As awareness of Stuxnet continues to resonant in the automation sector, I believe we're going to see a push towards hardware-based security in embedded settings. Of course, Intel is driving this from the vendor side, via their purchase of McAfee and research into security instructions and execution on the microprocessor/microcontroller itself.
Every security technology, whether software or hardware-based has their own set of vulnerabilities. Any sense of what the potential downsides or risks are with a silicon-based approach vs. traditional software security methods?
I'm struck by how rapidly security seems to be moving into hardware. An added impetus will likely come from the increased awareness (aka fear) that Stuxnet has stirred up in the factory/automation sector. I wrote a little bit about this last month, here.
Truchard will be presented the award at the 2014 Golden Mousetrap Awards ceremony during the co-located events Pacific Design & Manufacturing, MD&M West, WestPack, PLASTEC West, Electronics West, ATX West, and AeroCon.
In a bid to boost the viability of lithium-based electric car batteries, a team at Lawrence Berkeley National Laboratory has developed a chemistry that could possibly double an EV’s driving range while cutting its battery cost in half.
For industrial control applications, or even a simple assembly line, that machine can go almost 24/7 without a break. But what happens when the task is a little more complex? That’s where the “smart” machine would come in. The smart machine is one that has some simple (or complex in some cases) processing capability to be able to adapt to changing conditions. Such machines are suited for a host of applications, including automotive, aerospace, defense, medical, computers and electronics, telecommunications, consumer goods, and so on. This discussion will examine what’s possible with smart machines, and what tradeoffs need to be made to implement such a solution.