Blog Review: July 31

Finding new materials; unlicensed spectrum for 5G; chip traceability.


Cadence’s Meera Collier checks out a study that uses AI and natural language processing techniques to infer new discoveries in materials science from published academic literature and considers how it could be used in the future.

Synopsys’ Taylor Armerding considers whether the NIST Secure Software Development Framework, the latest standard aimed at improving software security, can succeed.

Mentor’s Brent Klingforth argues that constraints are the backbone of good PCB design and points to ways to make constraint management simpler.

NI’s James Kimery notes that utilizing unlicensed spectrum in the 6GHz band may be critical for 5G to reach its promised data rates, but that any device using it must comply with certain requirements.

In a video, VLSI Research’s Dan Hutcheson chats with Tom Caulfield about the transition in focus for GlobalFoundries and how whether stepping away from the traditional model can transform how foundry services are offered.

A Rambus writer takes a look at a newly identified vulnerability that affected nearly all Tegra-based devices and could allow device hijacking or siphoning of data.

SEMI’s Heidi Hoffman points to why automotive and other high-reliability markets will push efforts to implement chip traceability and the ability to secure IP when it is shared across the hardware supply chain.

ANSYS’ Shawn Wasserman looks at how new designs for hydropower turbines could cover peak energy needs with the right design.

TECHnalysis Research’s Bob O’Donnell considers the transition to the new Gate-All-Around transistor structure and whether it could provide several generations of improvements in process technology.

Arm’s Sylwester Bala points to questions about which processors are best at performing specific machine learning tasks on different devices and why the CPU is still dominant.

Plus, check out the blogs featured in the latest System-Level Design newsletter:

Editor in Chief Ed Sperling contends that China’s backing of homegrown tech stocks is the next phase in a much larger plan.

Technology Editor Brian Bailey explores once-great mammoths of the semiconductor industry now on the brink of extinction.

Cadence’s Frank Schirrmeister contends that a system-wide view is required for designing new 5G applications, from fixed wireless access to mission-critical devices.

Synopsys’ Pat Sheridan explains how to analyze problems earlier with static timing analysis-based activity delay shifting and glitch power analysis.

Mentor’s Omar El-Sewefy shows how to get the most out of cloud computing resources by following a few guidelines.

eSilicon’s Mike Gianfagna recounts how embedded memory started as a foundational element in chip design and has now arrived as a substantial differentiating element.

Silexica’s Zubair Wadood digs into the design flow steps used to convert C/C++ algorithms to a hardware implementation.

Leave a Reply

(Note: This name will be displayed publicly)