Add Security And Supply Chain Trust To Your ASIC Or SoC with eFPGAs


Before Covid-induced supply chain issues affected semiconductor availability and lead times, concerns about counterfeit parts and trusted supply chains were becoming the subject of many articles and discussions affecting critical data centers, communications, public infrastructure, and facilities such as regional power plants and the grid. Today’s semiconductor design and manufacturing is com... » read more

Embedded Intelligent Edge For Predictive Maintenance


Historically in a full-scale production setting, one of the best company assets was the experience of machine operators, as they had the ability to predict when maintenance was required. Plant managers reported about any unusual behavior such as a clatter or clank in the machinery, prompting a check-up by the maintenance crew. Today, the level of automation greatly reduces the operator’s abil... » read more

Improve Your Verification Methodology: Hunt Bugs Flying In Squadrons


After analyzing bugs on several generations of CPUs, I came to the conclusion that “bugs fly in squadrons.” In other words, when a bug is found in a given area of the design, the probability that there are other bugs with similar conditions, in the same area of the design, is quite high. Processor bugs don’t fly alone Finding a CPU bug is always satisfying, however it should not be an e... » read more

Radar For Automotive: Why Do We Need Radar?


Communications and sensing technologies have transformed the automotive industry. More and more, cars include features and systems to interact with their environment, gaining awareness of the surrounding space, networking with each other and with the infrastructure, and detecting possible sources of danger. We can consider that vehicles have acquired their own “senses”: they know where they... » read more

Precision Selective Etch And The Path To 3D


Scaling (the shrinking of the tiny devices in chips such as transistors and memory cells) has never been easy, but making the next generation of advanced logic and memory devices a reality requires creating new structures at the atomic scale. When working with dimensions this small, there is little room for variation. Compounding the problem is a need to remove material isotropically, or, un... » read more

PCB Layout Tips For Low Side Gate Drivers With OCP


Our 1ED44173/5/6 are the new low side gate driver ICs that integrate over-current protection (OCP), FAULT status output and enable function. This high integration level is excellent for the digitally controlled Power Factor Correction (PFC) applications with boost topology and ground reference switching. In PFC applications, shunts are used to sense power switch current or DC bus current... » read more

Who Will Own Debug?


Recently, I had an interesting conversation with a verification leader of one of the world’s leading semiconductors companies. He has some 150 verification engineers in his organization and the group has been exploring EDA solutions for many years. While we’ve exchanged many ideas about EDA and innovation, one sentence that he said stays in my head: Whoever will own debug, will own th... » read more

Enabling Silicon Lifecycle Solutions


The concepts of product lifecycle management (PLM) should be familiar, although the semiconductor industry has yet to adopt a system for managing the entire lifecycle of a product from inception through design, realization, deployment, and field service, right through to end-of-life activities such as final disposal. Now, a combination of business and technical pressures is bringing PLM capabil... » read more

Hardware Security Optimization With MITRE CWE


Whether you’re just starting to build out a hardware security program at your organization, or you’re looking to optimize existing hardware security processes, the MITRE Common Weakness Enumeration (CWE) database is an excellent resource to keep in your toolbox. What is CWE? A CWE is a type of vulnerability, or flaw, in the design of either hardware or software in embedded systems. Indi... » read more

Building Multipurpose Systems With Dynamic Function Exchange Part Three: Tools For Deploying DFX


In our previous two articles, we introduced you to the concept of Dynamic Function Exchange (DFX), a design approach that dynamically reallocates unused system resources to other tasks. We also introduced you to some techniques for bundling and managing your DFX resources. In this article, we will discuss some of the adaptive computing tools that make DFX possible. As part of its investment ... » read more

← Older posts Newer posts →