It’s Alive! The Miraculous Resurrection of Artificial Intelligence

CATEGORIES : All, System Architecture/AUTHOR : Ron Wilson

In late January the computing world passed—mostly without notice—two remarkable milestones. One marked the end of a beginning: Marvin Minsky, a pioneer and guiding light of artificial intelligence (AI) died. The other standing stone marked a beginning, perhaps of a new era. Only days after Minsky’s death, an article in the magazine Nature reported that […]

System Security: A Model from Medieval History

CATEGORIES : All, Embedded system, System Security/AUTHOR : Ron Wilson

As one security expert has said, system security is not a thing, it is a process. In our increasingly connected—and increasingly hostile—environment, security has become a continuous case of new attacks leading to new countermeasures, followed by more innovative new attacks, and so on. Just as the Cold War arms race sapped the resources of […]

Hardware Acceleration for Embedded Computing

CATEGORIES : All, System Architecture/AUTHOR : Ron Wilson

The Hot Chips conference for 2015 has come and gone, leaving us with a snapshot of some of the best contemporary thinking on silicon architectures. And while the scope of this year’s conference was wide—from wearables to supercomputers—a handful of papers, taken together, sketched out a strategy for the near future of embedded computing. Why […]

That Robot is Eating My Hardware Budget!

CATEGORIES : All, System Architecture/AUTHOR : Ron Wilson

With quiet efficiency the robots are taking over—and it is already too late to stop them. No, this isn’t another scary story about the robot apocalypse. It is about a threat to the hardware budget and the schedule on your next design. And though you can’t impede technology shifts, you can anticipate their impacts. The […]

Secure Embedded Systems: Digging for the Roots of Trust

CATEGORIES : All, System Architecture, System Security/AUTHOR : Ron Wilson

Many embedded designs absolutely have to work right. A malfunction could do unacceptable harm to persons or property. Until recently, this requirement has been addressed through careful design and hardware reliability: if the software and the logic are right and there are no hardware failures, the system will work. But today we live in the […]