RISC-V: Why The ISA Battles Aren’t Over Yet

A computer processor uses a so-called Instruction Set Architecture to talk with the world outside of its own circuitry. This ISA consists of a number of instructions, which essentially define the functionality of that processor, which explains why so many ISAs still exist today. It’s hard to find that one …read more

Continue reading RISC-V: Why The ISA Battles Aren’t Over Yet

5 Ways to Improve Your MIPS Score Through Secure Messaging

If you’re in healthcare, you are familiar with MACRA, the Medicare Access and CHIP Reauthorization act of 2015—bipartisan legislation that requires the US Centers for Medicaid and Medicare (CMS) to implement an incentive program. Merit-base… Continue reading 5 Ways to Improve Your MIPS Score Through Secure Messaging

Google Patches ‘High Severity’ Browser Bug

Google began pushing out updates to its desktop browser Friday with a patch that repairs a stack-based buffer overflow vulnerability. Continue reading Google Patches ‘High Severity’ Browser Bug

Virtualizing Around The FCC’s Firmware Modification Rules

Last year, the FCC introduced new regulations requiring router manufacturers to implement software security to limit the power output in specific 5GHz bands. Government regulations follow the laws of unintended consequences, and the immediate fear surrounding this new directive from the FCC was that WiFi router manufacturers would make the easiest engineering decision. These fears came true early this year when it was revealed a large router manufacturer was not following the FCC regulations to the letter by limiting the output of the radio module itself, but instead locking down the entire router.

The FCC’s rules regarding the power output …read more

Continue reading Virtualizing Around The FCC’s Firmware Modification Rules