Manufacturing Cyber Security


Designers and manufacturers worldwide are concerned about manufacturing cyber security and design data when using additive manufacturing technology. This whitepaper from Identify3D discusses how digital product data is shared during the additive manufacturing workflow and how that data might be better secured. Using products from Identify3D and Siemens, the entire additive manufacturing data ch... » read more

Revolution In Embedded Security


The growth of computing, graphics, neural processing power, communication bandwidth, and storage capacities have enabled amazing solutions. These innovations have created great value for society, and that value must be protected from exploitation by adversaries. This whitepaper explores many of these major technology changes and how Rambus’ security offerings help in tackling the new embedded... » read more

Meeting Stringent CO2 Building Code Requirements


As today’s world is struggling to come to grips with a worldwide pandemic and the rapid spread of viruses, accurate and reliable indoor air quality monitoring has become a crucial part of existing and newly updated building codes. This white paper discusses carbon dioxide (CO2) monitoring requirements as covered by California’s Title 24 standard (one of the strictest building code standards... » read more

2021 Software Vulnerability Snapshot


The Synopsys Cybersecurity Research Center (CyRC) examined anonymized data from thousands of commercial software security tests performed by Synopsys application security testing services in 2020. The CyRC team measured this data against the 2021 OWASP Top 10 list of the most critical security risks to web applications. Key findings in the report include   97% of tests uncovered vul... » read more

Open RAN Direct RF Sampling Radio Transceiver Architectures For Massive MIMO


With the exponential increase in wireless traffic, mobile networks are transformed into more software-driven, virtualized, flexible, intelligent, and energy efficient systems. These trends have stimulated significant change in the core network with the advent of software defined networks (SDN) and network functions virtualization (NFV), which have enabled building more agile and less expensive ... » read more

Addressing Library Characterization And Verification Challenges Using ML


At advanced process nodes, Liberty or library (.lib) requirements are more demanding due to design complexities, increased number of corners required for timing signoff, and the need for statistical variation modeling. This results in an increase in size, complexity, and the number of .lib characterizations. Validation and verification of these complex and large .lib files is a challenging task... » read more

Achieving C-V2X Compliance


Testing the performance of cellular vehicle-to-everything (C-V2X) components and subsystems to achieve compliance against evolving 5G test requirements is an ongoing challenge for the connected vehicle market. The global acceptance for the C-V2X technology takes autonomous driving from a shared vision to mass-market reality. C-V2X uses the 3rd Partner Project (3GPP) standard for 4G and 5G mo... » read more

Fuzz Testing Software-Defined Vehicles Using Agent Instrumentation


Cybersecurity has become intertwined into each step of the automotive development process. In particular, fuzz testing has proven to be a powerful approach to detect unknown vulnerabilities in automotive systems. But with limited instrumentation, especially on software-heavy systems such as high-performance computers (HPCs), several types of issues go undetected, including memory leaks and case... » read more

RF To mmWave Design For Systems


RF-enabled next-generation communication systems and connected devices are differentiated by their performance, size, and cost. Traditionally, custom proprietary IC designs, leveraging the latest advanced-node technology, were developed to meet these product requirements. Increasingly these challenges are being met by moving beyond single IC solutions. Today’s electronic systems often integra... » read more

Image Processing For Vision AI


Recent years have seen an increasing need for Vision AI applications using AI to enable real-time image recognition. Vision AI, which substitutes AI for human visual recognition, requires optimal image processing. Renesas has released RZ/V2M as mid-class, and RZ/V2L as an entry class, Vision AI microprocessors (MPUs). Both products are equipped with DRP-AI which is Dynamically Reconfigurable Pr... » read more

← Older posts Newer posts →