Lock-step "checker" cores running two steps behind sound like a good way to detect hardware failures, power glitches, or electrical interference that corrupt data processing. Can they help with hackers or malicious disruption? It would seem that whatever mechanism exists to allow software upgrades to alter the master and checker software could be exploited by hackers.
Certifying ISO 26262 compliance in order to meet worldwide mandates for tougher safety and security standards should get a leg up from Freescale's SafeAssure program, which also covers International Electrotechnical Commission (IEC) 61508 and other emerging standard. Details at:
As we unveil EE Times’ 2015 Silicon 60 list, journalist & Silicon 60 researcher Peter Clarke hosts a conversation on startups in the electronics industry. Panelists Dan Armbrust (investment firm Silicon Catalyst), Andrew Kau (venture capital firm Walden International), and Stan Boland (successful serial entrepreneur, former CEO of Neul, Icera) join in the live debate.