Author's Latest Posts


Syntiant: Analog Deep Learning Chips


Startup Syntiant Corp. is an Irvine, Calif. semiconductor company led by former top Broadcom engineers with experience in both innovative design and in producing chips designed to be produced in the billions, according to company CEO Kurt Busch. The chip they’ll be building is an inference accelerator designed to run deep-learning processes 50x more efficiently than traditional stored-prog... » read more

Toward IIoT Security Standards


Security is a high priority within Industrial IoT projects, but it is advancing like the rest of the industry—inconsistently, with big gaps between the leaders and everyone else. That isn't unique to one or two industrial segments. It applies to all of them, and even to slices within particularly industries. "There is some confusion about security because it's not just the IT issues," s... » read more

Why IIoT Security Is So Difficult


Despite the high risk of a market filled with billions of at least partially unprotected devices, it is likely to take five years or more to reach a "meaningful" level of security in the Industrial IoT. The market, which potentially includes every connected device with an integrated circuit, is fragmented into vertical industries, specialty chips, and filled with competing OEMs, carriers, in... » read more

Challenges At The Edge


By Kevin Fogarty and Ed Sperling Edge computing is inching toward the mainstream as the tech industry begins grappling with the fact that far too much data will be generated by sensors to send everything back to the cloud for processing. The initial idea behind the IoT/IIoT, as well as other connected devices, was that simple sensors would relay raw data to the cloud for processing throug... » read more

Processing Moves To The Edge


Edge computing is evolving from a relatively obscure concept into an increasingly complex component of a distributed computing architecture, in which processing is being shifted toward end devices and satellite data facilities and away from the cloud. Edge computing has gained attention in two main areas. One is the [getkc id="78" kc_name="industrial IoT"], where it serves as a do-it-yoursel... » read more

Where Is Energy Harvesting?


With power management a top priority in sensor networks, why is energy harvesting—a proven technology with diverse energy sources—conspicuously absent from sensor designs that are the foundation of the Internet of Things? [getkc id="165" kc_name="Energy harvesting"] always has been a promising answer to the limits of battery power. The idea that a device can run for much longer periods o... » read more

Mesh Networking Grows For ICs


Mesh networks were invented to create rich interaction among groups of almost-unrelated peers, but now they are showing up in everything from advanced chip packages to IoT networks. The flexibility of a many-to-many peer-connection model made the mesh approach a favorite for two-dimensional network-on-a-chip topologies, to the point where they began to supplant data-bus connections during th... » read more

Spark Microsystems: LP On-Chip Radios


Spark Microsystems is taking aim at on-chip radios that continue to be the primary source of battery drain, even in power-conserving designs like Bluetooth Low Energy. "If you wear AirPods, something like 80% of the power is going to power the radio, not the sound. That's not the most efficient approach." according to Frederic Nabki, co-founder of Spark Microsystems, and a former professor o... » read more

Xceler Systems: Graph Architecture


An inventor who made foundational contributions to three key ways we move data through complex systems is developing a new type of neuromorphic chip to accelerate AI applications. Rather than try to build a computer that looks like a brain, Gautam Kavipurapu and Xceler Systems are building smaller bits that act like synapses. When the design is advanced enough and there are enough of them, t... » read more

IIoT Security Threat Rising


The rapid growth of the Industrial Internet of Things is raising questions about just how secure these systems are today, how to improve security, and who exactly should be responsible for that. These issues are interlaced with a shift in where a growing volume of data gets processed, the cost and speed of moving large amounts of data, and the increasing frequency and cost of attacks. "Di... » read more

← Older posts