editor's blog archive
Subscribe Now

AMD and Other Peoples’ Technology

Today is all about acronyms: AMD, ARM, ATI, GloFo, and OPT. Haven’t heard of that last one? I just coined it, as “other peoples’ technology.” As in, AMD’s upcoming server chips won’t have a lot of AMD’s technology in them.

AMD announced today that it was becoming a full-fledged ARM licensee, with plans to make 64-bit ARM-based server chips by 2014. AMD isn’t giving up on x86; the company will offer both ARM- and x86-based server chips and let the customer decide which is better. Both flavors will include the on-chip network … Read More → "AMD and Other Peoples’ Technology"

Hardware Security in the Cloud

Some time back, we covered “physically unclonable functions,” or PUFs. These are techniques for deriving a key from the random characteristics of a specific piece of hardware, making it unique to that hardware and therefore unclonable by others. One of the companies covered was Intrinsic ID.

Intrinsic ID has now taken a step to make what is otherwise a low-level wonky technology available at the consumer and corporate level. They have created a cloud portal where data can be stored securely, … Read More → "Hardware Security in the Cloud"

featured blogs
Jul 10, 2020
[From the last episode: We looked at the convolution that defines the CNNs that are so popular for machine vision applications.] This week we'€™re going to do some more math, although, in this case, it won'€™t be as obscure and bizarre as convolution '€“ and yet we will...
Jul 10, 2020
I need a problem that lends itself to being solved using a genetic algorithm; also, one whose evolving results can be displayed on my 12 x 12 ping pong ball array....
Jul 9, 2020
It happens all the time. We'€™re online with a designer and we'€™re looking at a connector in our picture search. He says '€œI need a connector that looks just like this one, but '€¦'€ and then he goes on to explain something he needs that'€™s unique to his desig...