Accelerating AI And ML Applications With PCIe 5


The rapid adoption of sophisticated artificial intelligence/machine learning (AI/ML) applications and the shift to cloud-based workloads has significantly increased network traffic in recent years. Historically, the intensive use of virtualization ensured that server compute capacity adequately met the need of heavy workloads. This was achieved by dividing or partitioning a single (physical) se... » read more

Analog: Avoid Or Embrace?


We live in an analog world, but digital processing has proven quicker, cheaper and easier. Moving digital data around is only possible while the physics of wires can be safely abstracted away enough to provide reliable communications. As soon as a signal passes off-chip, the analog domain reasserts control for modern systems. Each of those transitions requires a data converter. The usage ... » read more

Priorities Shift In IC Design


The rush to the edge and new applications around AI are causing a shift in design strategies toward the highest performance per watt, rather than the highest performance or lowest power. This may sound like hair-splitting, but it has set a scramble in motion around how to process more data more quickly without just relying on faster processors and accelerators. Several factors are driving th... » read more

Blog Review: Jan. 15


Cadence's Paul McLellan looks back at the history of lithography, from its fundamental equation to multiple patterning and the challenges facing EUV today. Synopsys' Taylor Armerding warns that medical device security isn't keeping up with new threats, despite positive steps, due in part to lack of funding, delayed initiatives, and a focus on critical service delivery. In a video, Mentor'... » read more

Auto Industry Shifts Gears On Where Data Gets Processed


In-vehicle processing is becoming a major challenge in automotive electronics due to the massive amount of data being generated by sensors — especially cameras — and the rapid response time required to avoid accidents. The initial idea that all data could be sent to the cloud for processing has been shelved, most likely permanently. In its place is a growing recognition that data needs t... » read more

California’s IoT Law Is A Good Start, But More Needs To Be Done


Passed by former California governor Jerry Brown, cybersecurity law SB-327 went into effect on Jan. 1. This proactive legislation requires manufacturers to equip IoT devices with “reasonable” security features to prevent unauthorized access, modification and data leaks. Specifically, SB-327 requires manufacturers to implement a unique preprogrammed (default) password for each device. Additi... » read more

Security Risks In The Supply Chain


Semiconductor Engineering sat down to discuss security in the supply chain with Warren Savage, research scientist in the Applied Research Laboratory for Intelligence and Security at the University of Maryland; Neeraj Paliwal, vice president and general manager of Rambus Security; Luis Ancajas, marketing director for IoT security software solutions at Micron; Doug Suerich, product evangelist at ... » read more

Online Template Attacks


Authors: Lejla Batina, Radboud University Nijmegen, Nijmegen, The Netherlands Łukasz Chmielewski, Riscure, Delft, The Netherlands Louiza Papachristodoulou, Radboud University Nijmegen, Nijmegen, The Netherlands Peter Schwabe, Radboud University Nijmegen, Nijmegen, The Netherlands Michael Tunstall, Rambus Cryptography Research Division, San Francisco, USA. Template attacks are a special... » read more

Bricked IoT Devices Are Casualties Of Lax Semiconductor Security


Earlier this summer, a new strain of destructive malware known as Silex began to spread and effectively brick unprotected IoT devices. Although victims of Silex theoretically can resurrect their IoT devices by manually reinstalling factory firmware, most remain wary of an installation process that is often time consuming and complicated. Moreover, many victims assume their device has suffered a... » read more

Blog Review: Dec. 18


Lam Research's David Haynes finds that taking advances made at 300mm and applying them via upgrades to 200mm equipment is a cost appropriate strategy to quickly improve yield and add capacity. Synopsys' Taylor Armerding looks at which of this year's many data breaches hit corporate wallets the hardest and how the cost of privacy noncompliance is expected to rise with California's CCPA and st... » read more

← Older posts