• TI E2E Community

    TI E2E Community

    Blog Post: TI India Educators' Conference - 2013
    Published. December 5, 2012

    TI India Educators' Conference - 2013 C.P. Ravikumar, Texas Instruments The churning of the ocean In the Hindu mythology, there is a story of the churning of the ocean. The Gods and the Demons knew about the nectar of life that lay hidden deep in the ocean. Anyone who consumed a drop of the nectar would be rendered immortal. To extract the nectar out of the depths of the ocean, however, the ocean needed to be churned. Discussions and debates are a lot like the churning of the ocean. There...

  • Consumerization: BYOD

    Consumerization: BYOD

    Problem with PHP, MySQLi Login Application
    Published. December 5, 2012

    I am trying to create a secure login app using php and MySQLi by following this tutorial: Link To Tutorial The tutorial is using a table(members) with 5 fields as:"id", "username","email","password",and "salt". but at the very beginning there is a an SQL INSERT function which is confusing me INSERT INTO ......

  • Linux and Open Source

    Linux and Open Source

    Shimming your way to Linux on Windows 8 PCs
    Published. December 4, 2012

    Well-known developer Matthew Garrett has just made it easier for Linux to boot on PCs locked down with Windows 8 Secure Boot....


    Well, that was fun
    Published. December 2, 2012

    Somehow/somewhere, the @sijoe twitter account was compromised, and a bad tweet generated. I deleted the tweet. Then revoked all access to twitter from all accounts. Then made sure I’ve got two factor authentication up everywhere possible. Then changed all passwords on all accounts. Are we having fun yet? Somehow, I have a sense that this [...]...

  • NextGenLog


    #ROBOTICS: "1000 Robot Makers Debut Worldwide"
    Published. November 30, 2012

    Nearly a thousand robot companies are already hawking their wares to a global population of about one million working robots. All the manufacturing, service and personal robotics vendors are detailed in an interactive online map created by The Robot Report: R. Colin Johnson @NextGenLogRed markers are industrial robot makers; Blue with an "S" are service robots used by corporations and governments; Blue with a "P" are service robots for personal and private use; Green markers represent robotic start-up...

  • Branden Williams' Security Coverage Blog

    Branden Williams' Security Coverage Blog

    The Biggest Thing The PCI Council Can Do
    Published. November 29, 2012

    The PCI Council has been pretty influential in our lives since its inception on September 7, 2006. They were handed control of the PCI Data Security Standard and have turned it into a cascading group of standards that govern (or recommend controls) for nearly every aspect of payment acceptance and processing. So it almost seems [...]...

  • Green Hills Software

    Green Hills Software

    Green Hills Software Joins Xilinx Alliance Program
    Published. October 31, 2012

    Industry-Leading Safety and Security Solutions for Zynq-7000 All Programmable SoC...

  • Wireless Sensor Networks Blog

    Wireless Sensor Networks Blog

    Encryption Libraries for Waspmote Sensor Networks (AES / RSA)
    Published. November 27, 2012

    Libelium has released a set of Encryption Libraries for Waspmote and Plug & Sense!™ sensor platforms in order to ensure the authentication, confidentiality (privacy) and integrity of the information gathered by the sensors. To do so different cryptography algorithms including AES 256 and RSA 1024 have been implemented in the libraries and released under an [...]...

  • Dana Gardner's BriefingsDirect

    Dana Gardner's BriefingsDirect

    Right-sizing security and information assurance, a core-versus-context journey at Lake Health
    Published. November 28, 2012

    Lake Health's Information Security Officer has been expanding the breadth and depth of risk management there to a more holistic level -- far more than just a series of security products....

  • Technology Review Feed - Energy Top Stories

    Technology Review Feed - Energy Top Stories

    Security Guru Pledges to Strengthen Critical Computers
    Published. November 23, 2012

    Computer-security researcher Eugene Kaspersky says he is testing control software that won’t run malicious code.Stuxnet, a piece of malicious software discovered in 2010, targeted industrial software controlling Iran’s uranium-enrichment centrifuges. But the code got loose—and it continues to spread: Chevron, for example, said last week that its network had been infected by Stuxnet....

  • All About Microsoft

    All About Microsoft

    Microsoft delivers operating system updates for Surface RT
    Published. November 14, 2012

    Here's a list of non-security-specific updates that Microsoft is making available for Windows RT as part of today's Patch Tuesday....

