Security: Hard and Soft

Next Up: A Tortoise That Checks Your Chip for Flaws

by Jim Turley

I hate writing about security. I hate it because I wish it were unnecessary. There was a time when engineering meant making a product that did what you wanted it to do. Now it means spending a bunch of time making it not do what other people want but you don’t want. This sucks.

Most of the problem with implementing security features is guessing where the vulnerabilities are. How do you fix a bug you’ve never even thought of, much less identified? At least “real” hardware bugs are unintentional. Security hacks are both deliberate and malicious. Someone is trying to break your stuff.  Read More


latest news

February 21, 2017

Accellera Day Opens DVCon U.S. on Monday, February 27 with Three Timely Tutorials

ITTIA Empowers the Development of Intelligent IoT Devices together with Renesas Electronics America by Delivering ITTIA DB SQL Database Software on Power-Efficient RZ/A Microprocessor Series

Synopsys IC Compiler II Sets the Bar in Quality-of-Results

February 20, 2017

mPerpetuo Introduces The World's Fastest Android Cold Boot

February 14, 2017

Aricent and Rohde & Schwarz Cybersecurity unveil a unique bandwidth control solution to enhance customer experience for mobile operators and network equipment providers

February 13, 2017

Intrinsic ID Introduces CITADEL, the SRAM PUF-based Key Provisioning System that Breaks the Barriers of IoT Security

February 09, 2017

Renesas Electronics Delivers Next-Generation Emulator That Contributes to Reduced Embedded Software Development Time

January 04, 2017

The zigbee alliance to Unveil Universal Language for the IoT from CES 2017 – Making it Possible for Smart Objects to Work Together on Any Network

December 23, 2016

Green Hills Software and INTEGRITY Security Services to Present and Exhibit at CTS/CES 2017 in Las Vegas, NV

December 19, 2016

INTEGRITY Security Services Delivers Certificates for V2V Communication

December 09, 2016

Green Hills Software Announces Support for MICROSAR from Vector on INTEGRITY RTOS Platform

TargetLink 4.2: Merging Function and Production Software Development

December 08, 2016

Synopsys Announces Industry's First DisplayPort 1.4 with DSC 1.2 Verification IP and Test Suites

Barr Group Announces Spring 2017 Embedded Systems Training Calendar

December 07, 2016

Synopsys Releases Version 2016.12 of the RSoft Photonic System Design Suite

Software News Archive

Calling All Cores!

Standards, Tools, and Solving the Multi-Core Heterogeneous Computing Software Conundrum

by Amelia Dalton

How Does Scatter/Gather Work?

Promises of Single-Cycle Access Are True, But…

by Bryon Moyer

Robot Penguins Zap Cyber-Threat!

University Research Reveals Animal-Based Coding Practices

by Jim Turley

Information Monoculture

How Instant Access to Information Might be Making Us Dumber

by Jim Turley

Sequential and Parallel Universes

The Real Challenge of Next-Generation Computing

by Kevin Morris

Software Article Archive

 

Editors' Blog

Safety and Security Conference

posted by Dick Selwood

With the growth of the IoT there is increased interest in the overlapping areas of safety and security. There is already a lot of knowledge on these issues and this has been shared by the IET's International System Safety and Cyber Security Conference. The eleventh version of this conference is running from 11—13 October 2016 in London. (14-Sep)

Use Ada and win money

posted by Dick Selwood

Got An idea for an embedded project that will be running on an ARM Cortex M or R? Then – if you get your skates on - there is still time to take part in AdaCore's Make with Ada competition and as well as getting your project completed you could be in for a share of $88,000 prize money. (29-Aug)

Securing the core

posted by Dick Selwood

A Franco-German announcement brings improved security to SoCs for the IoT (17-Nov)

Through-The-Looking-Glass Security

posted by Bryon Moyer

While most security operations are intended to take place far from the light of day, that’s not always possible. If you know people can see what you’re computing, then obfuscation can help hide what you’re actually doing. Microsemi has helped explain how that obfuscation works. (16-Nov)

Toyota Unintended Acceleration

posted by Dick Selwood

What really happened with Toyota? (11-Nov)

Software Editors' Blog Archive

 

forum

Radio FPGA!

Posted on 02/23/17 at 12:48 AM by TotallyLost

TotallyLost
Thanks Kevin --- way cool parts --- can not wait for their general availability smiling

FPGAs Race for the Bottom

Posted on 02/20/17 at 4:42 PM by logos

CyrilJ,

You're links are broken.

Also, Microsemi's THREE separate software suites are INCONSISTENT with Linux support.
- FlashPro for Libero IDE does not support Linux. Microsemi's site and documentation is all over the place with FlashPro hardware…

How Does Scatter/Gather Work?

Posted on 02/20/17 at 2:13 PM by TotallyLost

TotallyLost
What is FAR worse?

An 8-way time division multiplexor to "fairly share" memory between 6 processors and 2 DMA channels -- no priority accesses to starve another channel, no contention based allocations, just straight channel 1 gets only time slot 1, ch…

How Does Scatter/Gather Work?

Posted on 02/20/17 at 1:16 PM by TotallyLost

TotallyLost
Now you might say that no one would be that stupid as to pack all accessed data into a single subchannel. With the number of sub-channels being 2^n (where n is 1, 2 or 3), it's also pretty likely that the underlying data structure to be processed will hav…

Software Forum Archive

subscribe to our software development newsletter



Software On Demand Archive


Login Required

In order to view this resource, you must log in to our site. Please sign in now.

If you don't already have an acount with us, registering is free and quick. Register now.

Sign In    Register