Creating A Roadmap For Hardware Security


The U.S. Department of Defense and private industry consortiums are developing comprehensive and cohesive cybersecurity plans that will serve as blueprints for military, industrial and commercial systems. What is particularly noteworthy in all of these efforts is the focus on semiconductors. While software can be patched, vulnerabilities such as Spectre, Meltdown and Foreshadow need to be de... » read more

Racing To The Edge


The race is on to win a piece of the edge, despite the fact that there is no consistent definition of where the edge begins and ends or how the various pieces will be integrated or ultimately tested. The edge concept originated with the Internet of Things, where the initial idea was that tens of billions of dumb sensors would communicate through gateways to the cloud. That idea persisted unt... » read more

Spreading Intelligence From The Cloud To The Edge


The challenge of partitioning processing between the edge and the cloud is beginning to come into focus as chipmakers and systems companies wrestle with a massive and rapidly growing volume of data. There are widely different assessments of how much data this ultimately will include, but everyone agrees it is a very large number. Petabytes are simply rounding errors in this equation, and tha... » read more

Blockchain May Be Overkill for Most IIoT Security


Blockchain crops up in many of the pitches for security software aimed at the industrial IoT. However, IIoT project owners, chipmakers and OEMs should stick with security options that address the low-level, device- and data-centered security of the IIoT itself, rather than the effort to promote blockchain as a security option as well as an audit tool. Only about 6% of Industrial IoT (IIoT) p... » read more

IoT Merging Into Data-Driven Design


The Internet of Things is becoming more difficult to define and utilize for an effective business strategy. While an increasing number devices send data to the cloud or some local server, so much data is being generated and moved around that new strategies are being developed to rethink what needs to be processed where. Back in 2013, when the IoT concept really began taking off, connectivity... » read more

Week In Review: Manufacturing, Test


Intel Mark Bohr, a senior fellow and director of process architecture and integration at Intel, is retiring, according to the company. Bohr, who will retire at the end of February 2019, held various technology positions during his 41-year career at Intel. Here is a quick bio on Bohr. Others have also recently retired from Intel’s manufacturing unit amid a massive reorganization in the depart... » read more

Smart Manufacturing Initiative


SEMI’s Smart Manufacturing (SM) Initiative has been a gathering place for companies who believe that electronics manufacturing will benefit from the gathering and analysis of production and sensor data, and optimizing processes based on that data. SM principles are focused on increasing speed, improved output and higher quality. Smart Manufacturing relies on simplifying data sharing and co... » read more

Adding AI To The IoT


The Internet of Things is about to undergo a radical change, fueled by vast number of things coupled with an almost pervasive presence of AI. The IoT today encompasses a long list of vertical markets, all of them connected to the Internet but not necessarily to each other. The concept of the IoT really began taking off in 2015, when a combination of data analytics, high-speed, affordable and... » read more

Cloud Drives Changes In Network Chip Architectures


Cloud data centers have changed the networking topology and how data moves throughout a large data center, prompting significant changes in the architecture of the chips used to route that data and raising a whole new set of design challenges. Cloud computing has emerged as the fast growing segment of the data center market. In fact, it is expected to grow three-fold in the next few years, a... » read more

Why The IIoT Is Not Secure


The Internet of Things is famously insecure, but not because the technology to build it or secure it is immature. Likewise, severely insufficient security on the Industrial IoT suffers from a lack of will. Neither tech buyers nor providers have yet invested the same effort expended in other areas of the tech world to create and adopt steps that will make everyone safer, according to chipmakers ... » read more

← Older posts Newer posts →