Week In Review: Auto, Security, Pervasive Computing


Security Ninety-one percent of commercial applications contain outdated or abandoned open-source components —a security threat, says Synopsys in its recently released report 2020 Open Source Security and Risk Analysis (OSSRA). In the fifth annual edition of the report, Synopsys’ research team in its Cybersecurity Research Center (CyRC) found that 99% of the 1,250 commercial codebases revie... » read more

Vehicle Communications Network Is Due For Overhaul


The Controller Area Network (CAN), one of the main communications networks in an automobile, is headed for a security overhaul — if not a wholesale replacement. Initially devised in the 1980s to allow electronic components in a vehicle to communicate directly without a central computer in between, the CAN bus has become a growing security risk as more functions are automated and integrated... » read more

Startup Funding: April 2020


It was another strong month for automotive startups, with one autonomous trucking company in China drawing a massive $100M investment. Another hot area was optimization of machine learning deployments, including one new company launch. Quantum computing, etch equipment, and mmWave feature in this month's look at twenty-two startups that collectively raised $375M. Semiconductors & design ... » read more

Blog Review: April 29


Arm's Paul Whatmough checks out SCALE-Sim, an open source cycle-accurate simulator specifically for neural processing unit (NPU) architectures. Mentor's Neil Johnson shows how a complete verification methodology requires complementary deployment of multiple techniques, with different options at each level of abstraction. Cadence's Paul McLellan checks out challenges in automotive reliabil... » read more

Blog Review: April 15


Mentor's Neil Johnson argues that it's time to reevaluate the current definition of verification methodology, with a new focus on methodologies driven by the needs of the design and best suited to different abstractions. Synopsys' Derek Handova warns that the need to manage the security risks of billions of IoT devices will continue to change the requirements and scope of 5G security. Cad... » read more

Week In Review: Auto, Security, Pervasive Computing


COVID-19/Medical Mentor's parent company Siemens is making its Additive Manufacturing (AM) Network, along with its 3D printers, available to the global medical community. MEMS is at the forefront of SARS-CoV-2 testing, writes Alissa M. Fitzgerald, founder of AMFitzgerald in a blog on SEMI.org. Fitzgerald points out a MEMS silicon PCR chip, developed by Northrup et. al. at Lawrence Livermore... » read more

Designing Ultra Low Power AI Processors


AI chip design is beginning to shift direction as more computing moves to the edge, adding a level of sophistication and functionality that typically was relegated to the cloud, but in a power envelope compatible with a battery. These changes leverage many existing tools, techniques and best practices for chip design. But they also are beginning to incorporate a variety of new approaches tha... » read more

Week In Review: Auto, Security, Pervasive Computing


Synopsys has added nanoscale and macroscale illumination optics to its RSoft Photonic Device Tools version 2020.03. ARVR designers can use the RSoft-LightTools Bidirectional Scattering Distribution Function (BSDF) interface to make interpolated BSDF files for optimized nanoscale and macroscale optics, such as freeform optical prism projectors, eye tracking technologies, and optical planar waveg... » read more

Tracking Automotive’s Rapidly Shifting Ecosystem


The automotive ecosystem is becoming much harder to navigate as automakers, Tier 1s and IP vendors redefine their relationships based upon shifting value caused by an rapidly expanding amount of increasingly interdependent and complex electronic content. Predictions of massive change started almost a decade ago with a number of pilot programs around autonomous vehicles. But those shifts real... » read more

Blog Review: March 25


Rambus' Steven Woo checks out common memory systems that are used in the highest performance AI applications and points to the differences between on-chip memory, HBM, and GDDR. Mentor's Colin Walls considers whether software for embedded systems should be delivered as a binary library or source code and warns of some key potential issues when requesting source code. A Synopsys writer poi... » read more

← Older posts Newer posts →