Why IIoT Security Is So Difficult


Despite the high risk of a market filled with billions of at least partially unprotected devices, it is likely to take five years or more to reach a "meaningful" level of security in the Industrial IoT. The market, which potentially includes every connected device with an integrated circuit, is fragmented into vertical industries, specialty chips, and filled with competing OEMs, carriers, in... » read more

Designing Hardware For Security


By Ed Sperling and Kevin Fogarty Cyber criminals are beginning to target weaknesses in hardware to take control of devices, rather than using the hardware as a stepping stone to access to the software. This shift underscores a significant increase in the sophistication of the attackers, as evidenced by the discovery of Spectre and Meltdown by Google Project Zero in 2017 (made public in Ja... » read more

Mesh Networking Grows For ICs


Mesh networks were invented to create rich interaction among groups of almost-unrelated peers, but now they are showing up in everything from advanced chip packages to IoT networks. The flexibility of a many-to-many peer-connection model made the mesh approach a favorite for two-dimensional network-on-a-chip topologies, to the point where they began to supplant data-bus connections during th... » read more

Imperfect Silicon, Near-Perfect Security


Some chipmakers, under pressure to add security to rapidly growing numbers of IoT devices, have rediscovered a "fingerprinting" technique used primarily as an anti-counterfeiting measure. [getkc id="227" kc_name="Physically unclonable functions"] (PUFs) are used to assign a unique identification number based on inconsistencies in the speed with which current causes a series of logic gates to... » read more

The Week in Review: IoT


Finance San Francisco-based Aquabyte has raised $3.5 million in seed funding led by Costanoa Ventures and New Enterprise Associates. Princeton University and strategic investors in the U.S. and Norway also participated in the round. The startup is using computer vision and machine learning to optimize efficiency in fish farming. Aquabyte is first deploying its technology in Norway in cooperati... » read more

The Race To Better Batteries


There is a new leader in the race to develop the best battery for smartphones, medical and IoT devices and all things related to information technology—Tesla. After almost a decade of making a big splash in the auto industry, though hardly a dent in its business, Tesla has succeeded in making electric vehicles attractive enough that automakers are following Tesla into the EV lane. That mov... » read more

The Next Phase Of Machine Learning


Machine learning is all about doing complex calculations on huge volumes of data with increasing efficiency, and with a growing stockpile of success stories it has rapidly evolved from a rather obscure computer science concept into the go-to method for everything from facial recognition technology to autonomous cars. [getkc id="305" kc_name="Machine learning"] can apply to every corporate fu... » read more

ARC HS4x And HS4xD CPUs


Synopsys’ DesignWare ARC CPUs comprise a family of highly configurable and customizable processor cores, which ship in nearly two billion chips per year. ARC’s popularity in embedded devices makes the company second only to ARM in the number of chips that integrate its licensable CPUs. More than 230 ARC licensees use the cores in products that span a broad range of embedded applications, su... » read more

Where Are The IoT Industry Standards?


Are you ready for some Internet of Things standards? Good, because you can help make them. The IoT is proceeding apace as a business, eagerly embraced by such corporate behemoths as Cisco Systems, General Electric, IBM, and Verizon Communications. What’s lacking is the codification of industry standards for the IoT, as many companies have aligned with groups that have competing agendas and... » read more

The Week In Review: IoT


Analysis After reading a blog post touting the Internet of Things for home security, Jon Hedren wrote this post detailing how IoT-based home systems can be easily compromised and could fail in multiple ways. “The IoT ‘dream’ as sold by the industry is pretty cool, but it’s still just a dream. For now, these devices remain generally shoddy, insecure, and easily breakable—and must be t... » read more

← Older posts