Testing For Security


Ever since the IoT became a household name, people have been strategizing about ways to utilize non-secure devices to mount an attack. The first instances of using electricity to overload a device's circuits, thereby neutralizing existing security features, came to light in some of the earliest car hacking incidents. These are basically side-channel attacks using what amounts to an electroni... » read more

Software Modeling Goes Mainstream


Software modeling is finally beginning to catch on across a wide swath of chipmakers as they look beyond device scaling to improve performance, lower power, and ratchet up security. Software modeling in the semiconductor industry historically has been associated with hardware-software co-design, which has grown in fits and starts since the late 1990s. The largest chipmakers and systems compa... » read more

FDA: Postmarket Management of Cybersecurity in Medical Devices


Source: U.S. Food & Drug Administration, Center for Devices & Radiological Health dated 12/28/16 "The Food and Drug Administration (FDA) is issuing this guidance to inform industry and FDA staff of the Agency’s recommendations for managing postmarket cybersecurity vulnerabilities for marketed and distributed medical devices. In addition to the specific recommendations contained in this gui... » read more

Overcoming The Limits Of Scaling


Semiconductor Engineering sat down to discuss the increasing reliance on architectural choices for improvements in power, performance and area, with [getperson id="11425" comment=" Sundari Mitra"], CEO of [getentity id="22535" comment="NetSpeed Systems"]; Charlie Janac, chairman and CEO of [getentity id="22674" e_name="Arteris"]; [getperson id="11032" comment="Simon Davidmann"] CEO of [getentit... » read more

The Real Differences Between HW And SW


How many times have we heard people say that hardware and software do not speak the same language? The two often have different terms for essentially the same thing. What hardware calls constrained random test is what software people call fuzzing. Another one recently caught my eye in a conversation with Jama Software, a Portland software company that has made a name for itself in requiremen... » read more

Embedded Evolution


The design of embedded systems has changed drastically from the days when I was directly involved with them. My first job after leaving college was to design aircraft control systems. I had the dubious honor to be working on the first civilian fly-by-wire aircraft – the Airbus A310. The reason I say dubious is that we had so many eyes trained on us, and that system contained so much redundanc... » read more

New Starting Point


Debate has been raging for years about whether software or hardware should be the starting point for improving power and performance, or whether it should elevated another notch by fusing hardware and software into a system-level approach. Now, groups like Leti, IEEE, SEMI, and a number of researchers in leading universities around the globe are beginning to talk about moving the starting point... » read more

Turning Verification Inside Out


A new motivation for rebalancing came to me during a conversation I had a couple weeks ago at the Agile Alliance Technical Conference. I had the chance to compare my day-to-day responsibilities with those of Lisa Crispin. Lisa is a software test expert that is very well regarded within the [getkc id="182" comment="Agile Development"] community. Think of her as a Harry Foster/Janick Bergeron typ... » read more

Tech Talk: ISO 26262


Arteris' Kurt Shuler talks about the automotive design standard, how it applies to semiconductors, and where engineers run into problems. » read more

What Is Cyberwarfare?


Cyberwarfare is emerging as the most sophisticated battleground of the 21st century. In fact, the military in all major countries make it a priority. Collectively they are spending tens of billions of dollars on education and building a knowledgebase of how attacks can be perpetrated and what defenses are needed. The entire effort is based on technology, both legacy and new, starting on the ... » read more

← Older posts