  • FPGA Blog

    FPGA Blog

    Xilinx Debuts Defense-Grade FPGAs, Zynq-7000 SoCs with 4G Secure Architecture
    Published. November 1, 2012

    Xilinx introduced their fourth generation secure architecture with Information Assurance and Anti-Tamper IP core support for defense-grade 7 series FPGA devices and Zynq-7000 All Programmable system-on-chips. In addition to the secure capabilities, the defense-grade 7 series FPGAs and Zynq-7000 All Programmable SoCs offer mask set control, ruggedized packaging with fully-leaded (Pb) content for harsh environmental [...]...

  • EDA Graffiti

    EDA Graffiti

    Hardware?based cryptography offers innovative solution for security
    Published. October 30, 2012

    Accelerating cryptographic processing in hardware instead of performing these algorithms entirely in software ensures that security measures do not get in the way of an engaging and satisfying user experience. In this article, we look at how to deploy the level of security needed to reassure users without slowing down the device to the point where the user experience is affected....

  • McAfee Labs

    McAfee Labs

    Android/FakeToken 2.0 Goes Back to Basics
    Published. October 30, 2012

    In March a new type of financial attack on Android devices was found targeting customers of several banks in Europe. Dubbed FakeToken, one of the principal differences of this new threat–compared with previous Trojan bankers for Android such as Zitmo/Spitmo–was the fact that both authentication factors (Internet password and mTAN) were stolen directly from the Read more......

  • Chris A. Ciufo on All Things Embedded

    Chris A. Ciufo on All Things Embedded

    “MicroFlix”…Funny name; how crazy would it be if Netflix joined the Microsoft Family?
    Published. October 29, 2012

    If Microsoft were to buy Netflix - and it's a big "if", since it's only a rumor - MSFT could join Apple, Amazon and Google in having a huge influence on the embedded industry. Continue reading →...

  • Now Hear This!

    Now Hear This!

    Hacker exposes pacemaker security flaws that allows deadly shock
    Published. October 18, 2012

    Well-known hacker Barnaby Jack has reverse-engineered a pacemaker transmitter to make it possible to deliver deadly electric shocks to the heart its goal is to protect....

  • Electronics Design Articles

    Electronics Design Articles

    Secure Gen 2 Cortex-M3 Flash FPGA Prevents Counterfeiting
    Published. October 9, 2012

    By William WongMicrosemi’s SmartFusion 2 FPGA incorporates a hard core Arm Cortex-M3 along with extensive security features that prevent tampering and counterfeiting while providing a secure runtime environment....

  • EDA Blog

    EDA Blog

    Coverity Launches Development Testing Platform v6.5
    Published. October 1, 2012

    Coverity launched version 6.5 of their Development Testing Platform, which is an integrated suite of software testing technologies for identifying and remediating critical quality and security issues during development. The latest version features Coverity Test Advisor for change impact analysis and unit testing on high risk code, including changed code and code impacted by a [...]...

  • John Day

    John Day

    Keeping cars safe from hackers
    Published. September 28, 2012

    I’ve recently spoken with several people about the security of connected vehicles and I learned, among other things, that providing 100 percent protection for cars 100 percent of the time is most likely not possible. Cars are increasingly connected in a variety of ways, and connected cars will eventually be hacked. The threat is not [...]...

  • Team Verify's Blog

    Team Verify's Blog

    Shameless Promotion: Free Club Formal San Jose (with Lunch) on Wednesday 10/17
    Published. September 24, 2012

    Please join Team Verify and other design and verification engineers at the next "Club Formal" on the Cadence San Jose campus on Wednesday, October 17 at 11:30am. This free, half-day event (including lunch) is a great opportunity to learn more about general advances in formal analysis and assertion-based verification, and to network with others in your field.  Based on attendee feedback from previous events, we will deep-dive on the following topics:* How customers are using the new...

  • CFD doesn’t mean Color For Directors

    CFD doesn’t mean Color For Directors

    Here Comes the Rain Again
    Published. September 24, 2012

    Saturday lulled me into a false sense of security. The weather was absolutely gorgeous and for once in a long time I wasn’t out hiking.  I thought that’s fine… there’s always tomorrow. Then bam on Sunday the rain came … the monsoon kind of rain. It reminded me of a quick conversation I had with [...]...

