Authentication In The IoT Age


We all know passwords are a problem. We have too many of them to remember, but too many of them are reused to make them secure. No surprise that they are the root cause of the vast majority of data breaches. Fortunately, clever minds are working at ways to replace them and they have come together to create the FIDO (Fast IDentity Online) Alliance. The FIDO Alliance was created in 2013 to de... » read more

Big Design, IP and End Market Shifts In 2020


EDA is on a roll. Design starts are up significantly thanks to increased investment in areas such as AI, a plethora of new communications standards, buildout of the Cloud, the race toward autonomous driving and continued advancements in mobile phones. Many designs demand the latest technologies and push the limits of complexity. Low power is becoming more than just reducing wasted power at t... » read more

Addressing IC Security Threats Before And After They Emerge


Semiconductor Engineering sat down to discuss different approaches to security with Warren Savage, research scientist in the Applied Research Laboratory for Intelligence and Security at the University of Maryland; Neeraj Paliwal, vice president and general manager of Rambus Security; Luis Ancajas, marketing director for IoT security software solutions at Micron; Doug Suerich, product evangelist... » read more

Week In Review: IoT, Security, Autos


AI/Edge Vastai Technologies is using Arteris IP’s FlexNoC Interconnect IP and AI Package for its Artificial Intelligence Chips for artificial intelligence and computer vision systems-on-chip (SoCs). Startup Vastai Technologies was founded in December 2018, designs ASICs and software platforms for computer vision and AI applications, such as smart city, smart surveillance, smart education, ac... » read more

5/3nm Wars Begin


Several foundries are ramping up their new 5nm processes in the market, but now customers must decide whether to design their next chips around the current transistor type or move to a different one at 3nm and beyond. The decision involves the move to extend today’s finFETs to 3nm, or to implement a new technology called gate-all-around FETs (GAA FETs) at 3nm or 2nm. An evolutionary step f... » read more

Priorities Shift In IC Design


The rush to the edge and new applications around AI are causing a shift in design strategies toward the highest performance per watt, rather than the highest performance or lowest power. This may sound like hair-splitting, but it has set a scramble in motion around how to process more data more quickly without just relying on faster processors and accelerators. Several factors are driving th... » read more

Big Growth Areas: Connectivity, AI, Reliability


Connectivity and artificial intelligence (AI) will be the biggest drivers for 2020, with an emphasis on improved reliability across all areas. New standards, new applications, and new pressures being placed on old technology will created boundless opportunities for those ready to fill the need. Of course, there will also be a lot of carnage along the way, and we can expect to see a lot of that ... » read more

The Evolution Of Pervasive Computing


The computing world has gone full circle toward pervasive computing. In fact, it has done so more than once, which from the outside may look like a more rapid spin cycle than a real change of direction. Dig deeper, though, and it's apparent that some fundamental changes are at work. This genesis of pervasive computing dates back to the introduction of the PC in 1981, prior to which all corpo... » read more

California’s IoT Law Is A Good Start, But More Needs To Be Done


Passed by former California governor Jerry Brown, cybersecurity law SB-327 went into effect on Jan. 1. This proactive legislation requires manufacturers to equip IoT devices with “reasonable” security features to prevent unauthorized access, modification and data leaks. Specifically, SB-327 requires manufacturers to implement a unique preprogrammed (default) password for each device. Additi... » read more

Open Source Hardware Risks


Open-source hardware is gaining attention on a variety of fronts, from chiplets and the underlying infrastructure to the ecosystems required to support open-source and hybrid open-source and proprietary designs. Open-source development is hardly a new topic. It has proven to be a successful strategy in the Linux world, but far less so on the hardware side. That is beginning to change, fueled... » read more

← Older posts Newer posts →