The Week in Review: IoT


Conferences Internet of Things World 2018 takes place next week at the Santa Clara Convention Center in Silicon Valley. Executives of GE Digital, The Chamberlain Group, and UPS will be among those giving keynote addresses during the four-day conference. Monday will see pre-conference workshops, followed by three days of keynotes, presentations, and an expo floor taking in 100,000 square feet o... » read more

Multiphysics Challenges For EDA Tools


Cost and performance are the main drivers for scaling of integrated circuits. However, some applications do not scale as easily as others. This is particularly true for analog circuits and everything related to high voltage and high power. Still, the demand for these kind of applications is growing rapidly due to new emerging markets such as Industry 4.0, IoT, and e-mobility. In the automoti... » read more

Power Optimization Strategies Widen


An increasing amount of electronic content in new and existing markets is creating different and sometimes competing demands for power optimization. For the past decade, EDA has been driven by the mobile phone industry, where the emphasis is on better power analysis and optimization tools to reduce power consumption and extend battery life. While energy efficiency continues to improve, other... » read more

Does Power Verification Work?


Functional verification continues to evolve, but power verification—a somewhat new concern—remains at levels of sophistication reminiscent of functional verification 30 years ago. When will power verification catch up and what must to happen to make it possible? These are questions that the industry is still grappling with, and not everyone believes they require answers. Functional error... » read more

Designing Hardware For Security


By Ed Sperling and Kevin Fogarty Cyber criminals are beginning to target weaknesses in hardware to take control of devices, rather than using the hardware as a stepping stone to access to the software. This shift underscores a significant increase in the sophistication of the attackers, as evidenced by the discovery of Spectre and Meltdown by Google Project Zero in 2017 (made public in Ja... » read more

The Week in Review: IoT


Cybersecurity Arm this week introduced the Cortex-M35P processor with anti-tampering technology and software isolation. The company also debuted security intellectual property to protect Internet of Things devices from physical cyberattacks and close proximity side-channel attacks. Paul Williamson, Arm’s vice president and general manager of the IoT Device IP line of business, provides more ... » read more

The Week In Review: Design


M&A ANSYS finalized its acquisition of OPTIS. Founded in 1989, OPTIS provided software for scientific simulation of light, human vision and physics-based visualization. The acquisition boosts the company's automotive simulation portfolio with radar, lidar and camera simulation. Terms were not disclosed. IP Arm debuted the Cortex-M35P processor. Aimed at IoT applications, the IP combine... » read more

Tech Talk: HW Security


Ben Levine, senior director of product management at Rambus, explains how to minimize the risk of attacks on chip hardware, why design for security is becoming more critical for connected devices, and strategies for making devices less vulnerable. https://youtu.be/twgHcdqvyjU » read more

Extending Cloud To The Network Edge


The adoption of multi-gigabit networks and planned roll-out of next generation 5G networks will continue to create greater available network bandwidth as more and more computing and storage services get funneled to the cloud. Increasingly, applications running on IoT and mobile devices connected to the network are becoming more intelligent and compute-intensive. However, with so many resources ... » read more

The Week in Review: IoT


Cybersecurity Cybersecurity concerns continued to generate news this week. Symantec reported a corporate espionage hacking campaign against manufacturers of medical supplies, dubbing the efforts “Orangeworm.” The hackers have attacked 24 or more targets this year, and almost 100 since 2015, according to the security software and services firm. Meanwhile, the House Energy and Commerce Co... » read more

← Older posts Newer posts →