中文 English

Week In Review: Auto, Security, Pervasive Computing


Automotive/Mobility Chip-telemetry company proteanTecs has joined TSMC’s IP Alliance Program, which puts proteanTecs’ Universal Chip Telemetry (UCT) IP into TSMC’s catalog of production-proven IP. UCT is a monitoring system designed directly into chips to pull measurements from inside the chip throughout its lifecycle, including after placement in systems in the field. Monitoring the hea... » read more

The Best AI Edge Inference Benchmark


When evaluating the performance of an AI accelerator, there’s a range of methodologies available to you. In this article, we’ll discuss some of the different ways to structure your benchmark research before moving forward with an evaluation that directly runs your own model. Just like when buying a car, research will only get you so far before you need to get behind the wheel and give your ... » read more

Over-the-Air Automotive Updates


Modern vehicles are increasingly-connected devices with growing volumes of electronic systems. This systemic complexity means that even an average vehicle design will include over 150 ECUs, which control not just infotainment and communications, but powertrain, safety, and driving systems (figure 1). We see not just a surge in the volume and complexity of electronic hardware, but also software.... » read more

Virtualizing FPGAs For Multiple Cloud Users


Cloud computing has become the new computing paradigm. For cloud computing, virtualization is necessary to enable isolation between users, high flexibility and scalability, high security, and maximized utilization of hardware resources. Since 2017, because of the advantages of programmability, low latency, and high energy efficiency, FPGA has been widely adopted into cloud computing. Amazon ... » read more

Challenges Of Using The Cloud For IC Design


The ‘cloud’ is so ubiquitous that perhaps even your grandmother has heard about it. There are advertisements on TV with various vendors touting their cloud offerings. The cloud is ideal for eCommerce and SaaS (Software as a Service) offerings, as the elasticity on demand provides a convenient way to scale up when demand is high and scale down when it is low. Yet the design community has ... » read more

Making Sense Of New Edge-Inference Architectures


New edge-inference machine-learning architectures have been arriving at an astounding rate over the last year. Making sense of them all is a challenge. To begin with, not all ML architectures are alike. One of the complicating factors in understanding the different machine-learning architectures is the nomenclature used to describe them. You’ll see terms like “sea-of-MACs,” “systolic... » read more

Water System Hack And The Implications For Hardware Security


Last month we talked about the SolarWinds hack and now this month another disturbing attack has taken place – this time on a water supply system in Florida. Unfortunately, these types of attacks are becoming more frequent, giving us all pause as to how secure the systems that serve our everyday life really are. What lessons can we take from this recent attack that we can implement to make thi... » read more

Auto OEMs Face New Competitive Threats


Automotive design and manufacturing are undergoing a fundamental shift to the left as cars increasingly are electrified and chips take over more functions formerly done by mechanical parts, setting the stage for massive disruption across a supply chain that has been in place for decades. The success of Tesla — a company that had never actually built a chip or a car — was both a surprise ... » read more

Making Vehicle Electronics Safe With ISO 26262 Compliance


There are many semiconductor applications with high demands on safety, including spaceborne systems, nuclear power plants, and embedded medical devices. But automotive electronics are probably foremost in most peoples’ minds when they think about safe operation under all conditions. The advent of fully autonomous vehicles is responsible for much of this attention. Like other safety-critical a... » read more

Keeping Key Management Clear And Physical


Fundamental to all digital security systems is the ability to turn sensitive data into what looks like random incomprehensible jibberish and turn it back again into the same original information. But that is not all there is to it. You should be able to do that second bit of getting the original text only if you are allowed to do so. A classic way to deal with this problem is by using another s... » read more

← Older posts