• Most Recent Posts
  • Popular Posts

KRACK WPA2 Encryption Protocol Vulnerability

With the recent KRACK attack, the security of WPA2 becomes equivalent of using an open, insecure Wi-Fi network. We are working on patches for our Wi-Fi products but in the meantime, hear some resources to secure the implementations using secure application level protocols, such as HTTPS, TLS etc. 

lock copy.png

IoT Hero Revolar: Keeping Loved Ones Safe with the Tap of a Button

Revolar is using the power of connectivity to develop personal safety devices that can help users stay safe with the push of a button. We recenlty had the opportunity to speak with co-founder Andrea Perdomo about the company and how they're using the IoT to meet this challenge. 

blog-rev.jpg

IoT Device Security: What Designers Need to Know

The devices we've come to rely on are at their best when they're smart and connected, but this convenience comes with risk. Here we take a look at common commissioning methods and their security tradeoffs. 

IoT Commish_Highlight.png

Employee Spotlight – Marius Munder

Meet Marius Munder, our Senior Staff Applications Engineer and this week’s Employee Spotlight.

spotlight-blog1.jpg

Delivering the Industry’s Best Jitter Performance and Power Efficiency on a Single Chip

This week we’ve released the new Si522xx PCIe clock generators, bringing best-in-industry jitter performance and energy efficiency to PCI Express® (PCIe®) Gen1/2/3/4 applications.

si52xxx-clean-460x303 copy.jpg

Timing 101: The Case of the Ouroboros Clock

In the second part of our Timing 101 series, we take a look at a clock chip feedback arrangement that should generally be avoided that might occur accidentally or in an attempted recovery or test mode. 

server-rack-circle copy_Highlight.jpg

IoT Hero Q-Free Moves Excess Traffic Off-Road by Helping People Park Faster

Parking is about to get a lot easier thanks to Brage Blekken and his team at Q-Free, who are harnessing the power of the IoT to shorten the time we spend cruising around looking for a spot. 

blog-qfree.jpg

Silicon Labs Bluetooth Implementations Unaffected by BlueBorne

BlueBorne, the attack announced this week by the security firm Armis, makes it possible for hackers to take control of Bluetooth devices and spread malware laterally to adjacent devices. This vulnerability highlights the value of being able to upgrade security through software updates.

Lock.jpg

 

September 2017 Member Spotlight: neal_tommy

original.png

We are featuring one of the Silicon Labs Community members who is active or new in the community on a monthly basis to help members connect with each other.

Join Us to Help Hurricane Harvey Victims

Hurricane Harvey, the most powerful storm to hit Texas in 50 years, wreaked havoc on Friday. Learn how you can join Silicon Labs and help the victims of this life-threatening storm. 

World_Highlight.jpg

Employee Spotlight – Arun Manickaraj

This week our Employee Spotlight is Arun Manickaraj, who started with us in 2014 and is now an Operations Analyst II in Singapore.

spotlight-blog1.jpg

Smart Jewelry: IoT Hero WiseWear Takes Safety Wearables to the Next Level

Jerry Wilmink and his team at WiseWare are using the IoT to make jewelry that not only looks great, but could save your life. 

blog-wise.jpg

Estimate the Range of Your Wireless Application

Check out these RF range calculators for help estimating the actual range of your wireless applications. 

world-communication-feature.jpg

ProtoBricks Brings LEGOs into the Digital Age with Gecko MCUs

Joe Broms is the founder and CEO of newly-launched ProtoBricks, which makes it possible for users to build digital logic into LEGO designs.

 

ProtoBricks_Hilight.png

Connectivity Not a Question of If, but How

Silicon Labs CMO Michele Grieshaber discusses how the decision to add connectivity shouldn't be taken lightly, and how the IoT can open up new avenues if learning and iteration is part of the product design process.

sketching-pinout_Feature.jpg