中文 English

Blog Review: June 30

Using encrypted data; key points of keepouts; security training; memory litmus tests.

popularity

Cadence’s Paul McLellan examines Fully Homomorphic Encryption, which allows for operations to be performed on encrypted data without decrypting it, and why it’s now entering the realm of practicality.

Mentor’s Shivani Joshi explains the basics of using keepouts to prevent the placement of specific or all design items within a specified area and why they can make or break a first pass at creating a PCB.

Synopsys’ Antionette Parnther points to the necessity of giving new hires skills in how to develop secure code and four key steps in secure development training.

Arm’s Jade Alglave provides a tutorial for software developers, compiler writers, and verification engineers on how to use Arm’s Memory Model Tool and diy7 to generate litmus tests automatically.

A Rambus writer points out different types of tampering attacks and why it’s useful to think about anti-tamper countermeasures as a hierarchy of safeguards that parallel the type, effort and expense of attacks.

In a blog for SEMI, Walt Custer of Custer Consulting considers the latest World Bank outlook plus what the latest data shows about the demand for semiconductor equipment and other indicators that could point to a slowing in the industry.

Ansys’ Krista Loeffler points to key things that must be considered when assessing the functional safety of automotive semiconductors.

And don’t miss the blogs featured in last week’s Systems & Design newsletter:

Editor in Chief Ed Sperling details the quiet shakeup being driven by virtual conferences.

Technology Editor Brian Bailey urges you to respond to this questionnaire.

Cadence’s Frank Schirrmeister sketches out the tectonic shifts data centers and high-performance computing are undergoing.

Mentor’s Greg Curtis digs into the key components of high-performance, high-capacity, and high-accuracy SPICE circuit simulation technology.

Synopsys’ Mark Richards and Neel Desai walk through how to efficiently capture design intent and map it into the physical domain.

Codasip’s Roddy Urquhart checks out a new dual threaded commercial RISC-V core for IoT, artificial intelligence, and data-intensive embedded applications.

OneSpin Solutions’ Sergio Marchese finds that learning about the latest, most efficient IC integrity assurance solutions is easier than ever.

Aldec’s Farhad Fallahlalehzari demos how to allow IoT devices to sync data even when not connected to the Internet.

Imagination’s Benny Har-Even reviews key features that make the new wireless standard ideal for power efficient devices.

proteanTecs’ Yuval Bonen explains why Deep Data is needed to address the elephant in the room.



Leave a Reply


(Note: This name will be displayed publicly)