Stories
116
1903
61
0
0
30
Briefs: Information Technology
A research team led by Rice University’s Edward Knightly has uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street. Read on to learn more.
Briefs: Electronics & Computers
The team, led by Data Scientist Sumit Purohit, is trying to create a tool that sorts and prioritizes cyber threats on the fly. The idea is to give grid operators a clear blueprint to identify and address the biggest threats first and to protect against them without a mad scramble for resources down the road.
Briefs: Robotics, Automation & Control
Equipment and test system designers need Ethernet devices that outperform consumer-grade components, while remaining easy to use.
Articles: Green Design & Manufacturing
Some of the hardest to detect cyber-attacks are wireless, including man-in-the-middle attacks and rogue access points.
Articles: Software
Billions of connected devices have been adopted within our personal eco-systems, rising two-fold during the pandemic. This means there are even more devices in our lives which can be attacked.
Facility Focus: Design
From artificial intelligence, cybersecurity, and manufacturing to health sciences, robotics, and more, the Virginia Tech College of Engineering offers an advanced engineering curriculum.
Briefs: Photonics/Optics
High-Speed Communication Vouchsafed by the Laws of Quantum Physics
Security in encrypted communication is a top priority because of our highly connected and mobile society’s increasing reliance on the internet. Engineers at Department of Electrical Engineering and Computer Science and the Research Laboratory of Electronics, MIT, have developed a...
Articles: Connectivity
One major concern for manufacturers is how safe and secure it is to open the OT network’s doors to the internet.
Briefs: Data Acquisition
The system guarantees the security of virtual machines in the cloud.
Articles: Data Acquisition
The biggest challenge in the provisioning process: ensuring that a device and the connection to the network and server are secure.
Articles: Test & Measurement
Automation can crumble, even when only one cog is loose, says Brad Walters from Monnit.
Application Briefs: Energy
The grid’s growing size and complexity increases vulnerability to cyberattacks.
Briefs: Connectivity
The technology is aimed at protecting physical targets, such as utilities and infrastructure.
Articles: Internet of Things
Four industry experts explore the future outlook for smart sensors and IIoT.
Briefs: Software
Modern PLCs now include IT-capable software and communications protocols, empowering users to easily access edge-sourced data and integrate it with the enterprise.
Technology Leaders: Data Acquisition
Sensors play a pivotal role in solving critical business challenges.
Briefs: Semiconductors & ICs
This built-in security measure would prevent hackers from getting enough information about the circuit to reverse-engineer it.
Articles: Data Acquisition
Tech Briefs asks industry experts about cybersecurity, the cloud, wireless devices, and securing a remote workforce.
Articles: Energy
With PrintIC technology, sensors, actuators, energy supplies, and ICs can be printed on the same substrate, avoiding assembly cost.
Briefs: Software
The algorithm provides an extra layer of safety and security against hackers of electronic devices.
Briefs: Data Acquisition
A higher-order network could be built that looks for subtle changes in data that point to suspicious activity.
Application Briefs: AR/AI
Smart sensors for hazardous areas monitor essential assets, such as motors and pumps.
Technology Leaders: Communications
How can the automotive industry protect itself and its customers against digital attacks?
Facility Focus: Software
The Georgia Tech Research Institute (GTRI) is the nonprofit applied research division of the Georgia Institute of Technology (Georgia Tech) in Atlanta, GA. Founded in 1934 as the Engineering...
Briefs: Electronics & Computers
Researchers have created technology that is 10 times more reliable than current methods of producing unclonable digital fingerprints that can be used to...
Q&A: Electronics & Computers
Aydin Aysu, Ph.D., is Assistant Professor in the Electrical & Computer Engineering Department at North Carolina State University in Raleigh, where he helped develop a technique for...
Articles: Sensors/Data Acquisition
Bluetooth technology is focused on short-range wireless connectivity. Most of us know the Bluetooth standard as the way we connect a phone to our car or a headset for hands-free operation. But Bluetooth...
Articles: Materials
WCX™ World Congress Experience 2019 — presented by SAE International — is for forward-thinking engineers, executives, OEMs, suppliers, decision-makers, disruptors, and the entire spectrum of...
Briefs: Software
Outsourcing machine learning is a rising trend in industry. Major tech firms have launched cloud platforms that conduct computation-heavy tasks, such as running data through a convolutional...
Top Stories
Blog: Sensors/Data Acquisition
Going for Gold in Winter Olympic Curling
Blog: Energy
Batteries that Can Withstand the Cold
INSIDER: Design
Advancing All-Solid-State Batteries
Blog: Design
Blog: Materials
Making Tungsten Carbide a More Viable Alternative
INSIDER: Power
Webcasts
Upcoming Webinars: Sensors/Data Acquisition
Beyond AI-Copy-Paste Engineering: Advanced AI-Integration Success...
Upcoming Webinars: Energy
Battery Abuse Testing: Pushing to Failure
Upcoming Webinars: Power
A FREE Two-Day Event Dedicated to Connected Mobility
Upcoming Webinars: Test & Measurement
Choosing the Right N-Port Strategy: Multiport VNAs vs. Switch...
Upcoming Webinars: Energy
2026 Battery & Electrification Summit (Online)
Upcoming Webinars: Mechanical & Fluid Systems
The Over-Engineering Trap: Aligning Custom Equipment Specs with...

