Author's Latest Posts


A Comprehensive Guide to Understanding AI Inference on the CPU


As AI continues to revolutionize industries, new workloads, like generative AI, inspire new use cases, the demand for efficient and scalable AI-based solutions has never been greater. While training often garners attention, inference—the process of applying trained models to new data—is essential for AI workloads, whether they are running in the cloud, or enabling real-world applications at... » read more

Complete Migration Guide for Arm-Based Cloud Workloads


Learn in three steps how to migrate your self-managed workloads to Arm virtual machines for superior price performance and energy efficiency across a wide range of applications. This guide covers the most common scenarios and provides links to additional resources. You will learn how to: -Plan your transition, survey your software stack, and understand your software dependencies. -Test, ... » read more

Software-Defined Vehicles for Dummies


This latest Dummies Guide takes you through the captivating world of software-defined vehicles (SDVs), offering important insights into the technologies and systems that propel SDVs, and their impact on the future of transportation. This book covers the foundational understanding of SDVs and progressively delves into their various aspects, exploring the potential implications of this rapidly ev... » read more

A Software-First Mindset for Driving Efficiency and Sustainability for Industrial IoT


Schneider Electric, Arm, and system integrators Witekio and Capgemini have produced a software-defined platform for industrial automation and energy management. The platform uses cloud-native techniques to create a flexible, energy-efficient reference design that uses virtualization to enable real-time, mixed-criticality services at the embedded edge. Read more here. » read more

Evolving Edge Computing


Edge computing is a term that has been in use for a long time. Throughout the industry, there are many references to edge and many pre-conceptions about what that might mean. The term ‘edge’ is typically used for devices that exist on the edge of a network and can cover a plethora of use cases, ranging from the router in your house, a smart video camera surveying a parking lot, to a control... » read more

Ambient Intelligence eBook


Get the lowdown on future ambient computing use cases and benefit from simple considerations you can build into your product roadmap today to ensure your platform is ready to capitalise on this burgeoning trend. This tech trends guide covers: Laying the foundations for ambient experiences Future use cases Challenges facing ambient computing use cases Six considerations to addre... » read more

Performance Boost In Powerful Real-Time Cortex-R Processor Using Data Prefetch Control


High-performance processors employ hardware data prefetching to reduce the negative performance impact of large main memory latencies. An effective prefetching mechanism can improve cache hit rate significantly. Data prefetching boosts the execution performance by fetching data before it is needed. While prefetching improves performance substantially on many programs, it can significantly red... » read more

Workload Trace Generation


The intended audience for this document is a performance engineer preparing traces for performance prediction on new Arm hardware. It is expected that the reader understands the basic concepts of performance engineering such as: • Workload characterization • Identifying key aspects of a workload • Understanding how Performance Monitor Unit (PMU) events correlate to a workload Click her... » read more

How To Build Computer Vision Solutions


Computer vision devices that can ‘see’ and act on visual information are bringing new efficiencies and functionalities to IoT. But with new opportunities come complexities. The specific features and functionality of smart vision use cases vary widely. Creating a system that catches defects on an assembly line requires different imaging, machine learning, and workloads compared to one ... » read more

Private Delegated Computations Using Strong Isolation


Computations are now routinely delegated to third-parties. In response, Confidential Computing technologies are being added to microprocessors offering a trusted execution environment (TEE) that provides confidentiality and integrity guarantees to code and data hosted within—even in the face of a privileged attacker. TEEs, along with an attestation protocol, permit remote third-parties to est... » read more

← Older posts