Home > Search
Found 3514 Results
5G is more memory hungry compared to previous generations, according to Gary Hilson, memory editor at EE Times. In his recent article, he pulled together an industry consensus about the types of memory that might be considered to comply with 5G demands, the pros and the cons. Hilson writes that it makes sense when you […]
Helena Handschuh wrote a recent article in EE Times stating that “with the proliferation of intelligent devices, the industry needs new robust security approaches instead of trying to fix the cracks in existing designs.” Handschuh is chair of the RISC-V Foundation’s security standing committee and a Fellow at Rambus. Titled “RISC-V, DARPA Advance Security,” the […]
Ben Levine, Senior Director of Security Product Marketing at Rambus, recently spoke with Semiconductor Engineering editor-in-chief Ed Sperling about the various security challenges associated with creating complex silicon. According to Levine, there are two primary issues associated with CPUs, SoCs and embedded systems becoming increasingly complex. “Firstly, there are more things (components) that can be […]
EE Times reports that Graphcore of Bristol, UK has put on the market a new type of processor for AI acceleration. It’s called the intelligence processing unit (IPU). According to CEO Nigel Toon, the IPU processor, is the most complex processor chip that’s ever been built. It’s described as “just shy of 24 billion transistors on a […]
File encryption, file system encryption and full disk encryption (FDE) are methods offered by the industry to allow users to protect their data stored on non-volatile storage devices, such as Solid State Disks (SSD). The main feature of FDE is to protect stored system and user date from unauthorized reading, writing, alteration, moving or rolling back. However, extended security […]
Ben Levine, Sr. Director, Product Marketing, Cryptography Products Division, recently penned an article in Embedded Computing Design Magazine letting SoC and system designers know that “isolation among applications in some security processors is dicey at best. It’s best to take the right security processor route with multiple roots of trust and complete application isolation” He […]
The glaring headline in a ComputerWeekly.com post is that “Nearly a quarter of tech firms do not security check their products.” The paper’s security editor, Warwick Ashford, wrote that nearly a quarter of organizations polled do not run security checks on products, and nearly a third admitted to shipping products with known security vulnerabilities. Ashford’s […]
Hacking a Tesla The past few weeks have been a busy time for white hat hackers demonstrating cyber-security vulnerabilities in connected vehicles. Firstly, Keen Labs researchers published a report that details how to hack a Tesla Model S by remotely controlling the steering wheel with a gamepad. “When the car is parked, we can take […]
First quarter revenue and billings in line with expectations; GAAP revenue of $48.4 million, with royalty revenue of $24.8 million and licensing billings of $75.4 million $28.8 million in cash provided by operating activities DDR4 server DIMM chipset revenue up nearly 40% year-over-year, fueled by continued market share growth Record revenue for IP Cores business; […]
Ben Levine, Senior Director of Product Marketing at Rambus, recently sat down with Sanjay Gangal of EDA Café to discuss IoT security and cryptography. According to Levine, security should be embedded in every chip. More specifically, says Levine, a separate hardware-based security core can help protect both the SoC itself and the system it powers. […]