Week In Review: Semiconductor Manufacturing, Test


The global sales slump in semiconductors but may be stabilizing, according to a new report from the Semiconductor Industry Association (SIA). Worldwide sales of semiconductors fell 8.7% in Q1 2023 compared to the Q4 2022, and dropped 21.3% compared to the Q1 2022. Sales for the month of March 2023 increased 0.3% compared to February 2023. Meanwhile, SEMI reports worldwide silicon wafer shipment... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing Microsoft and AMD are working together on an AI processor, according to a report in Bloomberg. Tenstorrent adopted Arteris IP’s Ncore and FlexNoC interconnect IP for its AI RISC-V chiplets. The chiplets will be configurable for different uses and workloads. Some use cases include AI high-performance computing for data center, such as cloud servers, and edge devices and... » read more

Data Leakage Becoming Bigger Issue For Chipmakers


Data leakage is becoming more difficult to stop or even trace as chips become increasingly complex and heterogeneous, and as more data is stored and utilized by chipmakers for other designs. Unlike a cyberattack, which typically is done for a specific purpose, such as collecting private data or holding a system ransom, data leaks can spring up anywhere. And as the value of data increases, th... » read more

Securely Store Your Credentials And Cryptographic Keys In TPM 2.0


A Trusted Platform Module (TPM) can securely store cryptographic keys that are specific to the host system and provide restricted access to the stored keys and secrets. You can never read out private keys, or in other words retrieve them as is from the TPM. Let’s say you need to generate a signature: you can indicate the private key you wish to use from the TPM to sign the message. You can... » read more

Blog Review: May 3


Synopsys' Thomas Andersen considers the requirements of AI-optimized chips that are resulting in exploration of different memory configurations, different types of memory, and different types of processor technologies and software components. Cadence's Girish Vaidyanathan considers the role of hierarchy and partitioning in custom design and looks at how a virtual hierarchy allows layout desi... » read more

Driving Performance In GaN-Based USB-C Adapters And Chargers With EPR


With the announcement of the USB PD 3.1 standard [1], higher power levels of up to 240 W are enabled. Still, the wide output voltage range from 5 V to 48 V raises new challenges for the converter topologies currently in use. In this white paper, the combination of an AC-DC PFC boost and a DC-DC hybrid flyback (HFB) stage [2], also well known as asymmetrical half-bridge flyback topology, is prop... » read more

Week In Review: Design, Low Power


The National Institute of Standards and Technology (NIST) outlined its plan for a National Semiconductor Technology Center (NSTC) to be created using a share of the $11 billion in funds from the CHIPS Act marked for research and development. While a large portion of the CHIPS Act investment is set to boost U.S. fabs and manufacturing capabilities, the NSTC aims to also support the design side, ... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing Renesas introduced a narrowband Internet of Things (NB-IoT) chipset and dev kit for the Indian market. The LTE NB-IoT modem chipset, the RH1NS200, was designed for Indian telecommunications carriers by targeting bands 1,3, 5 and 8 and by following India’s carrier-approved LTE protocol stack and software suite. Low power usage is built in — it has a low Power Saving Mode... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing Broadcom announced delivery of its Jericho3-AI fabric for artificial intelligence (AI) networks, which delivers 26 petabits per second of Ethernet bandwidth. That is roughly four times the bandwidth of the previous generation, at a 40% power savings per gigabit. AMD released the Ryzen Embedded 5000 Series processors for customers requiring power-efficient processors opt... » read more

Week In Review: Auto, Security, Pervasive Computing


Public USB phone charging stations are now another vector that bad actors can use to plant malware and steal data on devices — known as "juice jacking," according to the United States’ Federal Communications Commission (FCC). The FCC is encouraging people to stay away from these public charging stations, found in airports and hotels, because of bad actors can install malware on the charging... » read more

← Older posts Newer posts →