July 2015 - Page 10 of 11 - Semiconductor Engineering


Securing Modern-Day Devices With Embedded Virtualization And ARM TrustZone Technology


When securing today’s modern devices, it’s not enough to know the type of device you want to secure. Equally important is the process used to develop that device. In this paper, we’ll take a closer look at security as it relates to protecting data, building security into a device, and securing SoCs in multicore architectures. ARM TrustZone technology, which provides a solution for carving... » read more

The Patent Aspect Of IoT


Wearing objects on the body that perform a function is, of course, nothing new — but the level of sophistication has exploded in the recent past. Along with this is the number of patent applications that have been filed in order to corner some aspect of the market that could be worth as much as tens of billions of dollars in five years. To note: 41,301 patents have been published on wearab... » read more

Big Data, Big Holes


Having the potential to collect massive amounts of data from a variety of sources is the latest tool for trend spotting, predictive modeling, and forecasting of information. Information is power and big data promises to provide substantial, significant data that can be used by all tiers of businesses in the development of any number of new industrial and commercial strategies. For retailers ... » read more

Tech Talk: Mesh Networks


Yifeng Zhang, director of systems at NXP, discusses problems in connecting home networks and how that's about to change with Bluetooth Low Energy and mesh networking approaches. [youtube vid=zcET06J2Z2k] » read more

Electronic Labeling Takes Off


One hit product for the Internet of Things (IoT) market is the electronic shelf label (ESL). The ESL is rapidly replacing the paper price labels on store shelves throughout Europe and Asia, as well as within retail giants such as Walmart in the United States. But why are retailers replacing nearly zero cost paper labels with an electronic widget that sells for on the order of $5 each (prici... » read more

Memories Offer Measure Of Security For IoT Devices


Consumers are going to extremes to keep their electronic devices secure. A first-person account in The New York Times offered a novel way to thwart thieves from breaking into a car with a remote keyless system and stealing it — the author kept her car keys in the freezer. As extreme as this seems, it may only get worse as we move into the era of the Internet of Things. A recent Hewlett-Pac... » read more

Let’s Talk Open Source


Of late I have been hearing some rumblings about open source for the IoE. The sad part is that there is still talk about anything else. Even though the IoE remains a dream to many, the shrewd marketers already are scheming on how to make their product the one that leads that pack, and many see proprietary source code as a way to differentiate themselves. I can see that in any number of appli... » read more

Mobile Security And The IoE


As we climb that mobility ladder to becoming a mostly mobile society, every rung seems to expose us to more and more layers of security failings. Six billion of the seven billion people on this planet rely on a variety of mobile devices to shop, bank, interface with social media, monitor their health, and monitor their environment. Unless you are on the inside track and know better, one would t... » read more

UVM: What’s Stopping You?


These days, verification of the most complex designs is performed using a standard verification methodology, probably SystemVerilog-based [gettech id="31055" comment="UVM"]. Many verification teams have ramped up on UVM, but others have yet to take the plunge. Why is that? And how big a “plunge” is it, anyway? If UVM is as great as all that, then why hasn’t everybody adopted it already... » read more

The Week In Review: Design/IoT


Synopsys continued its expansion into security with the acquisition of security IP provider Elliptic Technologies. The Canadian company's focus was cryptography cores, security protocol accelerators and processors, Root of Trust embedded security IP modules, secure boot and cryptography middleware as well as content protection IP for integration into SoCs. NXP and Freescale shareholders appr... » read more

← Older posts Newer posts →