LG launches LG8111 AI SoC and development board for Edge AI processing
LG launches LG8111 AI SoC and development board for Edge AI processing
LG Electronics has designed LG8111 AI SoC for on-device AI inference and introduced the Eris Reference Board based on the processor. The chip supports hardware processing in artificial intelligence functions such as video, voice, and control intelligence. LG8111 AI development board is capable of implementing neural networks for deep learning specific algorithms due to its integrated “LG-Specific AI Processor.” Also, the low power and the low latency feature of the chip enhances its self-learning capacity. This enables the products with LG8111 AI chip to implement “On-Device AI.”
Components and Features of the LG8111 AI SoC
- LG Neural engine, the AI accelerator has an extensive architecture for “On-Device” Inference/Leaning with its support on TensorFlow, TensorFlow Lite, and Caffe.
- The CPU of the board comes with four Arm Cortex A53 cores clocked at 1.0 GHz, with an L1 cache size of 32KB and an L2 cache size of 1MB. The CPU also enables NEON, FPU, and Cryptography extension.
- The camera engine has a dual ISP pipeline with a parallel interface with an enhanced HDR preprocessing feature. This enables Lens distortion correction and Noise reduction while capturing images
- The vision accelerator on the board has a dedicated vision for Digitial Signal Processing. This enables feature extraction and image warping.
- The Video encoder and Voice engine support full HD video H.264 encoding and “Always-on” voice recognition respectively.
Solution Highlights of LG LG8111 AI
The “On-Device” artificial intelligence makes the chip independent from the limitations of always-on network connectivity, which is a major challenge in artificial intelligence. The chip supports AWS IoT Greengrass that provides an environment in which data is processed locally when generated through the device.
The integration of the board with AWS IoT Greengrass allows for easier deployment of a variety of solutions. Also, besides the “On-Device Artificial Intelligence feature mentioned above, the LG8111 AI development board can provide improved Sensor Data collection/analysis and ML Inference performance.” There are many component-specific solution highlights on the board, this could be found on the official product page.
LG LG8111 AI Development Board Specifications
The LG8111 AI development board supports the Ubuntu 18.04 environment and consists of Reset, USB Host, UART Debug Port, and Power. It uses an integrated Wi-Fi platform for network connectivity that works at 2.4 GHz only.
- Hardware Architecture: ARM
- Operating System: Linux(Other), Ubuntu
- Programming Language: C/C++
- I/O Interfaces: Camera, GPIO, I2C, MIPI, PWM, SD, UART, USB
- Network: Wi-Fi 2.4 GHz only
- Security: Hardware Encryption, Secure Boot, TEE
- Mounting/ Form Factor: Embedded
- Storage: eMMC
- Environmental: Industrial (-40 to 85 C)
- Power: Battery
Conclusion
LM8111 AI development board provides “On-Device AI” functionalities because of its ability to localized processing of the data generated by the device. The low power and low latency feature of the board should make it even more popular. The AWS IoT Greengrass integration makes it dynamic for the deployment of a variety of applications and solutions. LG Neural Engine makes this board a “Low-power AI SoC solution.”
AWS says “The Eris Reference Board for the LG8111 delivers a cost-effective machine learning device development platform for applications such as image classification/recognition, speech recognition, control intelligence, and more.”
If you want more information about the LG8111 AI chip or you want to buy the reference board then contact the company at this email address: [email protected].
Images have been taken from the official product page and the user guide.
Saumitra Jagdale is a backend developer, freelance tech author, open source contributor in Python projects, passionate AI/ML enthusiast, and the leader of Tensorflow Community India.
Published at Sun, 27 Dec 2020 03:00:00 +0000
A Cybersecurity Checklist For 2021: 6 Ways To Help You Protect Yourself In Coming Year
2021 Text with binary code
getty
2020 has been a perilous challenge for everyone across the globe. It was the year of the virus, from both a biological and a digital perspective.
We were unexpectedly infected by Covid19, a deadly and disruptive virus that changed our way of living. Thankfully, great strides are being made in therapeutics, and vaccines are on the way. The unexpected happened in 2020, and it served as an urgent wake-up call on the need for better pandemic preparedness.
Similarly, the digital scourge of cyber-attacks and breaches, exacerbated by the need for an ecosystem of immediate remote work to avoid Covid19, was calamitous. Hackers took advantage of the gaps in new remote work environments as the global cyber-attack surface greatly expanded. Governments, companies, organizations, and individuals have paid a heavy price from breaches and from ransomware attacks—clearly, we were not adequately prepared for the digital virus either. 2021 needs to be the year for cybersecurity preparedness.
With most businesses operating remotely, in 2020 hackers stepped up attacks against an expanded and target-rich environment. Breaches almost doubled from 2019. The surge correlates to an expanded attack surface. This comes as no surprise because there were close to 4.6 billion Internet users active as of July 2020, representing 59% of the world’s population. Internet users in the world 2020 | Statista Online crimes reported to the FBI’s Internet Crime Complaint Center (IC3) nearly quadrupled as a result of the COVID-19 pandemic.
