Blog Post
Big Data, Probability and Birthdays: Part 1 of 2
Cardinal Peak’s big data practice is expanding as we continue adding data scientists to our staff. In a recent discussion regarding a data set we’re analyzing, a probability problem conceptually equivalent to the following arose: In a room filled with N people, what is the probability that none of them have the same birthday? In…
View Article
Read More
Blog Post
MAC vs HMAC: Differences Explained
Hash-based message authentication code, or HMAC, is an important building block for proving that data transmitted between the components of a system has not been tampered with. It is a widely used cryptographic technology. I recently came across its use in an RFID system.
Read More
Blog Post
How to Find the Right CTO
I’ve got a new article up at Xconomy, sharing some thoughts about how to find the right Chief Technology Officer for your startup: I’ve got a strong bias that you are likely to need at least one member of your founding team who is a strong technology visionary and evangelist. Assuming you’re an entrepreneur with…
View Article
Read More
Blog Post
Boulder Tech Job Fair Redux: February 25
Based on the success of our last job fair, Cardinal Peak will once again be co-hosting the Boulder Tech Job Fair with the Boulder Chamber. We were thrilled by our experience at the last fair in September, so we will be joining 13 other tech companies offering more than 200 open positions ranging from entry-level…
View Article
Read More
Blog Post
“Who Am I” in the Internet of Things?
Out of the box, Chromecast has no idea who I am, or what my available content is. In a few simple steps I’m up and running with my content. I didn’t even enter my username and password! How did Google do that? The answer involves a protocol called oAuth.
Read More
Blog Post
Thoughts on Streaming Video Securely
The kind folks at EDN have asked Cardinal Peak to author an occasional blog about streaming video. The first post went live this morning and discusses streaming video securely: Until recently, the accepted wisdom in the industry was that end users didn’t care about encrypting this type of video, as long as it was a…
View Article
Read More
Blog Post
More Thoughts on Security and the Internet of Things
Attacks that are initially restricted to the realm of esoteric, government-backed spooks become accessible over time to run-of-the-mill cybercriminals. Take, for example, the Linux.Darlloz worm, which attacks embedded devices and is interesting for a couple of reasons. First, it propagates by exploiting a vulnerability that was patched in May 2012. But the firmware images on many embedded devices are much older than that. The second reason I find it particularly interesting is it targets PHP, a scripting language largely used for web development.
Read More
Blog Post
The Value of New Technologies
When I was a freshman in college, we had an engineering seminar where the Dean told us that we should expect to re-educate ourselves many times throughout our career. This has certainly been true in my career. In the Web and Mobile development world it seems like if you blink your skills are out of…
View Article
Read More
Blog Post
Five Software Tips for Securing IoT Devices
I’ve got a new blog post up today at EE Times, discussing how to secure devices on the Internet of Things: It used to be academically interesting, perhaps, that an attacker could compromise an unconnected home thermostat. Today, it’s another thing entirely that an attacker can potentially target thousands of home thermostats from afar, determine…
View Article
Read More
Blog Post
An Ode to Simplicity
Originally this was going to be a blog post ranting about remote controls for home entertainment systems. For the most part, they have way too many buttons! I don’t think I have a particularly high-end setup at home — but I still had to type up instructions so that the rest of the family could…
View Article
Read More