Author Archive

Invasion of the Hardware Snatchers: Cloned Electronics Pollute the Market – IEEE Spectrum Unlike counterfeit electronics of the past, modern clones are very sophisticated.  The counterfeiters make their own components, boards, and systems from scratch and then package them into superficially similar products. The clones may be less reliable than the genuine product, having never undergone rigorous testing. But they may also host unwanted or even malicious software, firmware,

Juicero may be the absurd avatar of Silicon Valley hubris, but boy is it well-engineered | TechCrunch Ben Einstein, general partner at Bolt, served up this excellent teardown of the Juicero on the company blog. If you were wondering how a juice press could possibly cost $400… well, this is how.

Struggling towards 5G | EDN  5G is developing so fast it’s hard to get a handle on it, whether you’re responsible for building 5G systems or writing about them. Part of the problem is that 5G is not one proposed standard, it’s a growing set of them.  Every new proposal of this sort complicates the ability of standards bodies

New password guidelines say everything we thought about passwords is wrong There is a draft of new guidelines for password management from NIST (the National Institute of Standards and Technology). There is a number of very progressive changes they proposed. Although NIST’s rules are not mandatory for nongovernmental organizations, they usually have a huge influence as many corporate security professionals.

LEGO power functions with Arduino

LEGO Power Functions is a LEGO electric building system. You have battery boxes to deliver the power, different types of motors to make things move, light, remote control and even connection to a computer. The Power Functions system has 4 wires and uses 9V voltage. The IR Remote Control sends infrared light messages to the IR

Analyzing the spectrum of corporate innovation from R&D to VC | TechCrunch Research and development has been an innovation lifeblood of our economy for nearly 50 years. Innovation is a hot topic, and it can be confusing. With terms like incubator, accelerator and corporate venturing frequently mentioned, but rarely defined, the menu of innovation options can be overwhelming. This article gives overview to those options.

7 considerations to make when securing your Raspberry Pi  This article tries to get you thinking of security at an appropriate level for your Raspberry Pi and IoT projects without scaring you away from playing, experimenting, and innovating. It’s about striking a balance. Don’t let a challenge stop you from trying. Just be aware of the big picture for securing your projects.

ARM Releases Machine Readable Architecture Specification The companies that design processors all provide specifications of their products. These specifications are usually in the form of books or PDF documents.  It is then up to diligent engineers and academics around the world to read those documents and transcribe the relevant parts into computer languages such as C, C++, Verilog, O’Caml, Coq,