Home > Search
Found 3514 Results
Artificial Intelligence & Machine Learning OverviewApplicationsProductsResources The meteoric growth in capabilities of AI/ML is perfectly illustrated by new generative AI applications like ChatGPT. Key to unleashing the power of processors and accelerators for AI/ML is greater memory bandwidth and capacity, and faster, safer interconnects between devices. Delivering Performance and Security for AI/ML Our state-of-the-art chip […]
Written by Steven Woo Introduction According to the National Highway Traffic Safety Administration (NHTSA), various driver assistance technologies are already helping to save lives and prevent injuries. Specific examples include helping drivers avoid making unsafe lane changes, warning of other vehicles when backing up, or automatically braking when a vehicle ahead stops or slows abruptly. […]
Starting later this month, Rambus will host a series of lunch & learns around the globe entitled “Securing Electronic Systems at their Foundation.” These technical sessions are designed for engineering, product, and program management staff at both defense and commercial OEMs. Interactive in nature, they will address specific security issues facing attendees. Topics that attendees […]
The term ‘neuromorphic computing’ can be traced back to the 1980s when Caltech researcher Carver Mead first proposed the concept of designing integrated circuits (ICs) to mimic the organization of living neuron cells. As the National Institute of Standards (NIST) states, neuromorphic computing promises to dramatically improve the efficiency of computational tasks such as perception […]
With a hardware root of trust, security protocols and applications can be run within a secure perimeter of an SoC, keeping keys and security assets protected from unauthorized access. This session will discuss how a secure co-processor with multiple roots of trust allow different entities or applications to have their own “virtual” security core in […]
When Jann Horn of Google’s Project Zero posted a detailed blog titled “Reading privileged memory with a side-channel,” it set off a firestorm of activity as the post confirmed that secret information inside a computer could be accessed via two different attacks, Meltdown and Spectre. Essentially, both attacks utilize CPU data cache timing to efficiently […]
In simple terms, a root of trust is the security foundation for a system-on-a-chip (SoC) or electronic system. Any functionality that needs to be secure relies in whole or in part on that root of trust. However, the term “root of trust” means different things to different people. In some cases, a root of trust […]
Root of Trust Security IP Lunch & Learns Securing Electronic Systems at Their Foundation Register Contact Us The security threats to electronic systems grow with each passing day. Headline-generating exploits like Spectre, Meltdown and Foreshadow will inevitably be followed by other vulnerabilities that put systems and data at risk. Attackers grow ever more sophisticated and […]
Highlights: Offers tailored configurations addressing the security needs of Internet of things (IoT), artificial intelligence (AI), machine learning (ML), cloud, government, military and automotive applications Employs fully programmable hardware-level security co-processor with the ability to adapt to a dynamic threat environment Purpose-built, complete security solution offers ease of integration into SoC designs Features FIPS 140-2 […]
This webinar will explore some of the threats facing SoC and processor designers and how can SoCs be architected for both performance and security.