中文 English

Learning How To Forget


There has been a lot of talk recently about the right to be forgotten, or data privacy rights. These require companies that hold data about us to remove it when properly requested. This might be data that was collected as we browse the Internet, or from online shopping. Or perhaps it's collected as we drive our cars past cameras, or GPS tracking of our cellphones, or many other ways – some of... » read more

Data Management Evolves


Semiconductor Engineering sat down to discuss data management challenges with Jerome Toublanc, business development executive at Ansys; Kam Kittrell, vice president of product management in the Digital & Signoff Group at Cadence; Simon Rance, vice president of marketing at Cliosoft; Rob Conant, vice president of software and ecosystem at Infineon Technologies; and Michael Munsey, senior dir... » read more

Data Security Drives Innovative Verification Capabilities For SoCs


The protection and integrity of data is a key challenge for organizations and businesses as human interactions with computers have expanded enormously. This has created a vast amount of information and led to the age of “Big Data” where massive, rich data sets are collected and analyzed to advance knowledge and progress in multiple fields. The security of this data has become a critical nee... » read more

Automotive Safety Island


The promise of autonomous vehicles is driving profound changes in the design and testing of automotive semiconductor parts. Automotive ICs, once deployed for simple functions like controlling windows, are now performing complex functions related to advanced driver-assist systems (ADAS) and autonomous driving applications. The processing power required results in very large and complex ICs that ... » read more

SCV (select, cross, and variation): Data Encryption


A new technical paper "RSCV: Reversible Select, cross and variation architecture in quantum-dot cellular automata." Abstract "In the past few years, CMOS semiconductor has been a growing and evolving technology in VLSI. However, due to the scaling issue and some other constraints like heat generation, high power consumption QCA (quantum cellular automata) emerged as an alternate and enhan... » read more

When It Makes Sense To Perform An Open Source Audit


Today's software is not created so much as assembled. The parts that serve as ingredients come from a variety of sources, but mostly from the millions of open source components freely available on the internet. This has enabled a digital transformation in several industries, helping market leaders speed their time to market, lower costs, and improve innovation. But what are the licensing and... » read more

CISO’s Guide To Sensitive Data Protection


Emerging data protection and privacy laws are causing organizations to scramble to implement strategies that address regulatory compliance and data security governance. And the SolarWinds software supply chain attack, in which attackers inserted a malicious back door into its network software release that later led to sensitive data exposure, further underscores the need to secure the DevSecOps... » read more

5G And AI Raise Security Risks For IoT Devices


This IDC Technology Spotlight, sponsored by Rambus, highlights the fifth generation of cellular network technology (5G) is scaling further in 2020, enabling a new wave of AI-powered end points. To remain competitive, manufacturers must implement enhanced security measures on edge and IoT devices designed for the increased performance in speed, latency, and connection density. Click here to r... » read more

Full Disk Encryption of Solid State Drives and Root of Trust


File encryption, file system encryption and full disk encryption (FDE) are methods offered by the industry to allow users to protect their data stored on non-volatile storage devices, such as Solid State Disks (SSD). The main feature of FDE is to protect stored system and user date from unauthorized reading, writing, alteration, moving or rolling back. However, extended security feature... » read more

Security for MEMS, Sensors


Napa, Calif. — The role of MEMS and sensors is growing as more devices are connected and more intelligence is added into those devices. But that has created its own set of issues involving security and privacy. “Our strategic landscape is changing,” observed Cynthia Wright, principal cybersecurity engineer at The MITRE Corp. and CEO of Synthus, during a keynote speech on day one of the... » read more

← Older posts