Special Report
Where Are The Autonomous Cars?
L5 vehicles need at least 10 more years of development.
Top Stories
Cities Strive For More Smarts, Security
Smart city security starts with the silicon.
Chip Backdoors: Assessing The Threat
Steps are being taken to minimize problems, but they will take years to implement.
Is Standardization Required For Security?
Why and how the semiconductor ecosystem needs to come together on security.
Design And Security Challenges For VR
As devices are untethered, applications will spread well beyond gaming, and chips will need to be tailored for many of them.
Chipmakers Model AI For Radio Access Networks
AI will be used to improve beamforming using less energy and to improve overall connectivity.
Blogs
Rambus’ Stuart Kincaid looks at the importance of meeting security standards in IC components before integration, in Building Trust Through Certification Of Security Solutions.
Riscure’s Jasper van Woudenberg shows how an attack can apply to other algorithms, in Hertzbleed: Prime Time For Power Side Channel Countermeasures Or Novelty Attack?
Analyst Anand Joshi foresees that full speech recognition will require fundamental innovations that allow processing at very high performance per watt, in Speech Applications Will Enable A New Category Of Edge AI Chips.
Siemens EDA’s Amir Attarha examines how to make the power analysis flow more efficient by performing experiments early, in Leaning Into The SoC Power Methodology.
Synopsys’ Ron DiGiuseppe scrutinizes what’s needed to develop chips and systems for automotive applications, in More Than Random: Achieving Systematic ASIL D ISO 26262 Compliance For Automotive SoCs.
Cadence’s Paul McLellan breaks down the new reality of delivering cars at the speed of consumer electronics, in AEK: Powerpoint Is Easy—Change Is Hard.
Infineon’s Danie Schneider concludes that when connected and equipped with sensors and AI capabilities, machines can cooperatively work with people, in Robots Need More Human Skills.
Sponsor White Papers
Cybersecurity Is A Journey
A single weakness detected too late in the design process can put deadlines in jeopardy and incur high costs while organizations spin a new design.
Five Things You Should Know To Avoid The Most Common Security Errors
Common security mistakes still made today by chip and device vendors.
Transforming AppSec: The Top Three Ways To Build Security Into DevOps
Organizations that can succeed in these areas will turn software security from a productivity inhibitor into a business enabler.
Matter Security And Privacy Fundamentals
How the CSA’s Matter handles smart home security and enables communication across smart home devices and ecosystems over a specific set of IP-based networking technologies, starting with Thread, Wi-Fi, and Ethernet.
Newsletter Signup
Find our email newsletter signup page here.