Secure Your SoC From Side Channel Attacks With Adaptable Security


Many SoC and ASIC manufacturers rely heavily on cryptographic solutions to safeguard sensitive IP and data transmission within their devices. In a dynamic landscape where threats from attackers continue to evolve, encryption algorithms play a crucial role in fortifying defenses. Hackers today are leveraging advanced physical tactics that extend beyond traditional data interception, posing signi... » read more

The Uncertainty Of Certifying AI For Automotive


Nearly every new vehicle sold uses AI to make some decisions, but so far there is no consistency in what is being developed, where it is being used, and whether it is compatible with other vehicles on the road. This fragmentation is partially due to the fact that AI is still a nascent technology, and cars and trucks sold today may be significantly different than those that will be sold sever... » read more

Why It’s So Hard To Secure AI Chips


Demand for high-performance chips designed specifically for AI applications is spiking, driven by massive interest in generative AI at the edge and in the data center, but the rapid growth in this sector also is raising concerns about the security of these devices and the data they process. Generative AI — whether it's OpenAI’s ChatGPT, Anthropic’s Claude, or xAI’s Grok — sifts thr... » read more

Liquid Cooling And GaN: A Winning Combination


Data centers are facing an unprecedented transformation due to the surge in generative AI and other emerging technologies. A single ChatGPT session consumes 50 to 100 times more energy than a comparable Google search, escalating data center rack power requirements towards 200 kW or more, presenting serious challenges for operators. Cooling, in fact, takes up about 40% of the power requireme... » read more

Strategies For Defense Against Fuxnet ICS Malware


According to recent cybersecurity media reports, a new destructive ICS malware named Fuxnet has been discovered. This incident is allegedly linked to the Blackjack hacker group, which is associated with Ukrainian security agencies. It involved a major attack on Moscollector, a Moscow-based company responsible for managing critical infrastructure such as water supply, sewage treatment, and com... » read more

Toward A Software-Defined Hardware World


Software-defined hardware may be the ultimate Shift Left approach as chip design grows closer to true co-design than ever with potential capacity baked into the hardware, and greater functionality delivered over the air or via a software update. This marks another advance in the quest for lower power, one that’s so revolutionary that it’s upending traditional ideas about model-based systems... » read more

Can Your Doorbell Be Spoofed?


Voice anti-spoofing is a set of techniques designed to prevent scam attempts that involve mimicked voices and improve the overall UI/UX experience of VUI systems by preventing accidental triggers. These techniques are particularly important to prevent issues related to: Speech Synthesis (SS): This type of attack employs a computer-simulated voice Voice Conversion (VC): In this attack,... » read more

Accelerating Speed And Accuracy In Aeroacoustic Predictions


Simulating aeroacoustics is a tedious task that blends the complexities of fluid dynamics with the nuances of acoustic phenomena. This dual-domain challenge is marked by numerous technical obstacles, ranging from the wide range of scales involved to the subtler distinctions of acoustic signals amidst turbulent flows. To navigate these technical difficulties and advance our understanding of aero... » read more

Data Center Evolution: The Leap to 64 GT/s Signaling with PCI Express 6.1


The PCI Express (PCIe) interface is the critical backbone that moves data at high bandwidth and low latency between various compute nodes such as CPUs, GPUs, FPGAs, and workload-specific accelerators. With the rapid rise in bandwidth demands of advanced workloads such as AI/ML training, PCIe 6.1 jumps signaling to 64 GT/s with some of the biggest changes yet in the standard. Find more inform... » read more

Gate Drive Configurations For GaN Power Transistors


This whitepaper gives a compact overview of the recommended gate drive concepts for both GIT (gate injection transistor) and SGT (Schottky gate transistor) product families. A versatile standard drive (RC interface) can be easily adapted to both technologies. The document also provides basic gate drive dimensioning guidelines and some typical application examples. Find more information here. » read more

← Older posts Newer posts →