Deals: Mentor-Solido, Marvell-Cavium


Marvell today signed a definitive agreement to buy Cavium for roughly $6 billion, ending weeks of speculation about whether the deal would go through. And Mentor, a Siemens business, paid an undisclosed price to buy Solido Design Automation, which tracks variation in complex designs. Both deals are part of a new flurry of M&A activity across the semiconductor industry as the industry ret... » read more

IoT Security Risks Grow


Semiconductor Engineering sat down to discuss security issues with Asaf Shen, vice president of marketing for security IP in [getentity id="22186" e_name="ARM's"] Systems & Software Group; Timothy Dry, principal staff marketing manager for the Industrial IoT segment at [getentity id="22819" comment="GlobalFoundries"]; Chowdary Yanamadala, senior vice president of business development at Cha... » read more

IoT Security Ratings Needed


Concerns about security have been growing alongside adoption of the IoT, and it seems to be making some headway. This is good news, if it continues, because one of the biggest concerns about buying connected devices is that they can provide inroads into personal data. Data security has been a persistent annoyance for several years. Almost anyone who travels or shops at major department store... » read more

IoT Security Risks Grow


Semiconductor Engineering sat down to discuss security issues with Asaf Shen, vice president of marketing for security IP in ARM's Systems & Software Group; Timothy Dry, principal staff marketing manager for the Industrial IoT segment at GlobalFoundries; Chowdary Yanamadala, senior vice president of business development at ChaoLogix; and Eric Sivertson, CEO of Quantum Trace. What follows ar... » read more

IoT Security Risks Grow


Semiconductor Engineering sat down to discuss security issues with Asaf Shen, vice president of marketing for security IP in [getentity id="22186" comment="ARM"]'s Systems & Software Group; Timothy Dry, principal staff marketing manager for the Industrial IoT segment at GlobalFoundries; Chowdary Yanamadala, senior vice president of business development at [getentity id="22819" comment="Glob... » read more

Next-Gen Botnets


Botnets, once limited to computer networks, are expanding and changing as more devices are connected to the Internet—and becoming much harder to detect and destroy. The term botnet—a contraction for robotic networks—conjures up the days when it was just a collection of computers that were largely autonomous, on a local network and usually assigned to repetitive tasks. But that is chang... » read more

White-Box Crypto Gains Traction


Ask any cryptography expert which is better, hardware- or software-based cryptography, and they'll almost always choose the hardware. But as the IoE begins to take root in cost-sensitive markets with tight market windows, that won't always be an option. Plan B is software cryptography, which historically has been used at the application level in the form of anti-virus, anti-spyware, and soft... » read more

Smarter Cities


One of the benefits touted by IoE proponents is that smart cities will improve the quality of life and make cities more “livable.” The concept is appealing, and if it comes to pass as visionaries hope, the smart city of the future will be a virtual cornucopia of convenience and efficiency. Residents and vistors will never be lost with the proliferation of location technologies, which als... » read more

The Rise Of Dynamic Networks


The Internet of the future, and particularly the [getkc id="260" comment="Internet of Everything"], will be interlaced with millions if not billions of intelligent, dynamic, self-organizing networks. These networks will be full of elements that are capable of autonomic self-registration across these multitudes of networks. It is one thing to put up a security perimeter when you know who the... » read more

Rising Threats From Differential Power Analysis


Differential power analysis (DPA) has been a threat vector on the chip landscape for a number of years. It was discovered around the mid 1990s by the teams at [getentity id="22671" e_name="Rambus"]’ Cryptography Research Division, and turned out to be a very effective tool for compromising the ubiquitous SIM card environment. “The most traditional market for DPA has been with smart cards... » read more

← Older posts