DecryptedTech

Tuesday04 October 2022

Editorials

Editorials (435)

Rate this item
(0 votes)
The world of copyright and patents is one of ignorance, greed and just plain stupidity. This is, sadly, on just about all sides of the game. From the people complaining all the way to the judges asked to decide these…
Rate this item
(0 votes)
In the war against (yes against) encryption there are many things to hide behind. One of the most frequently used is that criminals will use it to mask their dastardly deeds. The term criminal is, of course interchangeable with just…
Rate this item
(0 votes)
The “adult toy” has been around for a very, very long time. They have examples of them going back to the Egyptians and earlier. For thousands of years they were pretty much the same with a few add-ons to make…

Security and Privacy are the same argument.

Written by
Rate this item
(0 votes)
In the fast paced and insanely stupid argument between privacy advocates and national security advocates we often hear how we need to give up one or the other. The security guys say that privacy will block criminal activity so we…

HBM Vs GDDR in 2016 for the GPU crown.

Written by
Rate this item
(0 votes)
As most people are aware, AMD dropped the first GPUs to utilize HBM (High Bandwidth Memory). These GPUs use a form of HBM called 2.5D which requires the use of an interproser layer than both the memory and the GPU…
Rate this item
(0 votes)
When things are not quite right you always hope for that “ah-ha” moment when everyone realizes the issue and will actually begin to work on a solution. For connected devices we have been hoping for that since they were first…
Rate this item
(2 votes)
Back in 2007 or so I was asked to write a white paper on the subject of why Intel was able to pass AMD as quickly as they did. This is back in the AM2+ days when Intel was dropping…
Rate this item
(0 votes)
This is not the first time that I have spoken out about cloud computing (internet based, or the Internet of Things and the way they are impacting the ability to secure a network. It is also not going to be…
Rate this item
(0 votes)
The life of a security researcher is not all beer and pizza. In most cases the days are long and very few seem to appreciate what you are doing. From the stand point of a security researcher they are the…
Rate this item
(0 votes)
For a while now (many years actually) I have argued that the rush to turn everything into a techno-gadget has been irresponsible and dangerous. However, companies that are looking into the “Internet of things” simply do not care. They see…
Rate this item
(0 votes)
The term privacy has come to mean a great many things in the last few years. To some the idea of privacy is being able to do or say certain things without the fear of anyone finding out. Most people…

E3 and why we just do not bother

Written by
Rate this item
(0 votes)
Today I was asked why we do not attend the Electronic Entertainment Expo (E3). It was a valid question, but the answer is not really all that simple. If I had to be blunt I would say that we stopped…
Rate this item
(0 votes)
The world of the technical press has been evolving since it stumbled on the scene back in the mid-1990s. At that time the world seemed to be open to anyone with access to a website and willing to spend a…
Rate this item
(3 votes)
A couple of days ago we published an article on the state of AMD and what their immediate (next 18 months) looked like. In that article we looked at the state that AMD is in right now with what they…
Rate this item
(4 votes)
So Apple has released review samples to the press in order to build up interest in their entry into the smart watch market. It is an interesting move for Apple as they have sent out their $1,000 product to a…
Rate this item
(0 votes)
There is an old saying in business that you have to spend money to make money. The meaning is sort of plain, but we will give you a clear example of what it means. In the tech world, if you…

Page 2 of 28