  • Jack Erickson's Blog

    Jack Erickson's Blog

    iPhone5 Differentiation is Chip Design
    Published. September 19, 2012

    In case you may have missed it, Apple recently launched a new iPhone. As per the iPhone launch tradition, it brings with it a lot of excitement over the latest capabilities. Of course we don't know everything until it is actually available, but this latest incarnation has broken all kinds of records for pre-sales, so it must be groundbreaking. Right?There are a lot of comparisons out there between the iPhone 5 and the 4S, but in reading through all of them it seems on the surface like the 5 is...

  • Jason Andrews Blog

    Jason Andrews Blog

    Using a Network File System with the Xilinx Zynq-7000 Virtual Platform
    Published. September 18, 2012

    There are a number of ways to do embedded software development for Xilinx Zynq-7000 based designs. For embedded Linux projects, Zynq offers multiple storage options such as SD card and USB. It's also possible to use a ramdisk for the root file system during development. Today, I will cover how to use the Network File System (NFS), first to mount a file system on the host machine and then to mount the root file system over the network. As usual, we will do all this using the Zynq...

  • Tawna Wilsey Blog

    Tawna Wilsey Blog

    RE: RE: MMSIM11, simulates but now does not plot
    Published. September 12, 2012

    Hi Kabal,You are using IC6.1.4?  That is pretty old.  Most of the issues I see with that error message are from IC614 and previous releases.So, first thing I recommend is getting on to IC6.1.5 latest ISR.Honestly, it’s going to be fastest to contact http://support .  With the logfiles, a Customer Support AE can quickly pinpoint the issue andget R&D involved as necessary.  (I know…I’m one of those Customer Support AEs.)   best regards,Tawna...

  • The Java Posse

    The Java Posse

    Java Posse #393 - Newscast for Aug 30th 2012
    Published. September 1, 2012


  • Brian's Brain

    Brian's Brain

    Identity fraud: Retailer incompetence is at the core of a system that's deeply flawed
    Published. August 20, 2012

    Customer "convenience" is no excuse for shoddy online security that ends up causing consumers hassle and harm....

  • EEBeat


    40-nm Embedded Flash MCUs Target Automotive Applications
    Published. August 10, 2012

    With automakers staring down the double- barrel of some very difficult upcoming fuel-mileage mandates plus advanced security and functional safety requirements, any semiconductor supplier planning to succeed in this industry has to be prepared to do something extraordinary. Such as, say, jumping over the 65-nm process node to go from 90-nm directly to 40-nm technology, [...]...

  • Ed Burnette's Dev Connection

    Ed Burnette's Dev Connection

    More Android malware FUD is the only thing that is sprouting
    Published. August 8, 2012

    Yesterday, ZDNet's Rachel King picked up a malware story from security vendor Webroot. Now questions have arisen about the accuracy of the article, and the tactics and credibility of the vendor....

  • Gael Holmes Hofemeier (Intel)

    Gael Holmes Hofemeier (Intel)

    Intel KVM Port Requirements and Troubleshooting Tips
    Published. August 8, 2012

    There are various communication modes that can be established when working with Intel AMT.  Many IT shops will provision their Intel AMT capable systems using TLS (Transport Layer Security), others will provision their systems without any security. Regardless of how a company decides to work with Intel AMT, most will want to use the Remote KVM feature. [...]...

  • GreenTech Pastures

    GreenTech Pastures

    AlertMe supports Lowe's residential energy management platform
    Published. July 24, 2012

    The cloud-based solution called Iris enables homeowners to control thermostats and security, and will be available in 500 stores by the end of August....

  • Windows Embedded Standard

    Windows Embedded Standard

    June 2012 Security Updates are Live on ECE for XPe and Standard 2009
    Published. July 3, 2012

    The June 2012 Security Updates are now available on the ECE for Microsoft® Windows® XP Embedded with Service Pack 3 and Windows® Embedded Standard 2009. The list below applies to Standard 2009 only: KB2604121 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution KB2656405 - Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight KB2656368 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution KB2686827 - Vulnerabilities in...

  • Microchip Coupon Codes & Discounts

    Microchip Coupon Codes & Discounts

    Save 30% off the ICP2GANG-DS Production Quality ICSP Secure GANG Programmer from Softlog
    Published. December 26, 2011

    The ICP2GANG-DS Production Quality ICSP Secure GANG Programmer is a 4-channel in-circuit programmer (expandable up to 64 channels) that operates with a PC or as a standalone unit and simultaneously programs Microchip® 8-bit PIC MCUs and serial EEPROMs. The secure programming feature dramatically reduces the risk of unauthorized reconstruction of [...]...

