If you are a hardware design engineer, you are doubtless familiar with the concept of formal verification as it applies to hardware design, but have you ever considered how formal verification might relate to software and the developers thereof (bless their little cotton socks)?
Life can be a rum old thing, and no mistake. When it comes to formal verification, … Read More → "If You Can’t Trust TrustInSoft, Who Can You Trust?"
I don’t wish to appear greedy, and I certainly don’t wish to boast (I pride myself on my humility), but I do flatter myself that I know more than my fair share of Bobs (that is, people called Bob, not the hair style of the same moniker). I could start naming names, but (a) they would all be called Bob and (b) we would … Read More → "The A, B, C of USB for Beginners"
One of my favorite science fiction authors is/was Isaac Asimov (should we use the past tense since he is no longer with us, or the present tense because we still enjoy his writings?). In many ways Asimov was a futurist, but — like all who attempt to foretell what is to come — he occasionally managed to miss the mark.
Take … Read More → "Creating Tiny AI/ML-Equipped Systems to Run at the Extreme Edge"
I’m a digital logic designer by trade. In an ever-changing and increasingly unreliable world, I find the certainty of Boolean equations to be extremely reassuring. You know where you are with a Karnaugh map, you can trust a De Morgan transformation, and you can gratify your desire for single-bit transitions with a Gray code. By comparison, I find the wibbly-wobbly nature of analog electronics to … Read More → "Aspinity’s Awesome Analog Artificial Neural Networks (AANNs)"
Perhaps not surprisingly in the light of all the cyber-attacks and data breaches we’ve been seeing recently, the topics of cyber-security, cyber-resiliency, and securing one’s supply chains are at the forefront of our minds.
Several of my own columns have touched these topics in recent months, such as Read More → "High Entropy is the Foundation for High Security"
When most people hear the term “counterfeiting,” their knee-jerk reaction is to think of currency, the counterfeiting of which is as old as the concept of money itself. Around 400 BC, for example, metal coins in Greece were often counterfeited by covering a cheap-and-cheerful material with a thin layer of a more precious metal.
Or take the original American colonies. Throughout northeastern America, Native Americans would employ shell … Read More → "ID for the IoT? We Need the IDoT!"