Multicore Debug Evolves To The System-Level


The proliferation and expansion of multicore architectures is making debug much more difficult and time-consuming, which in turn is increasing demand for more comprehensive system-level tools and approaches. Multicore/multiprocessor designs are the most complex devices to debug. More interactions and interdependencies between cores mean more things possibly can go wrong. In fact, so many pro... » read more

Week In Review: Design, Low Power


RISC-V RISC-V International CEO Calista Redmond provided an update on the state of the community during the annual RISC-V Summit: “RISC-V has had an incredible year of growth and momentum. This year, our technical community has grown 66 percent to more than 2,300 individuals in our more than 50 technical and special interest groups. We’re seeing increased market momentum of RISC-V cores, S... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive Self-driving car company Cruise now has driverless cars on the streets of San Francisco, Calif., reports the San Francisco Chronicle. Cruise, which is backed by General Motors, is testing five driverless cars in the urban — and very hilly — environment of San Francisco. Cruise is using an EV — the Chevy Bolt — as a test vehicle. At Level 4 driving, the cars will not have a w... » read more

Make Hardware Strong With CWE


What is a weakness? And why should we care? These questions are relevant in probably any field or context you may think of, well beyond engineering or electronics. While in some cases the first-level answers might be obvious, in many others they are not. Generally, weaknesses are considered bad things that can lead to malfunctions, injuries, and other undesirable situations. In many cases, they... » read more

New Security Approaches, New Threats


New and different approaches to security are gaining a foothold as the life expectancy for advanced chips increases, and as emerging technologies such as quantum computing threaten to crack even the most complex encryption schemes. These approaches include everything from homomorphic encryption, where data is processed without being decrypted, to different ways of sending and receiving data ... » read more

Blockchain Attempts To Secure The Supply Chain


Blockchain technology is starting to be deployed more widely In the battle against counterfeiting, often coupled with component IDs to allow device authentication. Securing the supply chain is a complex challenge, particularly as more IP from more vendors in more locations makes its way into chips, packages or even systems. Being able to attest to the history of the device to prove its prove... » read more

Using Formal To Verify Safety-Critical Hardware For ISO 26262


Automotive technology has come a long way since the days of the Ford Model T. Today's smart vehicles not only assist their drivers with tasks such as parking, lane management, and braking, but also function as a home away from home, with WiFi hotspots and sophisticated entertainment systems. These sophisticated features are made possible by increasingly complex electronic systems—systems that... » read more

Using AI And Bugs To Find Other Bugs


Debug is starting to be rethought and retooled as chips become more complex and more tightly integrated into packages or other systems, particularly in safety- and mission-critical applications where life expectancy is significantly longer. Today, the predominant bug-finding approaches use the ubiquitous constrained random/coverage driven verification technology, or formal verification techn... » read more

IC Integrity Of Edge-Computing Processors: Meeting The Demands Of AI


If you ask most people, they would say that we’re living in an age of artificial intelligence (AI). But the reality is that we’re just getting started. The age of artificial intelligence is still in its infancy. So many of aspects of our lives involve technology but we’re still having to feed that technology or manually operate that technology in order get the results we want. Autonomous ... » read more

Who’s Got The Hot Potato?


In COVID-19 times, gathering a few friends in a circle and playing “hot potato” may sound like a dream. For car manufacturers and the automotive electronics supply chain, handling the cybersecurity hot potato is not quite a nightmare but certainly not a fun game. Companies like Volkswagen, Fiat, and Ford have much expertise in managing a complex supply chain and post-sale support. Most car ... » read more

← Older posts Newer posts →