Archives: Articles

  • Competitors Squawk at ARM/Nvidia Merger

    Competitors Squawk at ARM/Nvidia Merger

    To no one’s great surprise, companies around the world are quietly raising objections to Nvidia’s proposed takeover of ARM. When elephants dance, someone’s likely to…

  • What Programming Languages Are In Demand?

    What Programming Languages Are In Demand?

    “Kid, when I was your age, we programmed computers by hand using ones and zeroes. And some days we ran out of zeroes.” Okay, boomer,…

  • Organic Printed Electronics for the 21st Century!

    Organic Printed Electronics for the 21st Century!

    What do you think about when you hear the phrase “printed electronics”? To be honest, if you’d asked me yesterday, I would have probably waffled…

  • USB & HDMI: Who’s In Charge Here?

    USB & HDMI: Who’s In Charge Here?

    USB is one of the success stories in the saga of technical standards, and one of the few that lives up to its name. It…

  • Apple M1 vs. Intel Core i7: The Benchmark Wars Continue

    Apple M1 vs. Intel Core i7: The Benchmark Wars Continue

    Which chip is faster: Apple’s M1 or Intel’s Core i7? The new or the old? ARM or x86? The mobile gadgets company or the major…

  • Securing Artificial Intelligence Before It Secures Us!

    Securing Artificial Intelligence Before It Secures Us!

    Since I spend an inordinate and unfortunate amount of time worrying about the possibility of a forthcoming artificial intelligence (AI) apocalypse, I was delighted to…

  • When Is the Chip Supply Coming Back?

    When Is the Chip Supply Coming Back?

    If your new car doesn’t come with the radio you wanted, blame Japan. Or Korea. Or the United States, UK, Brazil, The Netherlands, Taiwan, France,…

  • Radar Sensors on a Chip

    Radar Sensors on a Chip

    Radar predates me by quite a bit. The word conjures up black-and-white images of WWII bombers, huge ground arrays, and stickers warning you not to…

  • Securing RISC-V-Based Systems

    Securing RISC-V-Based Systems

    In just a moment we are going to cogitate and ruminate over the question of how to secure our RISC-V-based systems, but first… Deep in…

  • How To Implement Virtual Memory, Part 4

    How To Implement Virtual Memory, Part 4

    Fiddly little bit-twiddling. Nobody likes it, but if you’re writing boot ROMs, device drivers, or low-level system functions, you’ve got to roll your sleeves up…