FeFETs Bring Promise And Challenges


Ferroelectric FETs (FeFETs) and memory (FeRAM) are generating high levels of interest in the research community. Based on a physical mechanism that hasn’t yet been commercially exploited, they join the other interesting new physics ideas that are in various stages of commercialization. “FeRAM is very promising, but it's like all promising memory technologies — it takes a while to get b... » read more

Blog Review: Feb. 17


In a video, Synopsys' Tim Mackey warns that IoT device manufacturers are dealing with a serious challenge when it comes to security and points to the types of software threats that could impact IoT products. Siemens' Paul van Straten finds that the rise in vehicle complexity and intensified global competition means traditional automotive OEMs will need to explore new approaches to vehicle de... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive/Mobility With the chip supply so tight it is shutting down automotive production lines, U.S. chip company CEOs signed a Semiconductor Industry Association (SIA) letter asking the U.S. president to include funding incentives for the chip manufacturing in U.S. economic recovery plans. The letter references the CHIPS for America Act and asks the president to work with Congress to suppo... » read more

Usage Models Driving Data Center Architecture Changes


Data center architectures are undergoing a significant change, fueled by more data and much greater usage from remote locations. Part of this shift involves the need to move some processing closer to the various memory hierarchies, from SRAM to DRAM to storage. There is more data to process, and it takes less energy and time to process that data in place. But workloads also are being distrib... » read more

Certification And Collaboration Key To Closing IoT Security-Perception Gap


When it comes to security today, there’s perception and then there’s cold, hard reality. Here’s the reality: Cybersecurity Ventures expects global cybercrime costs to grow by 15% per year over the next five years, reaching $10.5 trillion annually by 2025, which is triple the 2015 figure. To get a sense for how pervasive the problem is, Symantec set up a “honeypot” system that dete... » read more

The Problem With Benchmarks


Benchmarks long have been used to compare products, but what makes a good benchmark and who should be trusted with their creation? The answer to those questions is more difficult than it may appear on the surface, and some benchmarks are being used in surprising ways. Everyone loves a simple, clear benchmark, but that is only possible when the selection criteria are equally simple. Unfortuna... » read more

Servers Are Becoming More Heterogeneous


The number of CPUs in a server is growing, and so is the number of vendors that make those processors. CPU server build has been one, two, four, and occasionally more x86 processors, with IBM’s Power and Z series as the major exception. While x86 processors aren't necessarily being replaced, they are being complimented and augmented with new processor designs for a variety of more speciali... » read more

Powering The Edge: Driving Optimal Performance With Ethos-N77 Processor


Repurposing a CPU, GPU, or DSP is an easy way to add ML capabilities to an edge device. However, where responsiveness or power efficiency is critical, a dedicated Neural Processing Unit (NPU) may be the best solution. In this paper, we describe how the Arm Ethos-N77 NPU delivers optimal performance. Click here to read more. » read more

Blog Review: Feb. 10


Cadence's Paul McLellan finds out some of the pressing technological challenges and opportunities at the recent SEMI Industry Strategy Symposium, from the purity of gases and other materials used in semiconductor manufacturing to increasing cost and time-to-market pressures. Siemens EDA's Harry Foster examines trends in low power ASIC and IC design, including active management of power and t... » read more

DRAM’s Persistent Threat To Chip Security


A well-known DRAM vulnerability called "rowhammer," which allows an assailant to disrupt or take control of a system, continues to haunt the chip industry. Solutions have been tried, and new ones are being proposed, but the potential for a major attack persists. First discovered some five years ago, most of the efforts to eliminate the "rowhammer" threat have done little more than mitigate t... » read more

← Older posts Newer posts →