webinar banner2025 (1)

AI vs AI

AI vs AI
by Bernard Murphy on 12-30-2016 at 7:00 am

You might think that one special advantage of AI systems is that they should be immune to attacks. After all, their methods are so complex and/or opaque that even we can’t understand how they work, so what hope would a hacker have in challenging these systems? But you would be mistaken. There’s nothing hackers like better than a challenge.… Read More


IBM Demonstrates Blockchain Progress and Clients

IBM Demonstrates Blockchain Progress and Clients
by Alan Radding on 12-29-2016 at 4:00 pm

IBM must have laid off its lawyers or something since never before has the company seemed so ready to reveal clients by name and the projects they’re engaged in. That has been going on for months and recently it has accelerated. Credit IBM’s eagerness to get blockchain established fast and show progress with the open community HyperLedger… Read More


NetSpeed Bridges the Gap Between Architecture and Implementation

NetSpeed Bridges the Gap Between Architecture and Implementation
by Mitch Heins on 12-29-2016 at 11:30 am

This is part II of an article covering NetSpeed’s network-on-chip (NoC) offerings. This article dives a little deeper into what a NoC is and how NetSpeed’s network synthesis tool, NocStudio, helps system architects optimize a NoC for their system-on-a-chip (SoC) design.

Traditionally IC designers have used proprietary buses,… Read More


They Kill Pedestrians, Don’t They?

They Kill Pedestrians, Don’t They?
by Roger C. Lanctot on 12-28-2016 at 4:00 pm

I came upon the scene of a crash investigation yesterday afternoon in my hometown of Herndon, Va. A mother and two children were hit by a 20-year-old motorist making a right turn at an intersection. I did not see the crash, but I strongly suspect the motorist was looking left to anticipate oncoming traffic and never noticed the pedestrians… Read More


Solving a Murder Case with IoT Devices

Solving a Murder Case with IoT Devices
by Daniel Payne on 12-28-2016 at 12:00 pm

I watch a lot of Netflix and there are so many detective movies and series for me to enjoy where I try and match wits with the bad guys and figure out who is guilty a few seconds before the law enforcement characters do. On TV and with our movies there is often critical evidence extracted from desktop computers, laptops, hard drives, smart… Read More


3 Tips for Securing Home Cameras

3 Tips for Securing Home Cameras
by Matthew Rosenquist on 12-28-2016 at 7:00 am

Installing a home surveillance camera system can add great benefits but also may introduce new risks to privacy and network security. The goal is to increase the security and peace of mind, while avoiding cybersecurity threats. Here are three tips to consider when purchasing, installing, and configuring your new home camera … Read More


The 2017 Leading Edge Semiconductor Landscape

The 2017 Leading Edge Semiconductor Landscape
by Scotten Jones on 12-27-2016 at 6:00 pm

In early September of 2016 I published an article “The 2016 Leading Edge Semiconductor Landscape” that proved to be very popular with many views, comments and reposting’s. Since I wrote that article a lot of new data has become available enabling some projections to be replaced by actual values and new analysis… Read More


Intel Spreadtrum ARM SoCs

Intel Spreadtrum ARM SoCs
by Daniel Nenni on 12-27-2016 at 12:00 pm

In June of 2013 Edward Snowden copied and leaked classified information from the National Security Agency (NSA). His actions exposed numerous surveillance programs that many governments around the world reacted to, including China. In September of 2013 China Vice Premier Ma Kai declared semiconductors a key sector for the … Read More


The Other Half of AI

The Other Half of AI
by Bernard Murphy on 12-27-2016 at 7:00 am

I touched earlier on challenges that can appear in AI systems which operate as black-boxes, particularly in deep learning systems. Problems are limited when applied to simple recognition tasks, e.g. recognizing a speed limit posted on a sign. In these cases, the recognition task is (from a human viewpoint) simply choosing from… Read More