Author's Latest Posts


Optimizing Machine Learning Workloads On Power-Efficient Devices


Software frameworks for neural networks, such as TensorFlow, PyTorch, and Caffe, have made it easier to use machine learning as an everyday feature, but it can be difficult to run these frameworks in an embedded environment. Limited budgets for power, memory, and computation can all make this more difficult. At Arm, we’ve developed Arm NN, an inference engine that makes it easier to target di... » read more

Packing Neural Networks Into End-User Client Devices


Most of today’s neural networks can only run on high-performance servers. There’s a big push to change this and simplify network processing to the point where the algorithms can run on end-user client devices. One approach is to eliminate complexity by replacing floating-point representation with fixed-point representation. We take a different approach, and recommend a mix of the two, so as... » read more

Mobile Machine Learning At Arm


Machine learning is playing an increasingly significant role in emerging mobile application domains such as AR/VR, ADAS, etc. Accordingly, hardware architects have designed customized hardware for machine learning algorithms, especially neural networks, to improve compute efficiency. However, machine learning is typically just one processing stage in complex end-to-end applications, which invol... » read more

The Power Of Speech


With the widespread use of voice-activated virtual assistants, such as Apple’s Siri, Amazon’s Alexa, Microsoft’s Cortana, and the Google Assistant, voice has become an everyday way to interact with electronics. We’re talking to our devices more than ever, using speech to initiate searches, issue commands, and even make purchases. There are a number of reasons why using your voice to ... » read more

Not All Ops Are Created Equal


Efficient and compact neural network models are essential for enabling the deployment on mobile and embedded devices. In this work, we point out that typical design metrics for gauging the efficiency of neural network architectures – total number of operations and parameters – are not sufficient. These metrics may not accurately correlate with the actual deployment metrics such as energy an... » read more

The Route To A Trillion Devices


Technology vendors like to talk about data being big, really big. Petabytes of storage; gigabits of bandwidth; megaflops of processing power. But data doesn’t have to be big to be valuable. One of the most successful financial trades of all time was premised on a piece of information that could have been represented by a single bit (1 or 0). On June 19 1815, the bond market in London wa... » read more

IoT Security Manifesto


Securing tomorrow means rethinking how we design intelligent devices by embracing concepts from outside the digital realm and taking advantage of advanced new technologies. Some of the things the Arm Security Manifesto explores: A digital immune system. Technologists develop human-like immune systems and health-care services that automatically detect, quarantine and treat any cyber inf... » read more

HPC Case Study: CFD Applications On ARM


In this paper, we examine the readiness and potential of ARM-based platforms for High Performance Computing, and have benchmarked two different computational fluid dynamics (CFD) applications. CFD represents one of the most widely used HPC applications in aerospace, automotive and other engineering areas such as turbine-design. For server hardware, we leverage the ThunderX platform from Cavium,... » read more

Lowering The Barriers To Entry For ASICs


The future of IoT and its rate of scalability depends upon increased functionality in the smallest form factors. Arm knows that OEMs are increasingly turning to custom SoCs/ASICs for a wealth of benefits: differentiation, cost savings, improved reliability, and smaller products. So, at Arm, we wanted to better understand the perceived risks involved for OEMs – what makes custom SoCs a task... » read more

Arm Platform Security Architecture Overview


The transition to an Internet of Things (IoT) is well underway and has the potential to transform both businesses and consumer experiences. The success of this next phase of the internet is heavily dependent upon the trust and security built into billions of different connected devices. Businesses need to depend on the data from edge computing, in order to be able to make commercial decisions, ... » read more

← Older posts