April 29, 2018 – Most-Viewed Bills | Congress.gov

April 29, 2018

1. H.R.1865 [115th] Allow States and Victims to Fight Online Sex Trafficking Act of 2017
2. H.R.5087 [115th] Assault Weapons Ban of 2018
3. H.R.5734 [112th] Pakistan Terrorism Accountability Act of 2012
4. H.R.1699 [112th] Pakistan Foreign Aid Accountability Act
5. S.447 [115th] Justice for Uncompensated Survivors Today (JUST) Act of 2017
6. H.R.4 [115th] FAA Reauthorization Act of 2018
7. H.R.1 [115th] An Act to provide for reconciliation pursuant to titles II and V of the concurrent resolution on the budget for fiscal year 2018.
8. H.R.1625 [115th] Consolidated Appropriations Act, 2018
9. H.R.5428 [115th] Stand with UK against Russia Violations Act
10. H.R.38 [115th] Concealed Carry Reciprocity Act of 2017

Source: Most-Viewed Bills – Congress.gov Resources –

Cloud to Edge Engines | PC/104 and Small Form Factor


In March at the NVIDIA GPU Technology Conference in San Jose, the company showcased reference designs for ‘factory of the future,’ smart cities, and networking and communications.

ADLINK’s Accelerated Multi-access Edge Computing Development Kit (AMEC DEVKIT) with custom GPU is for the design of telecom carrier-grade platforms to support edge computing. Also on display:

  • Smart camera technology for deep learning inference, defect inspection, and object classification
  • A smart city platform, calculating vehicle flow to improve traffic management
  • An overview of IBM’s Accessible Olli, a self-driving, electric, and cognitive shuttle to be used for mobility within a neighborhood.
  • Edge computing is responsible for processing the driving and sign language translation and Olli’s “360° 3D immersive bus ride” experience, says the company, although this is usually used in entertainment or marketing applications.

Source: Cloud to Edge Engines | PC/104 and Small Form Factor

What You Don’t Know about Firmware Might Get You ∅wn3d | Embedded Intel® Solutions


Attacks against platform firmware fall into three general categories:

  1. Malicious code attempts to modify the operating system loader
  2. Malicious code attempts to run from add-in components
  3. Malicious code attempts to directly modify the platform firmware

Attempts to insert code directly into platform firmware typically attack non-volatile storage on the Serial Peripheral Interface (SPI) bus.

These attacks can be prevented by ensuring the SPI region is locked at runtime, which prevents programs from overwriting firmware contents and using signed capsule updates to prevent attackers from tampering with the manufacturer’s firmware image.

A TPM can also be used to detect tampering in all three cases, based on changes in measurements made during boot. Manufacturers also offer mechanisms like Intel® Boot Guard to preserve hardware root-of-trust.

Note that attacks may employ more than one method, such as a bootkit attempting to insert malicious code into the platform firmware during the bootloader phase. A comprehensive approach to firmware security employs multiple defensive methods.

Source: What You Don’t Know about Firmware Might Get You ∅wn3d | Embedded Intel® Solutions

Megaconstellations: Recipe for Disaster or Biggest Opportunity Yet? | Via Satellite


Satellite manufacturers and their partners envision a future where megaconstellations link terrestrial networks and satellites in LEO, which ultimately provides blanket coverage and optimal service at compelling price point. And while the threshold upon which a constellation becomes a megaconstellation is still up for debate, the potential for megaquestions is unquestioned, whether a large constellation comprises 75 or 4,000 smaller, lighter, self-propelling mobile satellites.

Driving the market for mega is a combination of innovation, dramatic reductions in the cost of materials and manufacturing and, of course, demand.

As the demand for 5G broadband connectivity continues to grow, the opportunity for applications in residential, commercial and military sectors is expanding. Megaconstellations can bring high-speed Internet to villages in Congo, fill in the connectivity gaps for oil and gas enterprise, or support a high-speed banking network between Wall Street and Beijing.

Source: April 2018 – Megaconstellations: Recipe for Disaster or Biggest Opportunity Yet? | Via Satellite

COTS in space: products vs. components for space applications } Intelligent Aerospace


It seems that space applications are hungry for more and more high-capacity, high-speed, compact mass nonvolatile memories. Looking with envy at the consumer world, space engineers and end users are aware of the rapid progress of solid-state drives (SSD), based on 3D NAND (Not AND) Flash.

The example of a Samsung commercial SSD (850 PRO) product helps outline the difficulties of selecting a COTS product for use in space applications. This example may be extrapolated to other Samsung SSDs and perhaps to other “not addressed” sources, as well.

Source: COTS in space: products vs. components for space applications – Intelligent Aerospace

Robots replace soldiers in first breaching exercise of its kind | Stripes


The Terriers were controlled by British soldiers several hundred feet away, inside U.S. Bradley Fighting Vehicles.

Besides the Terriers, the troops used other robotized systems, such as an unmanned M113 armored personnel carrier, to deliver walls of thick, white smoke to help cloak the breaching operation.

The drill also employed several models of drones, including the Puma Unmanned Aerial System to gather intelligence and the Instant Eye UAS to search for possible chemical weapons.

Source: Robots replace soldiers in first breaching exercise of its kind – News – Stripes

Brainstorm: reducing security threats in embedded computing systems | Military & Aerospace Electronics

embedded systems are architected around microcontrollers or larger microprocessors with external memory (peripherals for the most complex ones), and sometimes field-programmable gate arrays (FPGAs), when high-performance, determinism, and nanosecond real time are required.

All of these systems are therefore programmable, and as such, exhibit the obvious vulnerability of being reprogrammed with cyber security threats like malware.

Therefore, every embedded system should be designed around processors providing a secure boot capability that is able to validate the integrity of the software, or firmware it is running, on a systematic basis.

Source: Brainstorm: reducing security threats in embedded computing systems – Military & Aerospace Electronics