Week In Review: Design, Low Power


Cadence rolled out a slew of new products at this week’s CDNLive Silicon Valley, including: A new generative AI-powered tool for analog, mixed-signal, RF and photonics design; An extended collaboration with TSMC and Microsoft to advance giga-scale physical verification system in the cloud; A multi-year partnership with the San Francisco 49ers football organization, focused on sust... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing Broadcom announced delivery of its Jericho3-AI fabric for artificial intelligence (AI) networks, which delivers 26 petabits per second of Ethernet bandwidth. That is roughly four times the bandwidth of the previous generation, at a 40% power savings per gigabit. AMD released the Ryzen Embedded 5000 Series processors for customers requiring power-efficient processors opt... » read more

Week In Review: Semiconductor Manufacturing, Test


U.S. Senate Majority Leader Chuck Schumer said he launched an effort to establish rules on artificial intelligence to address national security and education concerns, Reuters reported. "Time is of the essence to get ahead of this powerful new technology to prevent potentially wide-ranging damage to society and national security and instead put it to positive use by advancing strong, bipartisan... » read more

Week In Review: Design, Low Power


Arm and Intel Foundry Services inked a multi-generation agreement to enable chip designers to build Arm-based SoCs on the Intel 18A process. The initial focus is mobile SoC designs, but the deal allows for potential expansion into automotive, IoT, data center, aerospace, and government applications. IFS and Arm will undertake design technology co-optimization (DTCO) to optimize chip design and ... » read more

Week In Review: Auto, Security, Pervasive Computing


Public USB phone charging stations are now another vector that bad actors can use to plant malware and steal data on devices — known as "juice jacking," according to the United States’ Federal Communications Commission (FCC). The FCC is encouraging people to stay away from these public charging stations, found in airports and hotels, because of bad actors can install malware on the charging... » read more

DDR5 Memory Enables Next-Generation Computing


Computing main memory transitions may only happen once a decade, but when they do, it is a very exciting time in the industry. When JEDEC announced the publication of the JESD79-5 DDR5 SDRAM standard in 2021, it signaled the beginning of the transition to DDR5 server and client dual-inline memory modules (Server RDIMMs, Client UDIMMs and SODIMMs). We are now firmly on this path of enabling the ... » read more

Blog Review: April 12


Cadence's Ericles Sousa describes the five critical features of automotive SoC architectures that are essential for developing the next generation of passenger vehicles. In a podcast, Siemens' Steph Chavez chats with Gerry Partida of Summit Interconnect about the difficulties in collaboration between PCB designers and manufacturers, along with best practices that designers should follow to r... » read more

Week In Review: Design, Low Power


MLCommons debuted the latest results for the MLPerf Inference v3.0 and Mobile v3.0 benchmark suites, which measure the performance and power-efficiency of applying a trained machine learning model to new data in data center, edge, and mobile use cases. Overall, MLCommons said the results showed both power efficiency improvements and significant gains in performance in some benchmark tests. Seve... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, Mobility Tesla employees have been viewing customer videos, according to an investigative report by Reuters. The news outlet surveyed and interviewed Tesla employees, who described using the footage for both legitimate purposes and entertainment purposes within the company. Some employees forwarded videos to coworkers. Even Tesla CEO Elon Musk was not immune. Employees found an in... » read more

Chiplet Security Risks Underestimated


The semiconductor ecosystem is abuzz with the promise of chiplets, but there is far less attention being paid to security in those chiplets or the heterogeneous systems into which they will be integrated. Disaggregating SoCs into chiplets significantly alters the cybersecurity threat landscape. Unlike a monolithic multi-function chip, which usually is manufactured using the same process tech... » read more

← Older posts Newer posts →