As demand for artificial intelligence (AI) increases, chip makers strive to create more powerful and more efficient processors. The goal is to accommodate the requirements…
Good embedded software has always been designed for both safety and security. However, connectivity has introduced intolerable levels of security vulnerability in safety-critical applications such…
We all know the story of the little girl named Goldilocks — an unruly miscreant who breaks into an unsuspecting family's home and wantonly taste-tests…
In my previous column — A new computing architecture for Big Data and AI applications — we discussed the high-performance computing needs of artificial intelligence…
In case you haven't heard, 2017 has already been dubbed “the year of the voice interface.” The year started out with voice activation front-and-center at…
You must verify your email address before signing in. Check your email for your verification email, or enter your email address in the form below to resend the email.
Please confirm the information below before signing in.
{* #socialRegistrationForm *}
{* firstName *}
{* lastName *}
{* displayName *}
{* emailAddress *}
By clicking "Sign In", you confirm that you accept our terms of service and have read and understand privacy policy.
{* /socialRegistrationForm *}
Almost Done
Please confirm the information below before signing in. Already have an account? Sign In.
Almost Done
Please confirm the information below before signing in.
{* #socialRegistrationForm *} {* firstName *} {* lastName *} {* displayName *} {* emailAddress *} By clicking "Sign In", you confirm that you accept our terms of service and have read and understand privacy policy.