[Viewed Archive] Using PC/104 COTS Embedded System (ES) running DOS. Files transferred over Enet via FTP with Username & Password required from ES. Remote User Interface (Enet) has UN & PW at the Operator Terminal, but not at ES end. Although designed to run on non-public network, it CAN also run on any network!
Listened to archive. Answers to questions. 30 Yrs experience. Design Printers of labels and receipts for hospitals, restaurants, retail, etc. Connected via tcpip,serial,usb. Some have encrypted keys to authorize features. No particular protection from reverse engineering (other then convoluted code :-) ). Most code done inhouse including rtos and communication stacks. Currently working on bluetooth interface.
Rsar- Many devices allow JTAG to be turned 'off' after board level tests are completed. Makes returns testing more difficult, but it is an option. Some allow for JTAG to be turned back 'on' if a secret key is known...
?If you can comment on this today: How easily hacked are the cellular networks? I.e. capturing and decoding data transmitted over a 2G, 3G, or 4G network? We have heard how easy it was during the analog days - how about with today's networks?
DKH- IoT looks to be using some standard security capabilities but I expect some new standards to develop that take less processing power and that might use security 'servers' instead of securing every device. Will be an interesting evolution...
CPU- I don't have enough information to give you any best-in-class worst-in-class information, so it is best for you to dig into the details on specific manufacturers yourself. We will talk more in future classes about specific features you can check on...
? Is security mainly an issue only for things attached by IP address, or is it also an issue for items connected by serial or GPIB? I guess I'm wondering if security can be improved by not using ethernet on the "local" side of a gateway.
?We sometimes use PIC MCUs that have a code protection mechanisms against read and write. How do these compare to other chip manufacturers' own code security mechanisms? Which MCU maker has the best protection? The weakest?
best we can for legacy systems, but new systems undergo a vulnerabilty analysis for the hardware and appropriate measures are taken. Such as selecting CPU/MCU that are more secure, including flash memory on lower layers of the die, and encrypted external flash storage
My controls are currently islands-of-automation, and not connected to the internet, or to each other. I would like to connect them to the internet to have an opportunity for remote view, remote troubleshooting, remote code updates/ enhancements. These systems are deployed on ships - out of range of cellphone networks, but usually have some sort of sattelite network with a low bandwidth and a Cisco router, and latency issues.
Distributed network of sensors that monitor an industrial process. Data are gather at a central station that makes some small processing before it sends results further to be sored and processed in relation with other data in the factory.
Hi all -Audio is live! If you don't see the audio bar at the top of the screen, please refresh your browser. It may take a couple tries. When you see the audio bar, hit the play button. If you experience audio interruptions and are using IE, try using FF or Chrome as your browser. Many people experience issues with IE. Also, make sure your flash player is updated with the current version. Some companies block live audio streams, so if that is the case for your company, the class will be archived on this page immediately following the class and you can listen then. People don't experience any issues with the audio for the archived version.
The streaming audio player will appear on this web page when the show starts at 2 PM Eastern time today. Note however that some companies block live audio streams. If when the show starts you don't hear any audio, try refreshing your browser. If that doesn't work, try using Firefox or Google Chrome as your browser. Some users experience audio interruptions with IE. If that doesn't work, the class will be archived immediately following our live taping.
What should be the perception of a product’s real-world performance with regard to the published spec sheet? While it is easy to assume that the product will operate according to spec, what variables should be considered, and is that a designer obligation or a customer responsibility? Or both?
Biomimicry has already found its way into the development of robots and new materials, with researchers studying animals and nature to come up with new innovations. Now thanks to researchers in Boston, biomimicry could even inform the future of electrical networks for next-generation displays.
Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.