Longer Chip Lifecycles Increase Security Threat


The longer chips and electronic systems remain in use, the more they will need to be refreshed with software and firmware updates. That creates a whole new level of security risks, ranging from over-the-air intercepts to compromised supply chains. These problems have been escalating as more devices are connected to the Internet and to each other, but it's particularly worrisome when it invol... » read more

Bridging The Gap Between Smart Cities And Autonomous Vehicles


Smart city planners and carmakers are wrestling with similar problems and goals, but they are working at very different paces and often with different technologies — despite the fact that these two worlds will need to be bridged in order to be useful. Moving traffic optimally in urban areas is critical for reducing energy consumption and accidents, and for moving emergency vehicles through... » read more

Security In The ARM Ecosystem


Building security in an SoC aiming to meet the goals set by the ARM Platform Security Architecture (PSA) is a complex matter. This is compounded by the complexity of modern-day SoCs comprising multiple processors, security domains and security levels. The Rambus root of trust provides a solid foundation for the SoC security architecture ticking ‘all the boxes’ for reaching the security goal... » read more

Blog Review: Jan. 27


Synopsys' Godwin Maben finds that applications like high-performance computing and AI are bringing new dynamics to the power equation, and the key power considerations for chip design that will likely emerge over the course of the year. Siemens EDA's Harry Foster checks out trends in verification technology adoption for IC and ASIC design, with increasing numbers of designs using both dynami... » read more

Blog Review: Jan. 20


Siemens EDA's Harry Foster takes a look at the amount of time IC and ASIC projects spend in verification, changes in the number of engineers on a project, and how engineers are spending their time. Synopsys' Stelios Diamantidis considers the importance of specialized accelerators for AI workloads as both cloud and edge push the PPA limits of current technologies. Cadence's Paul McLellan p... » read more

Hidden Costs In Faster, Low-Power AI Systems


Chipmakers are building orders of magnitude better performance and energy efficiency into smart devices, but to achieve those goals they also are making tradeoffs that will have far-reaching, long-lasting, and in some cases unknown impacts. Much of this activity is a direct result of pushing intelligence out to the edge, where it is needed to process, sort, and manage massive increases in da... » read more

Von Neumann Is Struggling


In an era dominated by machine learning, the von Neumann architecture is struggling to stay relevant. The world has changed from being control-centric to one that is data-centric, pushing processor architectures to evolve. Venture money is flooding into domain-specific architectures (DSA), but traditional processors also are evolving. For many markets, they continue to provide an effective s... » read more

Five Key Changes Coming With DDR5 DIMMs


On July 14th of last year, JEDEC announced the publication of the DDR5 SDRAM standard. This signaled the nearing industry transition to DDR5 server dual-inline memory modules (DIMM). DDR5 memory brings a number of key enhancements that will bring great performance and power benefits in next generation servers. Scaling Data Rates to 6.4 Gb/s You can never have enough memory bandwidth, and DD... » read more

Blog Review: Jan. 13


Siemens EDA's Harry Foster tracks trends in IC and ASIC design and finds that increased design size is only one dimension of the growing complexity challenge. Synopsys' Chris Clark and Dennis Kengo Oka predicts how the automotive industry will change in 2021, including new standards for security, increased use of AI and V2X technologies, and a growing focus on software. Cadence's Paul McL... » read more

Washington Sets IoT Cybersecurity Standards


On December 4th, 2020, the “IoT Cybersecurity Improvement Act of 2020” became law. The bipartisan legislation sets a minimum security standard for IoT devices that the US government procures. In an increasingly rare act of bipartisanship, the bill was “passed by unanimous consent” in both the House of Representatives and the Senate, demonstrating the importance of IoT security. The l... » read more

← Older posts Newer posts →