Author's Latest Posts


Arm Total Compute: Engineering For Tomorrow’s Workload


As consumers seek richer and more immersive experiences from their devices, the way compute systems are engineered must continually evolve to keep up. Arm Total Compute takes a solution-focused approach to system-on-chip design, moving beyond individual IP elements to design and optimize the system as a whole to enable more digital immersion experiences. Not only does this white paper dis... » read more

Arm Total Compute: Engineering For Tomorrow’s Workloads


As consumers seek richer and more immersive experiences from their devices, the way compute systems are engineered must continually evolve to keep up. Arm Total Compute takes a solution-focused approach to system-on-chip design, moving beyond individual IP elements to design and optimize the system as a whole to enable more digital immersion experiences. Not only does this white paper dis... » read more

Spectre-BHB: Speculative Target Reuse Attacks Version 1.7


In March 2022, researchers within the Systems and Network Security Group at Vrije Universiteit Amsterdam disclosed a new cache speculation vulnerability known as Branch History Injection (BHI) or Spectre-BHB. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within ... » read more

Arm SystemReady Certification System Requirements Specification v2.1


Systems that are designed to “just work” for the end user (with the ability to install and run generic off-the-shelf operating systems out-of-the-box) need to follow a set of minimum hardware and firmware requirements to ensure compatibility. For hardware, the Arm SystemReady Program defines a common Base System Architecture (BSA) specification and a set of market-specific supplements. F... » read more

Why Data-Over-Sound Is An Integral Part Of Any IoT Engineer’s Toolbox


Data-over-sound technology such as Chirp presents a compelling solution for many device-to-device connectivity applications, particularly for use cases that require frictionless, low cost connectivity with nearby devices. Download this white paper to: Understand the fundamental concepts and benefits of data-over-sound connectivity Explore the key application areas within the Internet... » read more

Learn The Architecture — Memory System Resource Partitioning And Monitoring (MPAM) Overview


This guide introduces the Memory System Resource Partitioning and Monitoring (MPAM), an optional addition to the Arm architecture to support memory system partitioning. MPAM is documented in the Memory System Resource Partitioning and Monitoring (MPAM), for A-profile architecture Arm Architecture Reference Manual Supplement. Click here to read more. » read more

Project Centauri: Driving Rapid, Exponential IoT Growth With Arm-Based Microcontrollers


Project Centauri is Arm's microcontroller (MCU) platform software initiative, designed to solve common industry problems, reduce barriers to deployment, and enable scale across the Arm Cortex-M ecosystem. Read this white paper to explore: The components and deliverables of Project Centauri How this initiative addresses the needs of the MCU software ecosystem How to get involved wi... » read more

Innovate By Customized Instructions, But Without Fragmenting The Ecosystem


This white paper reviews the design considerations for SoC designers when they deploy their hardware accelerators, and how software developers access the accelerators implemented using Arm Custom Instructions. Click here to read more. » read more

PLANAR: A Programmable Accelerator For Near-Memory Data Rearrangement


Many applications employ irregular and sparse memory accesses that cannot take advantage of existing cache hierarchies in high performance processors. To solve this problem, Data Layout Transformation (DLT) techniques rearrange sparse data into a dense representation, improving locality and cache utilization. However, prior proposals in this space fail to provide a design that (i) scales with m... » read more

Keyword Transformer: A Self-Attention Model For Keyword Spotting


The Transformer architecture has been successful across many domains, including natural language processing, computer vision and speech recognition. In keyword spotting, self-attention has primarily been used on top of convolutional or recurrent encoders. We investigate a range of ways to adapt the Transformer architecture to keyword spotting and introduce the Keyword Transformer (KWT), a fully... » read more

← Older posts