Future Shock – IoT benefits beyond traffic and lighting energy optimization

Future Shock – IoT benefits beyond traffic and lighting energy optimization
by Bill Montgomery on 12-22-2015 at 12:00 pm

The year is 2029, approximately 35 years after the Internet went mainstream and today the world, its people and things are connected in ways that the Internet’s pioneers could never have imagined. The Internet of Things (IoT) or as Cisco put it, The Internet Of Everything (IoE) is now a reality, enhancing our lives in myriad ways.Read More


Mentor takes IoT devices to cloud and back

Mentor takes IoT devices to cloud and back
by Don Dingee on 11-27-2015 at 12:00 pm

Walking into the Mentor Graphics booth at ARM TechCon, I was greeted by my friends Warren Kurisu and Shay Benchorin. It was good to see them both again. They were poised in front of a table with a Samsung tablet and a small Wi-Fi-ish box, next to a large Samsung printer. The demonstration was similar to a lobby check-in process, where… Read More


The Internet of Challenges Bumps Along

The Internet of Challenges Bumps Along
by Bernard Murphy on 11-18-2015 at 12:00 pm

More from ARM TechCon. Great show as always, high-energy and a reminder that systems and solutions are where it’s at. There was a very big focus on Internet of Things in all its many guises, from devices to detect whether a garbage container is full, to a child’s necklace to store immunization and other health data, to new ways to push… Read More


The Reason ARM Will Win IoT!

The Reason ARM Will Win IoT!
by Daniel Nenni on 11-15-2015 at 7:00 am

After spending the week in Silicon Valley at ARM TechCon and related meetings, there was one common thread amongst the presentations and conversations and that was security. No matter what the topic was, mobile, consumer or industrial IoT, wearables, automotive, etc… security always came up. The question I had was how will companies… Read More


A moment of IoT silence before we disrupt

A moment of IoT silence before we disrupt
by Don Dingee on 11-08-2015 at 12:00 pm

As I sat down in the SEMI Arizona Chapter breakfast meeting a few weeks ago, a moment of semiconductor history flew right before my eyes before the IoT sessions started.

We were seated in the cafeteria of Freescale Building 94 on Elliot Road in Tempe, a place I’d been many times before, except this time may have been the last. NXP is consolidating… Read More


Why Sidense OTP is Like the Armored Car of NVM

Why Sidense OTP is Like the Armored Car of NVM
by Tom Simon on 09-23-2015 at 4:00 pm

I have written about Sidense before, but last week at the TSMC Open Innovation Platform Forum, I had a chance to hear a talk by, and have lunch with Betina Hold Director of R&D at Sidense. Here is what I learned.

Sidense has been focusing on the growing market in what they like to call the smart connected universe. It is best to think… Read More


Threat Detection: How To Keep the Crown Jewels Secure

Threat Detection: How To Keep the Crown Jewels Secure
by Paul McLellan on 09-02-2015 at 7:00 am

Let’s just take it as a given that securing IP design data is critical. It’s rather like saying that it’s a good idea to have security in the Tower of London to stop the crown jewels being stolen. IP blocks are the crown jewels of an SoC company.

Data now must be secured within the collaborative teams that share that… Read More


Last line of defense for IoT security

Last line of defense for IoT security
by Don Dingee on 08-27-2015 at 12:00 pm

If I grab 10 technologists and ask what are the most important issues surrounding the Internet of Things today, one of the popular answers will be “security.” If I then ask them what IoT security means, I probably get 10 different answers. Encryption. Transport protocols. Authentication. Keying. Firewalls. Secure boot. Over-the-air… Read More


A Security Idea for EDA / Embedded Design

A Security Idea for EDA / Embedded Design
by Bernard Murphy on 08-25-2015 at 4:00 pm

I’m on a mission to find novel ideas for EDA / embedded design tools. One I have been discussing on and off with a DARPA friend for at least a couple of years is how to grade the security of a hardware design or, more comprehensively, the security of an embedded system including hardware and the software running on the hardware.

This feels… Read More


My Candid Conversation with Karen Bartleson

My Candid Conversation with Karen Bartleson
by Pawan Fangaria on 08-16-2015 at 7:30 am

If you don’t know about Karen Bartleson, before I get into details, let me tell you that she was the President of IEEE-SA for the past 2 years and has been nominated by the IEEE Board of Directors as one of the candidates for IEEE President-Elect for 2016. The IEEE is an organization I admire as it plays a key role in advancing technology… Read More