Security Holes In Machine Learning And AI


Machine learning and AI developers are starting to examine the integrity of training data, which in some cases will be used to train millions or even billions of devices. But this is the beginning of what will become a mammoth effort, because today no one is quite sure how that training data can be corrupted, or what to do about it if it is corrupted. Machine learning, deep learning and arti... » read more

Machine Learning’s Limits


Semiconductor Engineering sat down with Rob Aitken, an Arm fellow; Raik Brinkmann, CEO of OneSpin Solutions; Patrick Soheili, vice president of business and corporate development at eSilicon; and Chris Rowen, CEO of Babblelabs. What follows are excerpts of that conversation. To view part one, click here. SE: How much of what goes wrong in machine learning depends on the algorithm being wrong... » read more

Farming Goes High-Tech


Data from dirt — literally — is enabling farmers to perform detailed analysis to make their farming practices smarter, more efficient, and significantly more productive. Companies in every market are leveraging data to their business advantage, and the agricultural sector is no different. Even the venture capital community has taken note. According to ABI Research, some sizeable venture ... » read more

Machine Learning’s Limits (Part 1)


Semiconductor Engineering sat down with Rob Aitken, an Arm fellow; Raik Brinkmann, CEO of OneSpin Solutions; Patrick Soheili, vice president of business and corporate development at eSilicon; and Chris Rowen, CEO of Babblelabs. What follows are excerpts of that conversation. SE: Where are we with machine learning? What problems still have to be resolved? Aitken: We're in a state where thi... » read more

Toward IIoT Security Standards


Security is a high priority within Industrial IoT projects, but it is advancing like the rest of the industry—inconsistently, with big gaps between the leaders and everyone else. That isn't unique to one or two industrial segments. It applies to all of them, and even to slices within particularly industries. "There is some confusion about security because it's not just the IT issues," s... » read more

Progress And Chaos On Road To Autonomy


Progress in the development of fully autonomous vehicles is incremental and slow, but not for lack of effort. Research and development in self-driving cars is under way all around the globe, from the biggest automotive manufacturers and their Tier 1 suppliers to companies not traditionally involved in the automotive industry. Add to that fleets of startups working on sensor technologies and ... » read more

IIoT And Predictive Maintenance


It’s every production line manager’s nightmare—some machinery breaks down, stopping production on the factory floor. In a fab, if just one piece of semiconductor manufacturing equipment goes down and is out of service for hours, wafer fabrication can grind to a halt. Such shutdowns are expensive, especially if the plant is operating on a 24-hour schedule to meet demand. One selling poi... » read more

Why IIoT Security Is So Difficult


Despite the high risk of a market filled with billions of at least partially unprotected devices, it is likely to take five years or more to reach a "meaningful" level of security in the Industrial IoT. The market, which potentially includes every connected device with an integrated circuit, is fragmented into vertical industries, specialty chips, and filled with competing OEMs, carriers, in... » read more

Designing Hardware For Security


By Ed Sperling and Kevin Fogarty Cyber criminals are beginning to target weaknesses in hardware to take control of devices, rather than using the hardware as a stepping stone to access to the software. This shift underscores a significant increase in the sophistication of the attackers, as evidenced by the discovery of Spectre and Meltdown by Google Project Zero in 2017 (made public in Ja... » read more

Challenges At The Edge


By Kevin Fogarty and Ed Sperling Edge computing is inching toward the mainstream as the tech industry begins grappling with the fact that far too much data will be generated by sensors to send everything back to the cloud for processing. The initial idea behind the IoT/IIoT, as well as other connected devices, was that simple sensors would relay raw data to the cloud for processing throug... » read more

← Older posts Newer posts →