System Design Considerations For Embedded Heterogeneous Multiprocessing (HMP)


Heterogeneous multiprocessor (HMP) systems, using functionally asymmetric compute elements, such as application processors and microcontrollers integrated within the same SoCs, are now used extensively across a wide range of applications. These SoCs are used in smart, connected devices to transform the way we live – at home, in the car, and in our cities – with even more intelligence, speed... » read more

How The Evolution Of SoC Design Is Igniting Innovation Again


A funny thing happened on the way to the future. The futurologists were proven wrong. They said for years that the electronics industry was “consolidating,” and they sketched visions of a future that involved less innovation and openness, with fewer opportunities for entrepreneurs to deliver on their dreams. Reality turned out to be different. Yes, consolidation continues among tradit... » read more

Large-Screen Compute Transformation Is Here


Mobile development never sleeps. Unlike some application areas where a technology takes root, grows and evolves quickly, and then plateaus when the products are mature, mobile is a different beast. It influences other areas of technology, bringing a new look and life to older applications. Since 2009, each smart phone generation has delivered improved performance at the same or lower power c... » read more

Voice Recognition’s Role In Safer, More Secure Car Design


By Soshun Arai, ARM, and Mark Sykes, Recognition Technologies Look around the dashboard of a modern car and you will see dials, buttons and knobs everywhere. While each has its own purpose, they can confuse and distract people, especially when a driver should be paying attention to the road. Add to this new laws that promise harsher punishments for drivers using mobile devices, and you can s... » read more

Rethinking Computing For The AI Age


Cisco estimates that global cloud IP traffic will nearly quadruple in the next five years. Information consumption is exploding with artificial intelligence (AI) embedded into all devices and experiences surrounding us. However, we do not want that to come at a cost of our security and privacy. Talk about pressure. On you. Today, much of computing is done in the cloud for things that you are... » read more

Debug Is About To Get Really Interesting Again


One of the great unheralded chapters in the history of electronics design is debug. After all, where there have been designs, there have been bugs. And there was debug, engaged in an epic wrestling match with faults, bugs and errors to determine which would prevail. Think about system in the 1970s and '80s. A typical system would consist of a CPU, (EP)ROM, RAM, Peripherals (PIC, UART, DMA, T... » read more

Real-Time Virtualization – How Hard Can It Be?


What’s the first association you make when you hear of virtualization? Server farms? ‘The cloud’? Most people don’t think of embedded systems - never mind hard real-time - yet these are areas where virtualization is now becoming commonplace. Markets such as industrial, automotive and medical—many of which also have requirements around functional safety for products like car braking... » read more

IoT Will Grow Faster With More Flexible Wireless Design


The fascinating numbers-within-the-numbers for the forecasted growth in Internet of Things (IoT) devices is this: By 2020, it’s estimated there will be nearly 2 billion low-power radio-connected devices, specifically with Bluetooth 5 and 802.15.4 (Zigbee and Thread). Those numbers are compelling because not only is that a quadrupling of the amount of low-power radio devices today, but the val... » read more

Five Ways To Avoid Being The Next IoT Security Headline


Whether it is the remote hacking of cars or the rise of the IoT botnet we have all read the scary headlines: security for the IoT is a growing issue. But how exactly do you stop your company and your product appearing on the front page, as part of the latest security violation story? Security in IoT is more than just the processor, it requires an approach that protects the entire system and all... » read more

To Bolster IoT Security, Think Holistically


On Friday Oct. 21, a new phrase captured the public’s imagination: “script kiddie.” That’s what security experts suspect was at work when a denial-of-service attack slipped in through thousands of security cameras and home entertainment devices and brought much of the Internet to its knees. If you’re not familiar with the term, “script kiddie” refers to an unskilled person who ... » read more

← Older posts