Tagged articles
27 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
May 10, 2026 · Fundamentals

SOC vs MCU in Embedded Devices: Key Differences Explained

The article compares SOC and MCU for embedded systems, using analogies, performance and power benchmarks, development ecosystem contrasts, and cost considerations to show how each fits different application requirements and why choosing the right one matters.

MCUSOCcost analysis
0 likes · 6 min read
SOC vs MCU in Embedded Devices: Key Differences Explained
AI Waka
AI Waka
Apr 27, 2026 · Information Security

Building Intelligent Security Agents with Claude Skills: A Complete AI Cybersecurity Guide

The article explains how Anthropic’s Claude Skills framework enables AI agents to execute expert-level cybersecurity tasks by organizing 734+ MITRE ATT&CK‑mapped skills, detailing their structure, progressive loading, real‑world workflows, deployment steps, customization, and the operational benefits for SOCs, detection engineers, and incident responders.

AI securityAgent SkillsClaude
0 likes · 17 min read
Building Intelligent Security Agents with Claude Skills: A Complete AI Cybersecurity Guide
Black & White Path
Black & White Path
Mar 24, 2026 · Information Security

RSAC 2026: How AI Has Split Cybersecurity into Two Parallel Wars

At RSAC 2026, analysts warned that AI is reshaping cybersecurity into two simultaneous battles—rebuilding defenses with AI and protecting AI systems themselves—while attack timelines have collapsed from nine days to thirty minutes, forcing defenders to rethink SOC operations, architecture, and readiness.

AIAI-native ArchitectureRSAC 2026
0 likes · 14 min read
RSAC 2026: How AI Has Split Cybersecurity into Two Parallel Wars
Black & White Path
Black & White Path
Mar 4, 2026 · Information Security

Why Intent Detection Is the Only Way to Outrun AI-Powered Threats

As AI enables attackers to mass‑generate phishing emails and morph malware, traditional signature‑based defenses crumble, and the article explains how intent detection shifts security from static signatures to behavior‑based analysis, offering SOCs proactive alerts, reduced alert fatigue, and a way to counter AI‑driven attacks while acknowledging data quality, adversarial, and explainability challenges.

AI ThreatsBehavioral AnalysisIntent Detection
0 likes · 9 min read
Why Intent Detection Is the Only Way to Outrun AI-Powered Threats
Data Party THU
Data Party THU
Sep 14, 2025 · Big Data

How to Evaluate Battery Storage Health with Big Data and LightGBM

This report details a university big‑data project that builds a data‑driven framework for assessing lithium‑ion battery storage health, cleaning operational data, detecting abnormal cells with DBSCAN, and predicting SOC/SOH using LightGBM, while highlighting findings, limitations, and future improvements.

Big DataDBSCANLightGBM
0 likes · 4 min read
How to Evaluate Battery Storage Health with Big Data and LightGBM
Architects' Tech Alliance
Architects' Tech Alliance
Mar 22, 2023 · Fundamentals

Overview of Huawei Kunpeng 920 Processor Architecture and Subsystems

The article provides a detailed technical overview of Huawei's Kunpeng 920 processor, describing its ARM‑based RISC architecture, chip organization, core and cache hierarchy, security features, IMU management, and the design of its I/O, interrupt, network, SAS, and PCIe subsystems.

ARMHigh‑performance computingKunpeng
0 likes · 10 min read
Overview of Huawei Kunpeng 920 Processor Architecture and Subsystems
Architects' Tech Alliance
Architects' Tech Alliance
Dec 10, 2022 · Fundamentals

Comprehensive Overview of System-on-Chip (SoC) Architecture, History, and Market Trends

This article provides a detailed introduction to System-on-Chip (SoC) technology, covering its definition, component hierarchy, IP‑core concepts, historical milestones, typical architectures, instruction‑set families, AI‑enabled variants, and current market dynamics across mobile, server, and high‑performance computing domains.

AIHardwareMarket Trends
0 likes · 10 min read
Comprehensive Overview of System-on-Chip (SoC) Architecture, History, and Market Trends
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Sep 16, 2022 · Information Security

Overview of TrustZone‑Based SoC Components and CryptoCell Architecture

The article outlines ARM TrustZone‑enabled SoC components and the CryptoCell architecture, describing its two product families (700 and 300), hardware modules for symmetric and asymmetric cryptography, secure key slots, the CRYS software library, and their roles in secure‑boot, lifecycle management, debugging and data protection.

ARMCryptoCellSOC
0 likes · 8 min read
Overview of TrustZone‑Based SoC Components and CryptoCell Architecture
Dada Group Technology
Dada Group Technology
Jun 20, 2022 · Information Security

Design and Implementation of JD Daojia Security Operations Center (SOC) Platform

This article details the challenges, design choices, deployment steps, detection model creation, data processing, visualization, and future plans of JD Daojia's security operations platform, highlighting the use of Graylog, Elasticsearch, and MongoDB to achieve scalable, real‑time threat detection and response.

