Author's Latest Posts


Isambard Analysis of HPC-Optimized Arm Processors


Written by Simon McIntosh‐Smith, James Price, Tom Deakin, Andrei Poenaru (all from the High Performance Computing Research Group, Department of Computer Science, University of Bristol, Bristol, UK) In this paper, we present performance results from Isambard, the first production supercomputer to be based on Arm CPUs that have been optimized specifically for HPC. Isambard is the first Cray ... » read more

Giving a flexible edge to the IoT


As the Internet of Things (IoT) continues to revolutionize our daily lives, the demand for smaller, smarter, and more diverse flexible technology has never been greater. Increasingly complex demands have driven the development of smart sensors to monitor everything from velocity and proximity to pressure, humidity, and more. Future devices will need to interact with the ambient environment by p... » read more

Always-on Face Unlock


Accurate face verification has long been considered a challenge due to the number of variables, ranging from lighting to pose and facial expression. This white paper looks at a new approach—combining classic and modern machine learning (deep learning) techniques—that achieves 98.36% accuracy, running efficiently on Arm ML-optimized platforms, and addressing key security issues such as mu... » read more

360-Degree Video Rendering


The introduction of virtual reality has brought new applications to the surface as well as derivatives of existing technologies. One improvement over existing technologies can be seen in the case of 360-degree video. The increased immersion of virtual reality can easily be applied to video—providing superior user experience over the traditional video that is projected into flat surfaces. T... » read more

Arm Enterprise Virtualization With Arm System IP, Backplane Integration And Performance


Virtualization has become ubiquitous across the infrastructure market, increasing efficiency and security, boosting productivity and reducing operating costs. However, system performance remains crucial to ensuring a virtualized environment does not affect the end user’s experience. Performance within this environment depends on a number of factors such as transaction bandwidth, latencies an... » read more

Foveated Rendering


Virtual Reality (VR) is becoming increasingly popular due to its ability to immerse the user into an experience. Those experiences can vary from watching a movie in a simulated theatre, having a look at your personal pictures as though they were paintings in a museum or finding yourself in front row seats of a huge sporting event. These specific experiences don’t stress the device hardware to... » read more

Cache Speculation Side-Channels


This whitepaper looks at the susceptibility of Arm implementations following research findings from security researchers, including Google and MIT, on new potential cache timing side-channels exploiting processor speculation. This paper also outlines possible mitigations that can be employed for software designed to run on existing Arm processors. To read more, click here. » read more

The New Voice Of The Embedded Intelligent Assistant


As intelligent assistance is becoming vital in our daily lives, the technology is taking a big leap forward. Recognition Technologies & Arm have published a white paper that provides technical insight into the architecture and design approach that’s making the gateway a more powerful, efficient place for voice recognition. Some topics covered include: Why knowing who is speaking is i... » read more

Mobile Machine Learning Hardware At Arm


Machine learning is playing an increasingly significant role in emerging mobile application domains such as AR/VR, ADAS, etc. Accordingly, hardware architects have designed customized hardware for machine learning algorithms, especially neural networks, to improve compute efficiency. However, machine learning is typically just one processing stage in complex end-to-end applications, which invol... » read more

Cache Speculation Side-Channels


Cache timing side-channels are a well understood concept in the area of security research. As such, this whitepaper will provide a simple conceptual overview rather than an in-depth explanation. The basic principle behind cache timing side-channels is that the pattern of allocations into the cache, and, in particular, which cache sets have been used for the allocation, can be determined by m... » read more

← Older posts Newer posts →