Enhancing Compute Security Architecture For New-Age Applications


New-age AI-powered applications are becoming increasingly essential in our daily lives. Continuing to do so requires that these applications and services meet three primary challenges: Achieving high performance for complex compute tasks. Ensuring cost-effectiveness and seamless integration with existing infrastructure. Maintaining robust security and privacy measures. Historicall... » read more

USB4 Sideband Channel Is Not a Side Business


The USB4 specification has been around for several years now. Two years ago, USB4 version 2.0 was also released by the USB Promoter Group. This specification enables up to 80Gbps link speed per direction in symmetric mode and 120Gbps link speed in asymmetric mode. Be it Gen 2, Gen 3, or Gen 4 link speeds of 20Gbps, 40Gbps, 80Gbps, or 120Gbps, the sideband channel is indispensable for the sta... » read more

The Future Of Technology: Generative AI In China


China's investment in Gen-AI is projected to surge with an estimated 86% CAGR over the next five years. This growth is driven by a focus on technological self-sufficiency, from applications to chips, and a strong emphasis on locally developed technology. Key areas of development include: AI Chip Development: Addressing the need for powerful AI infrastructure. Dataset Localization: S... » read more

Advancing AI At The IoT Edge


In a highly connected world, there is a need for more intelligent and secure computation locally and preferably on the very devices that capture data, whether it be raw or compressed video, images, or voice. End markets continue to expect compute costs to trend down, at a time when computation demands are increasing, as is evident from recently popularized AI paradigms such as large language mo... » read more

Tools Needed To Track, Catalog Hardware Vulnerabilities


Monitoring for cyberattacks is a key component of hardware-based security, but what happens afterward is equally important. Logging and cataloging identified hardware vulnerabilities to ensure they are not repeated is essential for security. In fact, thousands of weak points have been identified as part of the chip design process, and even posted publicly online. Nevertheless, many companies... » read more

Post-Quantum Cryptography: Safeguarding The Future Of Digital Security


As technological advancements surge forward, the specter of quantum computing looms ever larger. While the promise of quantum computers holds the potential to revolutionize fields like weather forecasting, drug discovery, and fundamental physics, it also harbors a significant threat to our current cryptographic systems. The risk is not just a future concern; any sensitive data intercepted today... » read more

Radar, AI, And Increasing Autonomy Are Redefining Auto IC Designs


Increasing levels of autonomy in vehicles are fundamentally changing which technologies are chosen, how they are used and interact with each other, and how they will evolve throughout a vehicle's lifetime. Entire vehicle architectures are being reshaped continuously to enable the application of AI across a broad swath of functions, prompting increasing investment into technologies that were ... » read more

Where Cryptography Is Headed


Reports began surfacing in October that Chinese researchers used a quantum computer to crack military-grade AES 256-bit encryption. Those reports turned out to be wrong, but that did little to dampen concerns about what would happen if it was true. The looming threat of quantum computers breaking today's encryption, and the stockpiling of encrypted data in preparation for a time when it can ... » read more

Smart Irrigation System Using Periodic Advertisement With Response (PAwR) Feature Of Bluetooth Low Energy


With an ever-growing market of IoT and Industry 4.0 applications, a need for newer features arises to support these applications. The latest Infineon chip CYW20829 boasts a set of new features suitable for a multitude of these IoT applications. These features include Periodic Advertisements with Response (PAwR), low energy long-range (LE-LR), 2M PHY layer, etc. These features offer a novel pe... » read more

Lower Your Power Consumption For Battery-Operated Smart Devices


Striking the right balance between battery life and customer experience The number of connected smart home battery-operated devices is expected to grow as consumers look for new ways to retrofit their homes with IoT devices without power cabling. This change leaves device makers in search of new ways to make their battery-operated smart home products more power-efficient at all levels, while st... » read more

← Older posts Newer posts →