Securing The World’s Data: A Looming Challenge


A combination of increasingly complex designs, more connected devices, and a mix of different generations of security technology are creating a whole new set of concerns about the safety of data nearly everywhere. While security experts have been warning of a growing threat in electronics for decades, there have been several recent fundamental changes that elevate the risk. Among them: ... » read more

MIPI In Next Generation Of AI IoT Devices At The Edge


The history of data processing begins in the 1960s with centralized on-site mainframes that later evolved into distributed client servers. In the beginning of this century, centralized cloud computing became attractive and began to gain momentum, becoming one of the most popular computing tools today. In recent years however, we have seen an increase in the demand for processing at the edge or ... » read more

Suppressing Power Side-Channel Attacks: A HW/SW Design For Resource-Constrained IoT Devices


A technical paper titled “Hardware/Software Cooperative Design Against Power Side-Channel Attacks on IoT Devices” was published by researchers at Tokyo Institute of Technology and the University of Electro-Communications. Abstract: "With the growth of Internet of Things (IoT) era, the protection of secret information on IoT devices is becoming increasingly important. For IoT devices, atta... » read more

Navigating IoT Security


By Dana Neustadter (Synopsys), Ruud Derwig (Synopsys), and Martin Rösner (G+D) IoT expansion requires secure and efficient connectivity between machines. Integrated SIM technology and remote SIM provisioning can make this possible. Subscriber Identity Module (SIM) cards have been around for a long time, with Giesecke+Devrient (G+D) developing and delivering the first commercial SIM car... » read more

Ultra-Low Power CiM Design For Practical Edge Scenarios


A technical paper titled “Low Power and Temperature-Resilient Compute-In-Memory Based on Subthreshold-FeFET” was published by researchers at Zhejiang University, University of Notre Dame, Technical University of Munich, Munich Institute of Robotics and Machine Intelligence, and the Laboratory of Collaborative Sensing and Autonomous Unmanned Systems of Zhejiang Province. Abstract: "Compute... » read more

How To Build Computer Vision Solutions


Computer vision devices that can ‘see’ and act on visual information are bringing new efficiencies and functionalities to IoT. But with new opportunities come complexities. The specific features and functionality of smart vision use cases vary widely. Creating a system that catches defects on an assembly line requires different imaging, machine learning, and workloads compared to one ... » read more

Addressing The New Wave Of The IoT With Edge AI


Today, we are witnessing the exponential growth IoT is experiencing. Every second, 127 devices are getting connected with an expected forecast for 43 billion IoT devices by 2027. As this market grows and evolves, so does the demand for more sophisticated, powerful, energy efficient and accurate system solutions that can help enrich the way of life. Among the many crucial technologies enabling ... » read more

Preparing For An AI-Driven Future In Chips


Experts at the Table: Semiconductor Engineering sat down to discuss the impact of AI on semiconductor architectures, tools, and security, with Michael Kurniawan, business strategy manager at Accenture; Kaushal Vora, senior director and head of business acceleration and ecosystem at Renesas Electronics; Paul Karazuba, vice president of marketing at Expedera; and Chowdary Yanamadala, technology s... » read more

See The Future of IoT: Planning For Success With Smart Vision


Computer vision devices that can ‘see’ and act on visual information are bringing new efficiencies and functionalities to IoT. But with new opportunities come complexities. The specific features and functionality of smart vision use cases vary widely. Creating a system that catches defects on an assembly line requires different imaging, machine learning, and workloads compared to one ... » read more

Enabling Long-Lasting Security For Semiconductors


There’s no doubt we live in a world where technology is highly intertwined within our daily lives. It has become pervasive in our homes, our automobiles and, critically, at our work. With so many access points into our lives, we’ve not only become extremely vulnerable to data collection, but more devastatingly, hackers. Today, hackers have more time, resources, available training and motiva... » read more

← Older posts Newer posts →