中文 English

Author's Latest Posts


Energy Harvesting Starting To Gain Traction


Tens of billions of IoT devices are powered by batteries today. Depending on the compute intensity and the battery chemistry, these devices can run steadily for short periods of time, or they can run occasionally for decades. But in some cases, they also can either harvest energy themselves, or tap into externally harvested energy, allowing them to work almost indefinitely. Energy harvesting... » read more

New Challenges For Connected Vehicles


Connected vehicles are all about convenience and safety. Modern vehicles are connected to the Internet via wireless networks, consumer apps, and infotainment systems, and there is work underway to connect them over 5G to guided driving. But there also are challenges to making all of this work securely, safely, and as expected throughout the expected lifetimes of chips and systems. The goal i... » read more

Complex Chips Make Security More Difficult


Semiconductor supply chain management is becoming more complex with many more moving parts as chips become increasingly disaggregated, making it difficult to ensure where parts originated and whether they have been compromised before they are added into advanced chips or packages. In the past, supply chain concerns largely focused primarily on counterfeit parts or gray-market substitutions u... » read more

Robots Become More Useful In Factories


Most people associate factory automation with large robotic machines, such as those that weld automobile chassis on assembly lines. But as prices drop and technology improves, robots are being deployed for smaller and more varied tasks, and they are getting better at all of them. Inside of factories, robots can significantly improve output, consistency, and reliability. They can work around ... » read more

Why Banks Should Be More Worried About Security


At about 10:30 a.m. on Friday, Feb. 5, 2016, Jubail Bin-Huda, a joint director of Bangladesh Bank, and a colleague went to pick up the latest Society for Worldwide Interbank Financial Telecommunication (SWIFT) acknowledgement messages from the printer. When they got to the printer, they found nothing had been printed. They restarted the printer manually, but it still didn't work. They had no... » read more

Improving PPA In Complex Designs With AI


The goal of chip design always has been to optimize power, performance, and area (PPA), but results can vary greatly even with the best tools and highly experienced engineering teams. Optimizing PPA involves a growing number of tradeoffs that can vary by application, by availability of IP and other components, as well as the familiarity of engineers with different tools and methodologies. Fo... » read more

Power Grids Under Attack


Cyberattacks are becoming as troublesome to the electrical power grid as natural disasters, and the problem is growing worse as these grids become more connected and smarter. Unlike in the past, when a power outage affected just the electricity supplied to homes and businesses, power grids are becoming core elements of smart cities, infrastructure, and safety-related services. Without power,... » read more

Health Care Is Gold Mine For Hackers


Today’s digital health care systems are facing relentless cyberattacks, which are targeting health care organizations as well as the medical devices they use. The critical nature and size of the U.S. health care market — an estimated $3.5 trillion in 2020, with substantial growth anticipated — make it a favorite target of hackers. Vanson Bourne conducted a survey for Sophos in early 20... » read more

Manufacturing Shifts To AI Of Things


AI is being infused into the Internet of Things, setting the stage for significant improvements in manufacturing productivity, improved uptime, and reduced costs — regardless of market segment. The traditional approach to improving manufacturing equipment reliability and efficiency is regular scheduled maintenance. While that is an improvement over just fixing or replacing equipment when i... » read more

Securing Short-Range Communications


Short-range wireless communication technology is in widespread use and growing rapidly, adding conveniences for consumers while also opening the door to a whole range of cyberattacks. This technology is common across a variety of applications, from wireless key fobs to unlock a car and start the ignition, to tags used to help drivers find misplaced items such as car keys. RFID also is starti... » read more

← Older posts Newer posts →