How Cybersecurity Is Driving Business Forward


Cybersecurity is a topic that continues to grow in importance for both the general population and those who work in the tech industry. While news headlines about security breaches affecting various companies are now almost a daily occurrence, many still don’t understand the responsibility that every one of us has to keep our own personal and workplace networks secure. This October, Synopsys w... » read more

One SerDes Solution Doesn’t Fit All


Way back in the 1960s, E. Rent, who was working at IBM at the time, noticed a connection between the number of pins P on integrated circuits being used and the number of gates G on the integrated circuits. It was a power law, where the number of pins was cGR where c and R are constants. Actually, traditionally a Greek rho is used instead of R. It usually has a value between 0.5 and 0.8. If R... » read more

Choosing The Right Hardware Root Of Trust


A Root of Trust is broadly defined as the security foundation for a semiconductor or electronic system. Any secure function performed by the device or system relies in whole or in part on that Root of Trust. The Root of Trust typically handles chip and device identities, cryptographic functions, stores and manages cryptographic keys, and handles one or more secure processes that provides the fo... » read more

For AI Hardware, Power Optimization Starts With Software And Ends At Silicon


Artificial intelligence (AI) processing hardware has emerged as a critical piece of today’s tech innovation. AI hardware architecture is very symmetric with large arrays of up to thousands of processing elements (tiles), leading to billion+ gate designs and huge power consumption. For example, the Tesla auto-pilot software stack consumes 72W of power, while the neural network accelerator cons... » read more

Cybersecurity Risks In Automotive Electronics


I love the summer holidays! Even more when I haven’t much of a plan and can enjoy a sense of freedom and adventure. A few years back, I went traveling with a campervan with a few friends, and we did exactly that. In fact, with the COVID-19 situation, traveling with a campervan is a great holiday option. The only problem is that I don’t quite enjoy driving. I would rather plan my next destin... » read more

Security Implications Of Quantum Computing


The US Government just stepped up the push for quantum computing with an award of $625 million in funding to create five quantum information research centers. Industry and academic institutions will contribute $300 million toward this effort with the remainder drawn from the $1.2 billion earmarked in the 2018 law: the National Quantum Initiative Act. The race to quantum computing is a global on... » read more

Apples, Oranges & The Optimal AI Inference Accelerator


There are a wide range of AI inference accelerators available and a wide range of applications for them. No AI inference accelerator will be optimal for every application. For example, a data center class accelerator almost certainly will be too big, burn too much power, and cost too much for most edge applications. And an accelerator optimal for key word recognition won’t have the capabil... » read more

Using Critical Area To Boost Automotive IC Test Quality


To compete in the fast-growing market for automotive ICs, semiconductor companies need to address new challenges across the entire design flow. To meet the ISO 26262 goal of zero defective parts per million (DPPM), DFT engineers have embraced new test pattern types, including cell-aware, interconnect, and inter-cell bridge (cell neighborhood). But the traditional methods of choosing the types o... » read more

The Role Of NoCs In System-Level Services


The primary objective of any network-on-chip (NoC) interconnect is to move data around a chip as efficiently as possible with as little impact as possible on design closure while meeting or exceeding key design metrics (PPA, etc.). These networks have become the central nervous system of SoCs and are starting to play a larger role in system-level services like quality of service (QoS), debug, p... » read more

Establishing Connectivity Between Die and BGA


The BGA component serves the primary role of redistributing the signals from the die it protects to an interface pattern (the BGA’s balls) compatible with the host PCB it mounts on. As a result, many IC package designs are among those who do not use a front-end schematic. Even if you have a schematic, you may find yourself making logic swaps in the layout where the additional context of the r... » read more

← Older posts Newer posts →