Skip navigation
2015
It is common to have resource conflicts when designing with microcontrollers. It could be memory, I/O ports or any other constrained resources which often leads to having to choose a more expensive device with a larger package. I faced a similar situation using the EFM8 SB1 STK. The EFM8 STK is a starter kit platform with a Silicon Labs 8-bit MCU and is a nice platform for reference design because it has the EXP header for creating solutions. It also has some useful hardware like the Memory LCD ...
(Illustration Source: Linear Technology) To describe the vast number of stars in the observable universe, during his television series Cosmos the late astrophysicist Carl Sagan emphasized that there were “billions and billions,” placing exaggerated embellishment on both“ b’s”. Were he alive today Dr. Sagan could easily apply his catch phrase to describe the number of connected devices in the “Internet of Things” (IoT).The total installed base of ...
Google working to release IoT Operating System at I/O 2015. Google announced that their latest Brillo and Weave IoT operating system will be up, running, and available in Q4 of 2015 at the I/O 2015 May 28-29. Their new plan included updates for the Android M, but just how groundbreaking with these releases be for the future of IoT? (via google) At the I/O 2015 in May, Google unleashed some big news of their plans to create a new operating system designed specifically for the Internet of Thi ...
Italian cybersecurity company Hacking Team was hacked on Sunday, resulting in the public leak of over 400GB of sensitive information. The Twitter and data takeover included the publishing of client emails, sensitive employee information, source codes and more, revealing the company’s shady dealings with blacklisted governments. Perhaps the name was just asking for it. “Hacking Team” is an Italy-based company that provides offensive cybersecurity solutions to governments and ...
Researchers from Tel Aviv University recently found a way to decipher decryption keys by decoding the radiowaves emitted by laptop computers. The device the team created is compact enough to fit inside a round of pita bread, although not as stealthy as some would hope. (via TAU) Hackers of the future may use pita bread to compromise your network, according to a new study that is. Researchers from Tel Aviv University created a portable radio receiver that can extract protected decryption key ...
Bitcoin entrepreneur Oz Nathan and MIT Media Lab graduate researcher recently announced the near completion of their homomorphic encryption scheme – a bitcoin-inspired cloud network that promises to keep sensitive information safe by separating it into indecipherable puzzle pieces. (via MIT)   Imagine a world where your personal data was always secure online. A new homomorphic encryption scheme intends to create just that. The cloud network, Enigma, is based on the cryptography behi ...
Google’s Project Brillo is a slimmed-down OS for IoT-based devices (via Google) Google wants to be an integral part of your life in terms of the IoT. Sure, they already have smart devices such as thermostats and smoke alarms in our homes already but they want to expand even further into the IoT realm in much the same fashion as introducing Android to mobile platforms. It should be noted that this isn’t the first time Google tried their hand at getting into the IoT market as the ...
Kevin Mitnick at the Freescale Technology Forum (via Knowbe4) As reports about security breaches, stolen identities, and big box stores being hacked continue to rise, we can only hope that companies are improving their security systems to prevent further cyber attacks. Yet, the “world's most famous hacker” isn't so optimistic. Kevin Mitnick has been hacking since he was in his teens. He wiretapped the National Security Agency when he was only 16 and a federal prosecutor once tol ...
Revenue projections from car-connected services are expected to hit $152 billion by 2020. Analysts anticipate a huge push for the “Internet of Cars,” not just because of revenue generation, but also due to the immense amount of consumer data that can be collected. Similar to the Internet of Things, however, the demand may surpass the security technology available to ensure consumers are both pampered and safe. Can we have the best of both worlds? (image via stock photography)   ...

Filter Blog

By date: By tag: