San'an IC will provide Mentor Graphics' design rule decks to its customers to help verify that their mobile and wireless gall... » read more

Laws Don’t Apply Anymore


One of the nifty things about technology is that it's always new and always being refreshed. That creates problems, though. The speed with which technology is overhauled or changed out is so much faster than the social and legal infrastructure built to support and protect the people buying it, that the two worlds are now years, if not decades, out of sync. The first whiff of this came in 198... » read more

Super Wi-Fi For The IoE


From time to time the term “white space” may have popped up in wireless spectrum discussions. Generally, white space describes parts of the licensed radio spectrum that are unassigned, unused, only used part time by the licensees, or not used by them in certain geographic locations. Virtually every country in the world has some of this. Most of this exists in the television spectrum, and is... » read more

Overtaking The Black Hatters


I think the question on many minds today is whether the security features in hardware and software included in electronic systems today will be enough to keep the hackers out. The threats are real, the impact on businesses and personal lives is painful. Thankfully, it is clearly evident that there is an impressive upswell of activity in the security realm happening everywhere - from academic re... » read more

Newer posts →