The transition to post-quantum cryptography (PQC) is not a theoretical future event. It is the largest cryptographic migration in modern history, already shaping product roadmaps, standards bodies, and infrastructure planning across servers, AI datacenters, telecom, industrial automation, and critical systems. In this interview, we sat down with Mamta Gupta, a leader driving Lattice’s quantum-safe security strategy, to discuss Quantum Day (Q-Day) readiness, crypto-agility, Security Proto...
Artificial intelligence (AI) is rapidly moving out of the datacenter and into the real world, powering everything from industrial robots to autonomous vehicles and smart infrastructure. Edge devices have become the new frontier for AI, driving smarter factories, safer vehicles, and more responsive cities. Meeting the needs of edge applications involves using AI that is efficient, adaptable, and scalable, since these scenarios often involve unique technical constraints and possibilities. As AI ...
The Lattice Mach™ brand of FPGAs has long set the standard for performance, flexibility, and efficiency in board control and security applications. With the launch of the new Lattice MachXO4™ FPGA family, Lattice is redefining what’s possible for control and connectivity in next-generation systems, delivering competitive power efficiency, robust reliability, and design flexibility for a wide range of applications in the Compute, Industrial, Automotive, Consumer, and Communicati...
Interest in edge computing has surged as organizations across industries seek smarter ways to automate processes, enhance productivity, and optimize labor. By processing data closer to its source, edge systems can provide benefits like reduced transmission and storage costs and strengthened security. They can also enable the development of advanced machines and devices, from autonomous mobile robots (AMRs) and humanoids to smart medical devices, which can operate with precision and speed. Thes...
Planning and execution are two very different beasts. A project may appear straightforward on paper, staying within budget, on schedule, and technically sound, only to hit roadblocks in the real world. However, turning ideas into reality isn’t always smooth, and success depends on how well we anticipate and navigate the unknowns. This gap between concept and execution is especially pronounced in the fast-growing realm of edge artificial intelligence (AI). In a recent roundtable discussion...
One of the more exciting developments now happening in the high-tech world is the work being done to enable quantum computing. After decades of theoretical discussion and development, the last few years have shown tangible progress in this radically different (and enormously complex) new method of computing. Quantum computers essentially perform calculations by flipping the electrical charge of individual atoms and allowing them to simultaneously exist in more than one state through a process ca...
Quantum computing is no longer just a concept confined to research labs. Thanks to rapid progress in both hardware and algorithms, the risk to today’s cryptographic systems is steadily increasing. In 2025, Google’s 105-qubit Willow chip and Microsoft’s Majorana 1 processor demonstrated that scalable quantum systems are moving closer to practical reality. Industry experts now predict that quantum computers capable of breaking RSA-2048 encryption could arrive as early as 2030 to ...
Everyone, it seems, is now talking about how they’re planning to integrate AI into their devices, their factories, their workflows and, well, everything. But how they actually plan to make that happen isn’t always clear. Part of the challenge, of course, is that different workloads and different environments require different types of solutions. For those looking to integrate AI-powered capabilities into edge computing-based offerings, there are a relatively broad range of ways to ac...
Building and maintaining connected digital ecosystems that account for today’s evolving cyber threat landscape requires a degree of hardware-based trust, as software-only security approaches are no longer sufficient to protect complex, distributed systems Luckily, today’s developers can reference a foundational example of hardware-based security that has existed for decades: the Trusted Platform Module (TPM). With over four billion TPM units deployed globally across a wide range of u...
Human-machine interfaces (HMIs) are rapidly evolving, driven by trends such as Automotive personalization, sustainable always-on interfaces, hygienic touchless user interfaces (UI), consistent user experience (UX) across platforms, voice activation, and Industrial automation for labor and safety needs. Regardless of their specific drivers and/or use cases, modern HMIs must be smarter and more dynamic – shifting from command-based to context-aware systems that bridge the human-machine...