The Value Of High-Performance Computing For Simulation


This white paper breaks down the costs and time savings associated with implementing high-performance computing technology. High-performance computing (HPC) is an enormous part of the present and future of engineering simulation. HPC allows best-in-class companies to gain high-fidelity insight into product behavior, insight that cannot be obtained without the detailed simulation models – i... » read more

Choosing The Right Photonic Device Design Software


There are many factors to consider before deciding which software to use for photonic device design. To narrow the field, it can be helpful to ask these key questions as you investigate and compare software functionality. • Does the software provide enough flexibility to model and analyze products that offer the best solution to likely and possible design goals? • Is the simulation ca... » read more

The Human Hand: Curating Good Data And Creating An Effective Deep-Learning R2R Strategy For High-Volume Manufacturing


Currently, the semiconductor manufacturing industry uses artificial intelligence and machine learning to take data and autonomously learn from that data. With the additional data, AI and ML can be used to quickly discover patterns and determine correlations in various applications, most notably those applications involving metrology and inspection, whether in the front-end of the manufacturing ... » read more

GaN 8Gbps High-Speed Relay MMIC For Automated Test Equipment


An 8 Gbps high-speed relay MMIC for an Automated Test Equipment (ATE) using a gallium nitride is developed and evaluated. Metal-Insulator-Semiconductor structure with a tantalum oxynitride is employed to reduce a leakage current for ATE applications. The fabricated MMIC shows 0.3 nA of the leakage current, 12 GHz of a -3 dB bandwidth, and excellent eye-opening of 8 Gbps signals with a 18-lead... » read more

Advantages Of Measuring Surface Roughness With White Light Interferometry


The concept of measuring surface roughness originated nearly a century ago as a means to prevent uncertainty and disputes between manufacturers and buyers. Now, it has become a common identifier used throughout industry for validating manufacturing processes, confirming adherence to both internal and regulatory specifications, and guaranteeing quality and performance of end products. Subjective... » read more

Synopsys And Cerebras Systems


The Cerebras Systems Wafer-Scale Engine 2 (WSE-2) is by far the largest silicon product available, with a total silicon area of 46,225mm². It utilizes the maximum square of silicon that can be made out of a 300mm diameter wafer. The square of silicon contains 84 die that are 550mm² each. These die were stitched together using proprietary layers of interconnect, making a continuous compute fab... » read more

Supply Chain Security And Counterfeit Detection Using Universal Chip Telemetry (UCT)


The recent shortage of chip supply and long lead times prompted system makers to turn to second tier suppliers and distributors for fulfilling their semiconductor needs. This in turn has put the spotlight on the growing concern of fraudulent or counterfeited Integrated Circuits (ICs). Proteus deep data analytics based on Universal Chip Telemetry (UCT) provides a new approach to supply chain ... » read more

Cybersecurity Is A Journey


Hardware Is the Foundation of Your Security Posture Due to the inability to ‘patch’ silicon, failure to identify and remediate hardware vulnerabilities early comes with catastrophic consequences. However, most of the focus and investments in cybersecurity have historically been on device software and its administrators, not on securing the underlying hardware. Hardware Vulnerabilitie... » read more

Five Things You Should Know To Avoid The Most Common Security Errors


Since 2001, Riscure has been helping chip vendors and device manufacturers improve the security of their products. Over the years, the security scenario has changed a lot. The attacker profile evolved from individuals motivated by curiosity, with very limited resources and attack potential, to well-funded and organized adversaries with dark motivations and the capacity to execute very sophistic... » read more

Transforming AppSec: The Top Three Ways To Build Security Into DevOps


DevOps has changed the way organizations bring software to market, allowing them to deliver new applications and features rapidly and continuously. But it’s also introduced new security challenges as testing and remediation have failed to keep pace. As a result, cybercriminals have developed new attack strategies that intensify their focus on the application layer, including open source and s... » read more

← Older posts Newer posts →