Finding Meaning in Randomness

New Research Uncovers a Way to Generate High-Quality Random Numbers

by Jim Turley

“Anyone who attempts to generate random numbers by deterministic means is, of course, living in a state of sin.” – John von Neumann

Two days of the week are named after celestial bodies (the sun and moon), another four are named after Norse gods (Tyr, Odin, Thor, and Freida), and one after a Roman god (Saturn). What’s up with that?

Four consecutive months on the calendar have numeric names in Latin (septem, octo, novem, and decem) – but they’re wrong. September is the ninth month, not the seventh, December is twelfth, not tenth, and so on. Two other months are named after emperors (Julius and Augustus), and four others after Roman gods (Janus, Mars, Maia, and Juno). That leaves two, which aren’t named after anything, really.

Who’s in charge here?

 

Xilinx Scales Hyperscale

Announces “Reconfigurable Acceleration Stack”

by Kevin Morris

Today, power rules the data center. When we put together huge clusters of machines to handle the world’s biggest computing loads, the final arbiter of the amount of computing we can do, and the size of the data center we can actually build, is power. It is estimated that data centers consume as much as 2% of the electricity in the US, and the situation is only going to get worse. Today, the biggest companies in the data center build-out are going to extremes to get access to more energy, and to make their data centers more energy efficient.

 

Watching the Side Channel

How Does Synopsys Randomize Power?

by Bryon Moyer

Everybody’s trying to break into your… whatever it is you make. No matter what you make or how secure you try to make it, someone will still try to break it. For profit or for bragging rights.

And if the electronics governing the actual communications to and from your device – the main “channel” – are well protected, good job! But that means someone may look elsewhere for a way to break your secrets, using so-called “side-channels.” These typically consist of power or EMI analysis: patterns in both can lead to clues about keys and such, and they have been successfully employed to crack security.

 

Our 3D Printed Universe

Prototyping and Beyond with FATHOM 3D Printing

by Amelia Dalton

Move over niche applications, 3D printing is headed to prime time! In this week’s Fish Fry, we take a closer look at the evolution of 3D printing and investigate how 3D printed materials are changing the prototyping landscape. Rich Stump from FATHOM joins me to discuss the how 3D printed material allows them to help designers and engineers make the “un-makeable”. We also chat about how enterprise and consumer 3D printing differ, cutting edge 3D printing applications, and what the future holds.

 

Managing the Automotive Automation Transition

Will You Know How Someone Else’s Car Works?

by Bryon Moyer

Are fully automated cars just around the corner? If you listen to breathless media stories, you’d probably believe so. But that may not be the case – not only could full automation be further away, but there may also be a long transition period before we get there – a time when, critically, there may be all kinds of cars on the roads that have different levels of automation.

Last week’s ICCAD conference featured a keynote by Nissan’s Maarten Sierhuis, addressing some of the realities of self-driving cars. His main point was to counter some of the press that suggests that full automation is imminent: it’s far harder than people realize. The discussion was illuminating, but it also raised for me a question: during this extended transition, if you borrow someone else’s car or, say, rent a car, how can you quickly assess what levels of automation are present in the unfamiliar vehicle?

 

Can You Get Sued for Bad Code?

Legal Liability is Still User-Defined in the World of Software

by Jim Turley

You’ve just installed a shiny new multimillion-dollar computer system used to dispatch ambulances in a large, metropolitan city. You and your colleagues have spent years developing the software, which allows first-responders to efficiently locate the nearest ambulance in any part of the city. When an emergency call comes in, your computer immediately pinpoints the nearest ambulance, alerts the dispatcher, and sends help on the way. It’s a triumph.

Except that it doesn’t work. In fact, it’s so bad that experienced dispatchers would rather use a pencil and paper instead of your horribly buggy system. Rather than speeding up response times, ambulances are getting delayed or misdirected. Some aren’t even dispatched at all, long after the emergency call has come in. These unexplainable delays have probably cost lives. And it’s your fault.


Login Required

In order to view this resource, you must log in to our site. Please sign in now.

If you don't already have an acount with us, registering is free and quick. Register now.

Sign In    Register