Life at Broadcom after Moore’s Law ends
Embedded, EE Times
From our perspective [this situation] gives us more breathing room to be clever about
design. Most people run to the current process node as fast as they can. That's going to
change. Instead of running to the next node, you will come up with new architectures and
circuit designs, and that will create more opportunities on the design side, bringing more
value to a company like Broadcom.
Qualcomm vs. Broadcom: Race on China’s BeiDou Nav System
China’s BeiDou satellite navigation system has become the biggest bone of contention in the
Qualcomm vs. Broadcom competition to deliver more accurate positioning information to mobile devices.
Qualcomm announced late last month its support for the BeiDou constellation within Qualcomm IZat
location solutions. The San Diego-based company revealed its collaboration with Samsung to launch
the first wave of BeiDou-enhanced consumer smartphones.
Carriers Switch on Small Cells Slowly
As many as 11.5 million small-cell base stations could be deployed by 2018, up from just
168,000 today, according to a status report from the Small Cell Forum. The trade group gave
the update and released guidelines on using the systems in businesses as part of a regular meeting in Dallas today.
Small-cell base stations are seen as an inexpensive way to add capacity quickly to cellular
networks swamped with mobile data from the rise of smartphones and tablets.
Which is More Important -- Technology or Marketing?
Some people argue that the key for start-up is marketing, aka, searching for product-market
fit, while other people argue the key is really making good product. All you need to do is make a great product.
This reminds me of a joke about the military. When the general asks a solider what is important
in army, the solider doesn't say combat training or better weapon, but he said "women". Why?
Because there is no women in the army. The moral of this story is people tend to think what they
don't have is important.
Meticom: Bridging FPGAs & MIPI-Enabled Devices
MIPI, which stands for Mobile Industry Processor Interface, was originally conceived as a
low-power interface intended to interconnect functional units (e.g., camera sensors and displays) within handsets.
This has led to an interesting dilemma. Since MIPI as an interface was never intended to
serve non-mobile applications, interfacing to FPGAs was never made a priority. This makes
perfect sense, since the majority of FPGAs are not well-suited for use in high-volume mobile
devices. On the other hand, FPGAs are quite common in medical, industrial, and automotive applications.
The end result is that the lure of using low-cost MIPI-enabled devices and the need to connect them to
FPGAs has forced designers to look for bridging solutions.
Raytheon, GrammaTech team on U.S. malware prevention effort
“Mobile phones, network routers, computer workstations and other networked devices
can be secretly modified to function in unintended ways or spy on users”.
Companies have been tasked with developing tools and techniques to enable
organizations to inspect the software and firmware that exist inside such network-enabled
devices and protect them from attack.
Raytheon BBN Technologies plans to develop techniques that enable analysts to prioritize
elements of software and firmware to examine for hidden malicious functionality. GrammaTech
plans to develop the tools that actually examine the software and firmware to allow analysts
to demonstrate that they do not have exploitable security vulnerabilities.
Weighing Risk Against ROI in the Face of DDoS Threats
Distributed denial of service (DDoS) attacks are not limited to a single season.
Hackers motivated by money, idealism or competitive edge do not hang up their tools on
December 26, nor do they give their targets a pass 11 months out of the year. Bringing
down websites is a year-round endeavor. So why do so many businesses bolster their
DDoS mitigation efforts around the holidays and then pull them down along with the
tinsel and holly? Certainly, DDoS attacks pose a particularly strong threat...
Mind the Cloud Security Gap
Putting your digital assets in the cloud is safer than keeping them in your datacenter.
However, moving your digital assets to the cloud also makes nearly all of your existing
security investments irrelevant.
An Approach to Risk Decision Making
Security executives routinely have to make tough decisions about which risks to mitigate, which to
avoid or transfer and which to accept. Your security budget has its limits. You have a finite amount
of cash to spend on people and technologies to keep your business’ risk to an acceptable level, so
you have to make your decisions wisely.
Making these decisions and presenting them to company leadership requires a thorough understanding
of the impact of the risk, knowledge of available safeguards and sometimes the guts to make a tough
call. The goal of this article is to arm you with an approach to help guide you in these difficult risk decisions.
FAA Chooses First Six Aerial Drone Test Locations
Daily Tech, Dec 31, 2013
The FAA has announced the first six locations that will act as test sites for unmanned aircraft
systems into the air traffic system around the country. Before the FAA allows widespread use of
drone aircraft around the country, it has to test the system out and be sure that people in the
air and on the ground will be safe.
China’s Moon Rover Lands Safe and Sound, Starts Snapping Pics
Daily Tech, Dec 16, 2013
In order to coax the moon probe into a gentle landing, the Chinese lander was equipped with
state-of-the-art mini rockets, which allowed it to gently hover above the lunar surface.
This allowed it to avoid small boulders and large rocks that littered parts of its Sinus
Iridum (Bay of Rainbows) landing site.
Big Data In 2014: 6 Bold Predictions
Information Week, Dec 23, 2013
How will big data evolve in 2014? The future is anyone's guess, of course, but we thought we'd
compile a tasty holiday assortment of prognostications from executives working in the big data
trenches. So without further delay, here they are -- six big data predictions for next year:
Military Supply Data Search Tool Uses MongoDB
Information Week, Jan 3, 2014
The Department of Defense purchases nearly 7 million types of products and does business with 2.7 million
supplier companies, according to government records. Knowing what products and parts are stocked in DoD
warehouses worldwide is not only a challenge for military logistics personnel, but also for suppliers who
need information on products the DoD keeps in stock.
Predictions for 2014: Big Data, Cloud and Hadoop to Transform Business
Insights, Jan 2, 2014
Big Data was arguably one of the most hyped concepts of 2013 -- and for good reasons.
The second half of 2013 saw more and more big data projects move from the sandbox/proof-of-concept
to production. Cloud computing is in a very different phase: we are now far past the initial hype
and entering a new era of hybrid deployments, where the cloud extends transparently to the data center.
In 2014, we can expect the following developments in both of these areas:
2014: The Year Marketer’s Big Data Gets Real
Insights, Dec 31, 2013
In 2014, for the first time we’ll see marketers begin using big data to optimize their digital advertising
in ways that integrate seamlessly with people’s busy lives generating highly relevant, meaningful
interactions. RadiumOne predicts marketers’ data-centric demands will power three major ad tech
industry evolutions in the coming year: