Security Risks Grow With 5G


5G mobile phones can download a movie in seconds rather than minutes, but whether that can be done securely remains to be seen. What is clear from technology providers, though, is they are taking security very seriously with this new wireless technology. More data is in motion, and the value of that data is growing as users rely on mobile devices for everything from banking to automotive saf... » read more

Building A Secured Internet Of Things


The emerging Internet of Things (IoT) presents tremendous opportunities for innovative companies to deliver products and services to make industry more efficient, transportation safer and the everyday lives of people more convenient and fulfilling. But with great good there also can be great risk. Remote, intelligent monitoring and control for factories, homes, cities, and cars can increase eff... » read more

Wearables Disconnect


One of the great opportunities created by the pandemic is a result of conferences going online. I know many people miss the social aspects of not being able to get together with your thousand closest friends, who you see every year at the same shows, but requiring a physical presence is limiting in both time and expense. Personally, I have used the opportunity to "attend" conferences that I wou... » read more

Challenges With Chiplets And Packaging


Semiconductor Engineering sat down to discuss IC packaging technology trends, chiplets, shortages and other topics with William Chen, a fellow at ASE; Michael Kelly, vice president of advanced packaging development and integration at Amkor; Richard Otte, president and CEO of Promex, the parent company of QP Technologies; Michael Liu, senior director of global technical marketing at JCET; and Th... » read more

Stepping Up To Greater Security


The stakes for security grow with each passing day. The value of our data, our devices, and our network infrastructure continually increases as does our dependence on these vital resources. Reports appear weekly, and often daily, that describe security vulnerabilities in deployments. There is a steady drumbeat of successful attacks on systems that were assumed to be protecting infrastructure, i... » read more

Internet of Things (IoT) E-Book


The wide range of internet of things (IoT) applications in development today are made possible by smart devices operating across different network configurations, frequencies, power requirements, and protocols. Developing cost-effective IoT solutions requires a smart, organized approach to radio and antenna integration within a design flow that may have little to do with traditional RF product ... » read more

Always On, Always At Risk


Always-on devices are everywhere, and each of them is a potential target for hackers. While many people associate always-on devices with smart speakers such as an Amazon Alexa or Google Home, or a connected security camera, that's only one component in a system. There's a broader infrastructure behind those devices. So even if you power down a digital assistant/smart speaker, everything it's... » read more

Securing The IoT Begins With Zero-Touch Provisioning At Scale


The path to secured IoT deployments starts with a hardware root-of-trust at the device level, a simple concept that belies the complexity of managing a chain of trust that extends from every edge device to the core of the network. The solution to this management challenge, based on a coordinated effort of domain experts, is a zero touch “chip-to-cloud” provisioning service for certificates-... » read more

Securing 5G And IoT With Fuzzing


5G will revolutionize many industries, with up to 100 times the speed, 100 times the capacity, and one-tenth the latency compared to 4G LTE. But in addition to providing superior performance, 5G expands the attack surface of apps and IoT devices that rely on this next-gen network. In addition to known security exploits, we’re bound to see unknown, novelty attacks. Fuzz testing (or fuzzing)... » read more

RF To Millimeter-Wave Front-End Component Design Trends For 5G Communications


This white paper discusses design challenges and solutions related to the "third wave" of communications, presenting several case studies in which the Cadence AWR Design Environment platform has been used to develop products for 5G and beyond. Examples include a multiband active antenna tuner for cellular internet of things (IoT) machine-type communications (mMTC) applications, a linear power a... » read more

← Older posts Newer posts →