New IoT Chips See, Think & Act Autonomously

Rolling out the Internet of Things means using devices as our eyes and ears and even asking them to make decisions for us. The chips at the heart of those devices play critical roles, and recently some of them got better at their jobs.

While ARM introduced two minuscule processor architectures with security features borrowed from larger chips, Intel unveiled its Atom E3900 chips with improved computer vision and industrial-grade timing.

The E3900s are designed for a wide range of applications, including manufacturing and surveillance, and they’ll soon be joined by a version specifically for vehicles, called the A3900.

Intel is working to help machines evolve from accurately sensing what’s going on around them to acting on those senses. For example, if a device can see defective parts going through an assembly line, it can alert someone or even stop the line. Cameras in cars could see that the driver is drowsy and set off an alarm in the car, and ones pointed in front of the vehicle could tell a pedestrian from a shadow and stop the car, if its vision was accurate enough.

Rival Qualcomm also improved its chips for IoT vision recently. The E3900s have more computing power than their predecessors (by 1.7 times), along with faster memory speeds and memory bandwidth. But they also have better graphics and vision: 3D graphics performance is 2.9 times higher than in the previous generation, and the new chips can render 4K Ultra HD video on as many as three independent displays, Intel says.

Those three screens could be the virtual dashboard of a car and two seat-back displays for passengers to watch videos. By controlling each separately, the chip could make sure the dash display isn’t affected by the rendering activity happening on the entertainment screens, said Ken Caviasca, vice president of Intel’s IoT group.

The new chips are also better at capturing and processing images. They have four vector image processing units to perform video noise reduction, improve low-light image quality, and preserve more color and detail.

In a networked video recorder, an E3900 could take 1080p video streams from 15 cameras and display their feeds simultaneously at 30 frames per second on a video wall, Caviasca said.

Visual processing needs to keep getting better as technology evolves from rendering images to decoding content and on to image processing. The last step is computer vision, where machines understand what they see well enough to make decisions.

“What people are wanting is a processor that can sense like we do in an environment,” Caviasca said. And rather than just report back to humans, it can take action.

For industrial uses, the E3900 series gets Intel’s TCC (Time Coordinated Computing) technology. This feature lets the chip tightly control the timing of a device’s actions.

Some industrial systems rely on precise timing to be productive. For example, a robotic arm that takes parts off a conveyor belt needs to act when each object comes along. The more tightly the arm is synchronized with the rest of the system, the faster the assembly line can run.

Adding TCC, which wasn’t in the e3800 series, cuts the maximum delay to about one-tenth what it would have been. There are also uses for this technology in the automotive world, Caviasca said.

Computerworld:         A Strategic Company: The Internet of Things & How ARM Fits In:
 

« How Did WikiLeaks Get Clinton's Emails?
Healthcare Industry Lacks Basic Security Knowhow »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

NICE Systems

NICE Systems

NICE Systems provide software solutions to ensure compliance, fight financial crime, and safeguard people and assets.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

Centre for the Protection of National Infrastructure (CPNI) - UK

Centre for the Protection of National Infrastructure (CPNI) - UK

CPNI works with the National Cyber Security Centre (NCSC), Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter cyber threats.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

Shift Technology

Shift Technology

Shift Technology provides insurance companies with an innovative SaaS solution to improve and scale fraud detection.

Brighter AI

Brighter AI

Brighter AI empowers companies to use publicly-recorded camera data for analytics & AI while being compliant with increasing data privacy regulations worldwide.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Hayes Connor Solicitors

Hayes Connor Solicitors

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm. We act for clients on individual data breaches and also where a group has been compromised as part of a targeted attack.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

Cynch Security

Cynch Security

Cynch Security are passionate about building a world where every business is resilient to cybersecurity risks, no matter what their size.