The Week In Review: Design/IoT


M&A Dialog will acquire Atmel in a cash and stock transaction for total consideration of approximately $4.6 billion. Dialog anticipates achieving projected annual cost savings of $150 million within two years. The transaction is expected to close in the first quarter of calendar 2016. IP Synopsys announced a portfolio of IP optimized for the IoT, which includes power- and area-effi... » read more

Blog Review: Sept. 23


From the International Motor Show (IAA) in Frankfurt, NXP's Birgit Ahlborn brings us a discussion with on the challenges to building trust in connected cars and intelligent transport systems, and what is needed to ensure security in a world of connected mobility. From the world's largest aircraft to terahertz wireless to the launch of a partially reusable orbital rocket, innovation is in the... » read more

Blog Review: Sept. 16


Ansys' Justin Nescott presents five top engineering articles for the week. Being an amateur photography buff, I start salivating at a 250 megapixel camera. Plus, origami and the art of structural engineering and a football-playing robot. Synopsys' Michael Posner provides some shocking information about the buildup of static electricity and the impact it can have on 28nm designs. Increasin... » read more

Which Memory Type Should You Use?


I continue to get besieged by statements in which memory “latency” and “bandwidth” get misused. As I mentioned in my last blog, latency is defined as how long the CPU needs to wait before the first data is available, while bandwidth is how fast additional data can be “streamed” after the first data point has arrived. Bandwidth becomes a bigger factor in performance when data is stor... » read more

The Week In Review: Design/IoT


IP Synopsys rolled out logic library and embedded memory IP for the Mie Fujitsu 40nm low-power process. The process has 50% lower power consumption compared with previous process technologies. Deals Rambus' Cryptography Research Division won a deal to run the Secure Content Storage Association's cryptographic key management center. The keys are used in SCSA-enabled devices for securing vid... » read more

Rising Threats From Differential Power Analysis


Differential power analysis (DPA) has been a threat vector on the chip landscape for a number of years. It was discovered around the mid 1990s by the teams at [getentity id="22671" e_name="Rambus"]’ Cryptography Research Division, and turned out to be a very effective tool for compromising the ubiquitous SIM card environment. “The most traditional market for DPA has been with smart cards... » read more

Can Cars Be Hack-Proof?


Not many days go by when there isn't a news headline describing the latest hacking attempt — or success — of an automobile or automotive system. Malicious hacking has been around almost since the dawn of connected electronics, but it's happening with increasing sophistication in the automotive sector. Even high-end vehicles suffer security flaws that are too costly or not worthwhile to f... » read more

Lightweight Cryptography For The IoE


This is the age where technology is expected to do more, faster, anonymously, and often invisibly. And it's supposed to use less power, with smaller footprints, unobtrusively and intuitively. And all that needs to be protected with cryptography. That's the goal, at least. But as Simon Blake-Wilson, vice president of products and marketing for [getentity id="22671" e_name="Rambus"]' Cryptogra... » read more

Blog Review: Sept. 2


When it comes to cars, manufacturers may be adding too many features too fast, says Mentor's John Day. Up to half of the features may never get used either because they aren't useful or they are too complex. Cadence's Christine Young sat down with Neeti Bhatnagar, a software engineering group director to discuss the challenges and rewards of working in a distributed, cross-functional team, t... » read more

Electronics Butterfly Effect


Everyone has heard of the butterfly effect where a small change in a non-linear system can result in large difference in an outcome. For the past 40 years, the electronics industry has approximated a linear system, fed primarily by Moore’s Law. The incremental changes available at each new process node have led us to make incremental changes and improvements in many aspects of the design, its... » read more

← Older posts Newer posts →