Will Hypervisors Protect Us?


Another day, another car hacked and another report of a data breach. The lack of security built into electronic systems has made them a playground for the criminal world, and the industry must start becoming more responsive by adding increasingly sophisticated layers of protection. In this, the first of a two-part series, Semiconductor Engineering examines how hypervisors are entering the embed... » read more

Engineering Challenges Of ADAS


Advanced driver assistance systems (ADAS) have made tremendous strides in the past decade. The technology is part of the larger thrust to improve safety of cars, which cause over a million deaths per year around the world. Fortunately, fatal crashes have been on a steady decline for decades even as automobile usage has gone up. This is due in large part to safety-related technologies, including... » read more

Securing The Cloud


Cloud computing offers on-demand network access that is ubiquitous and convenient, with a pool of configurable computing resources such as shared networks, servers, storage, applications, and services. What makes this so attractive is these services can be provisioned and adapted to the load, with minimal management or service provider intervention. Cloud computing takes advantage of a distr... » read more

More Uses For Hypervisors


Hypervisors are showing up in more places than ever before as a quick and inexpensive way to utilize multiple cores and multiple chips more effectively and more securely. This marks an interesting twist for a technology that originally was developed as a way of enabling virtualization on a PC, allowing users to run multiple incompatible applications on the same computer. That was followed in... » read more

The Great IoE Race Begins


Nobody knows how many tens of billions of semiconductors will be used in the IoE, but it's a sure bet it won't be a few chips replicated billions of times. Most IoE devices will need to be customized for specific applications. Many will need to be highly reliable for many years. And all of them will need to be secure and power-efficient. Yet they also will need to connect to heterogeneous ne... » read more

Challenges For IC Security


Keeping chips secure is really a foot race between the good guys and the bad guys. Going forward, expect heavily funded, grouped efforts to place tremendous pressure on security envelopes. This includes everything from simple home devices, such as routers, to the most critical infrastructures, such as power, telecom, transportation, and soon, the IoT. Fig. 1: Courtesy of Blade Genexis I... » read more

Week In Review: System-Level Design


Mentor Graphics unveiled an embedded hypervisor for automotive infotainment systems. This is a Type 1 hypervisor, meaning it runs next to the metal and below the OS. In contrast, Type 2 hypervisors run above the OS. Mentor’s hypervisor supports multicore processors and ARM’s TrustZone security. Synopsys rolled out Ethernet controller IP for the data center, focused on energy efficiency a... » read more

Newer posts →