As companies embrace the data-unlocking power of smart lighting systems they need to consider how to secure them against attack. Here are 3 simple steps to secure IoT-enabled devices.
In an era where IoT sparks innovation in every corner of the globe and is redefining entire industries in the process, companies are using custom chips to differentiate their new products against competitors…
The current specification for LwM2M is not a good fit when the server itself is a constrained IoT device and when user authentication together with fine grained dynamic access control is demanded. Complementing…
This week we announced an open source Trusted Firmware (TF-M) project that will deliver a reference implementation of Platform Security Architecture (PSA) trusted code.
Powering a trillion wireless sensor nodes each using a small lithium coin cell would require approximately 109,000 metric tons of Lithium - nearly three times the annual worldwide production.
Mass production and commercialization of technologies based on integrated circuits, such as computers and mobile phones, have completely revolutionized our society, ultimately resulting in the Digital…
Following on from the launch of our new online training service, we have recently published a new video-based training course for developing software for the Arm DesignStart Cortex-M3 processor.
Arm Musca is at the heart of the latest developments in security, is a great demonstration of how IoT can scale. This blog discusses how Arm Musca can fulfil so many use cases and help an industry to develop…
As part of our continued work in drone and unmanned aerial vehicle (UAV) technology development, we are pleased to announce that we will be joining the Dronecode Project.
Arm's Platform Security Architecture (PSA) is a common framework providing a holistic approach to IoT security. We are announcing that we will be providing the first code and documents, freely available…
In the coming years the IoT presents an enormous opportunity to transform society by unlocking and unleashing a world of data that until now has been uncollected or unused.
Securing embedded systems has become a critical task for developers. It is nearly impossible to turn on the news and not hear about yet another major security breach.
Synopsys is proud to have collaborated with Arm on the development of this new AMBA 5 AXI5 and ACE5 specification and also deliver the first source code test suite and Verification IP (VIP) for these new…
Nordic announces the nRF9160 System-in-Package (SiP) - the very first chip to implement the Arm Cortex-M33 processor (with TrustZone) and Arm CryptoCell-310.
CMSIS-NN is a library of neural network kernels that maximizes the performance & efficiency of DNNs on Cortex-M-based platforms for smart IoT edge devices.
Our predictions about how the key themes of AI and Machine Learning (ML), IoT, security and blockchain are likely to begin to make a real difference in the way all of us interact with technology in 20…
This blog explains how Arm and its ecosystem provide the breadth of technology solutions to help you get your IoT product to market quickly and protect your software investment.