Data Center Evolution: The Leap To 64 GT/s Signaling With PCI Express 6.0


The PCI Express (PCIe) interface is the critical backbone that moves data at high bandwidth and low latency between various compute nodes such as CPUs, GPUs, FPGAs, and workload-specific accelerators. With the torrid rise in bandwidth demands of advanced workloads such as AI/ML training, PCIe 6.0 jumps signaling to 64 GT/s with some of the biggest changes yet in the standard. Download this w... » read more

Week In Review: Design, Low Power


Kalray, a provider of programmable data processing and storage acceleration cards for data centers, will acquire Arcapix Holdings, which provides software-defined storage and data management solutions for data-intensive applications. "I am delighted at the prospect of this acquisition that will accelerate our go-to-market and strengthen our key position in the data-intensive storage market. It ... » read more

Week In Review: Auto, Security, Pervasive Computing


China’s regulators are agreeing to AMD’s acquisition of Xilinx with the caveat that AMD must agree not to force tie-in sales Xilinx's products with AMD products, according to Reuters. China's State Administration for Market Regulation said the companies cannot discriminate against customers using other technology. Xilinx's SEC 8-K form confirms that the two companies received clearance for ... » read more

Health Care Is Gold Mine For Hackers


Today’s digital health care systems are facing relentless cyberattacks, which are targeting health care organizations as well as the medical devices they use. The critical nature and size of the U.S. health care market — an estimated $3.5 trillion in 2020, with substantial growth anticipated — make it a favorite target of hackers. Vanson Bourne conducted a survey for Sophos in early 20... » read more

Week In Review: Design, Low Power


Nvidia again made its case for acquiring Arm to the UK's Competition and Markets Authority (CMA). “Arm is a private for-profit business at a crossroads. After acquiring Arm several years ago, SoftBank increased Arm’s headcount, hoping to spur long-term growth in several markets, including data center and personal computer, long dominated by Intel and x86. SoftBank’s investment phase has c... » read more

Week In Review: Auto, Security, Pervasive Computing


Security Kyocera is using Rambus’ RT-130 Root of Trust and AES-IP-38 AES Accelerator IP for data security on Kyocera Evolution Series MFPs (multi-function printers). Connected printers are notorious targets for malicious actors to gain access a network or data. The Evolution Series MFPs’ data security mets Federal Information Processing Standards (FIPS) 140-2 Cryptographic Module Validatio... » read more

Advancing Signaling Rates To 64 GT/s With PCI Express 6.0


From the introduction of PCI Express 3.0 (PCIe 3.0) in 2010 onward, each new generation of the standard has offered double the signaling rate of its predecessor. PCIe 3.0 saw a significant change to the protocol with the move from 8b/10b to highly efficient 128b/130b encoding. The PCIe 6.0 specification, now officially released, doubles the signaling rate to 64 gigatransfers per second (GT/s) a... » read more

Automotive Outlook: 2022


The auto industry is widening its focus this year, migrating to new architectures that embrace better security, faster data movement, and eventually more manageable costs. The auto industry is facing both short-term and long-term challenges. In the short term, the chip shortage continues to top the list of concerns for the world's automakers. That shortage has delayed new vehicle deliveries,... » read more

Security Starts With A Threat Assessment


Developing the security architecture for an electronic device begins with building a threat model wherein we ask these questions: What is the operational environment in which the device needs to function? What type of attacks can be identified? What level of access does a potential attacker have to the device? What possible attack paths can an attacker exploit? What resources (... » read more

Making PUFs Even More Secure


As security has become a must-have in most systems, hardware roots of trust (HRoTs) have started appearing in many chips. Critical to an HRoT is the ability to authenticate and to create keys – ideally from a reliable source that is unviewable and immutable. “We see hardware roots of trust deployed in two use models — providing a foundation to securely start a system, and enabling a se... » read more

← Older posts Newer posts →