OTP Memory For Mobile Payment Applications

The trend toward mobile banking and payments as a way to replace debit or credit cards, or integrate a part of their functions into a mobile device, is moving faster than most industry analysts predicted. In China, for example, mobile payment systems Alipay and WeChat pay are popular and well used, and a great way for easy account monitoring and ditching the wallet. It is a fundamental change t... » read more

One-Time-Programmable Memories For IoT Security

Security in the IoT space is an issue of major concern. Hackers are attacking IoT devices across all layers of the infrastructure, from the application layer down to protocol, to the physical and deep into the IoT devices. I intend to focus on vulnerability prevention for IoT devices at the lowest level: memory structure and key storage. I conclude with indicating highly important features a... » read more

Security Improvements Ahead

After nearly two years of talking about how security is one of the biggest problems facing the IoE, progress is being made on a number of fronts. The changes involve many companies, both individually and collaboratively through standards groups. And while none of this will stop the kind of high-profile breaches that affected Target or Home Depot or JPMorgan Chase or a long list of other gian... » read more

The Real Value In Customizing Instructions

One element that distinguishes devices for the emerging IoT market from the mobile devices of the mature handheld market is power. Specifically, while the latter can accept a battery recharge cycle of days, the former demands years between battery recharge/replacement. Where the two devices resemble one another is their need for high performance. While embedded CPU cores have concentrated o... » read more

More Data, Different Approaches

Scaling, rising complexity, and integration are all contributing to an explosion in data, from initial design to physical layout to verification and into the manufacturing phase. Now the question is what to do with all of that data. For SoC designs, that data is critical for identifying real and potential problems. It also allows verification engineers working the back end of the design flow... » read more

Wireless Technologies For The IoE

It's generally understood the [getkc id="76" kc_name="Internet of Everything"] eventually will be the interconnect platform of all things, wireless and wireline. The utopian scenario is to have a common platform, with standardized protocols, which everyone builds to. Will that happen? Perhaps, but for a time, especially while the IoE evolves, that won’t be the case. Count on the early IoE bei... » read more

Blog Review: July 9

Cadence’s Richard Goering walks through a keynote speech from DAC, which was delivered by Imagination Technologies’ Peter McGuinness, about the evolving role of image processing and what it can do. There are lots of changes ahead in this space. Who’s financing the Internet of Things and what are they funding? ARM’s Brad Nemire takes a look at oort, a Bluetooth hub that looks like a ... » read more

We Are All Vulnerable

Target, Neiman Marcus, Michaels. We are all familiar with the huge loss of personal and financial data from these establishments. A lot more people are fuming over the data being accessed by the NSA. While we only know the details as leaked by Edward Snowden, this has to be the biggest data breach in history with the government having hacked into the data centers of Google, Yahoo and who knows ... » read more