The Week in Review: IoT


Cybersecurity The U.S. and U.K. governments collaborated on an unprecedented message on Monday, together warning that Russian cyberattacks may extend beyond government and private organizations to individual homes and offices. The attacks may focus on Internet of Things devices, said Rob Joyce, the cybersecurity coordinator for the National Security Council, who soon after resigned from the Wh... » read more

Meeting The Challenges Of The 2018 National Defense Strategy


In Secretary of Defense James Mattis’ Summary of the 2018 National Defense Strategy: Sharpening the American Military’s Competitive Edge, he provides a critical framework for driving “urgent change at significant scale.” This paper describes the role that Cadence can play in assisting the nation and its partners in achieving that urgency and scale of change called for in the vision and ... » read more

Blog Review: Dec. 13


Mentor's Sherif Hany notes that pattern matching isn't just for litho hotspots anymore, and is increasingly being used in a wide range of early design phase checks, DRC flows, layout retargeting and fixing and DFM checks. Synopsys' Eric Huang explains why USB cables have gotten so short, even though no length is mentioned in the specification. Cadence's Paul McLellan listens in as Jeremy ... » read more

The Week In Review: IoT


Mergers & Acquisitions Qualcomm reported that the waiting period under the Hart-Scott-Rodino Antitrust Improvements Act of 1976 expired on Monday, April 3, clearing the chip design company’s proposed $47 billion acquisition of NXP Semiconductors, at least in the eyes of U.S. antitrust regulators. Qualcomm expects to close the transaction, which will create an Internet of Things powerhouse, b... » read more

Intel Plus Altera


Since the Intel-Altera deal reached the handshake phase earlier this month, there have been a lot of theories being forwarded and a lot of questions being raised. And there have been very few answers, in part because the deal isn't finalized yet and in part because this marriage will take time to play out in the market—maybe years. But along with the GlobalFoundries-IBM pairing, this is th... » read more

What’s Really Inside?


Is it just paranoia, or do devices ranging from industrial controls to military hardware really contain malicious code, Trojan Horses, and remotely triggered back doors? The answer is "maybe not" if you're an optimist, and "maybe" if you're a pessimist, but no one really knows for sure. And that's what really worries security experts, particularly as more devices are connected to other devices.... » read more

Supply Chain Corruption


The more the chip supply chain relies on third-party sources, the greater the risk for a design containing potential malicious code or functions. Today, complex and sophisticated ICs are ubiquitous in virtually every industry. They are being relied upon, as never before, to control critical infrastructure subsystems such as power, finance, communications, and transportation. In a recent r... » read more

The Next Big Threat: Manufacturing


The business adage that you’re only as good as your partners should be a core principle of doing business when it comes to security. But with a complex SoC you don’t always know all your partners, who financed them—or worse, who else they’re working with or working for. Consider this scenario: A band of sophisticated thieves grinds off the top of an SoC package, inserts probes to map... » read more