Embedded Computing Needs Hardware-Based Security

CATEGORIES : Embedded system/AUTHOR : Ron Wilson

Embedded systems are in a profound transition: from physically isolated, autonomous devices to Internet-connected, accessible devices. Designers are learning—often to their dismay—that the mutation requires far more than just gluing a network interface onto the bus and adding an Internet Protocol stack. In many ways, these Internet-aware designs are coming to look less like traditional […]

Embedded Computing on the Edge

CATEGORIES : Embedded system, IoT/AUTHOR : Ron Wilson

Embedded computing has passed—more or less unscathed—through many technology shifts and marketing fashions. But the most recent—the rise of edge computing—could mean important new possibilities and challenges. So what is edge computing (Figure 1)? The cynic might say it is just a grab for market share by giant cloud companies that have in the past struggled […]

Understanding Neuromorphic Computing

CATEGORIES : AI/AUTHOR : Ron Wilson

The phrase neuromorphic computing has a long history, dating back at least to the 1980s, when legendary Caltech researcher Carver Mead proposed designing ICs to mimic the organization of living neuron cells. But recently the term has taken on a much more specific meaning, to denote a branch of neural network research that has diverged […]

Opening Windows into SoC Hardware

CATEGORIES : SoC, System Management/AUTHOR : Ron Wilson

There is a long tradition in system design for embedding special hardware to observe and manipulate the state of the system. From the beginning of digital computing, central processors have had hardware to support single-step, loading and examination of registers and memory, and setting of breakpoints for software debugging. Much later chronologically but early in […]

Test-Driven Hardware Development: True or False?

CATEGORIES : All/AUTHOR : Ron Wilson

Few generalizations about hardware design are more widely accepted than this: it is better to find errors early. And yet the traditional design-then-verify flow gives errors ample time to embed themselves in the design before even starting to look for them. It need not be so. A technique borrowed from the software world—Test-Driven Development (TDD)—seeks […]