AI & Machine Learning
The race to develop Edge AI servers is on, and it’s a hotly contested race.
The e-commerce and online retail industries are experiencing exponential growth, resulting in more stringent demands being placed on logistics operations worldwide. Logistics companies and their suppliers are relying on automation more than ever to increase productivity and efficiency.
How do we transition from our historical lack of understanding about what’s going on under the hood of complex neural networks, and into an era of AI explainability around how these models operate?
We’ve defined AIoT on multiple occasions; it’s where AI intersects with the IoT. And for our purposes, it typically involves the Industrial IoT, aka IIoT.
A typical design goal is to maximize the operational efficiencies of your system. However, that likely includes designing systems around the latest GPUs, and that can be a daunting task.
During a recorded presentation from embedded world 2021, Rich and Brandon are joined by Technology Editor Curt Schwaderer, who doubles as Vice President of Engineering at intelligence and security provider Yaana Technologies. The three discuss how the tech industry in particular and connected organizations in general have transitioned from protecting devices from attacks to accepting they will be hacked and mitigating losses to modern threat intelligence and modeling strategies. They then look at this evolution through the lens of employees, who are handling and working with sensitive information and IP, working from home.
The analysts all agree—the spend for AI hardware (and software) will be going through the roof in short order.
There’s been a shift in the security outlook, at least in my eyes.
Security is clearly in the spotlight these days, and for good reason—hacks continue on a regular basis.
Even though Embedded World 2021 has gone digital, the opportunities for education are just as plentiful.
You asked for high performance in a small, rugged design. Now you have it.
Software & OS
With time to market pressures constantly increasing, technology organizations are moving away from traditional waterfall development workflows and towards Agile/DevOps software development practices.
Security is vital. However, there are many different ways to approach security.
We’ve been hearing about the benefits of Edge computing and the ability to perform AI at that Edge for quite some time.
Just when you thought you had plugged all the holes, more vulnerability points pop up.
FPGAs represent a comfort zone for many design engineers.