  • CCIE Journey

    CCIE Journey

    CCIE Security 4.0 Refresh Information Released
    Published. June 5, 2012

    I thought Cisco would wait until Cisco Live to do the announcement, but looks like they wanted to give everyone time to come up with some questions. I am curious if any of the hardware changes are going to slow down any of the training vendors in updating their material? The additional hardware seems to [...]...

  • Jeff Kataoka (Intel)

    Jeff Kataoka (Intel)

    Jeff's Notebook: The Developer’s Guide to Creating Intel® AMT Certificates for Intel® vPro™ clients
    Published. March 6, 2012

    One of the great features of the latest Intel® vPro™ technology-based clients is that it supports the encryption of communications that an IT manager would have between the management console and the vPro client.  In order to enable this capability, a developer needs to work with a feature of vPro technology, called Intel® Active Management Technology (Intel® AMT).  [...]...

  • Rainer Makowitz << The Embedded Beat

    Rainer Makowitz << The Embedded Beat

    Securing telematics and infotainment
    Published. January 11, 2012

    By Rainer Makowitz — The Consumer Electronics Show 2012 is once again demonstrating to what extent consumer devices either enter the car or they get converted into their automotive equivalent and added to the feature list. The biggest expectations on value for the driver are in the field of infotainment and assist functions. Whether access [...]...

  • Denali Memory Blog

    Denali Memory Blog

    Can DRAM Contents Survive a Reboot? Surprisingly, In Most Cases The Answer is, “Yes”
    Published. April 20, 2011

    A Cadence DRAM Memory Controller IP customer asks, "I have a DRAM subsystem with ECC and my system has the capability to use write data masks and partial-word writes. DDR3 has a reset pin, why can't I just reset it? Why do I need to initialize the memory?" The answer is "yes, you must initialize it" but the reason may be surprising to many people: DRAM contents are not lost when the power is turned off! I stumbled upon this great research paper from Princeton University...

  • Michael Jacobs Blog

    Michael Jacobs Blog

    Webinar: SOI Gives More Performance Per Watt, And There's An Easy Path
    Published. August 20, 2010

    If you've seen any of the recent buzz lately around Silicon-On-Insulator (SOI), you'd know that it's an excellent option that can enable you to meet lower power consumption and die area targets without sacrificing performance or functionality. This is why Cadence, ARM and IBM have partnered to provide you an easy path to silicon with the SOI process for your digital design, including production proven software, design kits and IP.   If you're a design manager or engineer, and...

  • Laptops and Desktops Blog

    Laptops and Desktops Blog

    Dell's new Vostro 3000 series laptops offer Ivy Bridge, security features galore starting at $599
    Published. June 13, 2012

    Dell's business portables update to Intel's new Ivy Bridge processors, while retaining all the security features you would expect as well as value pricing....

  • BCL Team Blog

    BCL Team Blog

    Memory Mapped File Quirks [Greg]
    Published. June 6, 2011

    Memory mapped files are segments of virtual memory that are directly mapped to a physical file on disk, byte-by-byte. This technology has a number of benefits over traditional stream based I/O, such as performance during random access to large files, or the ability to share the mapped memory between different threads and processes. The .NET framework provides built-in support for memory mapped files starting from version 4. In most cases using memory mapped files in .NET is as easy as using traditional...

  • Barr Code

    Barr Code

    Building Reliable and Secure Embedded Systems
    Published. March 13, 2012

    In this era of 140 characters or less, it has been well and concisely stated that, “RELIABILITY concerns ACCIDENTAL errors causing failures, whereas SECURITY concerns INTENTIONAL errors causing failures.” In this column I expand on this statement, especially as regards the design of embedded systems and their place in our network-connected and safety-concious modern world. [...]...

  • Trenton Technology Blog

    Trenton Technology Blog

    GPU Computing Addresses Cryptanalysis Challenges
    Published. May 9, 2012

    The essence of cryptography is keeping information secret; securing communications in the presence of adversaries, verifying authenticity of trusted parties, and maintaining transaction integrity.  From a personal standpoint we can relate to protecting banking information, credit card transactions or even health records, but governments view cryptography from two unique angles; the need to protect top [...]...

  • Windows Embedded Blog

    Windows Embedded Blog

    How many embedded devices are you using each day?
    Published. October 20, 2011

    We all use embedded devices throughout the day without thinking about how many ‘smart’ systems are around us, from the in-car entertainment system, digital photo frame, home automation/security, digital signage, medical systems and more… When you start counting the number of devices you actually use each day the total number can be quite surprising! - Mike...

