For over 30 years, DRAM has continuously adapted to the needs of each new wave of hardware spanning PCs, game consoles, mobile phones and cloud servers. Each generation of hardware required DRAM to hit new benchmarks in bandwidth, latency, power or capacity. Looking ahead, the 2020s will be the decade of artificial intelligence/machine learning (AI/ML) touching every industry and application space. For DRAM, AI/ML represents the biggest challenge yet with a list of requirements for “all of the above.”
Artificial Intelligence/Machine Learning (AI/ML) growth proceeds at a lightning pace. In the past eight years, AI training capabilities have jumped by a factor of 300,000 driving rapid improvements in every aspect of computing hardware and software. Meanwhile, AI inference is being deployed across the network edge and in a broad spectrum of IoT devices including in automotive/ADAS. Training and inference have unique feature requirements that can be served by tailored memory solutions. Learn how HBM2E and GDDR6 provide the high performance demanded by the next wave of AI applications.
This IDC Technology Spotlight, sponsored by Rambus, highlights the fifth generation of cellular network technology (5G) is scaling further in 2020, enabling a new wave of AI-powered end points. To remain competitive, manufacturers must implement enhanced security measures on edge and IoT devices designed for the increased performance in speed, latency, and connection density.
The counterfeit market for semiconductors is real, sizable and growing. Industry analysts peg the current market for fake semiconductors at $75B. Counterfeit chips pose great risk to driver comfort and safety, to say nothing of the severe negative consequences they present to automaker revenues and brand. The good news is there are immediate and cost-effective measures available to secure the semiconductor supply chain and stop counterfeiters in their tracks.
The counterfeit market for semiconductors is real, sizable and growing. The Senate Armed Services Committee found over 1,800 cases where counterfeit electronic components were introduced into U.S. military hardware including airplanes, helicopters and missiles. Counterfeit chips pose serious risk to military equipment and the service personnel who depend on that hardware to perform their mission.
When Jann Horn of Google’s Project Zero posted a detailed blog titled “Reading privileged memory with a side-channel,” it set off a firestorm of activity as the post confirmed that secret information inside a computer could be accessed via two different attacks, Meltdown and Spectre. Essentially, both attacks utilize CPU data cache timing to efficiently exploit and leak information from the system. This could lead to – at worst – arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.