.advertise@offshoreoiljobs.co.uk

.www.offshoreoiljobs.co.uk

Engineering News

Research underway to address latest viral threat — ScienceDaily

The new cluster of viral pneumonia cases originating in Wuhan, China, marks the third time in 20 years that a member of the large family of coronaviruses (CoVs) has jumped from animals to humans and sparked an outbreak. In a new JAMA Viewpoint essay, Anthony S. Fauci, M.D., director of the NIH’s National Institute of Allergy and Infectious Diseases (NIAID), looks back at two earlier novel CoV outbreaks that initially caused global havoc and describes steps needed to contain the…

New Report: China’s Memory Ambitions

Advanced electronic systems for connected autonomous vehicles (CAVs) and other safety- and security-critical applications use complex software stacks. At the bottom of the stack are integrated circuits (ICs) that include general-purpose and workload-optimized processing engines, and other semiconductor intellectual properties (IPs). However, hardware vulnerabilities may compromise the entire system. Ensuring that ICs, both ASICs and FPGAs, have high integrity requires adequate hardware-development flows that deliver evidence of functional correctness (the IC satisfies its intended mission requirements), safety (the IC can…

Particle Accelerator Fits on a Chip

Stanford researchers built a particle accelerator that fits on a chip, miniaturizing a technology that can now find new applications in research and medicine. On a hill overlooking Stanford University, the SLAC National Accelerator Laboratory operates a particle accelerator scientific instrument nearly two miles long. In this giant accelerator, a stream of electrons flows through a vacuum pipe while bursts of microwave radiation push the electrons faster and faster until their velocity approaches the speed of light. Now scientists at…

Delivering 5G Devices to Market Will Bank on OTA Testing

The biggest challenge in testing 5G devices, as opposed to 4G/LTE, is the reliance on active antenna arrays and high RF frequencies. These frequencies are far higher than what we have ever used before in a commercial communication system. Frequency range 1 (FR1), which will transmit most of the traditional cellular communications traffic, has been designated for 450 to 7125 MHz. Frequency range 2 (FR2) will employ millimeter-wave (mmWave) frequencies (24,250 to 52,600 MHz) to deliver short-range, high-data-rate transmission. Higher…

Ada and RISC-V Secure Nvidia’s Future

As the electronic systems in today’s cars become more sophisticated, it rapidly ramps up the number of sensors feeding mission-critical data into the electronic control unit (ECU). For drivers, it’s imperative to feel confident that the advanced driver-assistance system (ADAS) hasn’t been compromised by something as seemingly benign as an auto-repair shop using non-authentic parts to repair the vehicle. Likewise, an OEM would want to mitigate liability in these situations and notify consumers if the system, and thus driver safety,…

Engineering Scholar to Continue Studies

Recent Mizzou Engineering graduate Luke Guerdan liked to stay busy when he was a student studying computer science and psychology, with a minor in mathematics.  As a student, Guerdan served as president of the Mizzou Computing Association, was a Fellowships Office ambassador, and helped fellow students as a mentor with the Peer Undergraduate Mentoring Program. As an undergraduate researcher, Guerdan worked in Prof. Yi Shang’s Distributed and Intelligent Computing lab, where he developed artificial intelligence methods for decoding human cognition…

Designing a Production-Ready Kappa Architecture for Timely Data Stream Processing

At Uber, we use robust data processing systems such as Apache Flink and Apache Spark to power the streaming applications that helps us calculate up-to-date pricing, enhance driver dispatching, and fight fraud on our platform. Such solutions  can process data at a massive scale in real time with exactly-once semantics, and the emergence of these systems over the past several years has unlocked an industry-wide ability to write streaming data processing applications at low latencies, a functionality previously impossible to…

Android App Modularization at Wealthfront (Part 3) – Engineering Blog

In the previous blog post, we looked at how we started with modularization and refactored our existing code into the legacy module which was ready to be modularized into smaller infrastructure and feature modules. In this blog post, we will go in detail about how we’d refactored our infrastructure modules with the help of interfaces.  Phase 3 – Breaking out the infra modules The next part of the project was to break out the legacy module into smaller modules. The…

Android App Modularization at Wealthfront (Part 2) – Engineering Blog

In the previous blog post, we looked at how the project was initially set up, and now we will take a look at how we started organizing features into Gradle modules. To ensure a consistent bucketing strategy throughout the migration period, we decided that it would be ideal to place any new code inside dedicated feature modules. We decided if we didn’t stop the inflow of more code into the root module, we would have to keep modularizing the new…

Prevent Automotive Counterfeiting with Secure Authentication

As the electronic systems in today’s cars become more sophisticated, it rapidly ramps up the number of sensors feeding mission-critical data into the electronic control unit (ECU). For drivers, it’s imperative to feel confident that the advanced driver-assistance system (ADAS) hasn’t been compromised by something as seemingly benign as an auto-repair shop using non-authentic parts to repair the vehicle. Likewise, an OEM would want to mitigate liability in these situations and notify consumers if the system, and thus driver safety,…