Blog Review: May 24


Mentor's Andrew Patterson questions who should have control over who sees the vast amounts of data generated by automobiles and how it is used. In a series of posts, Cadence's Meera Collier considers philosophical questions from the angle of computer science. Synopsys' Eric Huang has a lighthearted look at today's world of robots. Rambus' Aharon Etengoff points to Director of National ... » read more

The Week In Review: IoT


Conferences It’s been an action-packed week at Internet of Things World. The show was co-located at the Santa Clara Convention Center with the Connected & Autonomous Vehicles conference. There were lots of deals announced and many products or services debuted at IoT World, which has grown enormously in four years, from 700 attendees at its first event in Palo Alto, Calif., in 2014 to some 14... » read more

The Week In Review: Design


M&A Consultancy Sondrel acquired IMGworks, formerly the design services unit of Imagination. Sondrel says it plans to focus on design services for ADAS systems, AI, and machine vision and learning devices. Terms of the deal were not disclosed. Tools Cadence expanded its formal verification platform, JasperGold, adding linting and clock domain crossing apps that address RTL signoff ... » read more

Blog Review: May 17


Synopsys' Robert Vamosi digs into last Friday's massive ransomware infection that impacted the UK health system, a Spanish telecom, and many other organizations running unpatched Windows – and whether there's a second version out there. Cadence's Paul McLellan reports on the latest developments and future of FD-SOI from the SOI Silicon Valley Symposium. Mentor's Joe Hupcey III chats wit... » read more

Moore’s Law: Toward SW-Defined Hardware


Pushing to the next process node will continue to be a primary driver for some chips—CPUs, FPGAs and some ASICS—but for many applications that approach is becoming less relevant as a metric for progress. Behind this change is a transition from using customized software with generic hardware, to a mix of specialized, heterogeneous hardware that can achieve better performance with less ene... » read more

The Week In Review: Design


Tools Synopsys debuted a tool to replay RTL simulation data on a gate-level netlist for power analysis the company says is accurate within 5% of signoff. The tool, PowerReplay, is design to be used in combination with PrimeTime PX gate-level power analysis for earlier and faster generation of gate-level switching data. IP ClioSoft launched a design reuse ecosystem for searching and com... » read more

The SerDes – Terabit Ethernet Connection


400 Gigabit Ethernet (400GbE) and 200 Gigabit Ethernet (200GbE) are currently slated for official release by the IEEE P802.3cd Task Force in December 2017. Although there is not yet an official IEEE roadmap detailing what lies beyond 400GbE, doubling to 800GbE will likely become a reality when single-lane 112Gbps links hits the market. This technology will allow for larger lane bundles, providi... » read more

Blog Review: May 10


Mentor's Scott Salzwedel checks out what's next for the New Horizons space probe when it comes out of hibernation later this year. Cadence's Paul McLellan provides a look at how NASA took on changing the organization's culture towards safety after the space shuttle Columbia accident. Synopsys' Robert Vamosi points to recent malware that may be affecting between 100K and 200K Windows boxes... » read more

IIoT Grows, But So Do Risks


By Jeff Dorsch & Ed Sperling After years of fitful progress, [getkc id="78" kc_name="Industrial Internet of Things"] technology is gaining adoption on the factory floor, in the electrical power grid, and other areas that could do with greater amounts of data analysis and insights from a connected ecosystem. AT&T, General Electric, IBM, Verizon Communications, and other large ... » read more

Putting A Hardware Root-of-Trust To Work In An Anti-Counterfeiting IC


An anti-counterfeiting security IC is conceptually rather simple: during manufacture, it is securely programmed with some secret data. Then during operation, it can prove to a verifying host that it knows that secret data. This “proof of knowledge” is often all that can be expected of a low-cost security IC. This prove-you-know-the-secret authentication process between the security IC an... » read more

← Older posts