Getting To Orbit And The Rocket Equation


The Apollo 12 mission recently celebrated its 50th anniversary. Launching on November 14, 1969 and returning on November 24, it put humans on the Moon for the second time. I wrote about Apollo 11 (mostly about its guidance computer) earlier in the year in my post The First Computer on the Moon. Today's post is about the rocket equation, and how challenging it is to get into orbit around th... » read more

Understanding Side Channel Attacks


Side channel attacks (SCAs) differ considerably from conventional cryptographic attacks. Essentially, side channel attacks – which can be very low-cost and non-invasive – exploit data gathered from side channels. A side channel can be exploited by simply placing an antenna, magnetic probe, or other sensor near a device or system. This allows an attacker to measure power consumption, voltage... » read more

Safety Islands In Safety-Critical Hardware


Safety and security have certain aspects in common so it shouldn’t be surprising that some ideas evolving in one domain find echoes in the other. In hardware design, a significant trend has been to push security-critical functions into a hardware root-of-trust (HRoT) core, following a philosophy of putting all (or most) of those functions in one basket and watching that basket very carefully.... » read more

Traceability Of Functional Safety Requirements In Automotive IP And SoCs


By Shivakumar Chonnad, Vladimir Litovtchenko, and Rohit Bhardwaj Developing functional safety systems, including all the components such as the system-on-chip (SoC) and IP, hinges on the ability to meet the stringent automotive functional safety requirements such as definition, implementation, verification, and validation. Depending on the Automotive Safety Integrity Level (ASIL), the functi... » read more

How Does A Changing Automotive Ecosystem Affect Tier-1 Suppliers?


Tier-1 automotive suppliers have an enormous opportunity in the development of autonomous vehicles (AVs). Fortune.com sees these vehicles contributing $7 trillion in economic activity by the year 2050. But this opportunity comes with a challenge: the whole supply chain is being disrupted by new participants and new technologies that are making these AVs possible. Semiconductor companies and spe... » read more

Modeling AI Inference Performance


The metric in AI Inference that matters to customers is either throughput/$ for their model and/or throughput/watts for their model. One might assume throughput will correlate with TOPS, but you’d be wrong. Examine the table below: The Nvidia Tesla T4 gets 7.4 inferences/TOP, Xavier AGX 15 and InferX 1 34.5. And InferX X1 does it with 1/10th to 1/20th of the DRAM bandwidth of the ... » read more

Technological Dead Ends


Sometimes something comes along that looks like it is a portent of things to come, but then turns out to be a technological dead end. For example, in the 1990s, it seemed that you couldn't go to the mailbox or rent a video without getting an AOL CD offering a free trial. They were even in some cereal boxes. It was the era of the 56Kb dialup modem, and AOL's walled garden was king as everyone we... » read more

Layered Security Offers Best Embedded Hardware Security


The importance of building a secure and rigid foundation in SoC and system designs has never been so true as it is now, given not only the garden variety of software vulnerabilities existing today, but also micro-architectural attacks on CPUs like Meltdown, Spectre, and Foreshadow. Design engineers should embrace two security-related tenets when selecting a security processor: one is depth o... » read more

Bolstering Security For AI Applications


Hardware accelerators that run sophisticated artificial intelligence (AI) and machine learning (ML) algorithms have become increasingly prevalent in data centers and endpoint devices. As such, protecting sensitive and lucrative data running on AI hardware from a range of threats is now a priority for many companies. Indeed, a determined attacker can either manipulate or steal training data, inf... » read more

Spreadsheets In Virtuoso


The looming tape-out deadline is the nightmare that keeps most design managers up at night. Managing schedules and tracking progress is always a black art that few, if any, can master. Various project management tools and methodologies have been developed that can help, if followed diligently. However, the learning curve of the tools, or the training and overhead of the process, often result in... » read more

← Older posts Newer posts →