The high-performance computing (HPC) memory wall generally refers to the growing disparity between processor speed and memory bandwidth. When processor performance outpaces memory access speeds, this creates a bottleneck in overall system performance, particularly in memory-intensive applications like artificial intelligence (AI). This article begins by exploring the conventional definition of the memory wall and then […]
What is the maths of positive feedback and how it is used in electronic systems?
Positive feedback is primarily used to rapidly amplify a desired change or signal, often in situations where a large response is needed, like triggering a process to reach a specific threshold quickly. It must be carefully managed due to its potential for instability and runaway effects. It’s used in digital electronics to force voltages away […]
What’s the relationship between Ohm’s Law and quantum mechanics?
Ohm’s Law is the classical physics explanation of the linear relationship between voltage, current, and resistance in a conductor. Quantum mechanics provides insights into the mechanisms behind this behavior, explaining why Ohm’s Law still holds true even on very small scales where quantum effects are significant. Ohm’s law is a macroscopic view of classical physical […]
What does a watchdog timer watch?
Watchdog timers (WDTs) watch MCU operations to ensure reliability, especially in embedded systems, robotics, medical devices, electric grid monitoring, deep space missions, and other critical applications. They are used to detect and correct MCU and software glitches without human intervention. The WDT monitors system operation by listening to signals from the MCU. The system software […]
What is the Coherent Hub Interface?
The Coherent Hub Interface (CHI) is used in system-on-chip (SoC) designs to track which processor has the most recent copy of a data block, preventing other processors from using old data. CHI is used in a wide range of applications requiring high-performance cache coherence, such as mobile devices, networking equipment, automotive systems, and data centers. […]
How to avoid common electronics hardware engineering errors
There are many ways to arrive at a less-than-optimal electronics hardware solution. This article is an overview, not a comprehensive compilation of possible hardware engineering errors and how to avoid them. Common errors include incorrect component selection, poor circuit design practices, such as grounding or signal integrity issues, improper power supply specifications, neglecting thermal management, […]
What determines the size of the dataset needed to train an AI?
Large data sets are needed to train artificial intelligence (AI) algorithms. Large data sets can be expensive. So, how much data is enough? The complexity of the problem, the model complexity, the quality of the data, and the required level of accuracy primarily determine that. Data augmentation techniques can be used to increase the size […]
How does a zero trust security architecture work?
Zero trust architectures (ZTAs) are a reaction to the emergence of cloud computing, remote work, and bringing your own device (BYOD) into enterprise networks. Those trends result in networks not completely contained within an enterprise-owned boundary, significantly complicating network security needs. This article briefly reviews the purpose and structure of ZTAs, looks at some relevant […]
What can be done to prepare for post quantum cryptography?
Post-quantum cryptography (PQC), also called quantum-safe cryptography, uses mathematical algorithms to create security environments resistant to quantum computer attacks. PQC is a rapidly evolving technology, and preparing for its adoption requires keeping up with developments in several areas. As part of the formalization of PQC algorithms, NIST has finalized the algorithms and changed their names […]
What’s new in the NIST CSF 2.0 framework?
The NIST Cybersecurity Framework (CSF) 2.0 is the first major update since its creation in 2014. It was finalized in early 2024. This article reviews some of the important changes in CSF 2.0 compared with v1.1, briefly examines how v2.0 improves alignment with other cybersecurity standards and frameworks and compares CSF 2.0 with the ISO […]