Embedded Technology

Looking at Android security

Sep 17th, 2015 | By

We interviewed Jack Wolosewicz, CTO of Eurocal Group (a New Tech Press sponsor) recently about the recurring stories regarding Android security.




Hacking by sound not that simple

Aug 17th, 2015 | By

A recent story from Reuters kicked up a bit of a stir by claiming that hackers could use sound to steal data from a computer or network. While the story was true it turns out that it isn’t the whole story and is less of a problem than the report inferred, according to cybersecurity expert Jack Wolosewicz. Here’s the interview.

 

 



OpenText offers secure collaboration environment

Jun 16th, 2015 | By

At the 52nd Design Automation Conference in San Francisco, we talked to Rod Simon of OpenText about their collaboration platform, Exceed VA Turbo X that was introduced to the EDA industry at the conference.  With a web-based interface, Exceed VA TurboX is a hybrid solution intended to improve users productivity by enhancing collaboration from any location, securely. Exceed VA TurboX is designed for the enterprise data center so administrators to easily manage and monitor access to sensitive applications and data. Here’s the interview:



//

Bookmark and Share


Outsourcing has become a zero sum game with benefits for many

Jun 1st, 2015 | By

This is the latest in our ongoing series of articles on outsourcing, benefits and downfalls.

By Lou Covey
Editorial Director

Outsourcing product design and manufacturing has become an international way of life despite the concern that it takes jobs world_of_outsourcingaway from one country in favor of another. As the practice has matured, it has become more of a zero-sum game as long as the participant realize it is best as a cooperative exercise.

The decision to outsource any part of a product lifecycle is not longer a matter of which country a company will choose, but which countries to choose. …



Data breach fatigue and NIH fuel ineffective cyber security

Mar 19th, 2015 | By

This is another part of our ongoing series on outsourcing services, again focusing on security  Large companies rely on the work of outsourcing providers for developing security solutions and containing breaches.

By Lou CoveyNew Tech Press

News reports about data breaches are almost a daily occurrence. Companies spend millions on identity protection services for affected customers while the same type of breaches continue with no end in sight. The sheer volume of data stolen is astronomical begging the question, why isn’t anything being done?

“There is no financial reason for companies and governments to do anything about the …