2 Big Shifts, Lots Of Questions


The proliferation of AI everywhere, and ongoing efforts by big systems companies to develop their own chips, could have a profound effect on semiconductor manufacturing for years to come. AI is a multi-faceted topic, but what makes this particularly interesting from a semiconductor standpoint is the architecture of AI-specific chips. So far, most of these chips have been developed for data c... » read more

Smart Manufacturing


Tom Salmon, vice president of collaborative technology platforms at SEMI, talks about smart manufacturing, and the role of AI, smart gateways, and digital twins. https://youtu.be/e9DQ_Xfc2K0     See other tech talk videos here.   » read more

Establishing the Root of Trust for the Internet of Things


The Internet of Things (IoT) is a quickly emerging ecosystem of applications, products and services in which both large and small devices connect to the internet. These new IoT devices will be embedded into diverse applications ranging from home security and home automation to manufacturing—and more. Protecting the data collected from these dispersed IoT endpoints presents a myriad of challen... » read more

Are Devices Getting More Secure?


Adding security into chip design is becoming more prevalent as more devices are connected to the Internet, but it's not clear whether that is enough to offset an explosion in connected "things." Security concerns have been growing for the past half-decade, starting with a rash of high-profile attacks on retail establishments, hotel membership clubs, and Equifax, one of the three top credit-c... » read more

Reducing Time To Market For Security Solutions


Security is now a common feature on most mobile devices, from fingerprint scanners to face ID. However, despite its widespread adoption, the time-to-market for developing security solutions still remains a challenge for OEMs, silicon providers (SiPs) and developers. Some of the most notable obstacles include: the availability of fully integrated security solutions incorporating existing IP, arc... » read more

The Blockchain – Not As Secure As You Think


The blockchain has the potential to touch all aspects of our everyday lives, from buying and trading cryptocurrency, to securing vital healthcare records, to proving that a tomato really is organic. The security challenges, specifically the vulnerability of private keys faced by the cryptocurrency market, prove that before the transformative impact of blockchain technology can be realized, a co... » read more

The Building Blocks Of Future Compute


Eric Hennenhoefer, vice president of research at Arm, sat down with Semiconductor Engineering to talk about privacy, security, high-performance computing, accelerators, and Arm’s research. What follows are excerpts of that conversation. SE: Privacy, cybersecurity, silicon photonics, quantum computing are all hot topics today. What do you find really interesting with these emerging areas? ... » read more

DOM-Based Cross-Site Scripting


DOM-based attacks are a misunderstood, serious, and pervasive source of risk in contemporary web applications. The language that drives the web, JavaScript, is easy to understand and hard to master; junior and senior developers routinely make mistakes. Mix difficulty to master with an enormous attack surface, and you have the perfect storm for widespread vulnerability. These risks expose web ap... » read more

The Next Big Chip Companies


Rambus’ Mike Noonen looks at why putting everything on a single die no longer works, what comes after Moore’s Law, and what the new business model looks like for chipmakers. https://youtu.be/X6Kca8Vm-wA » read more

NIST’s Considerations For ‘Cybersecuring’ The Internet Of Things


Experts at the National Institute of Standards and Technology (NIST) have kicked off an initiative to support the development and application of standards, guidelines, and related tools to improve the cybersecurity of connected devices and the environments in which they are deployed. NIST’s Cybersecurity for the Internet of Things (IoT) and Privacy Engineering Programs drafted a report ... » read more

← Older posts