Priorities Shift In IC Design


The rush to the edge and new applications around AI are causing a shift in design strategies toward the highest performance per watt, rather than the highest performance or lowest power. This may sound like hair-splitting, but it has set a scramble in motion around how to process more data more quickly without just relying on faster processors and accelerators. Several factors are driving th... » read more

Big Growth Areas: Connectivity, AI, Reliability


Connectivity and artificial intelligence (AI) will be the biggest drivers for 2020, with an emphasis on improved reliability across all areas. New standards, new applications, and new pressures being placed on old technology will created boundless opportunities for those ready to fill the need. Of course, there will also be a lot of carnage along the way, and we can expect to see a lot of that ... » read more

The Evolution Of Pervasive Computing


The computing world has gone full circle toward pervasive computing. In fact, it has done so more than once, which from the outside may look like a more rapid spin cycle than a real change of direction. Dig deeper, though, and it's apparent that some fundamental changes are at work. This genesis of pervasive computing dates back to the introduction of the PC in 1981, prior to which all corpo... » read more

California’s IoT Law Is A Good Start, But More Needs To Be Done


Passed by former California governor Jerry Brown, cybersecurity law SB-327 went into effect on Jan. 1. This proactive legislation requires manufacturers to equip IoT devices with “reasonable” security features to prevent unauthorized access, modification and data leaks. Specifically, SB-327 requires manufacturers to implement a unique preprogrammed (default) password for each device. Additi... » read more

Open Source Hardware Risks


Open-source hardware is gaining attention on a variety of fronts, from chiplets and the underlying infrastructure to the ecosystems required to support open-source and hybrid open-source and proprietary designs. Open-source development is hardly a new topic. It has proven to be a successful strategy in the Linux world, but far less so on the hardware side. That is beginning to change, fueled... » read more

Week In Review: IoT, Automotive & Security


Internet of Things Qorvo, the company whose products sent pictures back from Pluto and Arrokoth (formerly Ultima Thule) on New Horizons, is showing off a couple smart home, IoT products at CES 2020 in Las Vegas next week. The company says its new transceiver chip QPG7015M will simplify gateway IoT design because the chip can simultaneously handle all open, smart home protocols, including ZigBe... » read more

Applications, Ecosystems And System Complexity Will Be Key Verification Drivers For 2020


In my predictions blog last year, I focused on verification throughput and its expected growth in 2019. The four areas I predicted we’d see growth in during 2019 were scalable performance, unbound capacity including cloud enablement, smart bug hunting and multi-level abstractions. In 2018, the five key verification drivers that I identified were security, safety, application specificity, proc... » read more

How to Manage One Trillion Devices on the Edge


THE EDGE, THE DATACENTER, AND NEW DESIGN PRINCIPLES: The world of compute is changing rapidly, as is the traditional view of a physical building, or buildings filled with servers, storage, and networking to “run the business”. Cloud computing, distributed cloud computing, and edge computing will all be fed by a 5G access network, forcing IT organizations to think and plan differently. Th... » read more

Week In Review: IoT, Security, Auto


Internet of Things SiFive is bringing RISC-V to IoT makers and university developers through the RISC-V-based SiFive Learn Initiative, an open-source learning package that can be used to create a low-cost RISC-V hardware compatible with AWS IoT Core. The development platform SiFive Learn Inventor has a software package and education enablement course. It includes: The programmable SiFive Lear... » read more

A Trillion Security Risks


An explosion in IoT devices has significantly raised the security threat level for hardware and software, and it shows no sign of abating anytime soon. Sometime over the next decade the number of connected devices is expected to hit the 1 trillion mark. Expecting all of them to be secure is impossible, particularly as the attack surface widens and the attack vectors become more sophisticated... » read more

← Older posts