Week In Review: Auto, Security, Pervasive Computing


Automotive, Mobility Automotive chip shortages will continue until 2025, according to reports in a Financial Times (FT) article. Demand for SiC power chips will remain high. Onsemi reportedly is already sold out of the power semiconductors. Archer Aviation’s Midnight eVTOL (electric vertical take-off and landing) is listed in the Federal Register now by The U.S. Federal Aviation Administr... » read more

Designing And Securing Chips For Outer Space


Design considerations for hardware used in space go far beyond radiation hardening. These devices have to perform flawlessly for years, under extreme temperature variations, and potentially banged up by space junk or other particles floating in the void over its projected lifetime. Reliability in space adds a whole different set of design considerations. For example, while it's unlikely anyo... » read more

Ensuring Your Semiconductor Test Equipment Is Protected From Rising Cybersecurity Threats


Cybersecurity threats pose risks to your business every day and can attack every aspect of your operation, and these threats are only increasing. According to IBM Security’s Cost of a Data Breach Report, in 2021, the average total cost of a data breach increased by nearly 10% year over year, from $3.86M to $4.24M – the largest single year cost increase in the last seven years. Sourc... » read more

Cybersecurity Risks Of Automotive OTA


Modern vehicles increasingly resemble supercomputers on wheels, with many electronic control units (ECUs) networked together as increasingly sophisticated software is installed and updated. Similar to smartphones, vehicle OEMs will contact vehicle owners remotely about operating system updates that add new features and/or fixes, as well as software bugs and vulnerabilities. But all of this h... » read more

Creating Comprehensive And Verifiable Hardware Security Requirements


Developing effective hardware security requirements is one of the trickiest aspects of building trustworthy electronic products. Even highly skilled and experienced teams don’t always get it right. Why? First, it’s very difficult to anticipate every security risk – much less cover every possible scenario with a specific security requirement. Instead, hardware security requirements o... » read more

Security Solutions In A World Of IoT Devices


Internet of Things (IoT) devices are everywhere these days adding tremendous value, but unfortunately also representing unprecedented levels of risk for exploitation. Anything that is connected to the internet is potentially hackable. Securing connected devices is a challenge and is top of mind for electronics manufacturers who want to avoid the embarrassment of having their devices hacked. The... » read more

Post-Quantum And Pre-Quantum Security Issues Grow


General-purpose quantum computers will be able to crack the codes that protect much of the world’s information, and while these machines don’t exist yet, security experts say governments and businesses are starting to prepare for encryption in a post-quantum world. The task is made all the more challenging because no one knows exactly how future quantum machines will work, or even which mat... » read more

Secure Interfaces In An Increasingly Connected World


The tremendous data and bandwidth growth in the era of supercomputing is driving technological advances across markets and is reshaping system-on-chip (SoC) designs supporting new compute architectures, more acceleration, and more storage. As high bandwidth interfaces including DDR, PCIe, CXL, Ethernet, HDMI and DisplayPort are proliferating and evolving from one generation to another, so does ... » read more

Enabling The Highest Levels Of SoC Security


The tremendous data and bandwidth growth in the era of supercomputing is driving technological advances across markets and is reshaping system-on-chip (SoC) designs supporting new compute architectures, more acceleration, and more storage. As high bandwidth interfaces including DDR, PCIe, CXL, Ethernet, HDMI and DisplayPort are proliferating and evolving from one generation to another, so does ... » read more

Data Security Takes Front Seat In Industrial IoT Design


As recently as 10 years ago, protecting Internet of Things (IoT) data was largely an afterthought. Engineers designing IoT and industrial IoT (IIoT) networks were more concerned with ensuring their applications functioned according to design specifications, not with the unintended consequences of releasing potentially sensitive information into the cloud. Today, with billions of sensors an... » read more

← Older posts Newer posts →