For IT administrators it has never been so complex yet interesting. Until about 6-8 years ago, mobility in workforce meant supporting company equipment such as corporate designated laptops and Blackberry phones. And it worked – IT organizations and employees realized the power of mobility and how having corporate mobile… Read More



Demystifying Cisco’s Five Pillar Innovation Strategy
Large companies that are the leaders in their industry generally have a hard time maintaining the entrepreneurial spirit that got them to their leading position in the first place. On one hand you have relatively “new” companies like Facebook who keep growing and on the other, you have companies like Yahoo who are struggling in … Read More
Why IoT Security is a Market for Lemons
Concerns around the security of connected devices are continuing to rise. This is illustrated by July’s issue of The Economist where there are two articles on this theme outlining the perils of connected devices in the home, and more generally amongst the Internet of Things.
In “Home, Hacked Home: The perils of connected… Read More
Steve Furber has found his million ARM cores
Some people say that everything in our lives happens for a reason. As we wrote Part I of “Mobile Unleashed”, the origin story of ARM architecture and its main progenitors Steve Furber and Sophie Wilson, we found what seemed like an obvious technological breakthrough was far from an overnight success – and it led to fascinating twists… Read More
In Low Voltage Timing, the Center Cannot Hold
When I started discussing this topic with Isadore Katz, I was struggling to find a simple way to explain what he was telling me – that delay and variance calculations in STA tools are wrong at low voltage because the average (the center) of a timing distribution shifts from where you think it is going to be. He told me that I’m not alone… Read More
Your Car Will Never be Secure
The automotive cybersecurity forum put on by the National Highway Traffic Safety Administration (NHTSA) yesterday in Washington, DC, surfaced a wide range of issues and conflicts at the heart of the connected car industry. One clear takeaway from the event was that cars will never be secure.
… Read More
Star Wars, the Force and the Power of Parallel Multicore Processing
During the 80’s, the original Star Wars movies featured amazing future technology and were all about “the power of the Force.” The latest movie has now broken all box office records and got me thinking about how much IT and computing technology has progressed over the years but yet, there is still so much left untapped.
Yes, several… Read More
The Smartphone is Dead! Long Live the Smartphone!
According to a study released on the eve of CES by Accenture “heightened data security concerns, falling demand for smartphones and tablet PCs, and stagnant growth in the Internet of Things (IoT) market” are combining to stymie consumer electronics industry growth. While slow uptake of new products is normal, data security concerns… Read More
Honda Driver-aware Connected Car Insights from Patents
Honda patent applications US20130245886, US20140276112, US20140309881, US20140303899, US20140371984, US20150126818, US20160001781 and patent US8698639 describe systems implementing state monitoring of a driver for automatically adjusting the operation of a vehicle in response to the driver state (e.g., driver’s… Read More
The Best Analyst Presentation at SEMI ISS 2016!
The problem I have with semiconductor analysts and media today is that they rarely have depth in what they are talking about. Some because they have never actually worked in the industry and others because they have not worked in the industry since the 1970s. One famed analyst even repeated the mythical “Fabs cost $10B” generalization… Read More
A Quick Tour Through Prompt Engineering as it Might Apply to Debug