中文 English

Week In Review: Design, Low Power


Alphawave IP will acquire the OpenFive business unit from SiFive. The $210 million cash deal will bring OpenFive’s high-speed connectivity SoC IP portfolio to Alphawave and nearly double its IPs currently available, including an expanded die-to-die connectivity portfolio as well as adding data center and networking custom silicon solutions. "When we completed our IPO in 2021, we committed to ... » read more

Making PUFs Even More Secure


As security has become a must-have in most systems, hardware roots of trust (HRoTs) have started appearing in many chips. Critical to an HRoT is the ability to authenticate and to create keys – ideally from a reliable source that is unviewable and immutable. “We see hardware roots of trust deployed in two use models — providing a foundation to securely start a system, and enabling a se... » read more

Week In Review: Design, Low Power


Tools Imperas Software released updated simulator and reference models that support the latest RISC-V extensions for Bit Manipulation 1.0.0, Cryptographic (Scalar) 1.0.0, and Vector 1.0, plus Privilege Specification 1.12. They are offered both as freely available, open-source reference models for the RISC-V community as well as commercial products. Ansys' multiphysics signoff solutions were... » read more

Week In Review: Design, Low Power


Marvell will acquire Innovium, a provider of Ethernet data center switches, in an all-stock transaction valued at $1.1 billion. Innovium's switching architecture is optimized for ultra-low latency, optimized power, high performance, and telemetry in cloud applications and will join Marvell's portfolio of data center products to provide "architectural choice and flexibility to meet a diverse set... » read more

Making Sense Of PUFs


As security becomes a principal design consideration, physically unclonable functions (PUFs) are seeing renewed interest as new players emerge onto the market. PUFs can play a central role in hardware roots of trust (HRoTs), but the messaging in the market can make it confusing to understand the different types of PUF as well as their pros and cons. PUFs leverage some uncertain aspect of som... » read more

May’19 Startup Funding: Mega-Funding Rounds Continue


In May, 20 startups enjoyed the distinction of getting a mega-round of $100 million or more in private funding. Those 20 companies together took in more than $6.65 billion. There were two billion-dollar investments in recent weeks. GM Cruise, the autonomous vehicle startup, received $1.15 billion in new funding from General Motors, Honda Motor, the SoftBank Vision Fund, T. Rowe Price Asso... » read more

Blog Review: May 1


Synopsys' Melissa Kirschner questions whether a unified standard for safety-related code development will be enough to secure connected cars as MISRA and AUTOSAR merge C++ guidelines. In a podcast, Mentor's Brent Klingforth and John McMillan share questions and answers about rigid-flex PCB design, including the value of incorporating flexible circuits and the key challenges faced when doing ... » read more

Week in Review: IoT, Security, Auto


Internet of Things Organizers for the Internet of Things World 2019 conference, coming up on May 13-16 in Santa Clara, Calif., surveyed more than 100 IoT leaders in various industries. Implementation (34%) and security (25%) were the highest concerns for the respondents. Those were followed by initial purchase (17%), scalability (10%), business buy-in (8%), and upkeep costs (3%). Two-thirds of... » read more

Week in Review: IoT, Security, Auto


Internet of Things Dialog Semiconductor is shifting its product portfolio away from smartphones following its pending $600 million deal with Apple. The chip company is looking toward connected-health products and video-game consoles for future growth. The connected-health devices, developed in collaboration with pharmaceutical firms, would monitor blood pressure and check glucose levels, accor... » read more

Next Wave Of Security For IIoT


A rush of new products and services promise to make the famously un-secured Industrial IoT (IIoT) substantially more secure in the near future. Although the semiconductor industry has been churning out a variety of security-related products and concepts, ranging from root of trust approaches to crypto processors and physically unclonable functions, most IIoT operations have been slow to adop... » read more

← Older posts