Multiple Roots Of Trust And Isolation: Key Roles For Absolute Security


Today, there are many different security processors available to the SoC designer. A majority have a commonality, and that is they are based on the same architecture. You can call it a two-domain architecture. One is non-secure; the other is secure with a single bit dividing the secure from the non-secure. What’s more, different applications from different entities may be running in that o... » read more

The Rapid Success Of IP Reuse


The rise of IP use and reuse quickly became a challenge in the early 1990s as designs became more complex. Design teams quickly found themselves struggling to manage not only the vast numbers of IP cores that they were reusing but also versioning, permissions, legal approvals and so on. In the 1990s, software developers were established users of software configuration management (SCM) tools ... » read more

Neural Network Performance Modeling Software


nnMAX Inference IP is nearing design completion. The nnMAX 1K tile will be available this summer for design integration in SoCs, and it can be arrayed to provide whatever inference throughput is desired. The InferX X1 chip will tape out late Q3 this year using 2x2 nnMAX tiles, for 4K MACs, with 8MB SRAM. The nnMAX Compiler is in development in parallel, and the first release is available now... » read more

DAC: An Exhibitor’s Perspective


It is less than four weeks to DAC. At this point you should be deep into your planning and ready to drop down secure all your exhibit services before the deadline. While you are thinking about how to manage all the details of getting your booth on the show floor, this is a great time to take a step back and make sure you have clearly defined exhibit “takeaways” — think “goals” and ... » read more

Road Not Fully Constructed


There is a growing consensus in the semiconductor industry that SAE Level 3 and Level 4 autonomy will be full of unexpected hazards. At a number of recent conferences in Silicon Valley, experts from all parts of the semiconductor industry have voiced concern about those middle steps between assisted driving and full autonomy. This isn't the public position taken by carmakers and Tier 1s.... » read more

FIAs Pose Tricky Security Attacks


Voltage and clock glitching are terms crowding into the emerging lexicon of chip security attacks. These are two popular methods adversaries use that can be categorized under the umbrella of fault injection attacks (FIAs). Micro-architectural vulnerabilities like Meltdown, Spectre, Foreshadow and Spoiler have been in the limelight for months. But now, FIAs are getting more attention as the indu... » read more

Interconnect Prominence In Fail-Operational Architectures


When we in the semiconductor world think about safety, we think about ISO 26262, FMEDA and safety mechanisms like redundancy, ECC and lock-step operation. Once we have that covered, any other aspect of safety is somebody else’s problem, right? Sadly no, for us at least. As we push towards higher levels of autonomy, SAE levels 3 and above, we’re integrating more functionality into our SoCs, ... » read more

Dude, Where’s My Autonomous Car?


Researchers forecast that by 2025 we’ll see approximately 8 million autonomous or semi-autonomous vehicles on the road. Before merging onto roadways, autonomous cars will first have to progress through 6 levels of driver-assistance technology advancements. What exactly are these levels? And where are we now? The Society of Automotive Engineers (SAE) defines 6 levels of driving automatio... » read more

Three Tools Help Put Safe Vehicles On The Road


By Richard Pugh and Gabriele Pulini As the ultimate systems-of-systems, automated vehicles present an enormous verification task, requiring verification of complex sensing, computing, and actuating functions. This can be accomplished only by virtualizing the entire system: the vehicle and the environment it moves through. It also requires a combination of realistic scenario modeling, hard... » read more

Low Latency Networks: RoCE Or iWARP?


Today, Remote Direct Memory Access (RDMA) is primarily being utilized within high performance computing or cloud environments to reduce latency across the network. Enterprise customers will soon require low latency networking that RDMA offers so that they can address a variety of different applications, such as Oracle and SAP, and also implement software-defined storage using Windows Storage Sp... » read more

← Older posts