Week in Review: IoT, Security, Auto


Internet of Things A dairy barn without any people working in it. An automated greenhouse for produce. Coming soon, little robots that will weed crop fields and look for diseased plants. This is Rivendale Farms, in the countryside west of Pittsburgh, which is 175 acres serving as a beta site for agricultural Internet of Things technology. The small farm has about 150 Jersey cows, each of which... » read more

Week in Review: IoT, Security, Auto


Internet of Things Unmanned aerial vehicles are delivering vaccines to the very remote village of Cook’s Bay, on the island of Erromango, one of 83 volcanic islands in the South Pacific nation of Vanuatu. The drones can go from island to island faster than boats, which often are not a travel option during rough weather. Vanuatu this week began its vaccine deliveries by drones with support fr... » read more

Week in Review: IoT, Security, Auto


Internet of Things Arm uncorked its first forward-looking CPU roadmap and performance numbers for client computing. The company said it expects to deliver annual performance improvements of more than 15% per year through 2020. The targeted market includes 5G, always-on, always-connected devices. C3 IoT will work with Google Cloud to support artificial intelligence and Internet of Things dep... » read more

The Week in Review: IoT


Cybersecurity The U.S. and U.K. governments collaborated on an unprecedented message on Monday, together warning that Russian cyberattacks may extend beyond government and private organizations to individual homes and offices. The attacks may focus on Internet of Things devices, said Rob Joyce, the cybersecurity coordinator for the National Security Council, who soon after resigned from the Wh... » read more

Meeting The Challenges Of The 2018 National Defense Strategy


In Secretary of Defense James Mattis’ Summary of the 2018 National Defense Strategy: Sharpening the American Military’s Competitive Edge, he provides a critical framework for driving “urgent change at significant scale.” This paper describes the role that Cadence can play in assisting the nation and its partners in achieving that urgency and scale of change called for in the vision and ... » read more

Blog Review: Dec. 13


Mentor's Sherif Hany notes that pattern matching isn't just for litho hotspots anymore, and is increasingly being used in a wide range of early design phase checks, DRC flows, layout retargeting and fixing and DFM checks. Synopsys' Eric Huang explains why USB cables have gotten so short, even though no length is mentioned in the specification. Cadence's Paul McLellan listens in as Jeremy ... » read more

The Week In Review: IoT


Mergers & Acquisitions Qualcomm reported that the waiting period under the Hart-Scott-Rodino Antitrust Improvements Act of 1976 expired on Monday, April 3, clearing the chip design company’s proposed $47 billion acquisition of NXP Semiconductors, at least in the eyes of U.S. antitrust regulators. Qualcomm expects to close the transaction, which will create an Internet of Things powerhouse, b... » read more

Intel Plus Altera


Since the Intel-Altera deal reached the handshake phase earlier this month, there have been a lot of theories being forwarded and a lot of questions being raised. And there have been very few answers, in part because the deal isn't finalized yet and in part because this marriage will take time to play out in the market—maybe years. But along with the GlobalFoundries-IBM pairing, this is th... » read more

What’s Really Inside?


Is it just paranoia, or do devices ranging from industrial controls to military hardware really contain malicious code, Trojan Horses, and remotely triggered back doors? The answer is "maybe not" if you're an optimist, and "maybe" if you're a pessimist, but no one really knows for sure. And that's what really worries security experts, particularly as more devices are connected to other devices.... » read more

Supply Chain Corruption


The more the chip supply chain relies on third-party sources, the greater the risk for a design containing potential malicious code or functions. Today, complex and sophisticated ICs are ubiquitous in virtually every industry. They are being relied upon, as never before, to control critical infrastructure subsystems such as power, finance, communications, and transportation. In a recent r... » read more

← Older posts