中文 English

Security Risks Grow With 5G


5G mobile phones can download a movie in seconds rather than minutes, but whether that can be done securely remains to be seen. What is clear from technology providers, though, is they are taking security very seriously with this new wireless technology. More data is in motion, and the value of that data is growing as users rely on mobile devices for everything from banking to automotive saf... » read more

Smart Home Device Communication In The Era Of Hyperconnectivity


In our increasingly hyperconnected world, a fascinating area to watch is what I would call "the last 100 feet, give or take." There are many standards like Wi-Fi, Bluetooth, Zigbee, or Thread used for IoT device connectivity. There are very active discussions about how our smart devices should be allowed to talk to other resources, like our neighbor's Wi-Fi. In the IoT's municipal and industria... » read more

Security Provisioning Moves Out Of The Factory


Security credentials traditionally have been provisioned during chip manufacturing, often as a final part of the testing process. That's starting to change. Logistics management can be improved by pushing that process out — even as far as the on-boarding process. And simpler on-boarding can hide most of the details from the user. “The IT approach to provisioning IoT devices has primar... » read more

Huawei: 5G Is About Capacity, Not Speed


Paul Scanlan, CTO of the Huawei Carrier Business Group in Huawei Technologies, sat down with Semiconductor Engineering to talk about 5G, which use cases are attractive and why, and how that compares with previous wireless technologies. SE: Where are you seeing 5G, and how do you see this rolling out both for sub-6GHz and millimeter wave? Scanlan: 5G is a platform for transformation. The f... » read more

Week In Review: Auto, Security, Pervasive Computing


AI/Edge The United States Department of Defense (DOD) has adopted ethical principles for using artificial intelligence in warfare that chiefly say the U.S. has to follow the laws, treaties, in use of AI in warfare. Any AI used by DOD has to be responsible, equitable, traceable, reliable and governable. “The Department will design and engineer AI capabilities to fulfill their intended functio... » read more

Week in Review: IoT, Security, Auto


Internet of Things Wing received an Air Carrier Certification from the Federal Aviation Administration to begin making commercial deliveries with drones. The Alphabet unit is cleared to deliver packages in southwestern Virginia. Wing has had a pilot program going in the vicinity of Canberra, Australia, and was recently permitted to make commercial deliveries with unmanned aerial vehicles in th... » read more

Kumu Networks: Full Duplex on One Channel


Kumu Networks is in an enviable position fitting today’s requirements for radio-frequency system designs. The Sunnyvale, Calif., startup, incorporated in 2011 and coming together the following year, has developed self-interference cancellation technology, enabling radios to send and receive signals at the same time on the same channel or on an adjacent channel. This full-duplex technology has... » read more

IoT Wireless Battles Ahead


"The good thing about standards is that there are so many to choose from." – Andrew S. Tanebaum The extended version of that quote adds "furthermore, if you do not like any of them, you can just wait for next year's model." That could not be truer when it comes to IoT and wireless connectivity. Every standards group is rushing to create new versions of existing standards that use less p... » read more

Challenges At The Edge


By Kevin Fogarty and Ed Sperling Edge computing is inching toward the mainstream as the tech industry begins grappling with the fact that far too much data will be generated by sensors to send everything back to the cloud for processing. The initial idea behind the IoT/IIoT, as well as other connected devices, was that simple sensors would relay raw data to the cloud for processing throug... » read more

The Week in Review: IoT


Cybersecurity The U.S. and U.K. governments collaborated on an unprecedented message on Monday, together warning that Russian cyberattacks may extend beyond government and private organizations to individual homes and offices. The attacks may focus on Internet of Things devices, said Rob Joyce, the cybersecurity coordinator for the National Security Council, who soon after resigned from the Wh... » read more

← Older posts