中文 English

Toward Domain-Specific EDA


More companies appear to be creating custom EDA tools, but it is not clear if this trend is accelerating and what it means for the mainstream EDA industry. Whenever there is change, there is opportunity. Change can come from new abstractions, new options for optimization, or new limitations that are imposed on a tool or flow. For example, the slowing of Moore's Law means that sufficient prog... » read more

Strengthening The Global Semi Supply Chain


This confluence of all these factors is creating disruptions around the globe. Compounding that, the end customer base is shifting from traditional chipmakers designing for a socket to a combination of systems companies, existing chipmakers, and a slew of new players that are developing chips for very specific applications. Some of those are being developed at the most advanced nodes, particula... » read more

Progress In Quantum Computing


A recent wave of quantum computing investment has given rise to claims of a quantum computing bubble, based on overly optimistic technological claims in a field area that experts say has yet to demonstrate any real utility. But executives on the industry’s front lines say quantum computing is indeed a commercially viable technology, albeit one that is at least several years away from overcomi... » read more

DDR Memory Test Challenges From DDR3 to DDR5


Cloud, networking, enterprise, high-performance computing, big data, and artificial intelligence are propelling the development of double data rate (DDR) memory chip technology. Demand for lower power requirements, higher density for more memory storage, and faster transfer speeds are constant. Servers drive the demand for next-generation DDR. Consumers benefit when existing and legacy generati... » read more

L5 Adoption Hinges on 5G/6G


Truly self-driving cars don’t yet exist, and research shows many consumers are wary of them anyway. What will it take to make fully autonomous cars possible? And how can automakers convince consumers to adopt such vehicles? Experts say the answer to both questions could lie in wireless communication networks. That’s because such networks offer a workaround to a major obstacle in autonomo... » read more

Optimize 5G New Radio MIMO Test And Debug


Radio technology is evolving from single antenna transmit-receive communication systems to multiple-input multiple-output (MIMO) antenna communication systems. MIMO technology is a wireless communication technique for sending and receiving multiple data signals simultaneously over the same radio channel. MIMO techniques play a prominent role in Wi-Fi communications, as well as in 4G long-term e... » read more

Chipmakers Model AI For Radio Access Networks


The chips that power and connect smartphones are now foundational to a disparate portfolio of daily tasks we take for granted, from accessing the internet to snapping a photo or asking Siri or Google if rain is in the forecast. Most people don’t think twice about the conflicting demands these tasks can place on semiconductors, but for engineers at leading chip manufacturers, this balancing ac... » read more

Need Design Talent? Create a Contest


Amid a labor crunch for qualified engineers, semiconductor ecosystem participants are coming up with new strategies to entice university students, such as design competitions. In one design competition sponsored by Renesas earlier this year for European university students and their educators, teams were tasked with building a self-guided robot that could drive along a track in a virtual sim... » read more

Best Practices For Visibility Architecture Tap Planning


When it comes to data monitoring, ensuring proper access to network data is one of the most critical things you can do. Missing and incorrect data will slow down the analysis of problems by your security monitoring and tools. It may also lead to false conclusions by those tools. In turn, this can lead to missed security threats, false positives for security threats and network impairments, and ... » read more

Week In Review: Auto, Security, Pervasive Computing


Security Flex Logix Technologies is partnering with Intrinsic ID to secure and protect any device using its eFPGA, so the device can’t be modified maliciously, through physical attacks or remote hacking. Flex Logix’s EFLX ePFGA will have Intrinsic ID’s SRAM physical unclonable function (PUF), a military-grade security IP that gives a device a unique silicon ID. The ID secures confidentia... » read more

← Older posts