Verifying A DDR5 Memory Subsystem


With the increasing complexity of DDR memory models and a vast set of configurations, it has become a daunting experience for verification engineers to verify memory subsystems. With the help of DDR5 Questa VIP and its unique features, engineers can maximize their debugging capabilities and achieve their verification goals quickly and efficiently. This paper introduces the Siemens EDA DDR5 and ... » read more

Design And Security Challenges for VR


Virtual reality is no longer just for gamers, and as this technology is deployed in everything from health care to industrial training, the requirements for processing more data faster over a high-speed connection are growing. Designing these devices continues to be a study in contradictions. They must be extremely low power, with a small enough batteries to make them comfortable to wear. Bu... » read more

Blog Review: Aug. 10


Siemens' Heather George provides a primer on 3D IC, including the problems it is trying to solve, what differentiates it from other multi-chip technologies, and some of the unique challenges in 3D integration. Cadence's Paul McLellan shares highlights from the Automobil Elektronik Kongress, including how the increasing amount of software in a car is driving disruption in the automotive suppl... » read more

Making The Most Of Data Lakes


Having all the semiconductor data available is increasingly necessary for improving manufacturability, yield, and ultimately the reliability of end devices. But without sufficient knowledge of relationships between data from different processes and computationally efficient data structures, the value of any data is significantly reduced. In the semiconductor industry, reducing waste, decreas... » read more

Where Are The Autonomous Cars?


Are we there yet? Governments, consumers, and engineers alike want to know how close the automotive world is to producing a fully autonomous Level 5 vehicle. While some experts say such vehicles could hit the road in the next few years, they're a shrinking minority. Most forecasts say a truly self-driving car is at least a decade away — and maybe much longer, because it requires disruptive... » read more

Week In Review: Design, Low Power


Quantum Computing Researchers in China are putting a damper on Google’s claims of achieving quantum supremacy after they were able to use normal processors to complete a difficult calculation in a few hours. Sycamore, Google’s quantum computer, completed the same calculation in a few minutes back in 2019, but the company said it would take a supercomputer more than 10,000 years to do the... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing, connectivity Semtech Corporation announced that it will acquire Sierra Wireless, an IoT services company. The acquisition will combine Semtech’s LoRa end nodes and cloud service with Sierra Wireless’ cellular capabilities. Telit will incorporate Thales’s cellular IoT products business under a new name Telit Cinterion, led by Telit. Telit Cinterion will be Californ... » read more

Leaning Into The SoC Power Methodology


As inflation skyrockets and the price of everything increases seemingly by the hour, finding ways to trim time and costs are more valuable than ever. Lean manufacturing was introduced by the Toyota Motor Corporation almost 100 years ago, laying the framework for future generations of manufacturing and industrial settings. Lean manufacturing is a methodology that focuses on minimizing waste w... » read more

Cities Strive For More Smarts, Security


As cities around the world move beyond their first completed smart city projects and add more systems, they face hurdles in expanding but have more standards, technical resources, and real-world examples to draw on when making project design decisions. The main concern is keeping the smart city systems and their data and functions safe, especially if the system is touching critical infrastructu... » read more

Chip Backdoors: Assessing the Threat


In 2018, Bloomberg Businessweek made an explosive claim: Chinese spies had implanted backdoors in motherboards used by some high-profile customers, including the U.S. Department of Defense. All of those customers issued strongly worded denials. Most reports of hardware backdoors have ended up in exchanges like these. There are allegations and counter-allegations about specifics. But as hardw... » read more

← Older posts Newer posts →