A Case of Mistaken Identity

A Russian-made crypto ignition key (CIK) was mistakingly identified as a Datakey CIK, straightened out with the help of the online Crypto Museum website that originally noticed the key online.

Securely storing and updating product configuration data – a case study featuring Delta Computer Systems

Forget sending out a technician or new hardware – use a custom Datakey memory token utilizing a Microchip CryptoAuthentication IC to load new features, also ensuring that a customer’s purchased configuration can be securely stored and later updated.

CryptoAuthentication in our Daily Lives – Efficient and Secure Management of Purchased Digital Credits

The rate at which cyber attacks are taking place only seems to be growing. As enhanced methods of security continue to be devised and implemented, secure memory ICs are increasingly being integrated into the products prevalent in the environments in which we live.

No Room for Error – Accurately Pairing Wireless Medical Devices with a Physical Token

There are many possible applications for the pairing of wireless products in our world – especially in mission-critical situations requiring absolute certainty in pairing. Using a portable memory device is an intuitive way to positively pair up transmitter and receiver(s) and could be an option in your design.

Curiosity Killed the Network – Beating the Security Risks of BadUSB with a Non-standard USB Port

USB ports on embedded devices are handy, but cause security holes in an infrastructure. Datakey's alternative to decades-old USB port design improves security through a non-standard design.

Datakey Turns 45 Years Old Today!

Founder of Datakey, Bill Flies, Dies at 78

Only a tiny number of people have the right stuff to create a successful business and brand that lasts for decades. Bill Flies was such a person. Bill Flies (pronounced “fleece”) founded Datakey in the mid-1970’s and was one of the early pioneers of solid-state portable memory.

75 years of technology innovation: ATEK Companies continues growth

Not All SD Cards Are Created Equal

How can embedded system manufacturers make sure their users don't use unsupported or counterfeit SD cards? It's a challenge when the cards look legit and plug-in.

You Just Bricked Hundreds of Devices. Now What?

An over-the-air (OTA) update just bricked hundreds of remote devices. Now what? This blog looks at various Plan B options to consider before the unthinkable happens.

RUGGEDrive Torture Test Video

Who doesn’t love a good product torture test video? Watch what happens when a 120,000-pound tank runs over a USB flash drive, an SD card and a Datakey RUGGEDrive memory token.

Thwarting Elbonians with Proprietary Memory Devices

Elbonians demonstrate the effectiveness and benefit of using a memory device (with SD card or USB flash drive functionality) with a non-standard/proprietary form factor.

World's Toughest SD Card

Are there SD cards that are physically more robust than others, when they all use the same form factor? The video in this blog post shows destructive testing of SD cards, in the search for the world’s toughest SD card.

Portable Memory in IoT Applications

Removable memory can be used with IoT or cloud-connected devices to provide ID or location information. It can also provide a local backup for devices' settings or programming.

Design Consideration: Cycle Life of Connectors

A while ago, I experienced firsthand the importance of connector cycle life. I made a late-night run into a local supermarket to print some photos for a family event that was taking place the next day. I loaded the photos onto a USB flash drive, but when I plugged the drive into the self-service photo kiosk, something felt wrong.

12

Our site uses cookies so that we, and our partners, can remember you and understand how you and other visitors use our site as per our Privacy Policy. If you prefer we don't use cookies, please disable them in your browser.