Week In Review: Auto, Security, Pervasive Computing


Pervasive computing — IoT, edge, cloud, data center, and back Arm shared new features and some design wins for its Neoverse V1 and N2 platforms, which it introduced in September 2020. Neoverse V1 is optimized for high-performance computing. Arm has licensing wins from India’s Ministry of Electronics and Information Technology (MeitY) for its exascale HPC project; and European exascale comp... » read more

Week In Review: Auto, Security, Pervasive Computing


AI/Edge Arm putting AI (artificial intelligence) and machine learning (ML) on the Cortex-M processor by offering IP for a microNPU for Cortex-M. The company says in a press release that it will deliver a 480x uplift in ML performance. The new Cortex-M IP is Arm Ethos-U55 NPU, which Arm says is the industry’s first microNPU (neural processing unit). Arm is hoping the new IP will start an expl... » read more

Securing The Future of Authentication With ARM TrustZone-based Trusted Execution Environment And Fast Identity Online (FIDO)


Smart connected mobile devices are increasingly used for a wide range of business, financial and entertainment uses. Authentication of the user to a remote Internet-based server is the first step for many applications or cloud-based services. Traditional authentication methods of username and password do not work very well for either the consumer who may have difficulty remembering complex pass... » read more

Security Made Easier


The FIDO (Fast IDentity Online) Alliance was formed in July 2012 to address the lack of interoperability among strong authentication devices as well as the problems users face with creating and remembering multiple usernames and passwords. The FIDO Alliance’s mission is to change the landscape of authentication by eliminating the reliance on passwords. This is accomplished by developing speci... » read more

How To Prevent Identity Theft


It is a well-known fact: Internet usage is booming. 3.2 billion people are online, while more than 7 billion mobile phones are subscribed worldwide. With the rise of activities such as browsing, shopping and online banking, Internet-based crime is on the rise, too. Cifas, a fraud prevention agency based in London, stated that more than 80% of identity theft was attempted or perpetrated onlin... » read more

Blog Review: Dec. 31


Mentor's J. VanDomelen zeroes in on the two most interesting discoveries from the Philae comet landing. So what was that "eerie cyclical clicking" sound? Synopsys' Ray Varghese digs into basic coherent transaction testing for AXI/ACE compliant interconnects. You might want to put on another pot of coffee. Cadence's Brian Fuller offers some deep insights into synthesis, verification and te... » read more