|
(303) 415-1112 Broomfield
(970) 541-4777 Loveland
May, 2020 - Vol 13, Issue 4
|
|
New Secure Boot Microcontroller
|
Microchip has announced a new "cryptography-enabled" microcontroller with custom firmware to provide a solution for secure boot from SPI flash. The microcontroller protects against malicious rootkit and bootkit malware by enabling secure boot with hardware root of trust protection that complies with NIST 800-193 guidelines. For more information please see the link-
Protect Against Rootkit and Bootkit Malware in Systems that Boot from External SPI Flash Memory CEPD can help secure your embedded control system using this new MCU.
|
|
|
Machine Learning Built Into Inertial Sensors
|
|
ST has launched two new inertial modules, the LSM6DSRX and ISM330DHCX, microelectromechanical systems (MEMS), which contain a machine learning core. These high precision devices can measure angular rates up to 4,000 degrees per second (dps). The devices feature a machine learning core which uses eight configurable decision trees to process the information it captures and make certain deductions, such as throwing an interrupt or classifying certain activities. The ability to undertake these processes within the sensor instead of a microcontroller dramatically reduces the power consumption. ST will soon release a new version of their Unico GUI that will help build the decision tree out of Python, MATLAB, Weka, or RapidMiner.
You can find more information here:
|
|
Conference Call Security Essentials
|
|
In the current times of the Coronavirus and stay at home orders, many companies are making the shift to video conferencing to collaborate face to face in a health-conscious manner. The increased use of these tools has brought into the media spotlight several latent security issues. To the point that Zoom has halted feature development in the interest of fixing security problems with the application. And Zoom is not the only application which has received negative attention.
For many corporate conversations, security cannot be an afterthought. So, what makes a video conference secure? End-to-end encryption of chat, audio, and video service is the most important security feature to look for, but moderating features like conference call waiting rooms and the ability to remove conference call attendees can also provide extra control and some peace of mind. Self-hosted meetings as opposed to applications that route their services through dedicated servers can also improve the privacy of a call as any attendee would have to know exactly where and when to look for an ongoing conference call. And while it is not a security feature, free service is definitely important to consider when looking to maintain the level of contact of an office without incurring additional costs.
Zoom has recently received a barrage of negative media coverage, in part, because it does not offer end-to-end encryption on its video services as well as faults in the way it generates passwords for conference call rooms. For those looking for a safer alternative, Apple’s FaceTime is free and end-to-end encrypted. It is only available on Apple platforms, so it isn’t always the best fit for every office. Microsoft Teams is another end-to-end encrypted product that is free to use and since it is a Microsoft product it also offers integration with office for real-time collaboration on documents during and after the call. There is also Jitsi that is free to use because it is an open source platform. Jitsi is not end-to-end encrypted, but video calls can be locally hosted to give users more control of the availability and access to their own content.
It is worth looking into the capabilities of the video conferencing tool that you use, because you cannot address a security issue if you aren’t aware of its existence. Stay safe, both physically and virtually, during these difficult times and beyond.
-CP
References:
|
|
If you would like help developing a new product or if your projects are understaffed, CEPD can help. Our staff draws on years of diverse product design experience to provide creative and timely solutions for your product needs. Some of our specialties include:
- Technical Project Management
- Embedded Systems Hardware and Software
- Digital Signal Processing (DSP)
- Data Acquisition
- Wireless Sensor and Telemetry Systems (Zigbee, Cellular, VHF, Bluetooth, ANT+, etc.)
- IoT
- Control Systems
- Programmable Logic: FPGA / PLD
- Analog Circuit Design
- Switching Power Supply Design
- Battery Charging (all Chemistries)
- PCB Design and Layout
- Analysis, Test and Documentation
We provide cost effective and expedient design options for our clients, regardless of the project's complexity. Our detailed proposals, accurate estimates and time schedules will help you manage each phase of the project.
|
|
Sincerely,
The Staff of CEPD, Inc.
Colorado Electronic Product Design, Inc.,
700 Burbank St, Broomfield, CO 80020 (303)415-1112
1339 S. Garfield Ave, Loveland, CO 80537 (970)541-4777
© 2020, CEPD, Inc.
|
|
|
|
|
|
|