Simplifying Power Module Verification Using Compliance Checking


By Wilfried Wessel, Siemens EDA; Simon Liebetegger, University of Applied Sciences, Darmstadt; and Florian Bauer, Siemens EDA Current simulation and verification methods for power modules are time-consuming. Each domain has specific solutions based on finite elements analysis, computational fluid dynamics and solvers for electric circuits like SPICE. This article investigates if it is possib... » read more

Securing Automotive Ethernet Connections With MACsec


Zonal architecture in automotive design has become common in recent years in response to the increasing complexity of in-vehicle electrical systems. Automotive Ethernet is used to connect sensors and actuators to zonal gateways in ADAS (Advanced Driver Assistance Systems) enabled vehicles. With multi-gigabit links, it further connects zonal gateways to the central compute units that handle ADAS... » read more

The Ultimate Guide To PCB Layout For GaN Transistors


In the ever-evolving landscape of power electronics, the emergence of gallium nitride (GaN) transistors has ignited a revolution by offering unparalleled benefits, including remarkable efficiency and power density enhancements. The art of PCB layout has been a crucial component in power electronic design for over four decades now, ever since the advent of switching power supplier. From the ea... » read more

Protecting Highly Confidential Data In IoT Devices


How should we approach the protection of highly confidential security parameters and personal data? It's just like our daily routines: when we leave home, we lock the door and take care not to lose the key. Similarly, in the realm of cybersecurity, safeguarding cryptographic keys is paramount. No matter how robust your data protection system is, it's rendered ineffective if keys or passwords... » read more

Texas: Cybersecurity Workforce Resilience And eCTF Success


Workforce resilience, the ability to adapt and recover from challenges, is a MITRE Engenuity priority. To ensure a resilient cybersecurity workforce that can defend organizations and the entire nation, we know that future professionals need to be interested in the field. As such, each year we proudly present Embedded Capture the Flag (eCTF), a two-phase competition for students to both test an... » read more

The Challenge And Value Proposition of eFPGA Emulation


More than 40 chips have been licensed to use EFLX eFPGA and more than 20 chips are already working in silicon. Big customers like Renesas are planning high volumes and families of chips using eFPGA. eFPGA is being used in process nodes from 180nm to 5nm, with 3nm and 18A in evaluation. Especially for the high-volume customers working in advanced finFET nodes, the strong need is for first ... » read more

Higher Automotive MCU Performance With Interface IP


By Ron DiGuiseppe and Hezi Saar AI is making waves across many industries, and automotive is no exception. Today’s vehicles are smarter and more connected than ever, and AI is at the heart of it all. Many new advanced driver assistance system (ADAS) applications, such as automatic emergency braking, adaptive cruise control, and lane-keeping assistance, are built using the latest AI algorit... » read more

Software Stack For Edge AI Performance


Developing an agile software stack is important for successful AI deployment on the edge. We regularly encounter new machine learning models created from multiple AI frameworks that leverage the latest primitives and state-of-the-art ML model topologies. This Cambrian explosion has resulted from a fertile open-source community that has embraced AI and is now fueling a wide proliferation of ML m... » read more

Why The SOAFEE Project Is Integral For The Design Of Connected Vehicles


The Scalable Open Architecture for Embedded Edge (SOAFEE) project, of which Synopsys is a voting member, is defined by automakers, semiconductor suppliers, open-source and independent software vendors, and cloud technology leaders. The effort builds on technologies that define standard boot and security requirements for the Arm architecture, while adding a cloud-native development and deployme... » read more

Draft Standards For Quantum Safe Cryptography Are Here


The world of security is constantly evolving, and in the few short weeks that have passed since my last blog on What It Takes To Make An SoC Design Quantum Safe, there have been some new and exciting developments in the world of quantum safe cryptography. On August 24th, 2023, NIST published the first three draft standards for general-purpose Quantum Safe Cryptography (also known as Post-Quantu... » read more

← Older posts Newer posts →