Top Stories
Automotive Lidar Technologies Battle It Out
None has achieved economies of scale yet, but there may be more than one winner.
Always On, Always At Risk
Chip security concerns rise with more processing elements, automatic wake-up, over-the-air updates, and greater connectivity.
Auto Displays: Bigger, Brighter, More Numerous
Chips come under new scrutiny as screens become integrated into safety-critical systems.
Will PAYGO Shake Up How We Pay For Chips?
Superchip approach could reduce costs, but not everyone is convinced.
Video
Changes In Auto Architectures
From driver-centric to driverless functionality.
Blogs
Siemens EDA’s Gajinder Panesar shows how to thwart hackers with security-focused embedded IP, in Building A More Secure SoC.
Flex Logix’s Andy Jaros presents a way to save power and improve performance with semi-custom chips at MCU volume prices, in Integrate FPGAs For A Customizable MCU.
Synopsys’ Dana Neustadter contends that starting security early in the design cycle is critical, in Protecting Automotive SoCs Starts With Secure IP.
OneSpin’s McKenzie Mortensen Ross asks what you want to protect, how will you protect it, and what you stand to lose if you don’t, in Does Your IC Security Need A Renovation?
Rambus’ Bart Stevens examines the varying and sometimes contradictory security requirements as an SoC moves from fab to end of life, in Securing The SoC Life Cycle.
Cadence’s John Chawner summarizes efforts to apply computational fluid dynamics to increasingly complex aerospace applications, in Progress And Challenges On The CFD Vision 2030 Roadmap.
Infineon’s Steve Hanna looks at why the Matter standard is so important, in Implementing Improved Security And Connectivity For The Smart Home.
Arteris IP’s Kurt Shuler explains that collaboration between supplier and customer is key to achieving functional safety goals, in ISO 26262 – Law Or Framework.
Cadence’s Sriram Sharma Kalluri explores the basics of cryptography beyond encryption, in Embedded Security Using Cryptography.
White Papers
The Evolving Landscape Of SoC Vulnerabilities And Analog Threats
Securing The IoT Begins With Zero-Touch Provisioning At Scale
Solution Efficiencies For Dynamic Function EXchange Using Abstract Shells
Securing 5G And IoT With Fuzzing
Beyond Bug Hunting: Verification Coverage From Safety To Certification
5G Communications
Newsletter Signup
Find our email newsletter signup page here.