Telecare Challenges: Secure, Reliable, Lower Power


The adoption of telecare using a variety of connected digital devices is opening the door to much more rapid response to medical emergencies, as well as more consistent monitoring, but it also is adding new challenges involving connectivity, security, and power consumption. Telecare has been on the horizon for the better part of two decades, but it really began ramping with improvements in s... » read more

Blog Review: July 20


Synopsys' Ron Lowman examines the various neural networks used in camera applications, the balancing act between camera lens choice and neural networks implemented, and how IP and embedded vision processors help optimize the designs. Siemens' Katie Tormala considers the importance of acoustic performance in consumer electronics and why it's important to understand the relationships between t... » read more

Using AI To Speed Up Edge Computing


AI is being designed into a growing number of chips and systems at the edge, where it is being used to speed up the processing of massive amounts of data, and to reduce power by partitioning and prioritization. That, in turn, allows systems to act upon that data more rapidly. Processing data at the edge rather than in the cloud provides a number of well-documented benefits. Because the physi... » read more

Designing Immersive AR/VR Displays


Last month, we looked at how VESA (Video Electronics Standards Association) video compression codecs enable cutting-edge displays. Over the next couple of articles, we will take a closer look at some of the markets where VESA DSC (Display Stream Compression) and VDC-M (VESA Display Compression) compression offer significant benefits for designers working on display-based applications. Demand... » read more

Post Quantum Cryptography Is Coming


Quantum computing has made big advances in recent years and experts agree that quantum computers capable of breaking 2048-bit RSA or 256-bit ECC will be built — it’s just a matter of time. In this white paper, we discuss the security algorithms NIST has selected for Post Quantum Cryptography (PQC) and their instantiation in Rambus security products. Download this white paper to learn: ... » read more

Blog Review: July 13


Siemens' John Sturtevant finds that the patterning requirements of next generation lithographic processes have pushed lithographers to explore the advantages of curvilinear masks, and notes some of the tools coming along to help. Cadence's Paul McLellan learns from Kyle Chen of Microsoft and Suomin Cui of Cadence how deep learning and electromagnetic solvers can be used to optimize high-dens... » read more

Implementing Memory Encryption To Protect Data In Use


In my blog “The Methods of Memory Encryption to Protect Data in Use,” I discussed how the XTS/XEX mode of encryption was the appropriate choice for protecting data stored in and accessed from memory, also known as, protecting data in use. As a quick recap, XTS/XEX uses two keys, one key for block encryption, and another key to process a “tweak.” The tweak ensures every block of memory i... » read more

Security Risks Widen With Commercial Chiplets


The commercialization of chiplets is expected to increase the number and breadth of attack surfaces in electronic systems, making it harder to keep track of all the hardened IP jammed into a package and to verify its authenticity and robustness against hackers. Until now this has been largely a non-issue, because the only companies using chiplets today — AMD, Intel, and Marvell — interna... » read more

Blog Review: June 15


Ansys' Vidyu Challa considers common primary, or single-use, battery chemistries and how they affect that many important cell properties, such as energy density, flammability and safety, available cell constructions, temperature range, and shelf life. Synopsys' Rimpy Chugh and Rohit Kumar Ohlayan discuss some of the challenges arising from static linting of code, shifting linting left in the... » read more

Chips Can Boost Malware Immunity


Security is becoming an increasingly important design element, fueled by increasingly sophisticated attacks, the growing use of technology in safety-critical applications, and the rising value of data nearly everywhere. Hackers can unlock automobiles, phones, and smart locks by exploiting system design soft spots. They even can hack some mobile phones through always-on circuits when they are... » read more

← Older posts Newer posts →