The Week in Review: IoT


Finance Palo Alto, Calif.-based Armis raised $30 million in Series B funding, bringing total funding for the provider of enterprise Internet of Things security to $47 million. Red Dot Capital Partners of Israel led the round, joined by Bain Capital Ventures. Existing investors Sequoia Capital and Tenaya Capital also participated in the latest funding, which Armis will use to expand sales and m... » read more

Architecture, Materials And Software


AI, machine learning and autonomous vehicles will require massive improvements in performance, at the same power consumption level (or better), over today's chips. But it's obvious that the usual approach of shrinking features to improve power/performance isn't going to be sufficient. Scaling will certainly help, particularly on the logic side. More transistors are needed to process a huge i... » read more

Merging Verification With Validation


Verification and validation are two important steps in the creations of electronic systems and over time their roles, but how they play together is changing. In fact, today we are seeing a major opportunity for rethinking this aspect of the flow, which could mean the end of them as separate tasks for many of the chips being created. As with many things in this industry, however, squeezing it... » read more

How To Build Security Into Your Software Development Process


To standardize the software development life cycle (SDLC), organizations implement development methodologies to fulfill their objectives in a way that best suits their organizational goals. Whether you use Agile, Waterfall, or something in between, building security into your SDLC can improve efficiency and reduce costs if it’s done the right way. Download the eBook to: Learn how to a... » read more

2017 Coverity Scan Report


Today, open source software (OSS) development is one of the primary driving forces of technological innovation. From artificial intelligence to the Internet of Things, autonomous driving, and cloud computing infrastructure, OSS plays a pivotal role in the evolution of a wide range of technologies. But what are the implications of its dominance? To answer this, we review what we’ve learn... » read more

Verification Of Functional Safety


Functional safety is becoming a key part of chip design, and an increasingly problematic one for many engineering teams. Functional safety for electrical and electronic systems is nothing new. It has been an important element of the military, aerospace and medical industries for many years. But the growing importance of functional safety within the automobile industry presents a number o... » read more

Who Needs OWASP?


A list of critical web application security vulnerabilities is a necessary risk management tool. Equally true is that each organization has a different set of vulnerabilities plaguing their applications. To complete a trifecta of fundamental truths, crowdsourced lists such as the OWASP Top 10 rarely reflect an individual organization’s priorities. Given these three points, many organizatio... » read more

And The Winner Is…


Finding out what resonates with our readers is important, so each year I look back through the list of the best-read articles for the channels that I write for. While this simple strategy does favor articles published during the early part of the year, the fact that our readership continues to grow, partially offsets this bias. For example, in Low Power/High Performance (LPHP) a quarter of the ... » read more

Creating Software Separation For Mixed Criticality Systems


The continued evolution of powerful embedded processors is enabling more functionality to be consolidated into single heterogeneous multicore devices. Mixed criticality designs, those designs which contain both safety-critical and non-safety critical processes, can successfully leverage these devices and meet the regulatory requirements for IEC safety standards and the highest level of ISO. Thi... » read more

Accounting For Power Earlier


Concerns about power usage in an SoC are far from new, but the adoption of power management techniques still varies by company and by project. Leading semiconductor providers have made the necessary changes in tooling and methodology to account for [getkc id="106" kc_name="power awareness"] because they have to, but the rest of the industry hasn't necessarily caught up. “The companies t... » read more

← Older posts