In part 1 of this securing embedded memory blog, we considered how your data is at risk and concluded that security needs to start at the hardware level. And as your IIoT’s data resides in memory, that’s the best place to start. Isolation through partitioning is key to securing embedded memory. Partitioning is also great for achieving higher reliability and…
One upshot of more time at home has been the increased opportunity to discover new things, and get some reading done and over the last couple of weeks, there’s a piece I’ve found hugely helpful for anyone who uses, or is considering using, product design reviews. Click here to give it a read. It’s not my work – it’s written…
There are many ways of incorporating this popular memory type into your embedded system, but one of the early questions to ask yourself is: permanent installation or have the ability to easily replace the EEPROM? Electrically erasable programmable read-only memory (E2PROM but more commonly called EEPROM) is one of five common non-volatile memory (NVM) types. Here’s how they compare: Read…
Datakey’s new CryptoAuthentication™ tokens, now available in the UK, Ireland, Germany, Austria, Switzerland and Scandinavia from Nexus Industrial Memory. The line comprises four products; the IAT4.5Kb, the IAX4.5Kb, the IAT10.5Kb and the IAX10.5Kb. All are ideal for embedded systems that require ‘cyber robust’ removable memory devices for applications that include the transfer of passwords (or other data needed for user…
We’re exhibiting at the Southern Manufacturing and Electronics Show at Farnborough International in February as usual and it would be great to see you there. Over on our stand (D85), we’ll be focusing on cyber security and offering loads of advice about: How to protect data transferred via removable memory devices How to reduce the risk of malware being introduced…
Do you know what accountants used before Excel and other spreadsheet software was invented? Pen and paper. Seems pretty obvious really, but when you consider how complex software is these days, and the hugely intricate operations they’re required to complete, you wonder how on earth anyone could have done any of this stuff without a computer. So, how did they?…
I hope you’ve had a fantastic weekend and a good start to the week? Mine was mainly spent unpacking bags after a wonderful family holiday in Devon – thankfully we got the most of the heat before the heavens opened! Anyway, I write with exciting news: Datakey are in with a fantastic chance of winning an award. As you probably…
You could be forgiven for thinking that I was going to launch into a message about Christmas, but given that we’re only just into May, that’d be a little incongruous. You’ll be relieved to know that it’s not the festive season I wanted to talk about – it’s the exhibition one. It seems to be that this time of year…
I was out of the office at a business event last week. And it was massively helpful. Every month or so, I like to take time out of the day-to-day to learn new strategies that’ll help me grow my business and rub shoulders with other business owners. It gives me new impetus to get things done. It makes me realise…
I was talking to a company in the Agricultural machinery sector when I discovered something that shocked me. They spend six figure sums fixing warranty claims for one of their product lines. When the claim first comes in, they generally just sent out a replacement part. And when the second or third from the same customer comes in, they’ll have…