By David Patterson , Pardee Professor of Computer Science, Emeritus, at UC Berkeley, vice chair of the RISC-V International Board of Directors and Hex Five Advisor.
EETimes (December 13, 2022)
In a little over a decade, RISC-V has arguably become at least the third most important instruction set architecture (ISA) for future applications of computing. In the next few years, it may become just as surprising to pick a proprietary ISA over the open RISC-V for a new project as it would be to pick a closed alternative to Ethernet or USB.
My colleagues at UC Berkeley and I predict that by the end of this decade, the dominant ISA for future product development will be the open RISC-V architecture. Companies around the world are already designing with RISC-V and the momentum is rapidly increasing, so this is a good time for the industry to take a closer look at RISC-V and examine some fallacies about it.
Cybersecurity: What You Need to Know and Do to Protect Yourself and Your Business
June 3, 2020
Embedded applications require a layered security approach. Security through separation is essential, as it shields critical functionality from the attack surface introduced by untrusted large code base software. The days of proprietary, overly complicated, hardware-heavy TEEs are over as this legacy approach has proven inadequate to meet cost and agility requirements of modern IoT applications. Hex Five’s MultiZone Security offers a quick and safe way to add security and separation to RISC-V applications. MultiZone is based on RISC-V standards and can retrofit existing designs: you can take advantage of high security separation without the need for hardware and software redesign, eliminating the complexity associated with managing a hybrid hardware/software security scheme.
June 1, 2020
At Hex Five, we’re focused on finding ways to improve our products and provide a better customer experience. We want to help you build out a proof of concept that works for your business. The Hex Five Early Adopter Program (EAP) provides MultiZone® Security license at no cost and a number of engineering hours at an heavily discounted rate.
Contact us at http://hex-five.com/contact/ to see if your project is eligible for the EAP program *.
* Program available for a limited time.
December 12, 2019
August 4, 2019
July 25 was a gorgeous summer day. It’s also when the Keystone Enclave team hosted the 2019 Open-Source Enclave Workshop at University of California, Berkeley. Industry and academic luminaries representing 23 organizations gathered at Wozniak Lounge, Soda Hall to deliver 25 talks.
Keystone Enclave is an open-source project for building trusted execution environments (TEE) with secure hardware enclaves, based on the RISC-V architecture. Its goal is to build an open-source secure hardware enclave, accessible to everyone in industry and academia.
July 6, 2019
Nov 15, 2018
Here’s why we believe in RISC-V