whitepaper semiwiki ad jitter
WP_Term Object
(
    [term_id] => 3611
    [name] => IoT
    [slug] => iot-internet-of-things
    [term_group] => 0
    [term_taxonomy_id] => 3611
    [taxonomy] => category
    [description] => Internet of Things
    [parent] => 0
    [count] => 552
    [filter] => raw
    [cat_ID] => 3611
    [category_count] => 552
    [category_description] => Internet of Things
    [cat_name] => IoT
    [category_nicename] => iot-internet-of-things
    [category_parent] => 0
    [is_post] => 
)

The IoTrojan Horse – an army of toasters

The IoTrojan Horse – an army of toasters
by Bill Montgomery on 10-30-2016 at 4:00 pm

Most everybody is familiar with the term Trojan Horse, drawn from Greek mythology. It’s a tale from the Trojan War where, after a fruitless 10-year attempt to capture the city of Troy, the Greeks constructed a huge wooden horse, left it outside the city walls, and then sailed away, seemingly accepting defeat. The Trojans were elated,Read More


Top 5 Things to Know About Recent IoT Attacks

Top 5 Things to Know About Recent IoT Attacks
by Matthew Rosenquist on 10-30-2016 at 12:00 pm

Recent internet attacks resulted in popular sites becoming unreachable, such as Twitter, Etsy, Spotify, AirBnB, Github, and the New York Times. These incidents have brought to light a new threat to online services: Internet of Things (IoT) botnets. Distributed Denial of Service (DDoS) attacks have been commonplace for over… Read More


Can one flow bring four domains together?

Can one flow bring four domains together?
by Don Dingee on 10-28-2016 at 4:00 pm

IoT edge device design means four domains – MEMS, analog, digital, and RF – not only work together, but often live on the same die (or substrate in a 2.5D process) and are optimized for power and size. Getting these domains to work together effective calls for an enhanced flow.

Historically, these domains have not played together … Read More


End-to-End Secure IoT Solutions from ARM

End-to-End Secure IoT Solutions from ARM
by Bernard Murphy on 10-25-2016 at 11:30 am

ARM announced today a comprehensive suite of solutions for IoT support, from IP optimized for applications in this space all the way to cloud-based support to manage edge devices in the field. Their motivation is to provide a faster path to secure IoT, from the chip to the cloud. One especially interesting component of this solution… Read More


FPGAs for a few thousand devices more

FPGAs for a few thousand devices more
by Don Dingee on 10-24-2016 at 4:00 pm

An incredibly pervasive trend at last year’s ARM TechCon was the IoT, and I expect this year to bring even more of the same, but with a twist. Where last year was mostly focused on ultra-low power edge devices and the mbed ecosystem, this year is likely to show a better balance of ideas across all three IoT tiers. I also expect a slew of … Read More


Soitec – Enabling the FDSOI Revolution

Soitec – Enabling the FDSOI Revolution
by Scotten Jones on 10-18-2016 at 12:00 pm

Recently I published two blogs on Fully Depleted Silicon On Insulator (FDSOI) and the potential the technology shows for a variety of low power and wireless applications. In order to produce FDSOI devices, the device layer has to be thin enough to ensure the device is fully depleted and ideally the buried oxide has to be thin enough… Read More


There is more than C to worry about

There is more than C to worry about
by Don Dingee on 10-17-2016 at 4:00 pm

We periodically see that “software ate the world” line – I’m pretty sure I’ve used it a couple times myself. The fact is, software doesn’t run itself; never has, never will. Somewhere there has to be an underlying computer. First it was on beads, then in gears, then in tubes.… Read More


Artificial Intelligence for Cyber Security

Artificial Intelligence for Cyber Security
by Alex G. Lee on 10-17-2016 at 12:00 pm

Since the United States is such a large market for products and services from nearly all technology innovations, a patent counting for growth in patenting over a period of times in the US can be a good measuring tool for monitoring the evolution of technology innovations. Following figure shows the growth trends for the artificial… Read More


5 Best Practices For Developing Secure IoT Solutions

5 Best Practices For Developing Secure IoT Solutions
by Padraig Scully on 10-16-2016 at 7:00 am

Security is often an afterthought when developing IoT solutions. Security features are commonly cut from initial designs to accommodate additional device functionality. However, security needs to play a central role in IoT projects if we are to secure the Internet of Things.

The process of developing secure IoT solutions was… Read More