Special Report
Blockchain: Hype, Reality, Opportunities
Technology investments and rollouts are accelerating, but there is still plenty of room for innovation and improvement.
Top Stories
Reshaping Automotive Design
Conflicting goals, evolving standards and the need for new methods and tools make this an interesting market for chipmakers.
Who’s Responsible For Security?
Experts at the Table, part 1: Where security is working, where it isn’t, and what to do about it.
Blogs
Editor In Chief Ed Sperling observes that what’s simple for people isn’t so easy for machines, in Can Autonomous Cars Get Around The Corner?
Executive Editor Ann Steffora Mutschler finds the automotive industry is shaking up the startup world, in Automotive Startup Activity Swelling.
Synopsys’ Ron Lowman examines changes in Bluetooth that make security a requirement, not an option, in Bluetooth Mesh Drives Security For Automotive Applications.
Achronix’s Alok Sanghavi explains the role eFPGAs play in making autonomous vehicles safe, in Self-Driving Cars At CES: The Future Of Transportation Is Here.
Flex Logix’s Geoff Tate contends that paying attention to metal stack requirements can cut costs and avoid re-routing, in The Importance Of Metal Stack Compatibility For Semi IP.
Mentor’s Greg Lebsack questions how sensor vendors make money in the IoT marketplace, in Sensors Drive IoT Intelligent Systems.
Rambus’ Bart Stevens argues that the introduction of standalone noise isn’t enough to stop data leaks, in Thwarting Side-Channel Attacks With DPA-Protected Software Libraries.
ARM’s Ian Hutchinson notes that due to a number of trends, mobile display technologies are now a major selling point for new devices, in Eye-Catching Innovations In Display Subsystems.
Sponsor White Papers
IoT Security Manifesto
Exploring new human-centered approaches to security.
Protecting Electronic Systems From Side-Channel Attacks
Countermeasures for inexpensive, non-intrusive, but very effective hacking.
Measuring ISO 26262 Metrics Of Analog Circuitry In ICs
What zero defects and safe operation over a vehicle’s lifetime mean for chip design.
Who Needs OWASP?
How to create your own Top 10 security vulnerability list.