IIoT Security Threat Rising

The rapid growth of the Industrial Internet of Things is raising questions about just how secure these systems are today, how to improve security, and who exactly should be responsible for that. These issues are interlaced with a shift in where a growing volume of data gets processed, the cost and speed of moving large amounts of data, and the increasing frequency and cost of attacks. "Di... » read more

Why All Nodes Won’t Work

A flood of new nodes, half-nodes and every number in between is creating confusion among chipmakers. While most say it's good to have choices, it's not clear which or how many of those choices are actually good. At issue is which [getkc id="43" kc_name="IP"] will be available for those nodes, how that IP will differ from other nodes in terms of power, performance, area and sensitivity to a v... » read more

How AI Impacts Memory Systems

Throughout the 1980’s and early 1990’s computer systems were bottlenecked by relatively slow CPU performance, thereby limiting what applications could do. Driven by Moore’s Law, transistor counts increased significantly over the years, improving system performance and enabling exciting new computing possibilities. Although computing capabilities have advanced significantly in recen... » read more

The Rambus GDDR6 PHY IP Core

The JEDEC-compliant Rambus GDDR6 PHY IP Core is optimized for systems that require low-latency and high-bandwidth GDDR6 memory solutions. Available on leading FinFET process nodes, the PHY interface supports two independent channels, with each supporting 16 bits for a total data width of 32 bits. In addition, the PHY supports speeds up to 16Gbps per pin, providing a maximum bandwidth of up to 6... » read more

eFPGA: Think Differently & Experiment

New technologies are never overnight successes and usually develop in new applications. Arm and other embedded processors today are a huge success and pervasive in almost all chips. It took Arm more than five years to win the first five customers. The first applications were not competitive with Intel’s PC dominance but instead filled needs in emerging applications such as mobile phones an... » read more

How To Secure The Network Edge

Microcontrollers, sensors, and other devices that live at the edge of the Internet must be protected against cyberattacks and intrusions just as much as the chips in data centers, network routers, and PCs. But securing those edge devices presents a swath of unique challenges, including the cost and availability of technology resources, as well as varying levels of motivation to solve these prob... » read more

Evaluating Side-Channel Vulnerabilities

By Bart Stevens and Gary Kenworthy In a book chapter titled “Security of Crypto IP Core: Issues and Countermeasures,” authors Debapriya Basu Roy and Debdeep Mukhopadhyay recently explored various side-channel vulnerabilities that can be exploited by an attacker. “An adversary can observe the power consumption, timing performance, electromagnetic radiation or even acoustic behavior o... » read more

(Smart) Watch this Space

The development of smart devices and the increasing possibilities of its features has lead to a search for a new frontier for technology. The idea of wearable technology has existed in science fiction and other speculative fiction, but only recently has wearable technology became a reality this decade with the introduction of wearables such as smartwatches. The development of smartwatches has n... » read more

Blog Review: Feb. 28

Mentor's Matthew Ballance explains just what the portable stimulus standard makes portable. Cadence's Dave Pursley considers why high-level synthesis is a good fit for cutting-edge machine learning designs. Synopsys' Melissa Kirschner notes that the growing number of IoT devices means new opportunities for one-time programmable NVM. Applied's Mike Rosa considers the pros and cons of 5G... » read more

RISC-V Gains Its Footing

The RISC-V instruction-set architecture, which started as a UC Berkeley project to improve energy efficiency, is gaining steam across the industry. The RISC-V Foundation's member roster gives an indication who is behind this effort. Members include Google, Nvidia, Qualcomm, Rambus, Samsung, NXP, Micron, IBM, GlobalFoundries, UltraSoC, Siemens, among many others. One of the key markets for... » read more

← Older posts