Strategies For Detecting Sources Of Silent Data Corruption


Engineering teams are wrestling with how to identify the root causes of silent data corruption (SDC) in a timely and cost-effective way, but the solutions are turning out to be broader and more complex than simply fixing a single defect. This is particularly vexing for data center reliability, accessibility and serviceability (RAS) engineering teams, because even the best tools and methodolo... » read more

Power/Performance Bits: Aug. 27


The sound of typing Cybersecurity researchers at the Southern Methodist University found a way to detect what a user is typing based on sensor data collected from a nearby smartphone. The team found that acoustic signals produced by typing on a computer keyboard can successfully be picked up by a smartphone, which can then be processed to determine which keys were struck – even in noisy conf... » read more