中文 English

Lawyers, Insurance And Self-Driving Cars


Self-driving cars are drawing semiconductor companies into legal and regulatory issues for the first time, adding a new level of scrutiny on cutting-edge chip technology. It also opens up a whole new field for legal interpretation, case law, and regulation. While most liability cases in the past never crossed below the system vendor/supplier level, that could change with autonomous vehic... » read more

Autonomous Vehicle Disruptions Ahead


The promise of autonomous driving is a significant one, with far fewer fatalities from vehicle crashes — down from 30,000 annually — topping the list of benefits. Beyond that, autonomous driving also promises increased convenience and productivity and less troublesome commutes. But autonomous driving also pushes automotive technology into uncharted areas. There is little to fall back on ... » read more

Defining Sufficient Coverage


Semiconductor engineering sat down to discuss the definition of sufficiency of coverage as a part of verification closure with Harry Foster, chief scientist at [getentity id="22017" e_name="Mentor Graphics"]; Willard Tu, director of embedded segment marketing for [getentity id="22186" comment="ARM"]; Larry Vivolo was, at the time of this roundtable, senior director of product marketing for [get... » read more

The Great IoE Race Begins


Nobody knows how many tens of billions of semiconductors will be used in the IoE, but it's a sure bet it won't be a few chips replicated billions of times. Most IoE devices will need to be customized for specific applications. Many will need to be highly reliable for many years. And all of them will need to be secure and power-efficient. Yet they also will need to connect to heterogeneous ne... » read more

How Much Security Is Enough?


Semiconductor Engineering sat down to discuss the current state of [getkc id="223" kc_name="security"] and what must be done in the future, with Denis Noël, head of cyber security solutions at [getentity id="22499" e_name="NXP"]; Serge Leef, vice president of new ventures at [getentity id="22017" e_name="Mentor Graphics"]; Andreas Kuehlman, senior vice president and general manager of the soft... » read more

Cryptography For ULP Devices


Soon virtually everything and everyone will be connected to the IoE in one fashion or another, and much of it will be wireless. To make it all work, these wireless, and low-power devices will need a new paradigm for handling cryptography. Ultra-low power devices have an interesting, and challenging set of metrics. There are, in general, two approaches that can work, with a variety of sub-sce... » read more

How Much Security Is Enough?


Semiconductor Engineering sat down to discuss the current state of [getkc id="223" kc_name="security"] and what must be done in the future, with Denis Noël, head of cyber security solutions at [getentity id="22499" e_name="NXP"]; Serge Leef, vice president of new ventures at [getentity id="22017" e_name="Mentor Graphics"]; Andreas Kuehlman, senior vice president and general manager of the soft... » read more

How Much Security Is Enough?


Semiconductor Engineering sat down to discuss the current state of [getkc id="223" kc_name="security"] and what must be done in the future, with Denis Noël, head of cyber security solutions at [getentity id="22499" e_name="NXP"]; Serge Leef, vice president of new ventures at [getentity id="22017" e_name="Mentor Graphics"]; Andreas Kuehlman, senior vice president and general manager of the soft... » read more

Is The IoT Safe To Use?


By Ernest Worthman & Ed Sperling Data security has been a problem since well before the invention the computer, and it has been getting progressively more difficult to contain every year for the past eight decades. It was made much worse when computing was decentralized with the introduction of the IBM PC in 1981, made worse again when networking was introduced into corporations by Novell'... » read more

Challenges For IC Security


Keeping chips secure is really a foot race between the good guys and the bad guys. Going forward, expect heavily funded, grouped efforts to place tremendous pressure on security envelopes. This includes everything from simple home devices, such as routers, to the most critical infrastructures, such as power, telecom, transportation, and soon, the IoT. Fig. 1: Courtesy of Blade Genexis I... » read more

← Older posts