Maximizing Value Post-Moore’s Law


When Moore's Law was in full swing, almost every market segment considered moving to the next available node as a primary way to maximize value. But today, each major market segment is looking at different strategies that are more closely aligned with its individual needs. This diversity will end up causing both pain and opportunities in the supply chain. Chip developers must do more with a ... » read more

Conflicting Demands At The Edge


Semiconductor Engineering sat down to define what the edge will look like with Jeff DeAngelis, managing director of the Industrial and Healthcare Business Unit at Maxim Integrated; Norman Chang, chief technologist at Ansys; Andrew Grant, senior director of artificial intelligence at Imagination Technologies; Thomas Ensergueix, senior director of the automotive and IoT line of business at Arm; V... » read more

The Meaning Of Verification


When I ask the question "Why do we do verification?" there are generally two types of responses. One of them sees the glass as half empty and the other as half full. It depends upon how you look at the problem and if you see verification as being a positive or negative operation. The negative answer is that we do verification to find bugs. This relies on the mechanical function of creating v... » read more

Power-Hungry Safety And Security


There is a price to pay for everything. When it comes to adding safety and security into a device, the costs in terms of power and area can be significant, but if the task is taken seriously, those costs can be managed and minimized. New analysis and implementation tools are coming to market that can also help to keep the costs contained. But it also requires the right mindset. As more indus... » read more

AI, Performance, Power, Safety Shine Spotlight On Last-Level Cache


Memory limitations to performance, always important in modern systems, have become an especially significant concern in automotive safety-critical applications making use of AI methods. On one hand, detecting and reporting a potential collision or other safety problem has to be very fast. Any corrective action is constrained by physics and has to be taken well in advance to avoid the problem. ... » read more

Uses And Limitations Of AI In Chip Design


Raik Brinkmann, president and CEO of OneSpin Solutions, sat down with Semiconductor Engineering to talk about AI changes and challenges, new opportunities for using existing technology to improve AI, and vice versa. What follows are excerpts of that conversation. SE: What's changing in AI? Brinkmann: There are a couple of big changes underway. One involves AI in functional safety, where y... » read more

3 Safety Standards For Auto Electronics


Kurt Shuler, vice president of marketing at Arteris IP, drills down into the three main safety standards, ISO 26262, SOTIF (Safety of the Intended Function) and UL 4600, what each one covers, what the intent is behind them, and what this means for companies developing technology for future vehicles. » read more

What Will AI Look Like In 10 Years?


There's no such thing as reverse in AI systems. Once they are let loose, they do what they were programmed to do — optimize results within a given set of parameters. But today there is no consistency for those parameters. There are no standards by which to measure how AI deviates over time. And there is an expectation, at least today, that AI systems will adapt to whatever patterns they di... » read more

Testing Autonomous Vehicles


Jeff Phillips, head of automotive marketing at National Instruments, talks about how to ensure that automotive systems are reliable and safe, how test needs to shift to adapt to continual updates and changes, and why this is particularly challenging in a world where there is no known right answer. » read more

Safety Islands In Safety-Critical Hardware


Safety and security have certain aspects in common so it shouldn’t be surprising that some ideas evolving in one domain find echoes in the other. In hardware design, a significant trend has been to push security-critical functions into a hardware root-of-trust (HRoT) core, following a philosophy of putting all (or most) of those functions in one basket and watching that basket very carefully.... » read more

← Older posts Newer posts →