Electronic Design

Hacking by sound not that simple

Aug 17th, 2015 | By

A recent story from Reuters kicked up a bit of a stir by claiming that hackers could use sound to steal data from a computer or network. While the story was true it turns out that it isn’t the whole story and is less of a problem than the report inferred, according to cybersecurity expert Jack Wolosewicz. Here’s the interview.

 

 



OpenText offers secure collaboration environment

Jun 16th, 2015 | By

At the 52nd Design Automation Conference in San Francisco, we talked to Rod Simon of OpenText about their collaboration platform, Exceed VA Turbo X that was introduced to the EDA industry at the conference.  With a web-based interface, Exceed VA TurboX is a hybrid solution intended to improve users productivity by enhancing collaboration from any location, securely. Exceed VA TurboX is designed for the enterprise data center so administrators to easily manage and monitor access to sensitive applications and data. Here’s the interview:



//

Bookmark and Share


Secure collaboration is a quiet trend at #52DAC

Jun 9th, 2015 | By

By Lou Covey
Editorial Director

While outsourcing software and design development is a common practice, the idea of putting your company’s crown jewels into the cloud for a freelancer to monkey with tends to drive sales of anti-emetics. Can you safely allow virtual strangers to access your server, or should you just suck it up and overwork your employees?

That has been a continuous conundrum of the Electronic Design Automation Industry (EDA) and its customers in the embedded software and semiconductor industries. Larger companies, like Synopsys and Intel either use internal security paradigms in the collaborative tools or work with …



Sony hacks may force companies to eliminate passwords

Jan 2nd, 2015 | By

This article is the first of a year-long series of articles looking at outsourcing services and how they are no longer just a means of saving money.  We look today into the arena of cybersecurity and a startup using contract software design to create a new security paradigm.

By Lou Covey, Editorial Director

gty_computer_password_ll_131204_16x9_992The hack and subsequent terror threat of Sony Pictures laid bare the inherent weakness of cyber security in the world. Even the most powerful firewall technology is vulnerable to the person with the right user name and password (credentials).  In the case of Sony, the administration credentials were



Outsourcing 101: A new series

Dec 30th, 2014 | By

Outsourcing, both onshore and offshore, is here to stay and is very big business (link numbers), but it is not static.  Suppliers in Asia and the Indian subcontinent are still the leading players but significant resources are growing in the US and the European Union that are challenging that traditional hegemony.

Outsourcing. Business Background.New Tech Press has been looking at this trend for the past few months and will begin publishing a series of articles and interviews beginning this month and running deep into 2015.  What has become clear is outsourcing falls into distinct groups:  Multinational enterprises providing soup-to-nuts services for large …