Autonomous Cars Drive New Software


Autonomous driving and other advanced features will require much more sophisticated software than what is used in vehicles today. To make this all work will require complex algorithms as well as co-designed hardware, which can make real-time decisions to avoid accidents and adjust to changing road conditions. Automobiles already take advantage of sophisticated software executed by a variety ... » read more

Self-Driving Cars Rattle Supply Chain


Automotive compute workloads are consolidating as carmakers push toward autonomous vehicles, but the changes necessary to make this all work are causing huge disruptions in an industry that has fine-tuned its supply chain over more than a century. Consolidation is essential for a variety of reasons, including efficiency of the computations, complexity management, and lower deployment costs. ... » read more

Intelligent Compute Engines Driving Today’s Automobiles Need Better Security


Driving a modern car or truck today is like driving a complex computer system which has the capability to transport people and freight from a geographic point to another through the road infrastructure and, to do so, it just happens it has an engine and wheels. With automotive systems moving towards consolidation of workloads, there is a need and benefit of having faster networking throughpu... » read more

Side-Channel Attacks


There are many techniques available for hackers to gain access to a system and obtain secret keys or other proprietary information– from invasive methods, such as microprobing, to noninvasive methods, such as cryptoanalysis. However, one of the easiest and most effective ways to extract the contents of a chip is through a side-channel attack using power analysis. To read more, click here. » read more

Big Data On Wheels


By Jeff Dorsch & Ed Sperling All kinds of chips are going into driver-assisted and autonomous cars. On one side are arrays of sensors, which are generating huge amounts of data about everything from lane position and proximity to other cars to unexpected objects in the road. On the other side are the chips required to process that data at blazing speed. As the market for PCs and mobil... » read more

IoT Security Ratings Needed


Concerns about security have been growing alongside adoption of the IoT, and it seems to be making some headway. This is good news, if it continues, because one of the biggest concerns about buying connected devices is that they can provide inroads into personal data. Data security has been a persistent annoyance for several years. Almost anyone who travels or shops at major department store... » read more

Fixing Security Holes


Connected devices can do everything from save lives to improve the quality of life. They also destroy that quality or cause harm if these things or systems of things are not secure. Security is a complex multi-level problem. It spans the entire seven-layer OSI communication stack, as well as the software that is used to run, manage and operate hardware. And it needs to be dealt with from mul... » read more

Chaos, Progress In Mobile Payment Security


Semiconductor suppliers and their embedded software partners, internally and externally, have made tremendous strides in recent years supporting secure mobile payment processing. It hasn't been easy. Or simple. And it's still evolving. The result of those efforts, which is now set to play an increasingly important and widespread commercial role in 2017, are trusted execution environment t... » read more

Tech Talk: Extending DRAM


Bruce Bateman, senior principal engineer at Kilopass, talks about how to extend the life of DRAM and how to work with smaller, denser memory.   Related Stories Executive Insight: Charlie Cheng Kilopass’ CEO talks about how to cut the capacitor in DRAM and why that’s important in the data center. » read more

Making Secure Chips For IoT Devices


Chips and modules going into Internet of Things node devices must have cybersecurity features designed and built into them. Multiple vendors are responding with products meant to keep the IoT devices protected from the cyberattacks that are becoming more common. While [getkc id="76" kc_name="IoT"] privacy remains a key concern for consumers and homeowners, IoT security has taken on top-of-mi... » read more

← Older posts