Search results for "cryptography"
The search for quantum-resistant cryptography
Quantum computing is set to transform the IT industry. This new computing architecture takes advantage of quantum mechanics to deliver capabilities beyond what traditional binary computing can achieve. However, these capabilities come at a cost. Once quantum computers reach a certain state of maturity, they are destined to render the cryptographic underpinnings of today’s digital systems insecure.
Small and light video server with AI for rugged applications
General Micro Systems (GMS), the rugged C4ISR mobile systems and servers company, has announced a small, light and SWaP-C-optimised workstation, display and general-purpose graphics processing unit (GPGPU) artificial intelligence (AI) algorithm and video processor.
Wireless modules pack processor power and rich peripherals set
Integrating a high-performance application processor, network processor, and crypto engine in a single chip with a rich set of peripherals, the CC, ISED/IC, ETSI/CE, and MIC-certified CC3235MODx modules from Texas Instruments (TI) are ideal for a wide range of Internet of Things (IoT), building automation, security, and health care applications.
Damning report on ‘invasive’ police use of facial recognition
The Information Commissioner Office (ICO) has demanded a new statutory code to govern the police use of ‘invasive’ facial recognition technology. The watchdog’s investigation follows the August incident over its use at King’s Cross station, in which it determined the technology was a potential threat to the public’s privacy.
Solving the equity dilemma and funding the intangible economy
Alternative SME credit specialist Caple has supported d EnSilica, a leading bespoke chip design and supply firm, with a £3.7m fully unsecured loan. This will enable EnSilica to continue its expansion into high-growth sectors including automotive, space and the Internet of Things (IoT).EnSilica funds the design and supply of silicon chips for customers and then takes a share of the revenues once the chip design is proven. Given the time betw...
Nightmare on IoT security street
Security is becoming a major headache for IoT companies. Steve Rogerson looks at the risks.The dream of billions of connected devices comes with a security nightmare as even a small vulnerability in a cheap consumer device can lead to a massive problem. While most people are not that concerned about a minor hack on a connected fridge or kettle, the problem is what the hacker can do once connected.
What are the trends in autonomous vehicle security?
Autonomous vehicles (AVs) are going to transform our driving habits, the transportation industry and wider society. We’ll not only be able to hail a car to our doorstep and send it away once used, but AVs will also challenge the concept of car ownership and have a positive impact on the environment and congestion. However, one topic remains high on the agenda: security. By Marc Canel, Vice President of Strategy, Security, Imagination Techn...
Commercial embedded Linux benefits: managing compliance
This is part three of a series on the main benefits of utilising a commercially-supported embedded Linux solution.Part oneexplained how you can get to market faster andpart twooutlined the long-term savings associated with commercial embedded Linux.Commercial embedded Linuxis the solution of choice for many software developers working on embedded products. Guest blog written by Pavan Singh, Wind River.
A closer look at the end-to-end security of SARA-R5
Recently launched by u-blox, theSARA-R5series of LTE-M and NB-IoT modules for low power wide area (LPWA) IoT applications is their most advanced, secure and highly integrated mobile product.The module provides end-to-end security.This makes it ideal for IoT applications with long-term device implementations.
Improving the security and performance of cloud connected devices
Hardware-based trust anchors are key for connected applications and smart services, whether for a robotic arm in the smart factory or automated air conditioning in a private home. The new OPTIGA Trust M solution from Infineon Technologies helps manufacturers to enhance the security of their devices while at the same time improving overall system performance.