How eMRAM Addresses The Power Dilemma In Advanced-Node SoCs


By Rahul Thukral and Bhavana Chaurasia Our intelligent, interconnected, data-driven world demands more computation and capacity. Consider the variety of smart applications we now have. Cars can transport passengers to their destinations using local and remote AI decision-making. Robot vacuum cleaners keep our homes tidy, and smartwatches can detect a fall and call emergency services. With hi... » read more

Why Data-Over-Sound Is An Integral Part Of Any IoT Engineer’s Toolbox


Data-over-sound technology such as Chirp presents a compelling solution for many device-to-device connectivity applications, particularly for use cases that require frictionless, low cost connectivity with nearby devices. Download this white paper to: Understand the fundamental concepts and benefits of data-over-sound connectivity Explore the key application areas within the Internet... » read more

RF Energy Harvesting and Wireless Power Transfer Technologies: Latest Technology & Future Develop Opportunities


A new technical paper titled "RF Energy Harvesting and Wireless Power Transfer for Energy Autonomous Wireless Devices and RFIDs" was published by researchers at Institut Polytechnique de Paris, Universidade de Aveiro, The Hague, McGill University, University of Bordeaux, Polytechnique Montreal, and others. Abstract: "Radio frequency (RF) energy harvesting and wireless power transmission (... » read more

Options Widen For Optimizing IoT Designs


Creating a successful IoT design requires a deep understanding of the use cases, and a long list of tradeoffs among various components and technologies to provide the best solution at the right price point. Maximizing features and functions while minimizing costs is an ongoing balancing act, and the number of choices can be overwhelming. The menu includes SoC selection, OS and software proto... » read more

Compact NN Accelerator In CodAL


Recent years of IoT/IIoT evolution resulted in an important shift from cloud-level to device-level AI processing. It enables devices to run some AI tasks locally, thus minimizing security issues, data transfer costs, and latency. The ability to run AI/ML tasks becomes a must-have when selecting an SoC or MCU for IoT and IIoT applications. Embedded devices are typically resource-constrained, ... » read more

100G Ethernet IP For Edge Computing


The presence of Ethernet in our lives has paved the way for the emergence of the Internet of Things (IoT). Ethernet has connected everything around us and beyond, from smart homes and businesses, to industries, schools, and governments. This specification is even found in our vehicles, facilitating communication between internal devices. Ethernet has enabled high-performance computing data cent... » read more

How Low Can You Go? Pushing The Limits Of Transistors


Deep low voltage enablement of embedded memories and logic libraries to achieve extreme low power: Rising demand for cutting-edge mobile, IoT, and wearable devices, along with high compute demands for AI and 5G/6G communications, has driven the need for lower power systems-on-chip (SoCs). This is not only a concern for a device’s power consumption when active (dynamic power), but also when... » read more

Securing IoT Devices With Lightweight Cryptography


The National Institute of Standards and Technology (NIST) recently announced the selection of a new family of cryptographic algorithms called ASCON, which have been developed for lightweight cryptography applications. In this blog, we will explore what lightweight cryptography is and why it is worth considering for specific Internet of Things (IoT) use cases. In summary, lightweight cryptogr... » read more

Automotive IoT Security By Design


A good example of the wider adoption and application of IoT devices is in automotive uses. It’s a growing market, with the worldwide number of IoT-connected devices projected to increase to 43 billion by 2023, an almost threefold increase from 2018. The modern vehicles that host so many IoT devices are increasingly connected—for cellular over-the-air updates, but also potentially to comm... » read more

Security Highlight: Ascon


The contest for standardization of a lightweight crypto (LWC) algorithm has just finished. US standards body NIST selected Ascon as the winner. Ascon is an algorithm proposed by an international team of scientists that delivers strong performance and security at a low cost. How does that work? Lightweight crypto is symmetric encryption technology, that runs well on constrained systems, lik... » read more

← Older posts Newer posts →