Power/Performance Bits: Oct. 15


Probabilistic computing Researchers at Purdue University and Tohoku University built a hardware demonstration of a probabilistic computer utilizing p-bits to perform quantum computer-like calculations. The team says probabilistic computing could bridge the gap between classical and quantum computing and more efficiently solve problems in areas such as drug research, encryption and cybersecurit... » read more

Week in Review – IoT, Security, Autos


Products/Services Rambus entered an exclusive agreement to acquire the Silicon IP, Secure Protocols, and Provisioning business from Verimatrix, formerly known as Inside Secure. Financial terms were not revealed. The transaction is expected to close this year. Rambus will use the Verimatrix offerings in such demanding applications as artificial intelligence, automotive, the Internet of Things, ... » read more

Dawn Of The Data-Centric Era


A recurring theme of the recent Industry Strategy Symposium (ISS) in Half Moon Bay, California, was how the explosion of new applications such as autonomous vehicles, digital healthcare, quantum computing, and crytocurrency mining are driving the need for more industry-wide collaboration to enable companies to compete in the “Data Centric” era. The resulting digital economy is creating unpr... » read more

Chaos, Progress In Mobile Payment Security


Semiconductor suppliers and their embedded software partners, internally and externally, have made tremendous strides in recent years supporting secure mobile payment processing. It hasn't been easy. Or simple. And it's still evolving. The result of those efforts, which is now set to play an increasingly important and widespread commercial role in 2017, are trusted execution environment t... » read more

Fingerprint Sensor Technology And Security Requirements


Biometrics is a technology that uses a human’s biological features, such as facial characteristics, fingerprint patterns, retina, DNA or behaviors (voice and signature) to authenticate a person’s identification and authorize specific actions. Of all of them, fingerprint analysis technology is the most mature and has the widest acceptance. Several factors contribute to fingerprint technol... » read more

Smartphone Security: For Your Eyes Only


Fans of the Olympics here in the United States were treated to a great Samsung commercial throughout the broadcast. The commercial stars the genius, multi-award-winning actor Christoph Waltz, showing how Americans can multitask with the amazing new Galaxy Note7. Yes, THAT Galaxy Note7. The 90-second long commercial is a delight to watch, but it must have cost Samsung some serious bucks to produ... » read more

What Is Cyberwarfare?


Cyberwarfare is emerging as the most sophisticated battleground of the 21st century. In fact, the military in all major countries make it a priority. Collectively they are spending tens of billions of dollars on education and building a knowledgebase of how attacks can be perpetrated and what defenses are needed. The entire effort is based on technology, both legacy and new, starting on the ... » read more

Using DNA Differently


As the Internet of Everything creeps closer and closer, technologies from wireless to biometrics are undergoing metamorphosis. On the biometrics front, there is a vast array of applications, from fingerprints to facial recognition—even finger vein recognition. But the one that is garnering a lot of attention these days is DNA sequencing, and a subset called rapid DNA sequencing. Both are b... » read more

Nymi: Wearable Authentication


If you had one device that could log into all your electronics automatically, allowing you to make electronic payments more securely based on your heart beat rhythms, would you use it? That's the question a startup named Nymi is asking—and a lot of other companies are watching. The company began its life in 2011 using a biometric electrocardiogram developed at the University of Toronto. ... » read more

The Real Value In Customizing Instructions


One element that distinguishes devices for the emerging IoT market from the mobile devices of the mature handheld market is power. Specifically, while the latter can accept a battery recharge cycle of days, the former demands years between battery recharge/replacement. Where the two devices resemble one another is their need for high performance. While embedded CPU cores have concentrated o... » read more

← Older posts