Data Center Evolution: DDR5 DIMMs Advance Server Performance


Driven by a confluence of megatrends, global data traffic is increasing at an exponential rate. For example, 5G networks are enabling billions of AI-powered IoT devices untethered from wired networks. Nowhere is the impact of all this growth being felt more intensely than in data centers. Indeed, hyperscale data centers have become the critical hubs of the global data network. DDR5 DRAM will en... » read more

Turning Cars Into Mobile Devices: MIPI


Everyone remembers their first car – how you could go where you wanted to go, moving faster and going longer distances – you were mobile. Yes, our cars made us mobile, but today’s cars are becoming mobile devices themselves. More than a means of transportation, cars are evolving into complete mobile devices – connecting and connected to the internet, transportation grids, and to each ot... » read more

Automotive IC Production Wafer Test In A Zero-Defect World


By Amy Leong, FormFactor. Innovations in automotive semiconductor ICs post a high bar for wafer test. FormFactor’s Chief Marketing Officer, Amy Leong, provides insights into the challenges associated with automotive IC production wafer testing amid the requirement for zero-defects. Click here to continue reading. » read more

Metrology at Automated Test Equipment Manufacturers


New technologies require an efficient qualification infrastructure to determine and qualify technical specifications. Metrology is the science which determines the acknowledged specification setting process based on proven international standards. This paper describes metrology and its role and benefits in automated test equipment business. By Piotr Skwierawski and Ralf Haefner. Click her... » read more

Accelerating SoC Verification Closure With Unified Verification Management Solution


Functional verification of system-on-chip (SoC) designs requires best-in-class tools linked together in a unified solution in order to address exponential complexity challenges. There is no one-size-fits-all method for verification. Complex designs require a combination of virtual prototyping, static checks, formal analysis, simulation, emulation and FPGA prototyping. The execution of all the t... » read more

Monitoring Critical Process Steps In 3D NAND Using Picosecond Ultrasonic Metrology With Both Thickness And Sound Velocity Capabilities


Amorphous carbon (a-C) based hard masks provide superior etch selectivity, chemical inertness, are mechanically strong, and have been used for etching deep, high aspect ratio features that conventional photoresists cannot withstand. Picosecond Ultrasonic Technology (PULSE Technology) has been widely used in thin metal film metrology because of its unique advantages, such as being a rapid, non-... » read more

Tessent LogicBIST With Observation Scan Technology


Meeting the ISO 26262 requirements for high quality and long-term reliability mans implementing on-chip safety mechanisms with high defect coverage of IC logic. This paper describes Observation Scan Technology, a new new logic built-in-self-test (BIST) technology that improves logic BIST test quality and reduces in-system test time. Empirical results demonstrate 90% test coverage with up to 10X... » read more

Security In The ARM Ecosystem


Building security in an SoC aiming to meet the goals set by the ARM Platform Security Architecture (PSA) is a complex matter. This is compounded by the complexity of modern-day SoCs comprising multiple processors, security domains and security levels. The Rambus root of trust provides a solid foundation for the SoC security architecture ticking ‘all the boxes’ for reaching the security goal... » read more

Radix Coverage For Hardware Common Weakness Enumeration (CWE) Guide


MITRE's hardware Common Weakness Enumeration (CWE) database aggregates hardware weaknesses that are the root causes of vulnerabilities in deployed parts. A complete list can be found on the MITRE Hardware Design Webpage. Hardware CWEs are ideal to be used alongside internally developed security requirements databases and have been developed and submitted by both government and commercial design... » read more

10 Things You Ought To Know Before You Benchmark Your Software Security Program


Benchmarking can help you get a new software security initiative off the ground or better navigate an existing one. It is different from other measurement techniques because it focuses on excellence, includes detailed comparisons, and pools confidential information among numerous organizations. To get you started in the right direction, we’ve put together some quick tips so you get the mos... » read more

← Older posts Newer posts →