Designing Hardware For Security


By Ed Sperling and Kevin Fogarty Cyber criminals are beginning to target weaknesses in hardware to take control of devices, rather than using the hardware as a stepping stone to access to the software. This shift underscores a significant increase in the sophistication of the attackers, as evidenced by the discovery of Spectre and Meltdown by Google Project Zero in 2017 (made public in Ja... » read more

Move Data Or Process In Place?


Chip architectures, and even local system architectures, long have found that the best way to improve total system performance and power consumption is to move memory as close to processors as possible. This has led to cache architectures and memories that are tuned for those architectures, as discussed in part 1 of this article. But there are several tacit assumptions made in these architectur... » read more

The Week In Review: IoT


Finance Particle, the provider of a full-stack Internet of Things device platform for enterprises, has raised $20 million in Series B funding, bringing its total venture funding to $30 million. Spark Capital led the new round, with participation by Qualcomm Ventures and existing investors in the IoT startup. Machina Research estimates cellular IoT connections will increase from 334 million in ... » read more