Tags: Hardware

raj-elc.png

Khem Raj
"This is a good time to port Linux applications to RISC-V,” said Comcast’s Khem Raj at an Embedded Linux Conference Europe presentation last month.

RISC-V Linux Development in Full Swing

Most Linux users have heard about the open source RISC-V ISA and its potential to challenge proprietary Arm and Intel architectures. Most are probably aware that some RISC-V based CPUs, such as SiFive’s 64-bit Freedom U540 found on its HiFive Unleashed board, are designed to run Linux. What may...
Read 0 Comments

New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data

A team of security researchers has discovered another serious side-channel vulnerability in Intel CPUs that could allow an attacker to sniff out sensitive protected data, like passwords and cryptographic keys, from other processes running in the same CPU core with simultaneous multi-threading...
Read 0 Comments

System76 Debuts Thelio, A Gorgeous 'Open Hardware' Linux PC

Never heard of Colorado-based System76? Think of the company as the Linux alternative to boutique PC builders like Digital Storm, Maingear or Falcon Northwest. System76 specializes in preloading laptops, desktops and mini PCs with a Linux operating system, either Ubuntu or its own Pop!_OS...
Read 0 Comments

Linux Apps on Chrome OS: An Easy-to-Follow Guide

Linux apps can expand your Chromebook's capabilities and open up all sorts of interesting options — but first, you have to know where to begin. If you think you'd stand to benefit from using a Linux app on your Chrome OS device — or if you just want to explore and see what's out there — the first...
Read 0 Comments

What Comes after Moore's Law?

The literal meaning of Moore’s Law is that CMOS transistor densities double every 18 to 24 months. While not a statement about processor performance per se, in practice performance and density have tracked each other fairly well. Historically, additional transistors were mostly put in service of...
Read 0 Comments

processor-edge.jpg

edge computing
The recent port of TensorFlow to the Raspberry Pi is the latest in a series of chess moves from Google and its chief AI rival Nvidia to win the hearts and keyboards of embedded Linux developers.

TensorFlow Pi Port Is Strategic Move in Edge Analytics Game

Google’s recent announcement that it had ported its open source TensorFlow machine intelligence (ML) library for neural networking to the Raspberry Pi was the latest in a series of chess moves from Google and its chief AI rival Nvidia to win the hearts and keyboards of embedded Linux developers....
Read 0 Comments

open-source-hardware.jpg

POSH
The POSH project aims to create a Linux-based platform and ecosystem for designing and verifying open source IP hardware blocks for next-gen system-on-chips. (Image: Intelligent Design of Electronic Assets (IDEA) & Posh Open Source Hardware (POSH); Andreas Olofsson, Program Manager, DARPA/MTO)

DARPA Drops $35 Million on “Posh Open Source Hardware” Project

The U.S. Defense Advanced Research Projects Agency (DARPA) announced the first grants for its Electronic Resurgence Initiative (ERI). The initial round, which will expand to $1.5 billion over five years, covers topics ranging from automating EDA to optimizing chips for SDR to improving NVM...
Read 0 Comments

An Introduction to Using Linux on Embedded Single-Board Computers

Most of the more powerful compact form-factor single-board computers (SBCs) run one of the popular Linux distributions designed for use with these embedded boards. While there isn’t a specific version of the Linux kernel for embedded applications, the difference from a PC or desktop device running...
Read 0 Comments

​The Return of Spectre

The return of Spectre sounds like the next James Bond movie, but it's really the discovery of two new Spectre-style CPU attacks. Vladimir Kiriansky, a Ph.D. candidate at MIT, and independent researcher Carl Waldspurger found the latest two security holes. They have since published a MIT paper, ...
Read 0 Comments

Router Vulnerability and the VPNFilter Botnet

On May 25, the FBI asked us all to reboot our routers. The story behind this request is one of sophisticated malware and unsophisticated home-network security, and it’s a harbinger of the sorts of pervasive threats — from nation-states, criminals and hackers — that we should expect in coming years...
Read 0 Comments

Pages

Click Here!