The Week in Review: IoT


Finance Vectra raised $36 million in Series D funding led by Atlantic Bridge Capital. The Ireland Strategic Investment Fund and Nissho Electronics also participated in this funding round along with returning investors Khosla Ventures, Accel Partners, IA Ventures, AME Cloud Ventures, DAG Ventures, and Wipro Ventures, bringing Vectra’s total funding to date to $123 million. Vectra will use the... » read more

The Week in Review: IoT


Finance Cincinnati-based Losant, which offers an enterprise Internet of Things platform, reports raising $5.2 million in Series A funding led by CincyTech. The Rise of the Rest Seed Fund, TechNexus, and Vine Street Ventures also participated in the new round. Losant says customers for its scalable IoT platform include Bosch, Hewlett Packard Enterprise, and Verizon Communications. SAM of Tel... » read more

The Race To Accelerate


Geoff Tate, CEO of [getentity id="22921" e_name="Flex Logix"], sat down with Semiconductor Engineering to discuss how the chip industry is changing, why that bodes well for embedded FPGAs, and what you need to be aware of when using programmable logic on the same die as other devices. What follows are excerpts of that conversation. SE: What are the biggest challenges facing the chip industry... » read more

The Week in Review: IoT


Finance BroadLink has raised $54.4 million in Series D funding from Citic Private Equity Funds Management. Baidu and Libai Group participated in the new round. BroadLink will use the money to expand its artificial intelligence and Internet of Things units, while also acquiring or investing in companies involved in smart home devices. Aperio Systems of Haifa, Israel, has received $4.5 millio... » read more

Imperfect Silicon, Near-Perfect Security


Some chipmakers, under pressure to add security to rapidly growing numbers of IoT devices, have rediscovered a "fingerprinting" technique used primarily as an anti-counterfeiting measure. [getkc id="227" kc_name="Physically unclonable functions"] (PUFs) are used to assign a unique identification number based on inconsistencies in the speed with which current causes a series of logic gates to... » read more

The Week in Review: IoT


Finance San Francisco-based Aquabyte has raised $3.5 million in seed funding led by Costanoa Ventures and New Enterprise Associates. Princeton University and strategic investors in the U.S. and Norway also participated in the round. The startup is using computer vision and machine learning to optimize efficiency in fish farming. Aquabyte is first deploying its technology in Norway in cooperati... » read more

Privacy Is In Retreat


It was always a given that when you were online, you're in public. The deceptive piece is that your online activities can appear very distant from your physical location. You might be shopping from the comfort and seeming privacy of your living room, or texting on your smart phone before you get out of bed. This created a lot of buzz initially, but over the past year or so the level of paran... » read more

Ethernet Architected For The Future


I wonder if Bob Metcalfe and David Boggs, who invented Ethernet (on my 4th birthday, it turns out!), imagined their technology baby would be what enables the communication within future autonomous vehicles. If you’re curious too, here’s a video of Metcalfe discussing the history of Ethernet. Fast forward to this week, when the Automotive Ethernet Congress was held in Munich, and from whi... » read more

Safety, Security And Open Source In The Automotive Industry


Today’s cars are as much defined by the power of their software as the power of their engines. Almost any car feature you can name is now digitized to provide drivers with easier operation and better information. Technological innovation is accelerating, enabling automobiles to monitor and adjust their position on the highway, alerting drivers if they’re drifting out of their lane, even aut... » read more

Bypassing Encryption With Side-Channel Attacks


Devices and systems that implement robust encryption/decryption algorithms using cryptographic keys were historically considered secure. Nevertheless, there is a category of attacks that simply ignore the mathematic properties of a cryptographic system – and instead focuses on its physical implementation in hardware. This vector is known as side-channel attacks, which are commonly referred... » read more

← Older posts