Blog Review: Nov. 9


Mentor's Andrew Patterson highlights two of the main debates around IoT: how to connect and how much security is enough. Cadence's Paul McLellan checks out one company's design for a dataflow processing unit to speed up deep learning networks. Prepare for USB to be everywhere in the autonomous car, says Synopsys' Eric Huang. Rambus' Aharon Etengoff argues that the end of Dennard Scalin... » read more

What’s Next For IoT Security?


By Ed Sperling & Jeff Dorsch With security, the little things can cause as much of a problem as the big things. As shown in the recent distributed denial of service attack (DDoS) on Dyn, which created waves of attacks using Mirai malware, connected devices of all sizes can be amassed into an army of bots that can bring even giants like Amazon and Netflix to a dead stop. This attack was ... » read more

Dyn DDoS Attack Reboots IoT Security


In mid-October, cyber criminals targeted Internet infrastructure company Dyn with a “massive and sustained” DDoS attack that focused on the company’s DNS infrastructure. The cyber offensive disrupted access to a number of major sites including Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix. Perhaps not surprisingly, the massive DDoS attack was conducted with the help of various hija... » read more

Healthcare IoT: Promise And Peril


By Gale Morrison & Ed Sperling As more connectivity and communication capability is built into everyday healthcare and medical devices, engineers are tasked with ensuring these devices are both completely secure and ultra-reliable. Reliability generally is measured in mean time between failure (MTBF), but when it comes to safety-critical markets, that equation takes on a whole new... » read more

Blog Review: Nov. 2


Mentor's Harry Foster digs into the trends in ASIC/IC languages and libraries, in the latest installment of the Wilson Research Group Functional Verification Study. High power and voltage requirements mean that the USB Type-C Port controller and Power Delivery blocks do not belong in the SoC, says Synopsys' Michael Posner. Cadence's Paul McLellan digs into hypervisors and how virtualizati... » read more

The Week In Review: Design


IP ARM unveiled a suite of products focused on the IoT, with new processors, radio technology, subsystems, end-to-end security and a cloud-based services platform. Included are Cortex-M23 and Cortex-M33, the first embedded processors based on the ARMv8-M architecture. The Cortex-M33 features configuration options including a coprocessor interface, DSP and floating point computation, while th... » read more

Blog Review: Oct. 19


Mentor's Colin Walls provides some tips on writing portable, reusable code. Cadence's Christine Young contends that you should never use 2.5D for characterization at advanced nodes. Synopsys' Eric Huang considers one impractical use of USB heating and the IoT. Applied's Ben Lee predicts a rapid growth in China's power device manufacturing. NXP's Joppe Bos digs into the challenges of... » read more

Side-Channel Attacks Make Devices Vulnerable


As the world begins to take security more seriously, it becomes evident that a device is only as secure as its weakest component. No device can be made secure by protecting against a single kind of attack. Hypervisors add a layer of separation between tasks making sure that one task cannot steal secrets from another. Protection of the JTAG port is necessary to prevent access underneath the h... » read more

Lower Power Plus Better Performance


The tradeoff between power and performance is becoming less about one versus the other, and more about a dual benefit, as new computing and chip architectures begin rolling out. Neural networking, which is one of the hot buttons for any system that relies on lots of distributed sensors, is essential to get a true picture of what is happening around a car moving down the highway at 65 miles ... » read more

From The Data Center To The Mobile Edge


At the heart of the Internet of Things is the complex interplay between the needs for both low power and high performance (LPHP), a perplexing challenge rooted in the de-facto bifurcation of the IoT itself. For example, lower power mobile devices, systems and lite endpoints make up the vast majority of forward-facing consumer infrastructure, while high-performance servers at the back end are ta... » read more

← Older posts Newer posts →