The world’s greatest health concern also became its largest cybersecurity threat. As workers moved to remote settings, IT departments became strained, cyberattacks increased and companies…
Cybersecurity Standards & Protocols: NIST 800-171
The latest revision of the National Institute of Standards and Technology’s (NIST) Special Publication 800-171 was fully implemented December 31, 2017. The publication includes standards…
Cybersecurity Standards & Protocols: CMMC
The Cybersecurity Maturity Model Certification (CMMC) is an information technology standard created by the U.S. Department of Defense for the defense industrial base (DIB) –…
The IoT Chain of Trust: The Boot Process
From the moment a user activates an IoT device, how do they trust the device is secure? How do they know their data remains confidential?…
Enclosure & Environmental Ratings: An Overview
Rugged tech must perform under challenging conditions. Because specific hazards vary in location and situation, standards exist to classify equipment performance. IP and NEMA ratings…
Types of Neural Networks
Previously, we discussed how neural networks work and their applications. The many different types of neural networks can be grouped into categories. Feedforward Neural Networks…
What Are Neural Networks?
Neuromorphic computing and neural networks might sound similar, but they function differently. Neuromorphic computing imitates the human brain with artificial neurons that fire and form…
Tardigrade-Tough Applications for Humans
Tardigrades are hardy creatures, capable of enduring conditions other animals can’t survive. What can humans learn from their methods of survival? Radiation Resistance Tardigrade cells…
Tardigrade-Tough Thermal Testing
Tardigrades are tiny organisms that can survive extreme conditions. They can withstand freezing temperatures, boiling heat, radiation and chemical exposure. Extreme Heat & Cold Extreme…