中文 English

Week in Review: IoT, Security, Autos


Products/Services Synopsys agreed to acquire QTronic, a German company specializing in simulation, test tools, and services for automotive software and systems development. The transaction is expected to close in the fourth quarter of the company’s 2019 fiscal year. “The terms of the deal, which is not material to Synopsys financials, are not being disclosed,” Synopsys said in a statemen... » read more

Week in Review: IoT, Security, Auto


Internet of Things Microsoft this week introduced IoT Plug and Play, a no-code toolkit for connecting Internet of Things devices to the cloud. The company touts it as a new modeling language to pump up the capabilities of IoT devices through the Microsoft Azure cloud service. The Azure IoT Device Catalog lists devices that support IoT Plug and Play, such as the STMicroelectronics SensorTile.bo... » read more

Week in Review: IoT, Security, Auto


Internet of Things Wing received an Air Carrier Certification from the Federal Aviation Administration to begin making commercial deliveries with drones. The Alphabet unit is cleared to deliver packages in southwestern Virginia. Wing has had a pilot program going in the vicinity of Canberra, Australia, and was recently permitted to make commercial deliveries with unmanned aerial vehicles in th... » read more

Week in Review: IoT, Security, Auto


Internet of Things Silicon Labs worked with Norway’s Q-Free to create the ParQSense Smart Parking Sensor, which helps drivers find available outdoor parking spaces. ParQSense uses the chip company’s Wonder Gecko wireless microcontroller for connectivity and control. Having gone through pilot testing in the European Union and North America this year, ParQSense is being released for commerci... » read more

Malicious Code In The IoT


Fundamentally, malicious code families are initially comprised of one or more distinct malicious code samples. For clarity, malicious code is, globally used as an umbrella term for all types of malevolent program code. However, for this article, the term is being applied to static code and not morphing codes, which were discussed in a previous article. This discussion focuses on the type of mal... » read more