Security Power Requirements Are Growing


Determining how much power to budget for security in a chip design is a complex calculation. It starts with a risk assessment of the cost of a breach and the number of possible attack vectors, and whether security is active or passive. Different forms of root of trust and cryptography have different power costs. Different systems could require tradeoffs between performance and security, whic... » read more

2030 Data Center AI Chip Winners: The Trillion Dollar Club


At the start of 2025, I believed AI was overhyped, ASICs were a niche, and a market pullback was inevitable. My long-term view has changed dramatically. AI technology and adoption is accelerating at an astonishing pace. One of the GenAI/LLM leaders, or Nvidia, will be the first $10 Trillion market cap company by 2030. Large language models (LLMs) are rapidly improving in both capability and ... » read more

AI For The Edge: Why Open-Weight Models Matter


The rapid advancements in AI have brought powerful large language models (LLMs) to the forefront. However, most high-performing models are massive, compute-heavy, and require cloud-based inference, making them impractical for edge computing. The recent release of DeepSeek-R1 is an early, but unlikely to be the only, example of how open-weight AI models, combined with efficient distillation t... » read more

The Rise Of Generative AI On The Edge


Artificial intelligence (AI) and machine learning (ML) have undergone significant transformations over the past decade. The revolution of convolutional neural networks (CNNs) and recurrent neural networks (RNNs) is evolving toward the adoption of transformers and generative AI (GenAI), marking a pivotal shift in the field. This transition is driven by the need for more accurate, efficient, and ... » read more

Tailoring Root Of Trust Security Capabilities To Specific Customer Needs


The cybersecurity threat landscape is dynamic and rapidly evolving. Indeed, attackers are constantly finding new ways to exploit critical vulnerabilities across a wide range of applications and devices. Protecting data and devices requires secure processes running on systems and networks. A Root of Trust is the foundation on which all secure operations of a computing system depend. It contai... » read more

2024 Security IP Year In Review: Innovations And Best Practices


This booklet offers six insightful articles on advanced security IP technologies, helping to fortify digital systems against emerging threats. Learn about: DDR Interface Security: Defend against DRAM attacks. IoT Security: Safeguard IoT devices with SIM and Root of Trust. SRAM PUF Technology: Secure device authentication. Post-Quantum Cryptography: Protect against quantum threa... » read more

Considerations And Guidelines For Using High-Voltage CoolGaN Switches In Power Systems


The design of an electronic switched-mode power system has always been a complex task, requiring both knowledge and experience. With the appearance of gallium nitride (GaN), this task has even become more complex, because the electrical properties of GaN expand the room for possible system solutions. Particularly the lack of a physical body diode and the lateral device operation enable complete... » read more

Accelerating The Shift To Software-Defined Vehicles


The automotive E/E architecture is undergoing a significant transformation, driven by the vision of a software-defined vehicle (SDV). This shift is leading to a change from traditional distributed and domain-based architectures to more centralized and mixed domain-zone architectures. Central Electronic Control Units (ECUs) are now powered by sophisticated system-on-chips (SoCs) that combine com... » read more

Auto Sector Leads The Way In IC Security


Concerns about chip and system security are beginning to bear fruit in some markets, driven by the overlap in safety and security in automotive applications and the growing value of algorithms and complex systems in others. But how and when that security is implemented is still all over the map, and so is its effectiveness. The reasons are as nuanced as the designs themselves, which makes it... » read more

Engineer’s Guide to Simulation of Aeroacoustics


Aeroacoustics is the study of noise generation due to turbulent fluid motion or the interaction of aerodynamic forces with surfaces. It is a branch of acoustics that focuses on how aerodynamic sound is generated, propagated, and transmitted to the environment. This guide provides an in-depth exploration of the specific challenges and techniques associated with aeroacoustics simulations. Key ... » read more

← Older posts