Lidar is an acronym for Laser Imaging, Detection And Ranging, as a light-based analog to radar, which you’ll recall stands for RAdio Distancing And Ranging. It uses a reflected laser beam rather than microwaves to locate objects in space and determine their distance, speed and direction.
Lidar is becoming a ubiquitous sensor, used by autonomous vehicles to see surrounding traffic, geographers and archeologists to map the ground and even smartphones and tablets to provide vision for augmented reality apps.
Longtime lidar supplier Velodyne explains that a lidar device’s laser pulses millions of times per second, operating in the 905 nanometer and 1550 nm wavelengths. Each of those has its own pros and cons, so the wavelength is selected to suit the application.
Huawei could run short of key chips for its networking gear by early next year, as US sanctions take their toll.
The Shenzhen-based vendor is uncertain if it can even fulfill its existing contracts to supply 5G kit to operators in China and around the world, Bloomberg is reporting.
So, the latest and harshest round of Huawei bans is already having the desired effect. But be careful what you wish for.
If Huawei can’t fulfill its 90-plus 5G contracts, the result will be messy and costly for operators.
Presumably those telcos will be forced to turn, directly or indirectly, to Nokia, Ericsson, Samsung and/or NEC, and pay whatever it takes. Neither they nor their governments will thank Washington for that.
Even Attorney General Bill Barr is asking just whose equipment are telcos going to buy if they are warned off Huawei.
A favorite tactic of the leviathan is to keep a watchful eye on smaller fish and gobble any that start to look dangerous. Facebook has done it repeatedly. Dodging slow-witted competition watchdogs, the social network eliminated one emerging threat with its $1 billion takeover of Instagram in 2012. Two years later, it dealt with another when it paid a jaw-dropping $19 billion for WhatsApp.
Neither target did much real business at the time it was swallowed. Yet both seemed capable of hitting Facebook where it hurts.
Similar predation now looks possible in the telecom equipment sector as operators increasingly call for open RAN.
Barr’s comments on open RAN essentially represented a direct attack on a competing 5G proposal by White House economic adviser Larry Kudlow, another Trump appointee. Kudlow earlier this year proposed to use open RAN technology developed by US companies as a block against Huawei, and he boasted of support from AT&T, Microsoft and Dell for the effort.
“Barr’s continuing interest and somewhat dissenting viewpoints on the 5G topic suggest that the issues are not resolved internally within the [Trump] administration,” noted the Wall Street analysts at New Street Research in a recent note to investors following Pompeo’s ION roundtable.
Perversely, the Commerce Department’s move could precipitate much keener US interest in contributing to a global standard. China had a similar shift in the days of 3G. Originally determined to build a homegrown standard, dominated by local firms, Chinese authorities changed tack when their TD-SCDMA technology failed to attract much international interest. Subsequently, Chinese companies have concentrated their efforts on being as dominant as possible in the global institutions.
That is a somewhat awkward reality for US hawks. While they can remove Huawei from US networks, they cannot remove the network or technology expertise from Huawei.
As a major licensor of mobile technology, the Chinese firm collects royalties on smartphone sales worldwide.
Let’s face it, Industry 4.0 is not a product that manufacturers can purchase off-the-shelf. Instead, it is an idea and vision that, to implement properly, requires planning, cultural change and new technology. So, is Industry 4.0 really just a pipedream?
At the heart of Industry 4.0 is the digitalization of manufacturing facilities. This could refer to the deployment of industrial hardware, investing in new technology or the use of innovative software. Don’t get us wrong, this doesn’t require an entire system overhaul, nor does it require investment in expensive and state-of-the-art technology.
Aceinna, Inc. has made the list of ABI Research’s Hot Tech Innovators for Transforming Precision Location solutions for its recently announced OpenRTK330L solution, a high-performance triple-band RTK/GNSS receiver equipped with triple redundant inertial sensors.
The OpenRTK330L includes a triple-redundant three-axis MEMS gyroscope and three-axis MEMS accelerometer for dead reckoning. This positioning solution for autonomous vehicles only utilizes valid sensor data and any defective sensor outputs can safely be ignored. This ensures that high accuracy dead reckoning is maintained where GNSS signals are unavailable.
Engineers Without Borders (EWB) began in April 2000 with a project directed by Dr. Bernard Amadei, a civil engineering professor at the University of Colorado Boulder, to establish a reliable, clean water supply for a community in San Pablo, Belize. Dr. Amadei officially founded Engineers Without Borders in 2002, and the organization now encompasses thousands of volunteers and hundreds of high-impact engineering projects across the globe.
An umbrella organization comprised of chapters based in universities and organizations around the globe, EWB works primarily to design sustainable infrastructure for underserved communities globally.
There is much speculation when it comes to the threat presented by ML technologies. Some of this speculation claims future capabilities that are hard to credit.
In this category, for instance, can be found types of AI-driven malware that will intelligently probe for weaknesses in a victim’s systems. The real threat presented by ML – at least at present – is much more limited, and largely relies on training Neural Networks (NNs) to mimic legitimate network traffic or communications.
Among the real-life examples of AI being used in cyberattacks is IBM’s AI-driven proof of concept DeepLocker. This system is able to leverage publicly available data in order to conceal itself from cyber security tools, lying dormant until it reaches its intended target. Once it detects the target — either via facial or voice recognition — it executes its malicious payload.
For decades our industry has used the term “Master / Slave” to denote a set of ICs or firmware/software where one device has control over one or many others. The use of this terminology has always made me and many others feel uneasy. While my “engineering brain” has an idea of what this term defines, my “human brain” relates this as a human condition, a human rights issue.
With all the energy in recent years around symbols of slavery and repression, such as the Confederate Flag, Confederate statues, street names, school names, and seeing the changes that have come about once the issue was brought into the light, I believe it is now time for our industry to make a similar change, eliminate the “master / slave” label, and I believe it is time for IEEE to take a leadership role and demand a change.