Turning Down The Power


Chip and system designers are giving greater weight to power issues these days. But will they inevitably hit a wall in accounting for ultra-low-power considerations? Performance, power, and area are the traditional attributes in chip design. Area was originally the main priority, with feature sizes constantly shrinking according to Moore's Law. Performance was in the saddle for many years. M... » read more

Beacons Beckon Ubiquity In IoT Era


In the early 1900s, radio beacons were created with the aim of tracking ships and planes. Prior to this innovation, pilots and ships’ captains usually relied on celestial navigation, and anyone who wanted to know their location was in the dark. A century later, engineers took the concept and devised Bluetooth Low Energy-enabled beacons, a vast use never envisaged by their 20th cent... » read more

The Route To A Trillion Devices


Technology vendors like to talk about data being big, really big. Petabytes of storage; gigabits of bandwidth; megaflops of processing power. But data doesn’t have to be big to be valuable. One of the most successful financial trades of all time was premised on a piece of information that could have been represented by a single bit (1 or 0). On June 19 1815, the bond market in London wa... » read more

What Will 2018 Bring To The IoT?


The Internet of Things is widely expected to progress in 2018—especially the Industrial IoT—as industry standards get hashed out and more vendors take cybersecurity seriously. On the home front, many Americans are growing accustomed to artificial intelligence technology from their use of Amazon Echo, Apple HomeKit, and Google Home devices. They’re talking to their remote controls to ch... » read more

Blog Review: Jan. 10


Rambus' Aharon Etengoff explains the Meltdown and Spectre CPU vulnerabilities and why they could negatively affect the semiconductor industry for decades. Cadence's Paul McLellan has an explainer on Meltdown and how it's an unintended consequence of a processor behaving as intended. Mentor's Ruben Ghulghazaryan and Jeff Wilson investigate using machine learning to predict post-deposition ... » read more

The Week In Review: Design


Security Security researchers identified a major exploit of the "speculative execution" technique used to optimize performance in modern processors. The flaws allow an attacker to read sensitive information in the system's memory such as passwords, encryption keys, or sensitive information open in applications, according to Google's Jann Horn. Multiple researchers discovered the issues indepen... » read more

IoT Security Manifesto


Securing tomorrow means rethinking how we design intelligent devices by embracing concepts from outside the digital realm and taking advantage of advanced new technologies. Some of the things the Arm Security Manifesto explores: A digital immune system. Technologists develop human-like immune systems and health-care services that automatically detect, quarantine and treat any cyber inf... » read more

Reshaping Automotive Design


The entire automotive ecosystem is being reshaped by vehicle electrification, assisted and autonomous driving, and the connectivity needed to make it all work. So far, it's not clear just how smoothly this will all come together. In this redefined world, electronics and software will provide differentiation rather than mechanical engineering and possibly even brand name, creating change on a... » read more

Eye-Catching Innovations In Display Subsystems


The mobile devices we hold in our hands today are nothing short of astonishing in what they deliver and how seamlessly they deliver it, and it’s not just geolocation and context-mapping applications that have made these devices so transformational. Hand in hand with processor and bandwidth improvements have come leaps in display capabilities, which means new entertainment and information appl... » read more

Who’s Responsible For Security?


Semiconductor Engineering sat down to discuss security issues and how to fix them with Mark Schaeffer, senior product marketing manager for secure solutions at Renesas Electronics; Haydn Povey, CTO of Secure Thingz; Marc Canel, vice president of security systems and technologies at [getentity id="22186" comment="Arm"]; Richard Hayton, CTO of Trustonic; Anders Holmberg, director of corporate dev... » read more

← Older posts