Week In Review: Auto, Security, Pervasive Computing


Intel issued an advisory of a potential security vulnerability in some of its processors. The company recommends updating to the latest firmware version. NVIDIA unveiled its GH200 Grace Hopper platform, based on 144 Arm Neoverse cores and 282GB of HBM3e memory. Meanwhile, Chinese internet companies including Baidu, ByteDance, Tencent, and Alibaba ordered about $5 billion worth of A800 proces... » read more

Study On HPC And Cloud Computing For Engineering Simulation


In engineering applications, cloud computing can provide the on-demand compute power needed to run increasingly more complex simulations on a more frequent basis throughout the design cycle. Simulation plays an increasingly important role in the development of disruptive new technologies and systems such as autonomous vehicles, digital manufacturing, next-generation aircraft, and more. Rapid, h... » read more

Week In Review: Design, Low Power


DAC and SEMICON WEST rebounded this year, focusing on everything from security to chiplets and smart manufacturing. Panel at DAC conference: Left to right, ARM’s Brian Fuller (moderator), Joe Costello (Metrics, Kwikbit, Arrikto, Acromove), and Wally Rhines (Cornami). Source: Semiconductor Engineering/Ann Mutschler EDA and IP remain strong, approaching $4 billion in Q1, according to ... » read more

Week In Review: Auto, Security, Pervasive Computing


Google was hit with a class action suit in U.S. District Court in San Francisco, alleging data scraping from millions of users without consent and violation of copyright laws to train and develop its AI products. Last month, the same law firm filed a suit against OpenAI for ChatGPT. Despite calling for a pause on development of advanced AI in March, Elon Musk launched xAI, a new company focu... » read more

Week In Review: Auto, Security, Pervasive Computing


Inflection AI raised $1.3 billion in a new funding round led by Microsoft, Reid Hoffman, Bill Gates, Eric Schmidt, and NVIDIA after raising $225 million in the first round to support the ongoing development of Pi, a “useful, friendly, and fun” AI. In partnership with CoreWeave and NVIDIA, Inflection aims to build the world’s largest AI cluster, comprised of 22,000 NVIDIA H100 Tensor Core ... » read more

Week In Review: Auto, Security, Pervasive Computing


The European Parliament took a major step toward enacting the world’s first laws around the use of AI. Known as the AI Act, the draft law won a majority vote following two years of debate. If the proposed regulations pass the next hurdles, AI systems posing an unacceptable risk to human safety would be banned — along with “intrusive and discriminatory” uses of AI, including biometric su... » read more

Spark On AWS Graviton2 Best Practices: K-Means Clustering Case Study


This report focuses on how to tune a Spark application to run on a cluster of instances. We define the concepts for the cluster/Spark parameters, and explain how to configure them given a specific set of resources. We use a K-Means machine learning algorithm as a case study to analyze and tune the parameters to achieve the required performance while optimally using the available resources. W... » read more

Week In Review: Semiconductor Manufacturing, Test


Nikkei Asia reports the U.S. is urging allies, including Japan, to restrict exports of advanced semiconductors and related technology to China. The U.S. holds 12% of the global semiconductor market, Japan has a 15% share, while Taiwan and South Korea each have about a 20% share. Some U.S. companies have called for other countries to adopt U.S.-style export curbs, arguing it is unfair for only A... » read more

Security Research: Technical Paper Round-Up


A number of hardware security-related technical papers were presented at recent conferences, including the August 2022 USENIX Security Symposium and IEEE’s International Symposium on Hardware Oriented Security and Trust (HOST). Topics include side-channel attacks and defenses (including on-chip mesh interconnect attacks), heterogeneous attacks on cache hierarchies, rowhammer attacks and mitig... » read more

An Escalation of Rowhammer To Rows Beyond Immediate Neighbors


Researchers at Graz University of Technology, Lamarr Security Research, Google, AWS, and Rivos presented this new technical paper titled "Half-Double: Hammering From the Next Row Over" at the USENIX Security Symposium in Boston in August 2022. Abstract: "Rowhammer is a vulnerability in modern DRAM where repeated accesses to one row (the aggressor) give off electrical disturbance whose cumu... » read more

← Older posts Newer posts →