Right-Sized Security


Security is a key design consideration of any connected product. Nefarious parties can and will attempt to exploit security flaws in order to capture sensitive data, gain device control, or for a myriad of other reasons. When considering security needs and implementation in their systems, Device OEMs must balance a number of factors. Security is obviously a very important factor; however, de... » read more

The Week in Review: IoT


Finance CyberInt raised $18 million in new funding led by Viola Growth and including existing investors. The company provides cybersecurity detection and response services. CyberInt has offices in Israel, the U.S., the United Kingdom, Singapore, and Panama. San Diego-based Kneron, which provides artificial intelligence technology for edge devices, received $18 million in Series A1 funding l... » read more

The Long Pause


Carmakers are leaping over each other to roll out cars that meet SAE Level 3 requirements, whereby under some conditions drivers can let go of the steering wheel. Getting to Level 5 will take a lot longer, and there is some debate about where and even whether Level 4 will ever happen (see Fig. 1). Fig. 1: Levels of autonomy. Source: Auto Alliance There are two big gaps that need to be a... » read more

Hardware Acceleration With eFPGAs


If integrating an embedded FPGA (eFPGA) into your ASIC or SoC design strikes you as odd, it shouldn’t. ICs have been absorbing almost every component on a circuit board for decades, starting with transistors, resistors, and capacitors –– then progressing to gates, ALUs, microprocessors, and memories. FPGAs are simply one more useful component in the tool box, available for decades and ... » read more

Architects: How To Get The Most Out Of eFPGA


At Flex Logix, we are working with customers with a wide range of applications: MCU, IoT, SoC, Networking, Wireless Base Station, Communications, Data Center, AI, Vision, Signal Processing and Aerospace. Their needs and their situations are all very different, but we have noticed some common learnings across the range of applications as people learn how to use eFPGA. 1. Use as little eFPGA a... » read more

Don’t Be The Dinosaur On IP Reuse


In today’s competitive marketplace, IP assets are becoming more critical and strategic than ever before. There is a general understanding among all design companies that one needs to invest and reuse IPs within the enterprise for faster realization of an IP sub-system or an SoCs. Unfortunately, from the start most companies have failed to adopt the processes for developing and reusing their I... » read more

Planning For A Digital Automotive Supply Chain


At the heart of the very cool intelligent connected vehicles (ICVs) of tomorrow is sophisticated software with artificial intelligence and powerful silicon chips all working together. These technologies will transform the traditional automotive supply chain from a mechanical-driven world to a digital one, where the user experience, reliability, safety, and value are created from silicon and sof... » read more

Machine Learning’s Limits (Part 1)


Semiconductor Engineering sat down with Rob Aitken, an Arm fellow; Raik Brinkmann, CEO of OneSpin Solutions; Patrick Soheili, vice president of business and corporate development at eSilicon; and Chris Rowen, CEO of Babblelabs. What follows are excerpts of that conversation. SE: Where are we with machine learning? What problems still have to be resolved? Aitken: We're in a state where thi... » read more

Connecting Cars Reliably


Imagine motoring along through busy, urban traffic in your new connected car that is learning, getting smarter, safer and more reliable as it is driving. Such a car is constantly gathering and generating all kinds of data that is intermittently and opportunistically being uploaded to the cloud. As more cars on the road feature advanced wireless connectivity, this exciting future will become com... » read more

Toward IIoT Security Standards


Security is a high priority within Industrial IoT projects, but it is advancing like the rest of the industry—inconsistently, with big gaps between the leaders and everyone else. That isn't unique to one or two industrial segments. It applies to all of them, and even to slices within particularly industries. "There is some confusion about security because it's not just the IT issues," s... » read more

← Older posts Newer posts →