Best Practices For Visibility Architecture Tap Planning


When it comes to data monitoring, ensuring proper access to network data is one of the most critical things you can do. Missing and incorrect data will slow down the analysis of problems by your security monitoring and tools. It may also lead to false conclusions by those tools. In turn, this can lead to missed security threats, false positives for security threats and network impairments, and ... » read more

Week in Review: Design, Low Power


Acquisitions Renesas completed its acquisition of Reality Analytics, which specializes in embedded AI and TinyML solutions for advanced non-visual sensing in automotive, industrial and commercial products. Siemens Digital Industries Software will acquire Zona Technology, which develops aerospace simulation software. Siemens plans to integrate that software into its wXcelerator and Simcenter... » read more

Secure Physical Design Roadmap Enabling End-To-End Trustworthy IC Design Flow


The FICS Research Institute (University of Florida) has published a new research paper titled "Secure Physical Design." This is the first and most comprehensive research work done in this area that requires significant attention from academia, industry, and government for ensuring trust in electronic design automation flow," said lead author Sukanta Dey. Abstract "An integrated circuit is s... » read more

Telecare Challenges: Secure, Reliable, Lower Power


The adoption of telecare using a variety of connected digital devices is opening the door to much more rapid response to medical emergencies, as well as more consistent monitoring, but it also is adding new challenges involving connectivity, security, and power consumption. Telecare has been on the horizon for the better part of two decades, but it really began ramping with improvements in s... » read more

Data Management Evolves


Semiconductor Engineering sat down to discuss data management challenges with Jerome Toublanc, business development executive at Ansys; Kam Kittrell, vice president of product management in the Digital & Signoff Group at Cadence; Simon Rance, vice president of marketing at Cliosoft; Rob Conant, vice president of software and ecosystem at Infineon Technologies; and Michael Munsey, senior dir... » read more

Up And Away: Clear-Eyed Considerations For Your Cloud-Adoption Journey


It’s no secret the cloud is a driving force powering the digital transformation. However, cloud adoption is rarely a one-size-fits-all operation. Even when done correctly, it can bring about company-wide transformations unique to each organization. At the very core, the move to the cloud is akin to a culture change, and understanding these changes can make the transition successful. The follo... » read more

Implementing Memory Encryption To Protect Data In Use


In my blog “The Methods of Memory Encryption to Protect Data in Use,” I discussed how the XTS/XEX mode of encryption was the appropriate choice for protecting data stored in and accessed from memory, also known as, protecting data in use. As a quick recap, XTS/XEX uses two keys, one key for block encryption, and another key to process a “tweak.” The tweak ensures every block of memory i... » read more

Maximize Memory Security Of HPC SoCs With Efficient Crypto IP


Data that is created and transferred between billions of devices and the cloud is growing exponentially. More and more devices are entering the market, the cloud is expanding to the network edge and new applications are emerging. These factors are drivers for technological advances in high-performance computing (HPC), reshaping system-on-chip (SoC) designs to address the need for more accelerat... » read more

Week in Review: Auto, Security, Pervasive Computing


Automotive The European Union plans to approve sales of fully autonomous vehicles by the end of September, according to Politico. The legislative package will allow for the registration and sale of up to 1,500 vehicles per model per year in member countries. Level 4 autonomous vehicles are still in the development stage, but reducing human error in autos is a crucial part of the EU’s goal to... » read more

Security Risks Widen With Commercial Chiplets


The commercialization of chiplets is expected to increase the number and breadth of attack surfaces in electronic systems, making it harder to keep track of all the hardened IP jammed into a package and to verify its authenticity and robustness against hackers. Until now this has been largely a non-issue, because the only companies using chiplets today — AMD, Intel, and Marvell — interna... » read more

← Older posts Newer posts →