Home > Search
Found 3616 Results
Watch this webinar to learn about the components that move, accelerate, and store the data that enable the applications of the future including artificial intelligence (AI), Internet of Things (IoT) and 5G.
A white hat researcher by the name of Triszka Balázs recently identified a security vulnerability that reportedly “affect[ed] every single” Tegra-based device released so far – except for the Nintendo Switch. As Balázs points out, the Switch utilizes its own custom bootloader. “After checking the magic in the header, the nvtboot reads the entire TBC […]
Interface IP Powering accelerated computing with high-performance interface IP Contact Us High-speed interconnects between chips, and between processors and memory, move enormous volumes of data and are key to meeting target performance of advanced computing architectures. Rambus provides state-of-the-art interconnect and memory interface IP consisting of digital controller IP, for PCIe®, CXL®, HBM, GDDR and […]
Artificial Intelligence & Machine Learning OverviewApplicationsProductsResources The meteoric growth in capabilities of AI/ML is perfectly illustrated by new generative AI applications like ChatGPT. Key to unleashing the power of processors and accelerators for AI/ML is greater memory bandwidth and capacity, and faster, safer interconnects between devices. Delivering Performance and Security for AI/ML Our state-of-the-art chip […]
Written by Steven Woo Introduction According to the National Highway Traffic Safety Administration (NHTSA), various driver assistance technologies are already helping to save lives and prevent injuries. Specific examples include helping drivers avoid making unsafe lane changes, warning of other vehicles when backing up, or automatically braking when a vehicle ahead stops or slows abruptly. […]
Starting later this month, Rambus will host a series of lunch & learns around the globe entitled “Securing Electronic Systems at their Foundation.” These technical sessions are designed for engineering, product, and program management staff at both defense and commercial OEMs. Interactive in nature, they will address specific security issues facing attendees. Topics that attendees […]
The term ‘neuromorphic computing’ can be traced back to the 1980s when Caltech researcher Carver Mead first proposed the concept of designing integrated circuits (ICs) to mimic the organization of living neuron cells. As the National Institute of Standards (NIST) states, neuromorphic computing promises to dramatically improve the efficiency of computational tasks such as perception […]
With a hardware root of trust, security protocols and applications can be run within a secure perimeter of an SoC, keeping keys and security assets protected from unauthorized access. This session will discuss how a secure co-processor with multiple roots of trust allow different entities or applications to have their own “virtual” security core in […]
When Jann Horn of Google’s Project Zero posted a detailed blog titled “Reading privileged memory with a side-channel,” it set off a firestorm of activity as the post confirmed that secret information inside a computer could be accessed via two different attacks, Meltdown and Spectre. Essentially, both attacks utilize CPU data cache timing to efficiently […]
In simple terms, a root of trust is the security foundation for a system-on-a-chip (SoC) or electronic system. Any functionality that needs to be secure relies in whole or in part on that root of trust. However, the term “root of trust” means different things to different people. In some cases, a root of trust […]
