Data Center Ethernet: Is a Bigger Pipe Enough?

CATEGORIES : All, Data Center/AUTHOR : Ron Wilson

In the enormous pressures and temperatures far beneath the Earth’s surface, minerals take on forms impossible to replicate in our familiar environment. Hence carbon may become diamond, or graphite. Similarly, in the intense, dynamic environment of the data center, familiar Ethernet is taking on configurations unimaginable to its inventors at Xerox PARC. As with carbon, […]

Is Tomorrow’s Embedded-Systems Programming Language Still C?

CATEGORIES : All, Embedded system, IoT/AUTHOR : Ron Wilson

What is the best language in which to code your next project? If you are an embedded-system designer, that question has always been a bit silly. You will use, C—or if you are trying to impress management, C disguised as C++. Perhaps a few critical code fragments will be written in assembly language. But according […]

It’s Alive! The Miraculous Resurrection of Artificial Intelligence

CATEGORIES : All, System Architecture/AUTHOR : Ron Wilson

In late January the computing world passed—mostly without notice—two remarkable milestones. One marked the end of a beginning: Marvin Minsky, a pioneer and guiding light of artificial intelligence (AI) died. The other standing stone marked a beginning, perhaps of a new era. Only days after Minsky’s death, an article in the magazine Nature reported that […]

From Here to 5G: A Roadmap of Challenges

CATEGORIES : All, IoT, Wireless/AUTHOR : Ron Wilson

Deploy 5G wireless networks by 2020! From research labs to service providers, these words have come to define a shared goal, almost a mantra. As a goal, the words justify all manner of R&D activities. But as a mantra, they betray a fundamental lack of definition. Just what is 5G? And what problems must we […]

System Security: A Model from Medieval History

CATEGORIES : All, Embedded system, System Security/AUTHOR : Ron Wilson

As one security expert has said, system security is not a thing, it is a process. In our increasingly connected—and increasingly hostile—environment, security has become a continuous case of new attacks leading to new countermeasures, followed by more innovative new attacks, and so on. Just as the Cold War arms race sapped the resources of […]