Redefining Hearing Aids With DSPs


Hearing is one of the most essential senses for engaging with the world. It enables us to converse, appreciate music, and remain alert to our surroundings. Hearing loss is a prevalent issue affecting millions of individuals globally and disconnecting them from a world where sound is vital to others and the environment. The World Health Organization (WHO) reports that over 5% of the global popul... » read more

Increasing Design Flexibility With RISC-V-Based Processor IP


The semiconductor industry increasingly needs more flexible and scalable processor architectures, driving the growing adoption of RISC-V. Originally developed at the University of California, Berkeley, the open-source RISC-V instruction set architecture (ISA) has become very popular in recent years. RISC-V allows designers to customize their processor implementations to meet the specific needs ... » read more

Confidential Computing: A Key To Secure Cloud And Edge Environments


Historically, data security was primarily focused on safeguarding data residing within systems controlled by the users themselves, such as on-premise storage and server infrastructure. In such a siloed environment, information stored on the storage media, Data-at-Rest, was encrypted to ensure security. Data-in-Motion (aka Data-in-Transit) was safeguarded by encrypting it before transmitting it ... » read more

Partial Header Encryption In Integrity And Data Encryption For PCIe


Partial Header Encryption (PHE) is an additional mechanism added to Integrity and Data Encryption (IDE) in PCIe 6.0 to prevent side-channel attacks based on attacker analysis of the information included in the headers. This blog narrates PHE flow and Cadence VIP support for PHE in IDE across PCIe/CXL protocols. Background Introducing PCIe's Integrity and Data Encryption Feature is an excell... » read more

CMA/SPDM—An Additional Layer of Security for PCIe Transport


In today’s data-driven world, everyone is navigating a vast ocean of information that transcends across unsecured links and can easily fall prey to digital hackers. To keep our data safe, it is crucial to beef up security and make sure that only the right users can access our data. This article dives into the world of secure communication, where component measurement and authentication (CM... » read more

Sustainable Rail Transportation With High Power SiC Modules: Part 2


In the first part of this blog, we had a look at how energy-efficient high-power modules contribute to the decarbonization of railway transportation. This part will focus on the future of traction: high-power silicon carbide modules, their key features, and the multiple system benefits they enable. Silicon carbide power modules and hybrid-propulsion trains: It’s a match! As we inch toward... » read more

Navigating Complexity And Enhancing Security In Advanced Automotive Systems


As the automotive industry advances towards higher levels of Advanced Driver Assistance Systems (ADAS), the complexity of vehicles is growing at an unprecedented rate. Modern vehicles are equipped with an increasing array of ADAS sensors, sophisticated algorithms, powerful processors, advanced in-vehicle networks, and millions of lines of software code. These components are crucial for processi... » read more

Combining Silicon Data Capture And Edge Processing Offers A Promising Solution For Automotive OEMs


By Lorin Kennedy and Jasmin Mulaosmanovic In the world of electric (EV) and software-defined vehicles (SDV), a key challenge and opportunity besets original equipment manufacturers (OEM): that of effectively harnessing in-vehicle and silicon data to improve user experience and quite literally drive business benefits. While collecting telemetry data is straightforward enough, the difficulty l... » read more

Unmasking Ransomware: Key Challenges And Strategic Responses In Critical Infrastructure Sectors – A Mid-2024 Review


Since 2015, ransomware attacks have become a significant threat that organizations and enterprises cannot afford to ignore, especially as critical infrastructure sectors (CI) increasingly embrace digitalization. Due to IT and OT convergence, even OT environments have become targets for ransomware groups. In 2023, ransomware attacks were the most frequent incidents faced by OT environments, fol... » read more

Shaping The Future Of Automotive Safety With V2X


In recent years, the automotive industry has witnessed a technological evolution that promises to redefine road safety and driving experiences. At the heart of this advancement is V2X technology, which stands for "vehicle-to-everything." This innovation allows vehicles to communicate with each other and their surroundings, enhancing road safety and efficiency. Understanding these cutting-edge d... » read more

← Older posts Newer posts →