System Bits: Aug. 21


Two types of computers create faster, less energy-intensive image processor for autonomous cars, security cameras, medical devices Stanford University researchers reminded that the image recognition technology that underlies today’s autonomous cars and aerial drones depends on artificial intelligence. These are the computers that essentially teach themselves to recognize objects like a dog, ... » read more

HD Video Comes To Entry-Level Drones


The consumer drone market has expanded greatly over the last few years, with almost 3 million units shipped during 2017. This upward trend is likely to continue. Analyst firm Statista forecasts that the commercial drone business will be worth $6.4 billion annually by 2020, while Global Market Insights has predicted that the worldwide drone market will grow to $17 billion (with the consumer cate... » read more

Power/Performance Bits: Feb. 27


Encryption chip A team at MIT developed a new chip to lower the power consumption of public-key cryptography for IoT devices. Software execution of encryption protocols require more energy and memory space than embedded IoT sensors can typically spare, given the need to maximize battery life. The new chip is hardwired to perform public-key encryption and consumes only 1/400 as much power as... » read more

Security For Android-Based Ecosystem With Mobile Storage IP


By Biswanath Tayenjam and Licinio Sousa Users are storing more sensitive data in flash memory on their mobile applications such as digital cameras, smart phones and tablets. Because of this reason, the Joint Electron Device Engineering Council (JEDEC) have developed two storage interface standards using inline encryption to secure data: embedded Multimedia Controller (eMMC) and Universal Fla... » read more

Improving Data Security


For industrial, military and a multitude of modern business applications, data security is of course incredibly important. While software based encryption often works well for consumer and some enterprise environments, in the context of the embedded systems used in industrial and military applications, something that is of a simpler nature and is intrinsically more robust is usually going to be... » read more

Ensure Robust Encryption With CAVP Validation For FIPS 140-2 Conformance


Cryptographic algorithms are mathematical procedures used to implement security protocols in today’s devices and communication infrastructure. Designers must validate their cryptographic algorithm implementations through certification by regulatory bodies, such as Communications Security Establishment Canada (CSEC) and National Institute of Standards and Technology (NIST), to ensure accuracy ... » read more

OTP Memory For Mobile Payment Applications


The trend toward mobile banking and payments as a way to replace debit or credit cards, or integrate a part of their functions into a mobile device, is moving faster than most industry analysts predicted. In China, for example, mobile payment systems Alipay and WeChat pay are popular and well used, and a great way for easy account monitoring and ditching the wallet. It is a fundamental change t... » read more

One-Time-Programmable Memories For IoT Security


Security in the IoT space is an issue of major concern. Hackers are attacking IoT devices across all layers of the infrastructure, from the application layer down to protocol, to the physical and deep into the IoT devices. I intend to focus on vulnerability prevention for IoT devices at the lowest level: memory structure and key storage. I conclude with indicating highly important features a... » read more

Security Improvements Ahead


After nearly two years of talking about how security is one of the biggest problems facing the IoE, progress is being made on a number of fronts. The changes involve many companies, both individually and collaboratively through standards groups. And while none of this will stop the kind of high-profile breaches that affected Target or Home Depot or JPMorgan Chase or a long list of other gian... » read more

The Real Value In Customizing Instructions


One element that distinguishes devices for the emerging IoT market from the mobile devices of the mature handheld market is power. Specifically, while the latter can accept a battery recharge cycle of days, the former demands years between battery recharge/replacement. Where the two devices resemble one another is their need for high performance. While embedded CPU cores have concentrated o... » read more

← Older posts