In 2021, the work from home trend will continue and cybersecurity will continue to be a major challenge. According to Cybersecurity Ventures, it is estimated that cybercrime will cost the world $6 trillion annually by 2021. The Herjavec Group envisions that a business will fall victim to a ransomware attack every 11 seconds by 2021. 107 Must-Know Data Breach Statistics for 2020 | Varonis
Global Cybercrime Damage Costs
Cybersecurity Ventures
The means and capabilities of attack for hackers are varied across levels of sophistication and depending upon the actors, some who are related to organized crime groups or, especially, nation states. Financial gains are still the main motivation behind most cyber-attacks. Phishing has been a tried-and-true method of gaining access to company and personal data. It is usually done by employing a fake website which is designed to look like the actual website. The purpose of this attack is to trick the user into entering their username and password into the fake login form, which allows the hacker to steal the identity of the victim. Hackers can easily mimic known brand websites, banks, and even people you may know.
Another method of hackers to reap havoc has been the growing trend of ransomware. Although ransomware has been around for years, it has become a more prevalent method for hackers as they can operate under the cover of cryptocurrencies that are more difficult to trace. Ransomware can hold computers, and even entire networks, hostage for electronic cash payments. Cybersecurity Ventures forecasts that global ransomware damage costs to reach $20 billion by 2021 — which is 57X more than it was in 2015. Cybercrime To Cost The World $10.5 Trillion Annually By 2025 (cybersecurityventures.com)
There a many more types of cyber- threats, and their impact is accelerated by machine learning and artificial intelligence technologies that are allowing hackers to pinpoint vulnerabilities in networks and on devices for exploits.
The fundamental question for most companies and individuals is what can be done to better protect data in the increasingly connected global digital landscape. Below are a few basic actions we can undertake to make ourselves safer.
10 Steps for Cybersecurity Protection in 2021
1) Learn: It all starts by having a risk management perspective. Learn what you need to do from open sources. Gather insights from informational resources available in the media. Network with those who have expertise or experience that mirrors your customized cybersecurity needs.
2) Create a Cybersecurity Framework: Explore Cybersecurity Frameworks such as NIST or MITRE ATT&CK®. which offer guidance on technical organization and response programs that identify and suggest means to mitigate gaps for cyber-threats. Cybersecurity frameworks are based upon lessons learned and continually modified to address new threats, including an incident response to a breach. Your goal should be to use these frameworks to create barriers to breach and policies for resilience.
Framework resources
NIST
3) Enact basic Cyber Hygiene: For example, do you have strong passwords and multi-factor authentication? Is your key data backed up? Do you use a secure WIFI? Do you need to use a virtual private network or encryption? Be sure to update your anti-virus software applications and regularly patch security flaws as they are updated. Referring
back to item #1, there are many good lists available on proper cyber hygiene you can adapt as your own. I recommend This CyberAvengers Graphic:
Good Cyber Hygiene Checklist
CyberAvengers
4) Be on the lookout for social engineering attacks: With the volumes of social media information out there on your personal likes and dislikes, hackers can figure ways to reach out to you with malware via phishing. Always look at who the emails or texts are actually from (not who they pretend to be from), and do not open up any files that are suspicious. Always be suspicious and operate on the premise of zero trust when it comes to social engineering threats.
5) The Internet of Things (IoT) has arrived and prepare for it: Each IoT device represents an attack surface that can be an avenue into your data for hackers. A Comcast report found that the average households is hit with 104 threats every month. The most vulnerable devices include laptops, computers, smartphones and tablets, networked cameras and storage devices, and streaming video devices, a new report found. Cybersecurity report: Average household hit with 104 threats each month – TechRepublic An important step to take is to change your default passwords on any IoT devices you have in your network.
6) Consider outsource security services: If you have a small or medium sized busines, consider bringing in outside cybersecurity expertise or managed service. They can augment your security posture with your internal IT shop and perform vulnerability assessments and recommend solutions and services that are most applicable to your industry requirements.
These are six basic actions to make cyber life easier in 2021. Nobody is fully invulnerable to breaches, but we can all take actions to improve cybersecurity. Wishing you a cyber-safer, healthier, and happier 2021!
Group of people. Human Resources. Global network. Diversity.
getty
Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. He is a two-time Presidential Appointee and served ten year on The Hill to a United States Senator on security issues. GovCon & Executive Mosaic named him as one of the top executives to follow on government cybersecurity. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” a “Top Cybersecurity Expert to Follow in 2021” by Cybersecurity Ventures, and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was featured in the 2020 Onalytica “Who’s Who in Cybersecurity” – as one of the top Influencers for cybersecurity issues. Chuck, who is also Adjunct Faculty for Georgetown University’s Graduate Cybersecurity Risk and Applied Intelligence Programs, briefed the G-20 Energy Conference on operating systems cybersecurity. Chuck has an M.A. from the University of Chicago, and a BA from DePauw University.
Chuck Brooks LinkedIn Profile:
Chuck Brooks on Twitter: @ChuckDBrooks
Published at Sat, 26 Dec 2020 23:15:00 +0000

You must be logged in to post a comment.