Improving Reliability In Automobiles


Carmakers are turning to predictive and preventive maintenance to improve the safety and reliability of increasingly electrified vehicles, setting the stage for more internal and external sensors, and more intelligence to interpret and react to the data generated by those sensors. The number of chips inside of vehicles has been steadily rising, regardless of whether they are powered by elect... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive And Mobility Two major auto OEMs revealed new electric vehicle models this week. The Audi Q8 e-tron has 40 driver assistance systems including five radar sensors, five cameras, and 12 ultrasonic sensors, and comes with either an 89 net kilowatt-hour battery or a 106 net kilowatt-hour battery. It arrives in the U.S. in April 2023. The Volvo EX90 contains both lidar and 5G connectivit... » read more

Weird Incidents Reveal L5 Challenges


A series of surprising, counterintuitive, and sometimes bizarre incidents reveal the challenges of achieving full Level 5 autonomy in self-driving vehicles, which are an increasingly common site in major cities. While it’s easy to dismiss such anecdotes as humorous glitches compared with the sobering accounts of autonomous tech-related injuries and fatalities, industry executives say these oc... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, mobility Saudi Arabia has launched an electric vehicle (EV) company called Ceer. The company is a joint venture between the Public Investment Fund (PIF) of Saudia Arabia and Foxconn (Hon Hai Precision Industry Co.). SiMa.ai, a four-year-old startup that designs edge machine learning SoCs used in vision applications, is getting into the automotive assisted driving market. The com... » read more

Memory-Based Cyberattacks Become More Complex, Difficult To Detect


Memories are becoming entry points for cyber attacks, raising concerns about system-level security because memories are nearly ubiquitous in electronics and breaches are difficult to detect. There is no end in sight with hackers taking aim at almost every consumer, industrial, and commercial segment, and a growing number of those devices connected to the internet and to each other. According... » read more

Security Solutions In A World Of IoT Devices


Internet of Things (IoT) devices are everywhere these days adding tremendous value, but unfortunately also representing unprecedented levels of risk for exploitation. Anything that is connected to the internet is potentially hackable. Securing connected devices is a challenge and is top of mind for electronics manufacturers who want to avoid the embarrassment of having their devices hacked. The... » read more

What You Need To Know About Qualifying Tools For DO-254 Programs


By Michelle Lange and Tammy Reeve, Patmos Engineering Services, and Jacob Wiltgen, Siemens EDA DO-254, which is required for airborne electronics development, is a design assurance standard. Design assurance requires multiple layers of review and verification within the development process to ensure safe operation of the design being produced. This means when an engineer is doing design work... » read more

AI Feeds Vision Processor, Image Sensor Boom


Vision systems are rapidly becoming ubiquitous, driven by big improvements in image sensors as well as new types of sensors. While the sensor itself often is developed using mature-node silicon, increasingly it is connected to vision processors developed at the most advanced process nodes. That allows for the highest performance per watt, and it also allows designs to incorporate AI accelera... » read more

Post-Quantum And Pre-Quantum Security Issues Grow


General-purpose quantum computers will be able to crack the codes that protect much of the world’s information, and while these machines don’t exist yet, security experts say governments and businesses are starting to prepare for encryption in a post-quantum world. The task is made all the more challenging because no one knows exactly how future quantum machines will work, or even which mat... » read more

Glitched On Earth By Humans


The Black Hat conference always brings up interesting and current research within the device security industry. Lennert Wouters of COSIC studied the security of the Starlink User Terminal. After some PCB-level reverse engineering, he found a serial port and observed various boot loaders, U-boot, and Linux running on the device. However, there was no obvious way to gain further access. The... » read more

← Older posts Newer posts →