Dell EMC Ready Solutions for HPC Digital Manufacturing – ANSYS Performance


This technical white paper describes the performance of ANSYS Fluent, Mechanical, and CFX on the Dell EMC Ready Bundle for HPC Digital Manufacturing, which was designed and configured specifically for Digital Manufacturing workloads, where Computer Aided Engineering (CAE) applications are critical for virtual product development. In addition, the architecture of the Dell EMC Ready Bundle for HP... » read more

Week in Review: IoT, Security, Auto


Products/Services Rambus agreed to acquire Hillsboro, Ore.-based Northwest Logic, a purveyor of memory, PCIe, and MIPI digital controllers. The transaction is expected to close in the current quarter. Financial terms weren’t disclosed; Rambus said in a statement, “Although this transaction will not materially impact 2019 results due to the expected timing of close and acquisition accountin... » read more

Creating A Roadmap For Hardware Security


The U.S. Department of Defense and private industry consortiums are developing comprehensive and cohesive cybersecurity plans that will serve as blueprints for military, industrial and commercial systems. What is particularly noteworthy in all of these efforts is the focus on semiconductors. While software can be patched, vulnerabilities such as Spectre, Meltdown and Foreshadow need to be de... » read more

Racing To The Edge


The race is on to win a piece of the edge, despite the fact that there is no consistent definition of where the edge begins and ends or how the various pieces will be integrated or ultimately tested. The edge concept originated with the Internet of Things, where the initial idea was that tens of billions of dumb sensors would communicate through gateways to the cloud. That idea persisted unt... » read more

Week in Review: IoT, Security, Auto


Internet of Things Pepper IoT collaborated with the Dark Cubed cybersecurity firm to produce “The State of IoT Security Report,” which can be downloaded here. Pepper IoT is an Internet of Things platform and service provider. Key findings of the report: Device security is important, but the platform is much more critical; patching will not fix systemic problems; and the market must make se... » read more

What’s in a Name?


Test Vision 2020 is a specialty workshop held each year during Semicon West. Formerly known as ATE Vision 2020, the program focuses on automatic test equipment and related topics. This year’s edition heard a lot about artificial intelligence, automotive electronics, and machine learning, which have been the leading topics at every tech conference I’ve attended in 2018. The workshop’s t... » read more

Why The IIoT Is Not Secure


The Internet of Things is famously insecure, but not because the technology to build it or secure it is immature. Likewise, severely insufficient security on the Industrial IoT suffers from a lack of will. Neither tech buyers nor providers have yet invested the same effort expended in other areas of the tech world to create and adopt steps that will make everyone safer, according to chipmakers ... » read more

Designing Hardware For Security


By Ed Sperling and Kevin Fogarty Cyber criminals are beginning to target weaknesses in hardware to take control of devices, rather than using the hardware as a stepping stone to access to the software. This shift underscores a significant increase in the sophistication of the attackers, as evidenced by the discovery of Spectre and Meltdown by Google Project Zero in 2017 (made public in Ja... » read more

The Week in Review: IoT


Cybersecurity Arm this week introduced the Cortex-M35P processor with anti-tampering technology and software isolation. The company also debuted security intellectual property to protect Internet of Things devices from physical cyberattacks and close proximity side-channel attacks. Paul Williamson, Arm’s vice president and general manager of the IoT Device IP line of business, provides more ... » read more

Challenges At The Edge


By Kevin Fogarty and Ed Sperling Edge computing is inching toward the mainstream as the tech industry begins grappling with the fact that far too much data will be generated by sensors to send everything back to the cloud for processing. The initial idea behind the IoT/IIoT, as well as other connected devices, was that simple sensors would relay raw data to the cloud for processing throug... » read more

← Older posts