Archives: Articles

  • Time, Ethernet, and White Rabbits

    Time, Ethernet, and White Rabbits

    Physics teaches us that distance is time. Light travels at a finite speed, so looking at a faraway object is, in a sense, looking back…

  • High Entropy is the Foundation for High Security

    High Entropy is the Foundation for High Security

    Perhaps not surprisingly in the light of all the cyber-attacks and data breaches we’ve been seeing recently, the topics of cyber-security, cyber-resiliency, and securing one’s…

  • Wine Wi-Fi Finds Fine Vines

    Wine Wi-Fi Finds Fine Vines

    Winemaking is an occupation steeped in tradition, to mix my metaphors. Winery websites feature richly sepia-toned photos of rugged Old World types squeezing the soil…

  • Xilinx Introduces Kria SoMs

    Xilinx Introduces Kria SoMs

    Integration is the fundamental fuel that drives technical innovation. Each new node of Moore’s Law has allowed us to “Cram More Components” onto our integrated…

  • Is an Instruction Set an API?

    Is an Instruction Set an API?

    No less an authority than the United States Supreme Court just ruled that a program’s application programming interface can be copied under the doctrine of…

  • Predictive Maintenance Evaluation Kit for Smart Buildings

    Predictive Maintenance Evaluation Kit for Smart Buildings

    One of the myriad problems I face — in addition to (a) being persistently pursued by gaggles of groupies and (b) the fact that all…

  • Clever Hack Finds Mystery CPU Instructions

    Clever Hack Finds Mystery CPU Instructions

    In the 1966 movie Fantastic Voyage, a team of doctors and scientists gets miniaturized and injected into the bloodstream of a human patient. They and…

  • The First Emulators of Spring

    The First Emulators of Spring

    It’s the season of rebirth. The sun is out. Flowers are in bloom. Birds busily build nests while semiconductor verification teams emerge from their long…

  • Parsing Google v. Oracle: What’s It Really Mean?

    Parsing Google v. Oracle: What’s It Really Mean?

    It’s okay to duplicate an API, even if you have to snarf 11,500 lines of somebody else’s code to do it. That’s the gist of…

  • ID for the IoT? We Need the IDoT!

    ID for the IoT? We Need the IDoT!

    When most people hear the term “counterfeiting,” their knee-jerk reaction is to think of currency, the counterfeiting of which is as old as the concept…