Optimizing Multiple IoT Layers


As the number of connected devices rises, so do questions about how to optimize them for target markets, how to ensure they play nicely together, and how to bring them to market quickly and inexpensively. [getkc id="76" kc_name="IoT"] is broad term that encompasses a lot of disparate pieces for devices, systems, and connected systems. At the highest levels are hardware and software, but with... » read more

Accelerating DO-254 Approval


This white paper explores software tools as they relate to meeting the DO-254 Design Assurance Guidance for Airborne Electronic Hardware specifications, and what steps must be performed in order to use your typical design automation tools such as simulation, synthesis, etc. In this paper, we will explore how DO-254 views tools, learn which tools receive the highest scrutiny and why, and how to ... » read more

From Specification To Virtual Prototype


Differentiation and success for any embedded system comes from how effectively and rapidly new software features can be added. System and semiconductor manufacturers that historically aimed only at being effective at developing hardware have found themselves less competitive in the fierce battle for volume sockets in the mobile, consumer or automotive domains. The secret for success comes in mi... » read more

The Limits Of Parallelism


Parallelism used to be the domain of supercomputers working on weather simulations or plutonium decay. It is now part of the architecture of most SoCs. But just how efficient, effective and widespread has parallelism really become? There is no simple answer to that question. Even for a dual-core implementation of a processor on a chip, results can vary greatly by software application, operat... » read more

Oscilloscopes: The EE’s Stethoscope


Oscilloscopes are like the electricity to your house. You don't give it much thought until a storm knocks it out. The entire electronics industry can't function without oscilloscopes. But this equipment is such a constant and so consistent, we sometimes forget it's there. Semiconductor Engineering spent time with three Test & Measurement (T&M) industry stalwarts to talk about Oscillo... » read more

Toward Real-World Power Analysis


The expansion of emulation into new fields, rather than just functional verification, is making it possible to do power analysis over longer spans of time. The result is a fast and effective way to analyze real-world scenarios. This is a new field, and it marks a new use of this technology. While it is still evolving, several ideas have surfaced about the best methodology and the best way to... » read more

What’s Next For IoT Security?


By Ed Sperling & Jeff Dorsch With security, the little things can cause as much of a problem as the big things. As shown in the recent distributed denial of service attack (DDoS) on Dyn, which created waves of attacks using Mirai malware, connected devices of all sizes can be amassed into an army of bots that can bring even giants like Amazon and Netflix to a dead stop. This attack was ... » read more

Is Security All Talk?


Security is the No. 1 recurring theme at conferences these days. And given the explosion in the number of conferences this year—up to a half dozen some weeks just in Silicon Valley—that's a lot of attention being showered on security. At nearly all of these talks, there is at least a mention about recent breaches, pervasive and persistent risks, and the growing threat level. The topic of... » read more

Tech Talk: Earlier Software


Malte Doerper, senior manager of product management at Synopsys, talks about the big "shift left" for software, where the problems crop up, and how to save as much as a year of development time with automation and better methodologies. [youtube vid=BjmHE0AvUIA]   Related Stories Bridging Hardware And Software The need for concurrent hardware-software design and verification is i... » read more

What Is Fuzzing?


Fuzzing is an excellent technique for locating vulnerabilities in software. The basic premise is to deliver intentionally malformed input to target software and detect failure. A complete fuzzer has three components. A poet creates the malformed inputs or test cases.A courier delivers test cases to the target software. Finally, an oracle detects target failures. Different fuzzing techniques ... » read more

← Older posts