Our digital world is undergoing a profound transformation. Cloud computing, artificial intelligence (AI) and machine learning (ML) workloads, as well as the emergence of quantum computing capabilities, are reshaping how networks must be protected and secured. What’s more, these changes come amid evolving risks & regulations – from the prevalence of “harvest now; decrypt later” attacks, to updated standards like the Commercial National Security Algorithm Suite (CNSA) 2...
Each year, the Open Compute Project (OCP) Global Summit brings together the tech industry’s most innovative thinkers to discuss the current and future state of open hardware and software solutions. This year, Lattice and our ecosystem partners had the opportunity to showcase a range of our Field Programmable Gate Array (FPGA)-based solutions that help enable OCP-compliant development of datacenters, artificial intelligence (AI) solutions, and more. In case you missed the show, here’...
One of the more exciting developments now happening in the high-tech world is the work being done to enable quantum computing. After decades of theoretical discussion and development, the last few years have shown tangible progress in this radically different (and enormously complex) new method of computing. Quantum computers essentially perform calculations by flipping the electrical charge of individual atoms and allowing them to simultaneously exist in more than one state through a process ca...
Quantum computing is no longer just a concept confined to research labs. Thanks to rapid progress in both hardware and algorithms, the risk to today’s cryptographic systems is steadily increasing. In 2025, Google’s 105-qubit Willow chip and Microsoft’s Majorana 1 processor demonstrated that scalable quantum systems are moving closer to practical reality. Industry experts now predict that quantum computers capable of breaking RSA-2048 encryption could arrive as early as 2030 to ...
Building and maintaining connected digital ecosystems that account for today’s evolving cyber threat landscape requires a degree of hardware-based trust, as software-only security approaches are no longer sufficient to protect complex, distributed systems Luckily, today’s developers can reference a foundational example of hardware-based security that has existed for decades: the Trusted Platform Module (TPM). With over four billion TPM units deployed globally across a wide range of u...
Servers are the backbone of modern computing infrastructure. They host sensitive data, AI models, and core workloads – making them prime targets for increasingly sophisticated cyber threats. As server architectures become more modular and disaggregated, integrating various CPUs, NICs, accelerators, SCM modules, and more, and as organizations rely more heavily on these distributed systems, the complexity of securing these systems grows exponentially. Recent attacks – such as those e...
Quantum computing has long been discussed as a far-off development in computer science. The claim that widespread accessibility and use is “just five years away” is a common refrain among many practitioners. But with recent advancements in the field—including Microsoft’s Majorana 1, Google’s Willow chip, and IBM's plans to release the largest-ever quantum computer in 2025— we are closer to realizing its potential than ever before. While exciting, these advance...
Cybersecurity best practices can change on a dime. To help our customers keep up with this rapidly changing field, Lattice runs a regular Security Seminar program where security and FPGA experts dive into the latest security trends, regulations, and implementation across the Communications, Computing, Industrial, Automotive, and Consumer markets. Our goal is to deliver security-relevant insights, real signals, and a sense of what's next, especially if you're building, deploying, or managing trus...
The rise of AI systems and advancing quantum computing capabilities are fundamentally reshaping the security landscape for modern organizations. While these technologies bring unprecedented capabilities, they also introduce complex security vulnerabilities that traditional cyber defense approaches struggle to address. Organizations must now position themselves to meet rising security needs, while maintaining the flexibility to address current and future threats. Recent regulatory guidelines unde...
The rapid digitalization of enterprise environments, coupled with a surge in sophisticated cyber threats, evolving security regulations, and the rise of quantum computing technology, has created a perfect storm in the cybersecurity landscape that demands heightened levels of agility and resiliency. To combat this, organizations must remain proactive in their approach to cyber defense and compliance. In the latest Lattice Security Seminar, Lattice security experts sat down with partners from AMI ...
When it comes to embedded devices, security has always been a big topic of interest. Unfortunately, up until now, much of the attention has been for the wrong reasons. Insecure edge computing and IoT devices have become notorious examples of how the weakest (and often overlooked) link in the chain can lead to big security breaches. Thankfully, there are now important new options for ensuring that critical features such as hardware root-of-trust, integrated cryptography, firmware resiliency and m...
In the ever-evolving landscape of cybersecurity, this year’s Global Cybersecurity Outlook from the World Economic Forum provides crucial insights into the multifaceted challenges facing leaders across the globe. Geopolitical instability, rapidly advancing technologies, and an increasing gap in organizational cyber capabilities reinforce the need to build resilience and enable systemic global collaboration. As threats like sophisticated ransomware, firmware attacks, and the expanded use of...
In today’s rapidly evolving digital landscape, the importance of cyber resilience cannot be overstated. The rise of modern technology – including automation, machine learning (ML), 5G, and artificial intelligence (AI) – has provided us with a host of benefits and advancements, but it has also opened doors for increased vulnerability to cyberattacks. In fact, nearly 75% of organizations have experienced a cyberattack in the past year and, even further, the global average cost o...
A new era of innovation is on the horizon amid the rise of quantum computing. This emerging technology harnesses the laws of quantum mechanics by fusing aspects of computer science, physics, and mathematics to rapidly solve problems too complex for classical computing. Google, for example, has already developed a quantum computer that operates 158 million times faster than the world’s most powerful existing supercomputer. The convergence of quantum computing with artificial intelligence (A...
The past decade has brought about some incredible innovations to the industrial technology sector. From artificial intelligence and cloud computing to the Internet of Things (IoT) and 3D printing, these advancements are all part of Industry 4.0 – the fourth industrial revolution that focuses heavily on interconnectivity, automation, and real-time data. Due to this increased interconnectedness, particularly between sectors like technology and manufacturing, Industry 4.0 has also had a mass...
At this year’s Embedded World 2022, Lattice presented a keynote address by Steve Douglass, head of R&D, the importance of flexibility and adaptability in embedded system design – both at the software layer and the hardware layer – to keep pace with the major technology trends of today and tomorrow. This blog provides a high-level recap of the presentation. We are living in a time in our industry with some of the most profound changes in technology that are fundamentally re...
自分が、新しいビデオブリッジソリューションの開発を任命されたと想定してください。当初は特定のアプリケーションを考えていましたが、カメラがますます急増するインテリジェントアプリケーションで出現してから、オブジェクト認識から奥行き知覚、車線検出、衝突回避に至るまで、幅広い種類の機能に向けた試作が必要だと気づきました。