New IoT Chips See, Think & Act Autonomously

Rolling out the Internet of Things means using devices as our eyes and ears and even asking them to make decisions for us. The chips at the heart of those devices play critical roles, and recently some of them got better at their jobs.

While ARM introduced two minuscule processor architectures with security features borrowed from larger chips, Intel unveiled its Atom E3900 chips with improved computer vision and industrial-grade timing.

The E3900s are designed for a wide range of applications, including manufacturing and surveillance, and they’ll soon be joined by a version specifically for vehicles, called the A3900.

Intel is working to help machines evolve from accurately sensing what’s going on around them to acting on those senses. For example, if a device can see defective parts going through an assembly line, it can alert someone or even stop the line. Cameras in cars could see that the driver is drowsy and set off an alarm in the car, and ones pointed in front of the vehicle could tell a pedestrian from a shadow and stop the car, if its vision was accurate enough.

Rival Qualcomm also improved its chips for IoT vision recently. The E3900s have more computing power than their predecessors (by 1.7 times), along with faster memory speeds and memory bandwidth. But they also have better graphics and vision: 3D graphics performance is 2.9 times higher than in the previous generation, and the new chips can render 4K Ultra HD video on as many as three independent displays, Intel says.

Those three screens could be the virtual dashboard of a car and two seat-back displays for passengers to watch videos. By controlling each separately, the chip could make sure the dash display isn’t affected by the rendering activity happening on the entertainment screens, said Ken Caviasca, vice president of Intel’s IoT group.

The new chips are also better at capturing and processing images. They have four vector image processing units to perform video noise reduction, improve low-light image quality, and preserve more color and detail.

In a networked video recorder, an E3900 could take 1080p video streams from 15 cameras and display their feeds simultaneously at 30 frames per second on a video wall, Caviasca said.

Visual processing needs to keep getting better as technology evolves from rendering images to decoding content and on to image processing. The last step is computer vision, where machines understand what they see well enough to make decisions.

“What people are wanting is a processor that can sense like we do in an environment,” Caviasca said. And rather than just report back to humans, it can take action.

For industrial uses, the E3900 series gets Intel’s TCC (Time Coordinated Computing) technology. This feature lets the chip tightly control the timing of a device’s actions.

Some industrial systems rely on precise timing to be productive. For example, a robotic arm that takes parts off a conveyor belt needs to act when each object comes along. The more tightly the arm is synchronized with the rest of the system, the faster the assembly line can run.

Adding TCC, which wasn’t in the e3800 series, cuts the maximum delay to about one-tenth what it would have been. There are also uses for this technology in the automotive world, Caviasca said.

Computerworld:         A Strategic Company: The Internet of Things & How ARM Fits In:
 

« How Did WikiLeaks Get Clinton's Emails?
Healthcare Industry Lacks Basic Security Knowhow »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

SecuriThings

SecuriThings

SecuriThings is a User and Entity Behavioral Analytics (UEBA) solution for IoT security.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

ForAllSecure

ForAllSecure

ForAllSecure’s mission is to make the world’s software safe by pioneering autonomous cybersecurity tools that automatically find and fix vulnerabilities in run-time executable software.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Atlas Cloud

Atlas Cloud

Atlas Cloud is a UK-wide provider of managed services based in Newcastle. Our ‘research-led’ approach to IT services helps leaders make better decisions about IT for their businesses.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.