Big Changes For eFPGAs


Geoff Tate, CEO of Flex Logix, talks with Semiconductor Engineering about the state of embedded FPGAs, why this is easier for some companies than others, why this is important for adding flexibility into an ASIC, and what are the main applications for this technology. » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive Imagination Technologies and BAIC Capital have formed an automotive joint venture to create a new automotive fabless semiconductor company focused on China as a client. The JV will be headquartered in the Zhongguancun Integrated Circuit Design Park in Beijing, China, with Bravo Lee serving as CEO. The JV will license IP and software from Imagination to create automotive-grade SoCs. ... » read more

Week In Review: Design, Low Power


Tools & IP Ansys' RedHawk-SC multiphysics signoff software was certified for all TSMC advanced process technologies, including N16, N12, N7, N6 and N5. The certification includes extraction, power integrity and reliability, signal electromigration (EM) and thermal reliability analysis and statistical EM budgeting analysis. Aldec launched a new FPGA accelerator board for high performance... » read more

Securing Data In Motion With MACsec


For end-to-end security of data, it must be secured both when “at rest” (processed or stored in a connected device) and when it is “in motion” (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all data and device security is built. For example, the security of applications builds on an uncompromis... » read more

Making Sense Of PUFs


As security becomes a principal design consideration, physically unclonable functions (PUFs) are seeing renewed interest as new players emerge onto the market. PUFs can play a central role in hardware roots of trust (HRoTs), but the messaging in the market can make it confusing to understand the different types of PUF as well as their pros and cons. PUFs leverage some uncertain aspect of som... » read more

MACsec Fundamentals: Securing Data in Motion


For end-to-end security of data and devices, data must be secured both when it as rest (stored on a connected device) and when it is in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides that foundation upon which all device security is built. Similarly, MACsec security anchored in hardware at the foundational communication l... » read more

Week In Review: Auto, Security, Pervasive Computing


Data center, 5G security Nvidia won approval for its Mellanox Technologies Ltd. deal from China, according to an article on Bloomberg. Mellanox chips split up and manage AI datasets for parallel processing, which can be used in data centers for computing. Rambus has released security for 800 Gigbit Ethernet MAC (media access control) for enhanced data center and 5G infrastructure. It secure... » read more

Week In Review: Design, Low Power


Nvidia completed its $7 billion acquisition of Mellanox. The acquisition, initially announced over a year ago, brings Mellanox’s high-performance networking and interconnect technology to Nvidia's server efforts and gives the company full end-to-end offerings in the data center space. To date, this is the largest acquisition in Nvidia's history. Tools & IP Synopsys debuted its 3DIC Co... » read more

Blog Review: April 15


Mentor's Neil Johnson argues that it's time to reevaluate the current definition of verification methodology, with a new focus on methodologies driven by the needs of the design and best suited to different abstractions. Synopsys' Derek Handova warns that the need to manage the security risks of billions of IoT devices will continue to change the requirements and scope of 5G security. Cad... » read more

2.5D Architecture Answers AI Training’s Call for “All of the Above”


The impact of AI/ML grows daily impacting every industry and touching the lives of everyone. In marketing, healthcare, retail, transportation, manufacturing and more, AI/ML is a catalyst for great change. This rapid advance is powerfully illustrated by the growth in AI/ML training capabilities which have since 2012 grown by a factor of 10X every year. Today, AI/ML neural network training mod... » read more

← Older posts Newer posts →