Safeguarding Data Over PCIe & CXL In Data Centers


As more devices enter the market and drive exponential growth of data in the cloud, cloud computing is going through a significant overhaul. The increasing presence of “hyperscale” cloud providers for big data and analytics, 5G for rapid IoT connectivity, and the wide use of AI for natural data processing and for extracting insights are compounding both the amount of connected data and the ... » read more

New Uses For AI


AI is being embedded into an increasing number of technologies that are commonly found inside most chips, and initial results show dramatic improvements in both power and performance. Unlike high-profile AI implementations, such as self-driving cars or natural language processing, much of this work flies well under the radar for most people. It generally takes the path of least disruption, b... » read more

SoC Integration Complexity: Size Doesn’t (Always) Matter


It’s common when talking about complexity in systems-on-chip (SoCs) to haul out monster examples: application processors, giant AI chips, and the like. Breaking with that tradition, consider an internet of things (IoT) design, which can still challenge engineers with plenty of complexity in architecture and integration. This complexity springs from two drivers: very low power consumption, eve... » read more

Privacy Protection A Must For Driver Monitoring


Driver monitoring systems are so tied into a vehicle's architecture that soon the driver will not be able to opt out because the vehicle will only operate if the driver is detected and monitored. This is raising privacy concerns about whether enough security is in place for the data to remain private. At the very least, laws and regulations in every geography where the vehicle will operate a... » read more

How To Measure ML Model Accuracy


Machine learning (ML) is about making predictions about new data based on old data. The quality of any machine-learning algorithm is ultimately determined by the quality of those predictions. However, there is no one universal way to measure that quality across all ML applications, and that has broad implications for the value and usefulness of machine learning. “Every industry, every d... » read more

Protecting The Connected Automobile From Modern-Day Cyberattacks


As the industry continues to make advances in the autonomous vehicle as well as in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, automotive OEMs must do everything possible to protect the connected automobile from potential cyberattacks. Unfortunately, attacks have become so prevalent, regulatory agencies are now defining cybersecurity requirements. New laws are b... » read more

Secure TSN Ethernet With MACsec Is Now Possible


For end-to-end security of data, it must be secured both when at rest (processed or stored in a device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all data security is built. Applications, OS, and boot code all depend on the root of trust as the source of confidentiality, integri... » read more

Preventing Online Fraud


I attended a webcast on Anti-Fraud organized by the RSA Conference in the leadup to the conference itself. The anti-fraud webcast was split into two sections. First was Steve Winderfield, who is advisory CISO at Akamai, titled "How We Can Keep up with Cyber-Criminals' Evolving Business Models?" The second part was by Michael Tiffany of White Ops and Chris Ott of Rothwell Figg, titled "Dete... » read more

Network Interface Card Evolution


Longer chip lifetimes, more data to process and move, and a slowdown in the rate of processor improvements has created a series of constantly shifting bottlenecks. Kartik Srinivasan, director of data center marketing at Xilinx, looks at one of those bottlenecks, the network interface card, why continuous enhancements and changes will be required, and how to extend the life of NICs as the networ... » read more

Systematic Methodology To Solve Reset Challenges In Automotive SoCs


Modern automotive SoCs typically contain multiple asynchronous reset signals to ensure systematic functional recovery from unexpected situations and faults. This complex reset architecture leads to a new set of problems such as possible reset domain crossing (RDC) issues. The conventional clock domain and CDC verification methodologies cannot identify such critical bugs. In this paper, we prese... » read more

← Older posts Newer posts →