Meeting Stringent PA_SaveConfigTime In UFS Solution When M-PHY Needs Higher Reconfigure Time


The JEDEC Universal Flash Storage (UFS) has emerged as the default mobile storage solution for high-end smartphones and battery-operated devices, owing to its superior speed, performance, and power efficiency. These attributes are essential to meet users' demand for rapid transmission and reception of high-resolution media amid myriad operations. Despite these advantages, UFS's use of the MIPI ... » read more

FMEDA-Driven SoC Design Of Safety-Critical Semiconductors


As state-of-the-art electronics propel the automotive, industrial, and aerospace industry into a future of more connectivity and autonomy, the development of safety-compliant semiconductors is critical. The Cadence FMEDA-driven Safety Solution consists of products enhanced for advanced safety analysis, safety verification, and safety-aware implementation for digital driving analog and dig... » read more

How To Stop Row Hammer Attacks


Row hammer is a well-publicized target for cyberattacks on DRAM, and there have been attempts to stop these attacks in DDR4 and DDR5, but with mixed results. The problem is that as density increases, distance decreases, making it more likely that flipped bit cell in one row can disturb a bit cell in another, and that bits flipped across an entire row can flip another row. Steven Woo, fellow and... » read more

What’s Changing In DRAM


More data requires more processing and more storage, because that data needs to be stored somewhere. What’s changing is that it’s no longer just about SRAM and DRAM. Today, multiple types of DRAM are used in the same devices, each with its own set of tradeoffs. C.S. Lin, marketing executive at Winbond, talks about the potential problems that causes, including mismatches in latency, and high... » read more

IoT Building Block: Touch Interface HMI


Many IoT devices have started to include touch screen interfaces as part of their UI to make the devices more intuitive and easier to use. A great interface can make customers really love and want to use your IoT product, but a poor HMI interface makes the device unusable damaging the brand value. Given this impact a touch interface can have on your IoT device, it made me wonder what are the... » read more

Visa Shakeup On Tap To Help Solve Worker Shortage


Governments around the world are racing to train workers to design, manufacture, and package chips, but they are facing a talent shortfall that is expected to continue despite their best efforts — particularly for those engineers capable of designing and producing the most advanced chips. The Semiconductor Industry Association (SIA) predicts a U.S. chip worker shortfall of 67,000 by 2030, ... » read more

How Secure Are FPGAs?


The unique hybrid software/hardware nature of FPGAs makes them tempting targets for cyberattacks, while also enabling them to rebuff attacks and change the attack surface before significant damage can be done. But it's becoming increasingly challenging to address all the potential vulnerabilities. FPGAs are often included in larger systems, each with their own unique attack vectors as well a... » read more

Trendspotting: Automotive IC Startup Funding In 2023


Consumers expect a lot from the electronics in their cars. The parts in the safety-critical systems need to be reliable for up to 18 years, able to handle a range of temperatures, voltages, and vibrations — and all the while be fault-tolerant and make zero errors. On top of those basic requirements, automakers trying to appeal to consumers are adding in more features that communicate with the... » read more

Key Inflection Points Influencing Bluetooth Low Energy Sourcing Decisions


Bluetooth 5.4, the latest specification from the Bluetooth Special Interest Group (SIG), includes a number of enhancements that will open additional markets and use cases. This is one of several inflection points in the Bluetooth Low Energy (BLE) market that we will discuss in this blog. One thing I have learned over the course of my career in delivering multiple wireless products is that th... » read more

Side-Channel Attack Protection For Quantum Safe Cryptography


A recent Reuters Special Report discussed the race between the US and China to protect digital assets and communications from the potential threat posed by quantum computers. Cryptographically relevant quantum computers, those that are powerful enough to crack existing public key-based encryption methods, could compromise military, economic, and personal information across the globe. While the ... » read more

← Older posts Newer posts →