Synaptics Blog

May 11, 2016
Category: Automotive

“Why can’t my car be more like my smartphone?” That’s a question people in the automotive industry often hear.

In an age when we're more likely to leave the house without shoes than without our smartphones, the latter’s indispensability is unquestioned. Consumers have grown accustomed to smartphones' ever-advancing functionality -- their speed, responsiveness, frequent updates, not to mention their being our most accessible source of... Read more

March 29, 2016
Category: Biometrics

Easy-to-guess keyboard passwords are just one of the pitfalls of legacy user authentication. In the world of enterprise IT, maintaining security is a challenge and managing the logistics that enable it can be tedious as well. But it is never in vain – protecting the company’s crown jewels is so important, and in our hyper-connected world, strong security procedures are necessary. Biometrics provides that enhanced security, eliminates the... Read more

March 22, 2016
Category: Touch, Displays

The old expression “timing is everything” could very well have been predicting the future – smartphones, tablets, touchscreen computers, and cars’ instrument panels. The timing – more specifically, the synchronization – of those devices’ distinct touch and display functions plays a critical role in their speed, accuracy and overall user experience.

Because those intelligent devices incorporate both touch and display, those two... Read more

March 18, 2016
Category: CEO, Corporate

Thirty years ago, I graduated from University of Michigan with a BSEE. At the time, IBM was the leading PC company, the internet didn’t really exist and early portable phones were still about five years away. At about the same time, a tiny company was founded in San Jose committed to constant innovation around the human interface.

Thirty years is a long time... Read more

February 17, 2016
Category: Biometrics

Wealth attracts criminals like honey attracts bears.  It should come as no surprise, then, that the wealth of information and services accessed through fingerprint authentication would be “honey” to the bad guys out there, intent on using such access for illicit purposes. Among their methods is spoofing – the act of fabricating fingerprints for use on... Read more