The Week in Review: IoT


Finance CyberX raised $18 million in Series B funding, bringing its total funding to $30 million. Norwest Venture Partners led the new round and was joined by ff Venture Capital, Flint Capital, Glilot Capital Partners, and OurCrowd. CyberX makes its headquarters in Framingham, Mass., with operations in Israel. The startup offers security protection for Industrial Internet of Things application... » read more

The Week In Review: Design


Startup OnScale launched with advanced CAE multi-physics solvers that are seamlessly integrated with a scalable, high performance cloud computing platform built on Amazon's AWS. The company's model is built around a Solver-as-a-Service pay-as-you-go subscription model and targets 5G, IoT/Industrial IoT, biomedical, and autonomous car markets. The company has $3 million in strategic seed fund... » read more

Is The IoT Getting Safer?


The Internet of Things as we know has been in use in some form or another for at least a decade, but it is only in the past several years that it has achieved enough success that security has become an overriding issue. The fact that breaches are no longer shocking is a sign that attacks are becoming more common. Only the biggest and baddest hacks raise eyebrows, like today's hack of Germany... » read more

Autonomous Cars Have Far-Reaching Impacts


Within the semiconductor ecosystem, autonomous vehicle technology is already having a gigantic impact as far as chip and tool development, education about what this all means, new relationships and partnerships -- among other things that hit closer to home such as how autonomous vehicles will impact our professional and personal lives. Sundari Mitra, CEO of NetSpeed Systems has been closely ... » read more

Automotive IPs Bring New Challenges To IP Management


Recent innovations in the automotive industry, like driving assistance, have fueled an insatiable appetite for more electronics in cars. With electronics now a major component of building an automobile, there is growing use of IPs and IP subsystems provided by multiple vendors. It is, however, becoming clear that IPs developed for the automotive industry are a totally different beast compared t... » read more

Embedded FPGA: Increasing Security In Next-Gen Networks


The pull of data toward real-time applications on the network’s edge makes the outflow of processing from the cloud inevitable. Programmable logic provides the ability to make computing much more data-centric. While traditional processors demand data to be fed to their pipelines through a complex hierarchy of memory caches, programmable logic makes it possible to construct data pipelines. Dat... » read more

eFPGA: Think Differently & Experiment


New technologies are never overnight successes and usually develop in new applications. Arm and other embedded processors today are a huge success and pervasive in almost all chips. It took Arm more than five years to win the first five customers. The first applications were not competitive with Intel’s PC dominance but instead filled needs in emerging applications such as mobile phones an... » read more

A New Approach To A Fragmented Industrial IoT


By now, we’ve all seen or experienced the transformational change the Internet of Things (IoT) has had in our daily lives. The emerging area of industrial automation, often referred to as the Industry Internet of Things (IIoT) or Industrie 4.0, has also quickly transformed itself. Suddenly within IIoT we have thousands, even millions of devices, connected to the seemingly infinite potential o... » read more

Tech Talk: On-Chip Variation


Raymond Nijssen, vice president of systems engineering at Achronix, discusses on-chip and process variation at 7nm and 5nm, the role of embedded FPGAs, and how to reduce margin and pessimistic designs. https://youtu.be/LQnw_3H9soQ » read more

How To Secure The Network Edge


Microcontrollers, sensors, and other devices that live at the edge of the Internet must be protected against cyberattacks and intrusions just as much as the chips in data centers, network routers, and PCs. But securing those edge devices presents a swath of unique challenges, including the cost and availability of technology resources, as well as varying levels of motivation to solve these prob... » read more

← Older posts Newer posts →