Blog

The topic of Silent Data Corruption (SDC) is very hot; in short, SDC is a result of flaws within a semiconductor that causes invisible errors in the data that it processes. As one example of this, a CPU might erroneously calculate 1+1 and yield 3.
Boundary Scan devices must be capable of executing all Boundary Scan instructions specified by the IEEE 1149.1 standard. If the Boundary Scan devices are not capable of executing these instructions correctly, the ScanWorks test actions that is built, when applied to the UUT, will return incorrect data. This blog goes into details for how to build the ScanPath Verify action using ScanWorks.
Windows 7 was End-of-Lifeโ€™d on January 14, 2020, and Microsoftโ€™s Extended Security Update (ESU) plan, available to select customers, ended on January 10, 2023. Without ongoing support, cybersecurity attacks on this older operating system are rising. Why is that, what vulnerabilities are these exposed to, and what are the mitigations employed by more current operating systems?
Archives