Author's Latest Posts


Creating A Roadmap For Hardware Security


The U.S. Department of Defense and private industry consortiums are developing comprehensive and cohesive cybersecurity plans that will serve as blueprints for military, industrial and commercial systems. What is particularly noteworthy in all of these efforts is the focus on semiconductors. While software can be patched, vulnerabilities such as Spectre, Meltdown and Foreshadow need to be de... » read more

Spreading Intelligence From The Cloud To The Edge


The challenge of partitioning processing between the edge and the cloud is beginning to come into focus as chipmakers and systems companies wrestle with a massive and rapidly growing volume of data. There are widely different assessments of how much data this ultimately will include, but everyone agrees it is a very large number. Petabytes are simply rounding errors in this equation, and tha... » read more

Next Wave Of Security For IIoT


A rush of new products and services promise to make the famously un-secured Industrial IoT (IIoT) substantially more secure in the near future. Although the semiconductor industry has been churning out a variety of security-related products and concepts, ranging from root of trust approaches to crypto processors and physically unclonable functions, most IIoT operations have been slow to adop... » read more

VCSEL Technology Takes Off


By Kevin Fogarty and Ed Sperling Vertical cavity surface emitting laser (VCSEL) technology, a proven but mostly niche technology until recently, is suddenly a very hot commodity thanks to the introduction of facial recognition in phones and other mobile devices. VCELS primarily have been used as a low-cost way of tracking movement and transfering data in computer mice, laser printers and ... » read more