See ByteSnap’s AI demo at Embedded World 2020

2020-02-24T14:14:35+00:00

See ByteSnap's AI demo at Embedded World 2020 ByteSnap’s New Machine Learning and GUI Demos at Embedded World 2020 ByteSnap will be showcasing Artificial Intelligence and user interface demos at the world’s biggest embedded systems trade show this month. The demonstrations will feature NXP’s powerful new iMX8X processor – designed for safety-certifiable and performance efficiency needs at Embedded World 2020 in Nuremburg, Germany. Machine Learning Demo using Gesture Recognition With industry professionals continuously finding innovative uses for AI, and with Deep learning becoming a staple in many sectors, ByteSnap will be showcasing our image recognition capabilities using the new Digi ConnectCore 8x. Our Gesture Recognition Interactive Demo consists of a Convolutional Neural Network (CNN) classifier, applied to Computer Vision. Using [...]

See ByteSnap’s AI demo at Embedded World 20202020-02-24T14:14:35+00:00

Tech Podcast: Rise of RISC-V, Embedded Design Trends, & Xenobots!

2020-02-24T14:22:45+00:00

Tech Podcast: Rise of RISC-V, Embedded Design Trends & Xenobots! Tech Podcast: Rise of RISC-V, Embedded Design Trends - and Xenobots! Listen in as ByteSnap Director Dunstan Power and Amelia Dalton from EE Journal (from 6 minutes 15 seconds) discuss a variety of design trends for 2020, including the rise of RISC-V, the role of security in embedded design, and why he expects to see a big push into machine learning-driven by tools from Xilinx and Intel. click to download link Also in the podcast to start things off, Amelia takes a closer look at how a team of research scientists have created a new form of life (a living, programmable organism called a Xenobot) [...]

Tech Podcast: Rise of RISC-V, Embedded Design Trends, & Xenobots!2020-02-24T14:22:45+00:00

WiFi KRACK: Take these four key steps to manage the risk and protect your network

2018-10-09T12:52:45+01:00

When the WPA2 vulnerability, better known as the WiFi KRACK was revealed late last year, what followed was a torrent of concerning headlines suggesting that all WiFi communications could be decrypted. Whilst it is vulnerability at the core of one of the most popular forms of WiFi network security, all is not as bad as some of the articles might lead you to believe.   We're going to take a realistic look at how this attack works and outline some important steps users and service providers can take to keep networks and devices safe.   WiFi KRACK: Four key steps to manage the risk and protect your network   What is a KRACK?   KRACK, meaning Key Reinstallation AttaCK, works by abusing a flaw found in the WPA2 implementation declared [...]

WiFi KRACK: Take these four key steps to manage the risk and protect your network2018-10-09T12:52:45+01:00

Why IoT Security Will Cost You More

2018-10-09T12:16:34+01:00

IoT security is an increasingly urgent issue, but is still in the early stages of resolution. We take a look at the “Cost to Care” ratio, and why it is set to dictate our responses to this trend for some time to come...   The Internet of Things has been a discussion point for years, but only recently has the security aspect become anything more than a concept. However, with recent record-breaking DDoS attacks being squarely blamed on insecure IoT devices, and the publication of the botnet source code (dubbed Mirai); it’s certain this is just a beginning. With an estimated 25 to 50 billion devices set to be connected through IoT by 2020, the scale of the problem is likely to increase. But as the technology to secure, [...]

Why IoT Security Will Cost You More2018-10-09T12:16:34+01:00

IoT Security and the Cost-to-Care Ratio

2018-10-09T12:10:35+01:00

Here, we take a closer look at IoT security in terms of the "Care-to-Cost" ratio - e.g. are manufacturers and product developers prepared to pay more (at least 25% more) to increase security in their offerings and are consumers willing to shell out for enhanced security? The further we travel into IoT territory, the more the potential for innovation becomes apparent. According to latest estimates, 25 to 50 billion devices will be connected through IoT by 20201,2. This journey isn’t without its challenges – particularly in terms of security.  There can be no denying the need to tackle spiralling data and privacy concerns.  But – as always – the bottom line is cost and demand; the “Cost to Care” ratio, if you will. This term came to prominence when Boston-based information services [...]

IoT Security and the Cost-to-Care Ratio2018-10-09T12:10:35+01:00