Improving Energy And Power Efficiency In The Data Center


Energy costs in data centers are soaring as the amount of data being generated explodes, and it's being made worse by an imbalance between increasingly dense processing elements that are producing more heat and uneven server utilization, which requires more machines to be powered up and cooled. The challenge is to maximize utilization without sacrificing performance, and in the past that has... » read more

Architecting Hardware Protection For Data At Rest And In Motion


Planning the security architecture for any device begins with the threat model. The threat model describes the types of attacks that the device or application may face and needs to be protected against. It is based on what attackers can do, what level of control they have over the product (i.e., remote or direct access), and how much effort and money they are willing and able to spend on an att... » read more

Why It’s So Difficult — And Costly — To Secure Chips


Rising concerns about the security of chips used in everything from cars to data centers are driving up the cost and complexity of electronic systems in a variety of ways, some obvious and others less so. Until very recently, semiconductor security was viewed more as a theoretical threat than a real one. Governments certainly worried about adversaries taking control of secure systems through... » read more

Anti-Tamper Benefits Of Encrypted Helper-Data Images For PUFs


PUFs are mixed-signal circuits which rely on variations unique to a specific chip to self-generate a digital “fingerprint.” Most PUFs require a “helper-data” image that is generated during the initial digitization process, also known as Enrollment. Leveraging the chip-unique transformation function of PUFs and encrypted helper data, an unclonable challenge-response mechanism can be impl... » read more

Week In Review: Design, Low Power


Tools Imperas Software released updated simulator and reference models that support the latest RISC-V extensions for Bit Manipulation 1.0.0, Cryptographic (Scalar) 1.0.0, and Vector 1.0, plus Privilege Specification 1.12. They are offered both as freely available, open-source reference models for the RISC-V community as well as commercial products. Ansys' multiphysics signoff solutions were... » read more

Blog Review: Nov. 17


In a podcast, Arm's Geof Wheelwright and Hilary Tam chat about the importance of efforts to decarbonize compute and how low-power compute can help ensure that the benefits of technology outweigh the environmental cost. Synopsys' Graham Allan and Vikas Gautam consider what's driving demand for HBM3, what's different from the previous HBM2E specification, unique design considerations, and how ... » read more

AI/ML Workloads Need Extra Security


The need for security is pervading all electronic systems. But given the growth in data-center machine-learning computing, which deals with extremely valuable data, some companies are paying particular attention to handling that data securely. All of the usual data-center security solutions must be brought to bear, but extra effort is needed to ensure that models and data sets are protected ... » read more

MIPI On Wheels: Enabling ADAS Applications


Formed in 2003, the Mobile Industry Processor Interface (MIPI) Alliance brought together leading system and chip companies to provide standards for the essential video interface technologies for cameras and displays in phones. Over the years, the alliance has expanded its scope to publish specifications covering physical layer, multimedia, chip-to-chip and inter-processor communications (IPC), ... » read more

Improving Power Efficiency In Ultra-Low Power Designs


Faster data communications in phones and data centers grabs headlines, but many applications don't require the continuous, high-data-rate communications needed for video streaming or image processing. In fact, for many devices, designing for better performance results in wasted energy and sharply curtails the time between battery charges. That is especially true for machine-to-machine (M2M) ... » read more

Changing Server Architectures In The Data Center


Data centers are undergoing a fundamental shift to boost server utilization and improve efficiency, optimizing architectures so available compute resources can be leveraged wherever they are needed. Traditionally, data centers were built with racks of servers, each server providing computing, memory, interconnect, and possibly acceleration resources. But when a server is selected, some of th... » read more

← Older posts Newer posts →