6G And Beyond: Overall Vision And Survey of Research


A new 92 page technical paper titled "6G: The Intelligent Network of Everything -- A Comprehensive Vision, Survey, and Tutorial" was published by IEEE researchers at Finland's University of Oulu. Abstract "The global 6G vision has taken its shape after years of international research and development efforts. This work culminated in ITU-R's Recommendation on "IMT-2030 Framework". While the d... » read more

Navigating The Foggy Edge Of Computing


The National Institute of Standards and Technology (NIST) defines fog computing as a horizontal, physical or virtual resource paradigm that resides between smart end-devices and traditional cloud or data centers. This model supports vertically-isolated, latency-sensitive applications by providing ubiquitous, scalable, layered, federated and distributed computing, storage and network connecti... » read more

The Week In Review: IoT


Finance Santa Monica, Calif.-based Sixgill reports raising $27.9 million in its Series B round of private financing, led by DRW Venture Capital. Mobile Financial Partners participated in the round. The startup last year raised $6 million in its Series A funding, also led by DRW. The company offers the Sixgill Sense sensor data services platform, addressing applications in the Internet of Thing... » read more

IP Business Models In Flux


EDA and IP suppliers are engaging with foundries earlier with each manufacturing process node, while those foundries are providing ever more optimized and tuned processes to their customers. As part of this, IP providers must port their IP offerings to the various foundries and processes, putting a squeeze on resources. That raises some difficult questions, such as how to prioritize their li... » read more

Rethinking Processor Architectures


The semiconductor industry's obsession with clock speeds, cores and how many transistors fit on a piece of silicon may be nearing an end for real this time. The [getentity id="22048" comment="IEEE"] said it will develop the International Roadmap for Devices and Systems (IRDS), effectively setting the industry agenda for future silicon benchmarking and adding metrics that are relevant to specifi... » read more

Next-Gen Botnets


Botnets, once limited to computer networks, are expanding and changing as more devices are connected to the Internet—and becoming much harder to detect and destroy. The term botnet—a contraction for robotic networks—conjures up the days when it was just a collection of computers that were largely autonomous, on a local network and usually assigned to repetitive tasks. But that is chang... » read more

On The Verge


Anyone who has been following the IoT/IoE or whatever-you-want-to-call-it movement knows we’re on the eve of far-reaching, life-altering change. There will be billions of connected devices, all streaming information to gigascale cloud datacenters using big data analytics and deep machine learning. Somewhere along the way, we’ll discover important, useful information from all this tha... » read more

Unexpected Security Holes


Security is emerging as one of the top challenges in semiconductor design across a variety of markets, with the number of security holes growing by orders of magnitude in sectors that have never dealt with these kinds of design constraints before. While security has been a topic of conversation for years in mobile phones and data centers, commercial and industrial equipment is being connecte... » read more

The Next Big Challenge


In his keynote speech at the Synopsys User Group last month, company chairman and co-CEO Aart de Geus defined IoT as the Internet of Threats. As interviews across the semiconductor industry have revealed over the past 12 months, his comment was very much on target. As more things are connected—and that includes everything from watches to toasters to cars to buildings within a city—securi... » read more

White-Box Crypto Gains Traction


Ask any cryptography expert which is better, hardware- or software-based cryptography, and they'll almost always choose the hardware. But as the IoE begins to take root in cost-sensitive markets with tight market windows, that won't always be an option. Plan B is software cryptography, which historically has been used at the application level in the form of anti-virus, anti-spyware, and soft... » read more

← Older posts