Week In Review: Auto, Security, Pervasive Computing


Automotive Bosch licensed Arteris IP’s FlexNoC interconnect products for Bosch’s automotive chips. “Arteris IP provides the easiest and fastest means to assemble the complex chips we require while allowing us to implement innovative functional safety mechanisms within our designs,” said Oliver Wolst, senior vice president integrated circuits at Bosch. Mentor, a Siemens business, int... » read more

Growing Complexity Adds To Auto IC Safety Challenges


The automotive industry is working to streamline, automate and tame verification of automotive electronic control units, SoCs and other chips used in vehicles, many of which are becoming so complex and intertwined that progress is getting bogged down. Modern cars may have up to 100 ECUs, which control such vehicle functions as engine, powertrain, transmission, brakes, suspension, entertainme... » read more

Achieving Security Goals With A Hardware Root Of Trust


In an environment of growing threats, meeting a fundamental set of security goals is imperative for safeguarding devices and data from attack. The most robust means of meeting these goals is a root of trust anchored in hardware. In Microsoft’s “The Seven Properties of Highly Secured Devices” white paper, property #1 is implementation of a hardware root of trust. As Microsoft explains: ... » read more

ResNet-50 Does Not Predict Inference Throughput For MegaPixel Neural Network Models


Customers are considering applications for AI inference and want to evaluate multiple inference accelerators. As we discussed last month, TOPS do NOT correlate with inference throughput and you should use real neural network models to benchmark accelerators. So is ResNet-50 a good benchmark for evaluating relative performance of inference accelerators? If your application is going to p... » read more

Model Variation And Its Impact On Cell Characterization


EDA (Electronic Design Automation) cell characterization tools have been used extensively to generate models for timing, power and noise at a rapidly growing number of process corners. Today, model variation has become a critical component of cell characterization. Variation can impact circuit timing due to process, voltage, and temperature changes and can lead to timing violations, resulting i... » read more

New And Innovative Supply Chain Threats Emerging


The electronics supply chain is seeing evidence of increased sophistication in the counterfeiting of complex ICs and simple passives, both of which can impact the functioning and safety of the systems that use them. New technologies are being developed to build trust by helping to identify counterfeit devices before assembly and during failure analysis. It's too early to tell how effective t... » read more

How End-To-End Solutions Support Tomorrow’s Automotive Electrical Systems


We are living in a time of significant change and disruption in the automotive industry. The amount of electrical and electronic content in today’s vehicles continues to explode as consumers demand greater personalization of products and regular feature updates, and as tomorrow’s technologies such as autonomous and electric drive continue to develop. Meanwhile, established carmakers are gra... » read more

Dealing With Security Holes In Chips


Semiconductor Engineering sat down to discuss security risks across multiple market segments with Helena Handschuh, security technologies fellow at Rambus; Mike Borza, principal security technologist for the Solutions Group at Synopsys; Steve Carlson, director of aerospace and defense solutions at Cadence; Alric Althoff, senior hardware security engineer at Tortuga Logic; and Joe Kiniry, princi... » read more

Electronics In Agriculture


In my post Jobs: Farmer I wrote about my experience as a teenager working on the farm owned (actually rented from the Duke of Badminton) by the father of one of my school friends. Electronics were nowhere to be found in those days. I recently watched some YouTube videos that show just how hi-tech farming has become now that Moore's Law has made accessible electronics that would have seemed ma... » read more

Know Your Code: Open Source Security Risks During Development


Exploits of software security vulnerabilities can result in loss of sensitive customer and company information, disruption of business operations, and costly litigation. Organizations are increasingly turning to open source software to save time and money, but few have sufficient visibility into, or control of, open source usage to head off potential open source risks. Read this white paper ... » read more

← Older posts Newer posts →