Generative AI Training With HBM3 Memory


One of the biggest, most talked about application drivers of hardware requirements today is the rise of Large Language Models (LLMs) and the generative AI which they make possible.  The most well-known example of generative AI right now is, of course, ChatGPT. ChatGPT’s large language model for GPT-3 utilizes 175 billion parameters. Fourth generation GPT-4 will reportedly boost the number of... » read more

HBM’s Future: Necessary But Expensive


High-bandwidth memory (HBM) is becoming the memory of choice for hyperscalers, but there are still questions about its ultimate fate in the mainstream marketplace. While it’s well-established in data centers, with usage growing due to the demands of AI/ML, wider adoption is inhibited by drawbacks inherent in its basic design. On the one hand, HBM offers a compact 2.5D form factor that enables... » read more

Protecting Data And Devices Now And In The Quantum Computing Era


Quantum computing is being pursued across industry, government and academia with tremendous energy and is set to become a reality in the not-so-distant future. Once sufficiently large quantum computers exist, traditional asymmetric cryptographic methods for key exchange and digital signatures will be broken. Many initiatives have been launched throughout the world to develop and deploy new quan... » read more

Wi-Fi 7 Moves Forward, Adding Yet Another Protocol


The latest generation Wi-Fi protocol brings better speeds and data handling, but it does little to bridge various communications technologies. That, in turn, makes it more difficult and more expensive to design chips because they must integrate and support multiple wireless technologies, including different versions of the same technology. Wireless communications technologies are often victi... » read more

Week In Review: Auto, Security, Pervasive Computing


Google was hit with a class action suit in U.S. District Court in San Francisco, alleging data scraping from millions of users without consent and violation of copyright laws to train and develop its AI products. Last month, the same law firm filed a suit against OpenAI for ChatGPT. Despite calling for a pause on development of advanced AI in March, Elon Musk launched xAI, a new company focu... » read more

Silicon Root Of Trust IP And The Automotive Chain Of Trust


Cybersecurity attacks in the automotive industry have increased in magnitude, frequency and sophistication in recent years. According to IDC, there have been more than 900 publicly reported automotive security incidents since 2010, and this number is growing year over year. New attack vectors are emerging all the time. For example, attacks on the EV charging infrastructure reached 4% of total i... » read more

Week In Review: Automotive, Security, Pervasive Computing


Stellantis and Foxconn formed a 50/50 joint venture called SiliconAuto, to be headquartered in the Netherlands. The goal is to close the gap between supply and demand for chips used in computer-controlled features and modules, especially for electric vehicles (EVs). The U.S. Department of Justice created a National Security Cyber Section within its National Security Division to increase the ... » read more

Power/Performance Costs Of Securing Systems


For much of the chip industry, concerns about security are relatively new, but the requirement for protecting semiconductor devices is becoming pervasive. Unfortunately for many industries, that lesson has been learned the hard way. Security breaches have led to the loss of sensitive data, ransomware attacks that lock up data, theft of intellectual property or financial resources, and loss o... » read more

LPDDR5X: High Bandwidth, Power Efficient Performance For Mobile & Beyond


Looking back over recent history in the memory landscape, we can clearly see a trend of new applications growing sufficiently large enough to command the creation of new memory technologies tailored to their specific needs. We saw this with the creation of GDDR for graphics and later HBM for AI/ML applications. Low-Power Double Data Rate (LPDDR) emerged as a specialized memory designed for mobi... » read more

Post-Quantum Cryptography: The Algorithms That Will Protect Data In The Quantum Era


There is no doubt that quantum computers will play a significant role in helping the world solve complex challenges not possible on current classical computers. However, quantum computers also pose a serious security threat. They will eventually become powerful enough to break traditional asymmetric cryptographic methods, that is, some of the most common security protocols used to protect sensi... » read more

← Older posts Newer posts →