Bluetooth connectivity continues to gain traction for IoT applications because of its unique features, such as Bluetooth Low Energy (BLE), effectiveness in short-range communications, and lower cost deployment. This multipart FAQ series will cover several manufacturers, including Silicon Labs and Infineon Technologies, characterized by ARM Cortex processors. Silicon Labs: EFR32BG26 Series 2 Bluetooth SoC The […]
FAQ
Teardown: AMD Radeon HD 7970 graphics card
Identifying the components reveals clues as to how a graphics card works, assuming you can read the identifying marks and find documentation. Wandering through an electronics swapfest, I found someone selling a graphics card and wondered what was inside. I bought it for $20, opened the case, and looked up the architecture and components. Released […]
What are the different MLPerf benchmarks from MLCommons?
Formulated and managed by MLCommons, MLPerf benchmarks measure key operational parameters of artificial intelligence (AI) accelerators across multiple industries. These standardized metrics help semiconductor companies optimize performance and support the development of efficient AI chip designs. This article discusses MLPerf’s crucial role in facilitating comprehensive benchmark testing for tiny and edge computing systems while scaling […]
Accelerating high-performance AI workloads with photonic chips
Artificial intelligence (AI) and machine learning (ML) continue to push the limits of conventional semiconductor architectures. To increase speeds, lower latency, and optimize power consumption for high-performance workloads, semiconductor companies, and research institutions are developing advanced photonic chips that operate on the principles of light rather than electrical currents. This article discusses the limitations of […]
What’s new with Matter: how Matter 1.4 is reshaping interoperability and energy management
Since its initial launch in 2022, Matter has led the charge on making smart homes smarter – allowing devices from different manufacturers and ecosystems, like Apple Home and Amazon Alexa, to communicate seamlessly. The open-source, IP-based protocol has become a key player in the push for device interoperability, aiming to create a reliable user experience […]
How to minimize design cycles for AI accelerators with advanced DFT and silicon bring-up
Design for testability (DFT) embeds testable features into an integrated circuit (IC) during design, while silicon bring-up initiates chip evaluation and debugging. Streamlining these sequential processes minimizes design cycles and shortens time-to-market (TTM) for advanced artificial intelligence (AI) accelerators. This article explores the complexities of AI chip design and outlines strategies for optimizing DFT and […]
How to test IoT device wireless capabilities
Testing the wireless capabilities of IoT devices before production helps ensure reliable connectivity, optimal performance, and seamless integration across a wide range of applications. This article reviews key IoT wireless parameters and highlights Wi-Fi, 5G, and Bluetooth LE testing priorities. It also discusses how wireless testing supports optimal LPWAN and ZigBee IoT device functionality. Analyzing […]
How to integrate theft-prevention tracking capabilities in IoT devices
Microcontrollers and wireless modules combine to add connectivity and theft-prevention features to IoT devices for automotive, industrial, medical, and smart-home use. Many original equipment manufacturers (OEMs) integrate theft-prevention tracking capabilities into their IoT devices. This article reviews key trade-offs and considerations for selecting wireless tracking technologies and highlights the crucial role microcontroller units (MCUs) play […]
How does a zero trust security architecture work?
Zero trust architectures (ZTAs) are a reaction to the emergence of cloud computing, remote work, and bringing your own device (BYOD) into enterprise networks. Those trends result in networks not completely contained within an enterprise-owned boundary, significantly complicating network security needs. This article briefly reviews the purpose and structure of ZTAs, looks at some relevant […]
What can be done to prepare for post quantum cryptography?
Post-quantum cryptography (PQC), also called quantum-safe cryptography, uses mathematical algorithms to create security environments resistant to quantum computer attacks. PQC is a rapidly evolving technology, and preparing for its adoption requires keeping up with developments in several areas. As part of the formalization of PQC algorithms, NIST has finalized the algorithms and changed their names […]