What’s In Your IP?


Jeff Markham, software architect at ClioSoft, talks with Semiconductor Engineering about IP traceability in markets such as automotive and aerospace, what’s actually in IP, what should not be in that IP from a security standpoint, and how all of this data can used to avert system reliability issues in the future. » read more

Week In Review: Auto, Security, Pervasive Computing


Internet of Things SEMI-FlexTech launched six flexible hybrid electronics (FHE) projects, collaborating with U.S. Army Research Laboratory (ARL), to accelerate innovations in sensor and sensor systems. Participating in the projects are American Semiconductor, Inc., University of Texas El Paso, Tekscan, PARC, Alertgy, and Iowa State University, among others. Some of the projects include develop... » read more

Big Design, IP and End Market Shifts In 2020


EDA is on a roll. Design starts are up significantly thanks to increased investment in areas such as AI, a plethora of new communications standards, buildout of the Cloud, the race toward autonomous driving and continued advancements in mobile phones. Many designs demand the latest technologies and push the limits of complexity. Low power is becoming more than just reducing wasted power at t... » read more

Week In Review: IoT, Security, Autos


AI/Edge Vastai Technologies is using Arteris IP’s FlexNoC Interconnect IP and AI Package for its Artificial Intelligence Chips for artificial intelligence and computer vision systems-on-chip (SoCs). Startup Vastai Technologies was founded in December 2018, designs ASICs and software platforms for computer vision and AI applications, such as smart city, smart surveillance, smart education, ac... » read more

Network Storage Optimization In Chip Design


Prathna Sekar, technical account manager at ClioSoft, explains how to manage large quantities of data, how this can quickly spin out of control as colleagues check in data during the design process, and how to reduce the amount that needs to be stored. » read more

Moore’s Law, Supply Chains And Security


The debate about the future of Moore's Law continues, while other parts of the industry look for alternatives. In between, supply chains are being pulled in multiple directions, with safety and security often in the middle. All across the semiconductor industry, significant changes are underway. Some of these have been in the works for some time. Others are new or accelerating faster than an... » read more

Big Growth Areas: Connectivity, AI, Reliability


Connectivity and artificial intelligence (AI) will be the biggest drivers for 2020, with an emphasis on improved reliability across all areas. New standards, new applications, and new pressures being placed on old technology will created boundless opportunities for those ready to fill the need. Of course, there will also be a lot of carnage along the way, and we can expect to see a lot of that ... » read more

Auto Industry Shifts Gears On Where Data Gets Processed


In-vehicle processing is becoming a major challenge in automotive electronics due to the massive amount of data being generated by sensors — especially cameras — and the rapid response time required to avoid accidents. The initial idea that all data could be sent to the cloud for processing has been shelved, most likely permanently. In its place is a growing recognition that data needs t... » read more

Can You Afford To Waste Time On Your Next Design Project?


Let’s be honest: engineers are asked to perform miracles every day, and they almost always deliver. They are challenged to invent the future in the form of newly sophisticated, powerful and highly functional systems-on-chips and systems. On top of this, they’re required to do so with an increasingly complex array of tools and re-use increasing amounts of IP to speed time-to-market. Oh, and ... » read more

Challenges In IP Reuse


Jeff Markham, software architect at ClioSoft, explains why IP reuse is so important in advanced process node SoC chip designs, what companies need to keep track of when working with third-party IP, and how it needs to be characterized. » read more

← Older posts Newer posts →