Week In Review: Design, Low Power


Nvidia again made its case for acquiring Arm to the UK's Competition and Markets Authority (CMA). “Arm is a private for-profit business at a crossroads. After acquiring Arm several years ago, SoftBank increased Arm’s headcount, hoping to spur long-term growth in several markets, including data center and personal computer, long dominated by Intel and x86. SoftBank’s investment phase has c... » read more

Week In Review: Auto, Security, Pervasive Computing


Security Kyocera is using Rambus’ RT-130 Root of Trust and AES-IP-38 AES Accelerator IP for data security on Kyocera Evolution Series MFPs (multi-function printers). Connected printers are notorious targets for malicious actors to gain access a network or data. The Evolution Series MFPs’ data security mets Federal Information Processing Standards (FIPS) 140-2 Cryptographic Module Validatio... » read more

Advancing Signaling Rates To 64 GT/s With PCI Express 6.0


From the introduction of PCI Express 3.0 (PCIe 3.0) in 2010 onward, each new generation of the standard has offered double the signaling rate of its predecessor. PCIe 3.0 saw a significant change to the protocol with the move from 8b/10b to highly efficient 128b/130b encoding. The PCIe 6.0 specification, now officially released, doubles the signaling rate to 64 gigatransfers per second (GT/s) a... » read more

Automotive Outlook: 2022


The auto industry is widening its focus this year, migrating to new architectures that embrace better security, faster data movement, and eventually more manageable costs. The auto industry is facing both short-term and long-term challenges. In the short term, the chip shortage continues to top the list of concerns for the world's automakers. That shortage has delayed new vehicle deliveries,... » read more

Security Starts With A Threat Assessment


Developing the security architecture for an electronic device begins with building a threat model wherein we ask these questions: What is the operational environment in which the device needs to function? What type of attacks can be identified? What level of access does a potential attacker have to the device? What possible attack paths can an attacker exploit? What resources (... » read more

Making PUFs Even More Secure


As security has become a must-have in most systems, hardware roots of trust (HRoTs) have started appearing in many chips. Critical to an HRoT is the ability to authenticate and to create keys – ideally from a reliable source that is unviewable and immutable. “We see hardware roots of trust deployed in two use models — providing a foundation to securely start a system, and enabling a se... » read more

Hardware Root of Trust: Everything You Need To Know


As explained in our “Secure Silicon IP Webinar Series“, a root of trust is the security foundation for an SoC, other semiconductor device or electronic system. However, its meaning differs depending on who you ask. For example, the hardware root of trust contains the keys for cryptographic functions and is usually a part of the secure boot process providing the foundation for the software c... » read more

2021 Top Tech Videos


While the world’s chip shortage dominated the 2021 headlines, the semiconductor industry blazed new trails with the increased electrification of cars, focused AI applications, improving power/performance, better utilization of data deluges, dealing with design challenges in advanced nodes and much more focus on chip security. Semiconductor Engineering’s Tech Talks reflected these focus a... » read more

Blog Review: Dec. 15


Arm's Hannah Peeler, Joshua Randall, and Zach Lasiuk examine the carbon cost of data centers and introduce a tool that allows users to make informed decisions about the carbon impact of their compute workloads. Synopsys' Kenneth Larsen provides a primer on the fundamentals of quantum computing, the role of photonics in building quantum systems, and the future potential impact on chip design.... » read more

Securing Short-Range Communications


Short-range wireless communication technology is in widespread use and growing rapidly, adding conveniences for consumers while also opening the door to a whole range of cyberattacks. This technology is common across a variety of applications, from wireless key fobs to unlock a car and start the ignition, to tags used to help drivers find misplaced items such as car keys. RFID also is starti... » read more

← Older posts Newer posts →