Data visualizationGraylogSOC
0 likes · 16 min read
Design and Implementation of JD Daojia Security Operations Center (SOC) Platform
Architects' Tech Alliance
Architects' Tech Alliance
Apr 19, 2022 · Artificial Intelligence

Overview of AI Chip Development, Architectures, and Market Trends in China (2022)

The article provides a comprehensive overview of AI chip technology, describing the dependence on mathematical models and semiconductor integration, classifying chips by architecture (GPU, FPGA, ASIC, SoC, brain‑like), deployment (cloud, edge, terminal), and outlining current challenges, market trends, and future research directions such as in‑memory and neuromorphic computing.

AI ChipASICFPGA
0 likes · 11 min read
Overview of AI Chip Development, Architectures, and Market Trends in China (2022)
Architects' Tech Alliance
Architects' Tech Alliance
Oct 8, 2021 · Industry Insights

What Is a SoC? Market Growth, History, and Future Trends Explained

The article defines System‑on‑Chip (SoC), outlines its key components and advantages, presents market size data showing rapid growth from 2017 to 2023, reviews the technology’s origins in the mid‑1990s, and highlights emerging trends such as the convergence of SoC, MEMS and SiP technologies.

Future IntegrationMarket TrendsSOC
0 likes · 4 min read
What Is a SoC? Market Growth, History, and Future Trends Explained
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Aug 6, 2021 · Operations

Intelligent Power Allocation (IPA) Governor: Architecture, PID Control, and Power Allocation in the Linux Kernel

The Intelligent Power Allocation (IPA) governor, introduced in Linux kernel 4.2, uses a PID‑based closed‑loop controller and a dynamic power allocator to distribute sustainable power among CPU, GPU and other IP cores, maximizing performance while respecting temperature limits, but requires careful PID tuning and device‑tree configuration.

Linux kernelPID controllerSOC
0 likes · 9 min read
Intelligent Power Allocation (IPA) Governor: Architecture, PID Control, and Power Allocation in the Linux Kernel
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jun 18, 2021 · Operations

CPU Power Consumption, Low‑Power Modes, and Core Control Framework

CPU power consumption comprises static leakage and dynamic switching energy, so modern SoCs use low‑power C‑states and core‑control isolation to shut down idle cores, with the kernel’s corectl module dynamically evaluating load and task counts each scheduler tick to decide how many CPUs to activate or deactivate, configurable via sysfs.

CPU powerDynamic ScalingKernel Module
0 likes · 11 min read
CPU Power Consumption, Low‑Power Modes, and Core Control Framework
IT Architects Alliance
IT Architects Alliance
Oct 4, 2020 · Industry Insights

How Huawei Built a Five‑Series Chip Empire: From 1991 to AI Powerhouses

This article traces Huawei’s three‑decade journey from its modest 1991 chip beginnings to a diversified portfolio of five major series—Kirin, Kunpeng, Ascend, Balong/Tiangang, Boudica/Lingxiao, and Honghu—detailing their technical evolution, market impact, and future roadmap across mobile, compute, AI, 5G, IoT, and video domains.

5GAIChip Design
0 likes · 18 min read
How Huawei Built a Five‑Series Chip Empire: From 1991 to AI Powerhouses
ITPUB
ITPUB
Aug 9, 2020 · Fundamentals

How Five Undergraduates Designed a 64‑bit RISC‑V Chip and Graduated with Their Own Processor

Five 2016‑class undergraduates from the University of Chinese Academy of Sciences completed a 64‑bit RISC‑V SoC chip named "NutShell," successfully fabricated it in 110 nm, ran Linux and a custom teaching OS, and presented the open‑source design at the RISC‑V Global Forum, showcasing a novel "One Life One Chip" education model.

Chip DesignRISC-VSOC
0 likes · 19 min read
How Five Undergraduates Designed a 64‑bit RISC‑V Chip and Graduated with Their Own Processor
Architects' Tech Alliance
Architects' Tech Alliance
Jul 21, 2020 · Fundamentals

Key Features and Advantages of DDR5 DRAM

The article provides a comprehensive overview of DDR5 DRAM technology, detailing its higher density, lower voltage, increased data rates, enhanced reliability features, and its suitability for servers, cloud computing, networking, laptops, desktops, and consumer SoC applications.

DDR5DRAMMemory
0 likes · 8 min read
Key Features and Advantages of DDR5 DRAM
Efficient Ops
Efficient Ops
Jun 10, 2020 · Information Security

Mastering Log Standardization: Boost Security Analytics with Flexible Parsing

This article explains why standardized log parsing is crucial for security analytics, outlines key parsing concepts, compares pre‑ and post‑parsing approaches, discusses flexible custom parsing methods, and offers practical guidance to improve accuracy and efficiency in large‑scale security environments.

SOCcustom parsinginformation security
0 likes · 12 min read
Mastering Log Standardization: Boost Security Analytics with Flexible Parsing
HomeTech
HomeTech
Jul 31, 2019 · Information Security

Enterprise Intrusion Detection System Architecture and Feature Overview

This document outlines the background, challenges, and a comprehensive enterprise intrusion detection solution that combines host‑based and network‑based monitoring, automated CVE and GitHub leak collection, a modular agent‑middle‑display architecture, and future plans for multi‑dimensional threat modeling to enhance preventive security capabilities.

CVE collectionSOCasset visualization
0 likes · 10 min read
Enterprise Intrusion Detection System Architecture and Feature Overview