2020-03-03 - Mark Lippett, Xmos

Blog: The Rise of the AIoT

Moving AI to the edge is going to require an entirely new category of processor that is inexpensive and flexible.

2020-02-27 - Ann R. Thryft

Unsupported and Unpatched

Vulnerable to attack, older Windows systems present modern challenges to OT network managers.

2020-02-27 - Nirav Shah, Fortinet

Hyperscale is in Need of Security Processors

Without purpose-built security processors, organizations that rely on digital innovation are left with either slowing down to accommodate security limitations,…

2020-02-24 - Colin Barnden

Blog: Cracks in Seams of AV-Dreams

Waymo calls its robocar “the World’s Most Experienced Driver.” But implying we aren't good enough drivers is a way to…

2020-02-17 - Junko Yoshida

China Can’t Mask Impact of Coronavirus

The Covid-19 coronavirus outbreak in China has exposed the best and the worst aspects of the world’s biggest totalitarian nation.

2020-02-05 - Lou Covey

Blog: Facial Recognition Is Not yet a Threat

The availability of facial-recognition technology to governments and law enforcement has been with us for many years and the new…

2020-02-04 - Junko Yoshida

Blog: Is It Really Business as Usual?

It’s not just in Wuhan. Also in Shenzhen, all shops and restaurants are closed except some supermarkets and pharmacies.

2020-01-23 - Lou Covey

Blog: Modern Satellites and Fire From the Sky

Satellite systems are among the most crucial technologies for people on earth. They are also vulnerable to terrorist manipulation.

2020-01-22 - Bill Schweber

The Different Guises of Power “Protection”

Often, it’s those obvious problems that offer the opportunity for basic solutions, but the factors which are hard to foresee…

2020-01-14 - Brian Santo

Blog: VR & Marketing

Using such sophisticated AR/VR techniques to manipulate children to buy products is questionable. Being gleeful about it is unseemly.