Collaboration Accelerates Moore’s Law


Moore's Law dictates that the number of transistors in dense, integrated circuits will double approximately every two years. Maintaining this pace of scaling, however, has become increasingly difficult given the ever-increasing complexity inherent with new chip starts. Additionally, the cost of using leading-edge process technology is prohibitively expensive. As a result, collaboration amon... » read more

Implementation Challenges And Solutions Of Low-Power, High-Performance Memory Systems


Mobile devices and their demand for rapid innovation have fundamentally and forever changed the semiconductor industry. These devices have fueled tremendous innovation in the last few years to bring about drastic improvements in performance, power and cost efficiency. They also demand condensed product development cycles which accelerate the rate and need for innovation. The only thing that has... » read more

Blog Review: Sept. 10


eSilicon’s Mike Gianfagna is searching for patterns and trends in the industry, ranging from big data and the cloud to the IoT. Check out the four V’s. The market for wearables is gaining momentum. Apple made a huge deal out of its Apple Watch this week, but it wasn’t alone. ARM’s David Maidment is on the ground in Berlin looking at the new gear based on Android. Mentor’s John... » read more

The Week In Review: Design


Tools Mentor Graphics unveiled a hypervisor with configuration, debugging and hardware support. The solution is aimed at a variety of vertical markets, ranging from industrial and medical to consumer electronics. NXP uncorked a passive Inter-Integrated Circuit (I²C) solution for near-field communications tagging, allowing appliances, wearables and consumer electronics to use existing NFC-... » read more

Supply Chain Corruption


The more the chip supply chain relies on third-party sources, the greater the risk for a design containing potential malicious code or functions. Today, complex and sophisticated ICs are ubiquitous in virtually every industry. They are being relied upon, as never before, to control critical infrastructure subsystems such as power, finance, communications, and transportation. In a recent r... » read more

The Simple Way To Steal Data


Given all the propaganda that is currently floating around about what the IoT/E, CoT is or isn’t, will or won’t be, one thing is for sure – it will be flooded with autonomous objects, most of which most will be cheap, simple, and, as it stands now, unsecured. And, given the equation that: a) side channel attacks are relatively easy, and b) that many of the chips of IoT/E, CoT objects a... » read more

Quantum Cryptography: A Magic Bullet For The IoT?


Quantum cryptography (QC for this discussion) theory—and it is still just theory—is potentially a very powerful security process that could be implemented for the dissemination of information over communications channels, using the principles of quantum mechanics. This is particularly intriguing because it is impossible to measure a photon, the fundamental element in the creation of QC secu... » read more

Malicious Code In The IoT


Fundamentally, malicious code families are initially comprised of one or more distinct malicious code samples. For clarity, malicious code is, globally used as an umbrella term for all types of malevolent program code. However, for this article, the term is being applied to static code and not morphing codes, which were discussed in a previous article. This discussion focuses on the type of mal... » read more

How Code Is Embedded


By Ambuj Kumar, System Architect at Rambus Cryptography Research Division Today, chip development and manufacturing processes have become exponentially complex. A typical chip may include dozens of semiconductor IPs, using various EDA tools, and developed around the globe,. The chip itself goes through very complex lifecycle from RTL through netlist, GDS data, wafer, and packaged die, to e... » read more

End-To-End Security


As the things we use every day get both connected and smarter, the sensitivity and potential damage caused by breaches in security becomes larger. With the new generation of connectedness, we saw a 368% rise in exposed identities last year over the year prior with 552 million leaked identities in 2013, according to the 2014 Internet Security Threat Report. Weak security is such an issue that... » read more

← Older posts Newer posts →