Make Your Own Energy


Regenerative braking and other forms of energy capture are becoming more popular and increasingly effective. What started as a way of increasing the range of electric or hybrid vehicles is now being applied to everything from green buildings to industrial robots. The automotive industry is still the main driver of this technology. The idea that braking can generate energy has been around for... » read more

Three Tools Help Put Safe Vehicles On The Road


By Richard Pugh and Gabriele Pulini As the ultimate systems-of-systems, automated vehicles present an enormous verification task, requiring verification of complex sensing, computing, and actuating functions. This can be accomplished only by virtualizing the entire system: the vehicle and the environment it moves through. It also requires a combination of realistic scenario modeling, hard... » read more

Creating A Roadmap For Hardware Security


The U.S. Department of Defense and private industry consortiums are developing comprehensive and cohesive cybersecurity plans that will serve as blueprints for military, industrial and commercial systems. What is particularly noteworthy in all of these efforts is the focus on semiconductors. While software can be patched, vulnerabilities such as Spectre, Meltdown and Foreshadow need to be de... » read more

April’19 Startup Funding: Corporate Gushers


It was another rich month for startups, large and small. In April’s top 11 funding rounds, five were investments by big corporations or corporate venture capital funds—an investor consortium led by the SoftBank Vision Fund, PayPal, Ford Motor, NTT DoCoMo, and HAPSMobile, a joint venture of SoftBank Group and AeroVironment. Those 11 investments totaled $3.74 billion. Intel Capital was als... » read more

Low Latency Networks: RoCE Or iWARP?


Today, Remote Direct Memory Access (RDMA) is primarily being utilized within high performance computing or cloud environments to reduce latency across the network. Enterprise customers will soon require low latency networking that RDMA offers so that they can address a variety of different applications, such as Oracle and SAP, and also implement software-defined storage using Windows Storage Sp... » read more

Improving Edge Inferencing


Cheng Wang, senior vice president of engineering at Flex Logix, talks with Semiconductor Engineering about how to improve the efficiency and speed of edge inferencing chips, what causes bottlenecks, and why AI chips are different from other types of semiconductors. » read more

112G XSR And LR SerDes PHYs


The virtuous cycle of increased computing power enabling new applications which demand more computing power continues unabated. Today, applications spanning AI, autonomous vehicles, video streaming, AR and VR all demand more bandwidth, lower latencies and higher speeds. In response, the SoCs powering the terabit routers and switches at the heart of the network must run even faster. The upgrade ... » read more

Addressing IC Reliability Issues Using Eldo


Advanced, short-geometry CMOS processes are subject to aging that causes major reliability issues that degrade the performance of integrated circuits (ICs) over time. Degradation effects causing aging are hot carrier injection (HCI) and negative bias temperature instability (NBTI), in addition to positive bias temperature instability (PBTI) and time-dependent dielectric breakdown (TDDB). Below ... » read more

Joint Optimization Of Hardware And Compiler


ASPLOS is the premier forum for multidisciplinary systems research spanning computer architecture and hardware, programming languages and compilers, operating systems and networking. This presentation proposes a novel approach for joint optimization of algorithms/compilers and hardware architecture. The top-down/integrated approach that leverages the latest machine learning framework/compile... » read more

Secure Data Center Traffic


With the increasing data security breaches, encrypting and protecting data-in-flight and data-at-rest in data centers has gained the highest priority for data center security. To address the challenges of securing the perimeter and within the data center from unlawful intercepts, protect data integrity and confidentiality, Cloud Data Centers are increasingly encrypting data within and across da... » read more

← Older posts Newer posts →