中文 English

Guiding Principles To Ensure Your Hardware Is Secure


The modern society relies on complex, intelligent electronic systems. Automotive, avionics, medical, smartphones, communication and 5G networks, critical infrastructure, data centers, and other applications are ever more dependent on integrated circuits (ICs) that deliver high performance, low power consumption, safety, cybersecurity, and continuity of operation. Hardware is so central to compe... » read more

Maximizing Edge AI Performance


Inference of convolutional neural network models is algorithmically straightforward, but to get the fastest performance for your application there are a few pitfalls to keep in mind when deploying. A number of factors make efficient inference difficult, which we will first step through before diving into specific solutions to address and resolve each. By the end of this article, you will be arm... » read more

Safeguarding Data Over PCIe & CXL In Data Centers


As more devices enter the market and drive exponential growth of data in the cloud, cloud computing is going through a significant overhaul. The increasing presence of “hyperscale” cloud providers for big data and analytics, 5G for rapid IoT connectivity, and the wide use of AI for natural data processing and for extracting insights are compounding both the amount of connected data and the ... » read more

SoC Integration Complexity: Size Doesn’t (Always) Matter


It’s common when talking about complexity in systems-on-chip (SoCs) to haul out monster examples: application processors, giant AI chips, and the like. Breaking with that tradition, consider an internet of things (IoT) design, which can still challenge engineers with plenty of complexity in architecture and integration. This complexity springs from two drivers: very low power consumption, eve... » read more

Protecting The Connected Automobile From Modern-Day Cyberattacks


As the industry continues to make advances in the autonomous vehicle as well as in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, automotive OEMs must do everything possible to protect the connected automobile from potential cyberattacks. Unfortunately, attacks have become so prevalent, regulatory agencies are now defining cybersecurity requirements. New laws are b... » read more

Secure TSN Ethernet With MACsec Is Now Possible


For end-to-end security of data, it must be secured both when at rest (processed or stored in a device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all data security is built. Applications, OS, and boot code all depend on the root of trust as the source of confidentiality, integri... » read more

Preventing Online Fraud


I attended a webcast on Anti-Fraud organized by the RSA Conference in the leadup to the conference itself. The anti-fraud webcast was split into two sections. First was Steve Winderfield, who is advisory CISO at Akamai, titled "How We Can Keep up with Cyber-Criminals' Evolving Business Models?" The second part was by Michael Tiffany of White Ops and Chris Ott of Rothwell Figg, titled "Dete... » read more

Greetings From Mars


Hello Mars. Congratulations to the amazing engineers and scientists at NASA and Jet Propulsion Labs (JPL) for a successful touchdown on the Mars Jezero Crater. In July 2020, NASA launched the Perseverance rover mission, which sought to find signs of habitable conditions, search for biosignatures, and collect samples for future Mars-sample-return missions and human expeditions. Seven months l... » read more

COVID-19 And Cybersecurity: Pay Attention To Exponential Growth!


COVID-19 and cybersecurity – you may wonder what these two seemingly very different topics have in common. I would list two: Both of them are exponential in nature, which, as a society we have difficulties grappling with – making this one of the reasons for our uneven responses. Both of them require a multi-layered solution strategy that, while it does not need to be perfect, must b... » read more

The Best AI Edge Inference Benchmark


When evaluating the performance of an AI accelerator, there’s a range of methodologies available to you. In this article, we’ll discuss some of the different ways to structure your benchmark research before moving forward with an evaluation that directly runs your own model. Just like when buying a car, research will only get you so far before you need to get behind the wheel and give your ... » read more

← Older posts