  • Gabe On EDA

    Gabe On EDA

    A Hardware Solution to Systems' Security
    Published. April 3, 2012

    Many news items in newspapers and on the web remind us frequently that security of electronic systems has become a problem. As the world of the common person becomes more and more based on the correct functioning of the electronic systems that make his and hers daily life possible, any breach of data or malfunctioning of an appliance creates at best an inconvenience and at worst a life threatening situation. Security measures developed so far use software applications, hardware devices, or a combination...

  • Matt Ployhar (Intel)

    Matt Ployhar (Intel)

    GDC 2012 – Session: Security Best Practices
    Published. February 23, 2012

    Hi Everyone – I hope to see some of you in a few weeks at GDC. This year I’ll be doing an Introductory Session on Security Best Practices. This is going to be a fast paced debrief and introduction of the spectrum of: Piracy, Secondary Sales, and Account Theft solutions available to Game Developers. I’ll [...]...

  • Electronics Engineering Video Blog Podcast

    Electronics Engineering Video Blog Podcast

    EEVblog #129 – US Airline TSA Security Rubbish & the $9 fee
    Published. November 27, 2010

    Dave cuts loose on all the US airline security and TSA rubbish, their stupid reactionary process to every new security threat, and the new $9 “Security fee” for all packages going into the US of 453g (16oz). How will affect local business who export to the US Thanks to Don McKenzie: And don’t try [...]...

  • Urban Work Bench

    Urban Work Bench

    We Remember
    Published. November 10, 2011

    If nothing else, this Remembrance Day, take a moment to remember those who made the ultimate sacrifice for their country, for the hope of peace, and the security of future generations. Or brave the weather on Friday and show your support in your local community. This image is where we’ll be, at the newly dedicated [...]This post was written by Mike Thomas for ©2010.Originally posted as We Remember...

  • John Coyne's Embedded Blog

    John Coyne's Embedded Blog

    Webcast: The New 'Standard' in Embedded: Windows 7 Componentized for Devices
    Published. June 29, 2010

      Hey Campers – Join me Tomorrow at 10AM PDT as I present a webcast on Windows Embedded Standard 7. we’ll go into the features we’ve included with this release that help you create an immersive device, and make it reliable, and secure. Should be...(read more)...

  • javierandrescaceres (Intel)

    javierandrescaceres (Intel)

    Building an Intel AMT Agent Monitor (Part I)
    Published. February 25, 2009

      Hello everybody,   One of the coolest Intel AMT’s features is security, but one can be lost among the jargon and get discouraged quickly. The purpose of this post is to talk a little about System Defense, network security policies and heuristic filters to finally build an Agent monitor (or "Agent Presence").   Introduction [...]...

  • Joseph Hupcey Blog

    Joseph Hupcey Blog

    Amazon’s New Kindles: More Steps Toward the Paperback Computer
    Published. September 28, 2011

    While I understand that a new Kindle Fire at $199 MRSP is significantly more than a dime novel, I assert that today's launch of the new Amazon tablets takes us one step closer to the "paperback computer" becoming a reality.  Here the term paperback computer isn't just a clever play on words regarding the bookish seller of these devices.  Instead, it's a reference to a conjecture introduced in 1992 by the venerable PBS series "The Machine That Changed the World"....

  • Conversation Central

    Conversation Central

    Security Standards for the Cloud
    Published. June 15, 2010

    Guests: Jeff Green, Senior Vice President McAfee Labs, McAfee, and James Wendorf, IEEE-SA Industry Connections Program Manager Hosts: Harry Gries, Social Media Specialist and Customer Support, Xuropa, and Karen Bartleson, Sr. Director, Community Marketing, Synopsys Learn from Jeff Green about the standard efforts happening at IEEE around the measurement of cloud security. Learn about the differences [...]...

  • Ask Steve

    Ask Steve

    Are High Interest Rates Good or Bad for Bonds?
    Published. October 4, 2011

    Question:  I heard an expert on TV saying that rising interest rates would be bad for bonds.  But I have heard other experts in the past say that bonds are good investments when the interest rates are high.  How can both situations be correct?   -Kimberly L., Scottsdale   Answer:  I know how confusing this can be, but both situations are correct.  Bonds are bad investments in a rising-interest-rate environment.  But bonds are good investments when the interest...

Share and Enjoy:
  • Digg
  • Sphinn
  • Facebook
  • Mixx
  • Google
  • TwitThis