IoT Has Always Been With Us

By most accounts, Kevin Ashton of the Auto-ID Center at the Massachusetts Institute of Technology coined the term “the Internet of Things” in 1999, referring to a system of ubiquitous sensors connecting the Internet with the physical world. We were well into the 21st century before the Internet of Things, as a marketing term or a short description of a certain technology, came to be wide... » read more

The Looming AI War

A recent spate of acquisitions and announcements in AI and machine learning is setting the stage for a colossal showdown across the tech industry. Among those vying for top spots are Samsung, Google, Apple, Microsoft and Amazon, each with a large enough revenue stream to support an M&A feeding frenzy and the sustained investments required to remain competitive. Consider the most recent a... » read more

Safety-Critical Chips Have A Premium Verification Cost

While the market opportunities in the automotive space may be exciting, the economics are staggering as consumers demand all kinds of new technologies: low power, safety-critical verification, Internet of Things — and they want it all at an incremental price of zero dollars over the actual value of the product. This can make business decisions about even entering a market a delicate balan... » read more

DDoS Attacks Highlight Need For IoT Security

A massive wave of distributed denial-of-service (DDoS) attacks executed against security researchers and hosting companies has captured headlines over the past few weeks. For example, OVH was targeted by two concurrent DDoS attacks at a combined bandwidth of almost 1 terabit per second, with one attack peaking at 799Gbps. According to reports, the attacks centered on Minecraft servers hosted... » read more

In An Election Year: OTP For IoT

Borrowing from this year’s hottest topic –– the Presidential Election –– let’s nominate one-time programmable (OTP) embedded memory for the Internet of Things (IoT). It’s sure to be the winner for any number of reasons, but most likely it is because of its built-in security features. As a memory-on-chip technology, antifuse OTP is paving the way for IoT designers to come up with n... » read more

Data Management For IIoT Devices: Is Your Software Stack Up To Task?

By now we’ve heard about the great things the IIoT will bring; increased productivity, improved operational efficiency, innovation, greater competitiveness the global markets, and so on. But there’s a major shift underway that’s worth mentioning. …what is this shift? Image courtesy of EETimes. The rise of the edge device Today we are seeing intelligent processing and ... » read more

We’re All Beta Testers Now

There are two distinct camps forming around autonomous vehicles. One group wants to see self-driving cars on the road as quickly as possible because it will save more lives than if people are behind the wheel. Others are wary, insisting there is no way will this can or should happen in the next 10 to 15 years. Time will tell who's right. But what is clear is that the technology has far outst... » read more

Automotive Is Convergence

Given that there is still much to be done to enable self-driving cars, particularly since security is still a moving target, the name of the game going forward is convergence. That fact is not disputed. What is quite fascinating, however, is to witness the impact of technology applied, as well as watch as the industry grapples with the issues critical to mobility electronics implementation. ... » read more

What’s Better than the Internet of Things?

We all like the Internet of Things, whatever that is. Would you be interested in the Innovative and Intelligent Internet of Things? The Semiconductor Research Corporation can get you involved in that project, also known as I3T. “This research enables breakthrough technologies for the next generation of intelligent, connected, and autonomous devices,” the I3T website reads. The program is... » read more

Lessons From The Cold War

With the ongoing threats to our electronic devices, it is obvious that security needs to be improved in the application and communication chips on the mobile platform. The ideal solution would be as secure as the celebrated red phone on the U.S. president’s desk in the Oval Office during the Cold War. The implementation of the red phone is actually much more complicated than red-colored ha... » read more

← Older posts