The Next Spoiler Alert


Speculative execution seemed like a good idea at the time. As the power/performance benefits of each node shrink began to dwindle, companies like Intel figured out ways to maintain processor speeds at the same or lower power. There were other approaches, as well. Speculative execution and branch prediction are roughly equivalent to pre-fetch in search, which has gotten so good that often the... » read more

Next Wave Of Security For IIoT


A rush of new products and services promise to make the famously un-secured Industrial IoT (IIoT) substantially more secure in the near future. Although the semiconductor industry has been churning out a variety of security-related products and concepts, ranging from root of trust approaches to crypto processors and physically unclonable functions, most IIoT operations have been slow to adop... » read more

Don’t Have A Meltdown Over A Spectre In Your SoC


You may be concerned about last year’s widely published Spectre and Meltdown vulnerabilities affecting most processors. Are your phone and computer OK? Or more importantly, if you are designing or verifying a System on Chip (SoC), do you have a specter in your design? Let’s first look at what these two vulnerabilities are and how they may be affecting your system. Both vulnerabilitie... » read more

Enterprise or Open Source: Which SAST Tool Is Right for You?


Static application security testing (SAST) is an essential part of any secure development workflow. But not all SAST tools are created equal. It’s crucial that you weigh your options carefully when choosing a SAST tool to avoid unnecessary costs in the future. This white paper compares open source and enterprise SAST solutions and provides relevant information to help you select the option th... » read more

Hidden Signals: The Memories And Interfaces Enabling IoT, 5G, And AI


This IDC Technology Spotlight Report, sponsored by Rambus, highlights key, often hidden, memory and interface technologies that are enabling high performance electronic systems to serve the disruptive trends of the next decade like IoT, 5G, and Artificial Intelligence. The report discusses: Data and the importance of connectivity, both from the physical (analog) world to the digital wor... » read more

Crisis In Data


The push toward data-driven design, debug, manufacturing and reliability holds huge promise, but the big risk is none of this will happen in an organized fashion and everyone will be frustrated. One of the clear messages coming out of DVCon this week is that standards need to be established for data. Even within large chipmakers and systems companies, the data they extract from tools is not ... » read more

Hot Technologies In Cold Weather


It is a busy week for verification and software development. DVCon in San Jose; Embedded World in Nuremberg, Germany; and Mobile World Congress (MWC) in Barcelona, Spain are all happening at the same time. I ended up covering embedded software in Germany (as I also had a paper on “Shift Left” here). At chilly minus 1° Celsius in the morning, the technologies had to be pretty hot to warm me... » read more

The Challenge Of RISC-V Compliance


The open-source RISC-V instruction set architecture (ISA) continues to gain momentum, but the flexibility of RISC-V creates a problem—how do you know if a RISC-V implementation fits basic standards and can play well with other implementations so they all can run the same ecosystem? In addition, how do you ensure that ecosystem development works for all implementations and that all cores that ... » read more

Can Debug Be Tamed?


Debug consumes more time than any other aspect of the chip design and verification process, and it adds uncertainty and risk to semiconductor development because there are always lingering questions about whether enough bugs were caught in the allotted amount of time. Recent figures suggest that the problem is getting worse, too, as complexity and demand for reliability continue to rise. The... » read more

Using AI Data For Security


Artificial intelligence is migrating from the cloud to IoT edge devices. Now the question is how to apply that same technology to protect data and identify abnormal activity in those devices and the systems connected to them. This is a complex problem because AI is being used on multiple fronts in this battle, as well as for multiple purposes. The technology has advanced to the point where e... » read more

← Older posts