中文 English

Electronics Supply-Chain Trust Standards Emerge


Creative new ideas for electronics supply-chain trust are in rich supply, whether securing identity, protecting logistics, or establishing provenance. But underlying these efforts are wide-ranging standards in development from a broad set of organizations. Today, no one-stop-shop for supply-chain standards exists. Instead, there is huge fragmentation. It can be difficult to identify all of t... » read more

Blockchain Attempts To Secure The Supply Chain


Blockchain technology is starting to be deployed more widely In the battle against counterfeiting, often coupled with component IDs to allow device authentication. Securing the supply chain is a complex challenge, particularly as more IP from more vendors in more locations makes its way into chips, packages or even systems. Being able to attest to the history of the device to prove its prove... » read more

New And Innovative Supply Chain Threats Emerging


The electronics supply chain is seeing evidence of increased sophistication in the counterfeiting of complex ICs and simple passives, both of which can impact the functioning and safety of the systems that use them. New technologies are being developed to build trust by helping to identify counterfeit devices before assembly and during failure analysis. It's too early to tell how effective t... » read more

Who’s Watching The Supply Chain?


Every company developing chips at the most advanced process nodes these days is using different architectures and heterogeneous processing and memory elements. There simply is no other way to get the kind of power/performance improvements needed to justify the expense of moving to a new process node. So while they will reap the benefits of traditional scaling, that alone is no longer enough. ... » read more

Combating Counterfeit Semiconductors In The Military Supply Chain


The reality: semiconductors are often counterfeits. In most current implementations, semiconductor authenticity is practically impossible to guarantee. The counterfeit market for semiconductors is real, sizable and growing: • 2012: According to a report produced by the Senate Armed Services Committee, more than 1,000,000 suspect counterfeit electronic components have been used in 1,800 sep... » read more

Week in Review: IoT, Security, Autos


Products/Services Huawei Technologies is again delaying the public introduction of its Mate X foldable smartphone. It is unlikely the product will be marketed in the U.S., given the ongoing trade war. The official rollout now seems likely to come in November, in time for the holiday shopping season. Samsung Electronics has had its problems with foldable phones, yet those were due to manufactur... » read more

System Bits: Aug. 20


Blockchain integrated into energy systems Researchers at Canada’s University of Waterloo integrated blockchain technology into energy systems, a development that may expand charging infrastructure for electric vehicles. In a study that outlines the new blockchain-oriented charging system, the researchers found that there is a lack of trust among charging service providers, property owners... » read more

Week in Review: IoT, Security, Auto


Products/Services Rambus agreed to acquire Hillsboro, Ore.-based Northwest Logic, a purveyor of memory, PCIe, and MIPI digital controllers. The transaction is expected to close in the current quarter. Financial terms weren’t disclosed; Rambus said in a statement, “Although this transaction will not materially impact 2019 results due to the expected timing of close and acquisition accountin... » read more

Week in Review: IoT, Security, Auto


Products/Services Arteris IP reports that Bitmain licensed the Arteris Ncore Cache Coherent Interconnect intellectual property for use in its next-generation Sophon Tensor Processing Unit system-on-a-chip devices for the scalable hardware acceleration of artificial intelligence and machine learning algorithms. “Our choice of interconnect IP became more important as we continued to increase t... » read more

New Approaches To Security


Different approaches are emerging to identify suspicious behavior and shut down potential breaches before they have a chance to do serious damage. This is becoming particularly important in markets where safety is an issue, and in AI and edge devices where the rapid movement of data is essential. These methods are a significant departure from the traditional way of securing devices through l... » read more

← Older posts