New Arm CryptoCell Security IP provides a number of benefits to meet complex security challenges, including reducing Time-to-Market for Arm's partners and meeting Chinese Crypto Standards.
As more people use their mobile devices for a range of everyday online tasks, from shopping to banking, the security threat to smartphones and other connected devices is only likely to increase.
It’s been almost 12 months since the launch of the Arm Online Training platform at Arm TechCon 2017. Since then we have added more bite-sized, accessible, engaging content and extra functionality.
Security is a top priority for the technology industry, especially now mobile devices are used for payment and hold valuable private information. FIPS 140-2 is one of the many standards providing this…
This blog discusses some of the key additions to the A-Profile architecture in 2018 – known collectively as Armv8.5-A.
This blog discusses some of the key additions to the A-Pro...
Windows 10 Arm-based laptop devices hit the market this year and I finally got my hands on one to use as a work PC. One month later, here's my review of the HP Envy x2.
Arm has introduced Secure EL2, which provides mechanisms to isolate secure payloads from each other and from the Normal world. Leveraging this technology requires new thinking in security software architecture…
Deploying advanced deep learning algorithms on edge devices, especially for computer vision applications like autonomous vehicles and IoT, requires special capabilities.
We are pleased to announce a new online training topic: An Introduction to Armv8-M. This is the latest addition to our introduction to Arm the Arm architecture series.
Designers looking for an open HP cache-coherent chip to chip accelerator interface with an easy migration path from today’s PCIe should consider CCIX for their next SoC.
As operators implement next-gen networks, containers help accelerate application deployment cycles and increase network agility. This blog will focus on containers and their benefits to NFV systems.
Universal Customer Premise Equipment (uCPE) is one of the first commercial implementations of Edge Computing. Find out how Telco Systems is working with Arm to produce the next generation of uCPE devices…
We are pleased to announce our new video-based online training module that provides an introduction to cryptography and security for Arm's CryptoCell family of security products
We announced a range of IP to protect silicon from physical attacks, extending our portfolio of Arm security IP to bring physical security within reach of any IoT product.
This blog will focus on some of the key technologies needed to protect network access, availability and data, with a brief overview of Arm’s underlying platform that is providing the foundation for trust…
Service providers or anyone involved in building out next-generation networks are faced with complex challenges today as they seek to evolve, future-proof, and secure their networks to meet the ever-increasing…
Neural Network accelerators as an essential part of bringing ML to life on your device – and whilst it’s true that they have a significant role to play, they’re just one part of the story.
The sources of interest in the VORAGO Technologies HT-DAB-1 high temperature data acquisition evaluation and reference design kit has surprised me a bit.