Can Your Doorbell Be Spoofed?


Voice anti-spoofing is a set of techniques designed to prevent scam attempts that involve mimicked voices and improve the overall UI/UX experience of VUI systems by preventing accidental triggers. These techniques are particularly important to prevent issues related to: Speech Synthesis (SS): This type of attack employs a computer-simulated voice Voice Conversion (VC): In this attack,... » read more

Accelerating Speed And Accuracy In Aeroacoustic Predictions


Simulating aeroacoustics is a tedious task that blends the complexities of fluid dynamics with the nuances of acoustic phenomena. This dual-domain challenge is marked by numerous technical obstacles, ranging from the wide range of scales involved to the subtler distinctions of acoustic signals amidst turbulent flows. To navigate these technical difficulties and advance our understanding of aero... » read more

Data Center Evolution: The Leap to 64 GT/s Signaling with PCI Express 6.1


The PCI Express (PCIe) interface is the critical backbone that moves data at high bandwidth and low latency between various compute nodes such as CPUs, GPUs, FPGAs, and workload-specific accelerators. With the rapid rise in bandwidth demands of advanced workloads such as AI/ML training, PCIe 6.1 jumps signaling to 64 GT/s with some of the biggest changes yet in the standard. Find more inform... » read more

Gate Drive Configurations For GaN Power Transistors


This whitepaper gives a compact overview of the recommended gate drive concepts for both GIT (gate injection transistor) and SGT (Schottky gate transistor) product families. A versatile standard drive (RC interface) can be easily adapted to both technologies. The document also provides basic gate drive dimensioning guidelines and some typical application examples. Find more information here. » read more

2024 Open Source Security And Risk Analysis Report


This report offers recommendations to help creators and consumers of open source software manage it responsibly, especially in the context of securing the software supply chain. Whether a consumer or provider of software, you are part of the software supply chain, and need to safeguard the applications you use from upstream as well as downstream risk. In the following pages, we e... » read more

Techniques To Identify Reset Metastability Due To Soft Resets


Modern SoCs are equipped with complex reset architectures to meet the requirements of high-speed interfaces with increased functionality. These complex reset architectures with multiple reset domains, ensure functional recovery from hardware failures and unexpected electronic faults. But the transmission of data across sequential elements that are reset by different asynchronous and soft reset ... » read more

Advancing the Future of Hearing Aids


Hearing, one of the fundamental senses, profoundly affects our ability to communicate, engage with our environment, and maintain connections with others. Despite the long-standing presence of hearing aids in the market, accessibility to essential hearing aids has historically lagged, leaving many individuals isolated due to untreated hearing. According to the World Health Organization (WHO), ov... » read more

Technology of the Connected Home and Building Delivers On Safety, Comfort and Convenience


Devices for the home and office are increasingly differentiated by their intelligence and connectivity. Products that can sense their environment, detect users and other people, understand behavior, and respond in a way that humans find intuitive, provide higher value in the form of greater comfort, convenience and safety. This new generation of equipment for the smart home and building is made... » read more

The Crisis of Convergence: OT/ICS Cybersecurity 2023


In 2023, many forces came into play that led to unprecedented cybersecurity challenges in the OT/ICS domain. Not only did the issues of IT-OT convergence and Ransomware-as-a-Service persist, but geopolitical tensions precipitated increased state-sponsored and civilian hacker activities as well. In this report, TXOne Networks worked with Frost & Sullivan to survey 405 key IT and OT security ... » read more

MCU Changes At The Edge


Microcontrollers are becoming a key platform for processing machine learning at the edge due to two significant changes. First, they now can include multiple cores, including some for high performance and others for low power, as well as other specialized processing elements such as neural network accelerators. Second, machine learning algorithms have been pruned to the point where inferencing ... » read more

← Older posts Newer posts →