Chip Monitoring For Max Performance And Security


In a semiconductor market dominated by SoCs for high-performance computing, AI, automotive and 5G, semiconductor companies face myriad challenges and device requirements. The specific challenges for any given SoC vary but can include issues around performance debug and security against hacking. Top of the list includes the need to ensure quality, enhance safety, optimize performance, and increa... » read more

Automotive IoT Security By Design


A good example of the wider adoption and application of IoT devices is in automotive uses. It’s a growing market, with the worldwide number of IoT-connected devices projected to increase to 43 billion by 2023, an almost threefold increase from 2018. The modern vehicles that host so many IoT devices are increasingly connected—for cellular over-the-air updates, but also potentially to comm... » read more

A New Era In Requirements Management


Project teams face a host of challenges when developing semiconductors compliant to a safety critical market. ISO 26262 drives state-of-the art safety critical designs for automotive electronics, DO-254 for airborne electronics hardware, and IEC61508 for industrial electronics, to name a few. In the context of ISO 26262, much of the discussion in recent years has been on challenges addressin... » read more

Navigating The Intersection Of Safety And Security


Automotive IC safety and security continue to be hot topics across the industry, and one phrase you may often hear during discussion is: An automotive IC can be secure without needing to be safe, but an automotive IC cannot be safe without also being secure. Adding a bit of detail to that: An automotive IC which has an incomplete security architecture provides potential attack vectors w... » read more

Digital Twin And The Implications For Semiconductor Suppliers


Automotive is a prime example of one industry where advanced semiconductors are forcing change across all aspects of vehicle development. Accelerated investment is fueling this industry wide evolution, driven by new business models, environmental regulations, and the evolution toward fully autonomous, software-defined vehicles. The demand for fully and semi-autonomous systems has a particula... » read more

What You Need To Know About Qualifying Tools For DO-254 Programs


By Michelle Lange and Tammy Reeve, Patmos Engineering Services, and Jacob Wiltgen, Siemens EDA DO-254, which is required for airborne electronics development, is a design assurance standard. Design assurance requires multiple layers of review and verification within the development process to ensure safe operation of the design being produced. This means when an engineer is doing design work... » read more

Streamline DO-254 Compliance With Model-Based Design


By Eric Cigan, MathWorks, and Jacob Wiltgen, Siemens EDA The purpose of DO-254 (formally known as RTCA/ DO-254 or ED80) is to provide guidance for the development of airborne electronic hardware. The Federal Aviation Administration (FAA), European Aviation Safety Agency (EASA), and other worldwide aviation safety authorities require this standard to ensure that complex electronic hardware us... » read more

Reducing Schedule Slips With Automated Post-Route Verification Of SerDes High Speed Serial Links


Most high-speed serial links don’t get verified once routing is complete because the process is time consuming and skill-intensive – and SI experts are in short supply. As a result, most serial channels are laid out according to rules, verified through manual inspection, and released to fabrication without thorough analysis. Unverified channels can result in lengthy (and hectic) prototype d... » read more

Leaning Into The SoC Power Methodology


As inflation skyrockets and the price of everything increases seemingly by the hour, finding ways to trim time and costs are more valuable than ever. Lean manufacturing was introduced by the Toyota Motor Corporation almost 100 years ago, laying the framework for future generations of manufacturing and industrial settings. Lean manufacturing is a methodology that focuses on minimizing waste w... » read more

Safeguarding A Digital Transformation Across The Entire Product Lifecycle


In 2020, the SolarWinds breach highlighted the emergence of software supply chain attacks as a very real security threat that impacted many high-profile companies. (The software supply chain includes third-party and open-source components used in a software product.) Then in late 2021, not to be outdone, the massive scope of the Log4j vulnerability emerged, impacting millions of consumer produc... » read more

← Older posts Newer posts →