While VAR Impacts Soccer, The IoT Impacts The World


While the 2022 FIFA World Cup was in full swing and all the excitement was on the players giving their utmost out on the field — black Technology throughout the global IoT industry was stirring up heated debates. Be it Croatian players sending the ball slightly offside or Japanese players hanging it over the line, VAR seems to have played an integral role in last year's World Cup. Technolo... » read more

Simplifying the Connected Future: Navigating Complexity In The IoT Landscape


Smart home devices, appliances, ear buds, personal medical devices, smart energy meters, POS machines, asset, and fitness trackers, … Whatever device you can think of that makes our lives more convenient, safer and more enjoyable, in today’s world it’s likely to be connected, often wirelessly. Almost everywhere, connectivity is no longer an extra, it’s expected. And expectations are gro... » read more

How To Meet The IoT Security Requirements Of Today And Tomorrow


Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world. Connectivity is good and, in fact, great but bad things can happen to people with unprotected or poorly protected IoT devices. Failing to meet government regulations or guidelines may lead to the inability to sell products in a r... » read more

Novel NVM Devices and Applications (UC Berkeley)


A dissertation titled “Novel Non-Volatile Memory Devices and Applications” was submitted by a researcher at University of California Berkeley. Abstract Excerpt "This dissertation focuses on novel non-volatile memory devices and their applications. First, logic MEM switches are demonstrated to be operable as NV memory devices using controlled welding and unwelding of the contacting electro... » read more

Protecting Highly Confidential Data In IoT Devices


How should we approach the protection of highly confidential security parameters and personal data? It's just like our daily routines: when we leave home, we lock the door and take care not to lose the key. Similarly, in the realm of cybersecurity, safeguarding cryptographic keys is paramount. No matter how robust your data protection system is, it's rendered ineffective if keys or passwords... » read more

A Hierarchical Instruction Cache Tailored To Ultra-Low-Power Tightly-Coupled Processor Clusters


A technical paper titled “Scalable Hierarchical Instruction Cache for Ultra-Low-Power Processors Clusters” was published by researchers at University of Bologna, ETH Zurich, and GreenWaves Technologies. Abstract: "High Performance and Energy Efficiency are critical requirements for Internet of Things (IoT) end-nodes. Exploiting tightly-coupled clusters of programmable processors (CMPs) ha... » read more

The Touch-Sensing HMI In Wearable And IoT Devices


The touch-sensing human-machine interface (HMI) in wearable devices is a key element of their consumer appeal, providing a responsive, intuitive way to interact via touch buttons and sliders in devices such as earbuds and smart glasses, or via a small touchscreen in a smart watch. Competition in the market for these types of wearable device continually drives innovation. Manufacturers battle fo... » read more

New Approaches To Sensors And Sensing


Sensors are becoming more intelligent, more complex, and much more useful. They are being integrated with other sensors in sensor fusion, so a smart doorbell may only wake up when it’s imperative to see who’s at the door, and a microphone may only send alerts when there are cries for help or sounds of glass breaking. Kim Lee, senior director of system applications engineering at Infineon, t... » read more

Heat-Tolerant CNT-Based PUFs


A technical paper titled “CNT-PUFs: Highly Robust and Heat-Tolerant Carbon-Nanotube-Based Physical Unclonable Functions for Stable Key Generation” was published by researchers at Chemnitz University of Technology, University of Passau, Technical University of Darmstadt, and Fraunhofer Institute for Electronic Nano Systems (ENAS). Abstract: "In this work, we explore a highly robust and... » read more

How Voltage-Controlled MRAM Devices Can Be Used To Create Unique Fingerprints Of Microelectronic Chips


A technical paper titled "Reconfigurable Physically Unclonable Functions Based on Nanoscale Voltage-Controlled Magnetic Tunnel Junctions" was published by researchers at Northwestern University, Western Digital Corporation, Fe Research Inc., and University of Messina. Abstract: "With the fast growth of the number of electronic devices on the internet of things (IoT), hardware-based securi... » read more

← Older posts Newer posts →