Trusted Execution Environments (TEEs) such as Arm TrustZone, while well-intentioned, present challenges for engineers. First, they doesn't allow for partitioning between many sensitive functions within a secure domain, and, perhaps more importantly, they can be very difficult to use. Don Barnetson of Hex-Five discusses TEEs and multi-zone security, a new technology for the RISC-V ISA that enables limitless partitions, each with its own set of resources. And, it has minimal impact on existing development processes and tools.
- Machine Learning
- Power Electronics
- Dev Tools & OS
- Dev Kit Selector
- White Papers
- Upcoming Activities & Events
- embedded world 2020
- Embedded Executive
Rumors of a shortage of electronics engineers have been circulating for years, but with Fortune 500 technol...
We also recommend:
Join Brad Rex, Senior Manager in the MCU Business Unit at Renesas Electronics on this episode of Embedded Toolbox as he builds an IoT-enabled Weather Panel in just 15 minutes using an Renesas RA MCU.
NXP is excited to bring you the NXP eXperience – an online and interactive destination for all our news, content and training as it was originally planned for the show.
In this episode of Embedded Insiders, Brandon and Rich review some of the highlights from the 2020 Consumer Electroncis Show (CES).
Traditional collaboration solutions like video teleconferencing have been around for years. But with innovations in security, communication, presentation, and management systems, meetings can ...
Audio is added to emUSB-Host at runtime to minimize memory footprint.
Industry's focus is shifting from the promise of Gallium Nitride (GaN) to the reality of the products enabled by it, with new packaging options available for emerging application spaces.
Lauterbach has extended kernel awareness for WITTENSTEIN high integrity systems’ SAFERTOS to all Arm processors in its TRACE32 debug environment.
Fifty years after Bell Labs first showed off its Picturephone, videoconferencing systems are ubiquitous across the enterprise—but many solutions are difficult to deploy and use.
congatec's Zeljko Loncaric at Embedded World 2019 booth #1-358. Follow Embedded Computing Design: https://twitter.com/embedded_comp Visit congatec: https://www.congatec.com
Steve Sandler of Picotest at the PMK booth #4-403 at Embedded World. Follow Embedded Computing Design: https://twitter.com/embedded_comp Visit PMK: www.pmk.de/en/home Visit Picotest: https://www.p
For some, RISC-V is the answer to Arm. For others, it offers a new path to innovation. It can also provide insurance in turbulent times. Whatever the reason, RISC-V is too open to fail.
By focusing on ad-hoc incident resolution, organizations struggle to identify and address recurring data quality problems in a structural way.
Attendance may have been down at the 2019 Consumer Electronics Show, based on observed foot traffic alone. But, that didn't stop electronics vendors from innovating at the highest levels. From...
In addition to tools, services, and training support, the Linux Foundation will provide neutral governance, best practices for open source development, community outreach, marketing, and legal advice.
The OCF standard will be published as ISO/IEC 30118 (Parts 1-6).
VxWorks was responsible for complex automated maneuvers of the InSight landing craft, providing system-wide determinism and synchronization through a Red Planet atmosphere 100x thinner than Earth's.
Rumors of a shortage of electronics engineers have been circulating for years, but with Fortune 500 technology firms now gobbling up as much engineering talent as possible for IT and enterprise...
The Spectre and Meltdown vulnerabilties resulted from speculative execution, designed to satisfy our need for speed. These could have been prevented through the use of hardware security verification,
Developing secure code is no longer optional, but that doesn't mean it's easy. Some software engineers use vulnerability databases like CWE and OWASP to ensure their code is robust as possible, howeve
With Moore’s law coming to an end and the growing volume of data that will require to be processed to drive the next wave of AI applications, CPUs are no longer able to keep up with the compute requir