Nick Tredennick has the usual degrees from typical universities and has held an uninspiring assortment of run-of-the-mill jobs. For example, he has been a fry cook, Air Force pilot, janitor, university professor, dishwasher, design engineer, truck driver, naval officer, oil field worker, and corporate executive. He even helped start a few companies but was soon forced out. Despite an appalling lack of knowledge about programmable logic and electronics in general, he was once Chief Scientist at Altera, a leading maker of programmable logic devices. And, through what could only have been a monumental bureaucratic foul-up, he was also once a Research Staff Member at IBM’s prestigious Watson Research Center. Tredennick has put considerable effort into finding something he could do well. No luck so far. He started his career as a working engineer (nerd) but moved to management when he found watching people work was easier than working. He moved to a university when he found talking about work was even easier than watching it. He has finally reached the pinnacle of his career in a position where he doesn’t even have to talk about work.
Email: [email protected]
DVP term expires December 2024
Presentations
Low-Cost, No-Touch IoT Security
IoT security needs chip-level hardware support for unique identity, for secrets management, and for cryptographic services. We have built a Silicon Anchor Security Module that implements these services in hardware. This security engine has been implemented in both Intel and Xilinx FPGAs and the core identity element, the dynamic entropy generator, has been implemented and tested in a TSMC 90nm process by a joint-venture partner. We have demonstration hardware for a low-cost, no-touch IoT application and are in the process of field-testing FPGA-based systems in an electrical grid application with another joint-venture partner. Both of these joint-venture partners are working with us to implement the security engine in an integrated circuit.
Optimal Condition Monitoring and Control for the Electrical Grid
The CryptoTag
, a novel IoT device, has been designed, prototyped, and field-tested. It operates from renewable energy sources, and is capable of provisioning itself and securely operating with no use of externally provided security certificates and with minimal human supervision. It was designed for a first application in today’s electrical grid, which is, at best, implemented with security as an afterthought. Today’s systems cannot be easily modified to implement security—security must begin with chip-level identity in the network’s leaf nodes. Our CryptoTag creates and autonomously authenticates its unique identity and also creates and manages any secrets necessary for secure communication. The CryptoTag, which can be incrementally introduced compatibly with today’s systems, works with a complementary secure communications protocol to ensure transaction security. The first versions of a CryptoTag-based system monitor the electrical grid. The current pipeline of systems in design will result in an integrated CryptoTag suitable for fielding in a wide range of vertical market segments.
Creating Silicon Valley 2.0
Silicon Valley’s magical concentration of talent, capital, and culture in a single place has led to decades of unparalleled wealth creation—probably exceeding anything ever seen before. This spectacular success has induced attempts to emulate it in such enclaves as Silicon Mountain (one in the African nation of Cameroon, and another in the U.S. state of Colorado), Silicon Hills (Texas), Silicon Desert (Arizona), and many more. These seedlings may indeed grow to become forests, but the ingredients are there for even more promising transformations—metamorphoses that would bring far greater resources together at abstracted, or virtual, focal points. Call them Silicon Valley 2.0.
The post Nick Tredennick first appeared on IEEE Computer Society.-------------------------------------
By: Kerry Cosby
Title: Nick Tredennick
Sourced From: www.computer.org/profiles/nick-tredennick
Published Date: Thu, 03 Feb 2022 23:40:11 +0000
Did you miss our previous article...
https://chieftechnologyofficer.blog/chief-technology-officer/android-malware-prevention-tips-and-tricks-in-2022