Secure Networking With MACsec, IPsec, And TLS


As digital networks grow in complexity, securing data in transit has become a top priority. Cyber threats, ranging from man-in-the-middle attacks to large-scale data breaches, make strong encryption and authentication mechanisms essential. But network security is not a one-size-fits-all solution. Instead, it operates at different layers of the OSI model, with each layer offering unique protecti... » read more

Enhancing Reliability For Automotive ICs


As an IC designer focused on automotive applications, reliability is likely one of your top priorities. The components you develop need to withstand extreme environmental conditions, maintain performance over extended lifetimes, and meet rigorous industry standards. Failure is simply not an option when it comes to automotive electronics. Achieving the required levels of reliability can be a ... » read more

Certified TRNG For Automotive


In today's tech-driven world, security and safety are more critical than ever, especially in the automotive sector. As cars become smarter and more connected, the need for robust cryptographic mechanisms to safeguard data and ensure secure communications grows. For decades, the automotive industry has been implementing numerous strategies to maintain vehicle safety. But now the industry is star... » read more

Automotive Outlook 2025: Ecosystem Pivots Around SDV


The automotive industry is deep in the throes of a massive shift to software-defined vehicle architectures, a multi-year effort that will change the way automotive chips are designed, where they are used, and how they are sourced. Creating a new vehicle architecture is no small feat. OEMs need to figure out who to partner with and which aspects of their current architecture to include. This ... » read more

Transforming Industrial IoT With Edge AI And AR


The Internet of Things (IoT) has evolved significantly from its early days of centralized cloud processing. Initially, IoT applications relied heavily on cloud-based data processing, where data from various devices was collected, processed, and analyzed in the cloud before insights were sent back to the devices. While effective, this approach has limitations, particularly in environments requir... » read more

Med Tech Morphs Into Consumer Wearables


Doctors have been using advanced technology for years, but the growing trend is for consumers to use devices at home and have direct access to their data. Watches and rings that were once primarily used for counting steps or registering sleep patterns can now read blood pressure, heart rate, blood oxygen, body temperature, and other early signs of illness. Meanwhile, various patches are under d... » read more

A Bluetooth LE Throughput Faceoff


The Bluetooth Low Energy (LE) space is shared by over 50 IC suppliers, each in healthy competition with one another. This healthy competition is one of the main driving forces behind the constant innovation and wide spread of Bluetooth LE technology. In the spirit of competition, we thought it would be fun to stage a friendly competition between ourselves and one of our competitors, an estab... » read more

Automotive Security Shifts To The System Level


Cars are getting smarter, more complicated, and more vulnerable to cyberattacks. As the amount of semiconductor and software content continues to increase, so does the number of over-the-air updates and connections to edge-based servers and services, adding a variety of new vectors for attacks. Properly securing vehicles requires engineers to first identify all the possible connection points... » read more

GaN Power Semiconductors – 2025 Predictions


GaN power semiconductors are on a tremendous growth trajectory. GaN is on its way to reaching more tipping points in its adoption in more industries. Consumer chargers and adapters have been the forerunner, more applications are expected to tip this year, with many others to follow in time. Still, there are some headwinds for GaN to reach this adoption level. Why is that and how can we overcome... » read more

Securing FPGAs Beyond the Bitstream


FPGAs are a popular solution for low-volume applications and applications where frequent updates are essential to the value of the solution, as in many aerospace and defense and AI applications. Security is a critical part of FPGA solutions, and FPGA providers have invested much effort into securing the bitstream. However, there is a need for a cryptographic solution for FPGAs beyond the bitstr... » read more

← Older posts