Trust is Good – But is Zero-Trust Better?
Zero-Trust

Trust is Good – But is Zero-Trust Better?

By Alexander Summerer of Swissbit AG

Zero-Trust, which has long been promoted as an alternative to classic network security concepts, sounds quite harsh. Yet it is by no means all about abolishing a trust-based corporate culture; rather, it is about a tangible cyber security concept. So, what is Zero Trust and how can it be achieved? Read more.

New Podcast: FPGAs for the Midrange Do Exist

New Podcast: Dev Talk with Rich and Vin

In the golden era of electrical engineering, when yours truly was a budding designer, we worked with a processor, like an 8051 or an 8085, and we wrote some code to go with it. Programmable log? It existed, but those things were too darn expensive for what we called mainstream or mid-range applications.?

Fast forward to today, and you’d be hard pressed to come up with application that doesn’t make use of programmable logic.

In this episode of DevTalk with Rich and Vin, we look at today’s landscape of FPGAs, particularly those that are, in theory, aimed at the mid-range of the market. And we bring in a special guest, Gordon Hands , a Senior Director with Lattice Semiconductor .

Optimizing Embedded System Functionality with the Right OS

By Nathan Drude of Variscite LTD.

Embarking on a new project for an embedded product involves critical decisions, chief among them being the selection of an appropriate operating system (OS). Much like how the foundation of a building sets its resilience and longevity, the choice of an OS significantly affects a product's performance, scalability, and user-friendliness. Considering the plethora of available options, understanding the nuances of each becomes vital. Read more.

Lynx Software Technologies acquires open source software security firm Timesys

Lynx Software Buys Timesys

Lynx has acquired Timesys is Now Lynx (Pittsburgh, Pennsylvania), a?provider of development tools, cybersecurity solutions, and software-ngineering services for open source embedded and edge software applications.? Read more.

New Embedded Data Sheet: Condor NVA500xX

Condor NVA500xX from

The Condor NVA500xX is a high-performance XMC video graphics and GPGPU processing card based on the NVIDIA?? Ampere?? architecture using the RTX A500 GPU. The Condor NVA500xX XMC card supports 4 GB GDDR6 graphics memory along with 2,048 NVIDIA CUDA Cores, 64 Tensor Cores, and 16 RT Cores for uncompromised computing accuracy and reliability. Read more.

Embedded Computing Design is the leading source of “how-to” technical articles, videos, blogs, conferences, and podcasts for embedded engineers.

Content

2024 Embedded Computing Editorial Calendar

2024 AI/Machine Learning Content Calendar

2024 Automotive Content Calendar

2024 Security Content Calendar

Content Creation Services

Events

Marketer’s Guide to CES 2024

Marketer’s Guide to embedded world 2024

Content/Lead Strategies

Guide to Content Marketing in the Electronics Space

Guide to Generating Leads in the Embedded Space

New Products

New Product/News Submissions

Product of the Week

NEW: Application Highlight

NEW: Datasheets

Speaking Opportunities

Embedded World

Other Opportunities

Dev Kit Weekly

Embedded Toolbox

Embedded Solutions Video

Podcasts

E-newsletters

#ces2024 #ew24 #ai #iot #aiot #embeddedsystems #machinelearning


Alexander Summerer

Head of Authentication at Swissbit

1 年

Indeed, identity does not give us zero trust in itself but can be an important element in the realization of zero-trust environments.

Philip Griffiths

Open source zero trust networking

1 年

Identity is foundational to zero trust, but identity (and by extension, 2FA/FIDO does not give us zero trust in itself.

要查看或添加评论,请登录

Patrick Hopper的更多文章

社区洞察

其他会员也浏览了