Post-quantum cryptography (PQC), also called quantum-safe cryptography, uses mathematical algorithms to create security environments resistant to quantum computer attacks. PQC is a rapidly evolving technology, and preparing for its adoption requires keeping up with developments in several areas. As part of the formalization of PQC algorithms, NIST has finalized the algorithms and changed their names […]
Featured
What’s new in the NIST CSF 2.0 framework?
The NIST Cybersecurity Framework (CSF) 2.0 is the first major update since its creation in 2014. It was finalized in early 2024. This article reviews some of the important changes in CSF 2.0 compared with v1.1, briefly examines how v2.0 improves alignment with other cybersecurity standards and frameworks and compares CSF 2.0 with the ISO […]
What are the elements of secure boot processes?
The secure boot protects devices from unauthorized modification by verifying the authenticity of the boot code. Its importance is growing as society digitalizes and the number of devices on the Internet of Things (IoT) soars. A secure boot prevents an adversary from compromising device operation. This article reviews the basic elements of secure boot processes, […]
How are AI and ML used for advanced threat detection?
The increasing number of threat vectors and the growing size of the attack surface in today’s communication and computer networks demand more powerful and faster threat detection. Legacy tools are no longer adequate. To ensure cybersecurity, high-speed threat detection based on artificial intelligence (AI) and machine learning (ML) is increasingly being deployed. This article reviews […]
Design World presents the 2024 LEAP Awards winners: Embedded computing
Now in its seventh year, Design World’s LEAP Awards showcase the best engineering innovations across several design categories. This undertaking wouldn’t be possible without the commitment and support of the engineering community. The editorial team assembles OEM design engineers and academics each year to create an independent judging panel. Below is their selection for this […]
Edge AI: Revolutionizing real-time data processing and automation
By Shawn Luke, technical marketing engineer at DigiKey From smart home assistants (think Alexa, Google, and Siri) to advanced driver assistance systems (ADAS) that notify a driver when they’re departing from their lane of traffic, the world relies on edge AI to provide real-time processing to these increasingly common and important devices. Edge AI uses […]
How does DMA enable efficient data transfer in microcontrollers?
Direct memory access (DMA) allows peripherals to transfer data directly to and from memory without requiring the CPU to handle each cycle. As the CPU’s role is minimized, DMA enables the CPU to perform other high-priority tasks and ensures faster data transfers in the background. How does the DMA controller work to reduce the load […]
Building the quantum future: how to master quantum control design
By Udo Weiss and Christian Ganninger, nVent In quantum computing systems, control electronics are critical in facilitating the operation and manipulation of qubits. Their precision ensures the integrity and accuracy of quantum computing processing and results. Engineers need minimal latency in the low milliseconds to effectively operate their chassis, including switches and central processing unit […]
10Base-T1S simplifies automotive zonal architectures
By Andreas Pellkofer and Madhura Deyanda Poonacha, Analog Devices Automakers aim to provide vehicles with home-like comfort and entertainment, which raises demand for electronic control units (ECUs). Older bus technologies and electrical/electronic architectures struggle to keep up. 10Base-T1S Ethernet is transforming cars into fully connected experiences. Automotive electronic control units (ECUs), which control each component […]
How software segregation minimizes the impact of AI/ML on safety-critical software
With the growing use of artificial intelligence and machine learning in safety-critical software, developers are considering software segregation and guardian applications to mitigate functional safety risks. By Mark Pitchford, LDRA The push toward artificial intelligence (AI) and machine learning (ML) in embedded systems raises questions about adapting functional safety processes and tools to achieve compliance. […]