Telecare Challenges: Secure, Reliable, Lower Power


The adoption of telecare using a variety of connected digital devices is opening the door to much more rapid response to medical emergencies, as well as more consistent monitoring, but it also is adding new challenges involving connectivity, security, and power consumption. Telecare has been on the horizon for the better part of two decades, but it really began ramping with improvements in s... » read more

Data Management Evolves


Semiconductor Engineering sat down to discuss data management challenges with Jerome Toublanc, business development executive at Ansys; Kam Kittrell, vice president of product management in the Digital & Signoff Group at Cadence; Simon Rance, vice president of marketing at Cliosoft; Rob Conant, vice president of software and ecosystem at Infineon Technologies; and Michael Munsey, senior dir... » read more

Up And Away: Clear-Eyed Considerations For Your Cloud-Adoption Journey


It’s no secret the cloud is a driving force powering the digital transformation. However, cloud adoption is rarely a one-size-fits-all operation. Even when done correctly, it can bring about company-wide transformations unique to each organization. At the very core, the move to the cloud is akin to a culture change, and understanding these changes can make the transition successful. The follo... » read more

Implementing Memory Encryption To Protect Data In Use


In my blog “The Methods of Memory Encryption to Protect Data in Use,” I discussed how the XTS/XEX mode of encryption was the appropriate choice for protecting data stored in and accessed from memory, also known as, protecting data in use. As a quick recap, XTS/XEX uses two keys, one key for block encryption, and another key to process a “tweak.” The tweak ensures every block of memory i... » read more

Maximize Memory Security Of HPC SoCs With Efficient Crypto IP


Data that is created and transferred between billions of devices and the cloud is growing exponentially. More and more devices are entering the market, the cloud is expanding to the network edge and new applications are emerging. These factors are drivers for technological advances in high-performance computing (HPC), reshaping system-on-chip (SoC) designs to address the need for more accelerat... » read more

Week in Review: Auto, Security, Pervasive Computing


Automotive The European Union plans to approve sales of fully autonomous vehicles by the end of September, according to Politico. The legislative package will allow for the registration and sale of up to 1,500 vehicles per model per year in member countries. Level 4 autonomous vehicles are still in the development stage, but reducing human error in autos is a crucial part of the EU’s goal to... » read more

Security Risks Widen With Commercial Chiplets


The commercialization of chiplets is expected to increase the number and breadth of attack surfaces in electronic systems, making it harder to keep track of all the hardened IP jammed into a package and to verify its authenticity and robustness against hackers. Until now this has been largely a non-issue, because the only companies using chiplets today — AMD, Intel, and Marvell — interna... » read more

Security Highlight: Evil Never Sleeps


Recently, Apple introduced a useful but potentially dangerous feature to its iPhones. Most of us would assume that a phone becomes inactive when switched off by the user or due to low power. Surprisingly, newer phones continue limited functionality for several hours in low power mode or even if it is off. This includes cards in your Wallet and the Find My service. This feature caught the attent... » read more

A New Phase In The Journey To Trustworthy Electronic Products


Semiconductor chips drive our everyday lives – and our global economy – in more ways than any of us could have envisioned when Tortuga Logic was founded in 2014. And similarly, the importance of hardware security has grown dramatically beyond what anyone could have predicted at that time. This has led us to redouble our effort to help the industry develop trustworthy products in the next ph... » read more

Safeguarding A Digital Transformation Across The Entire Product Lifecycle


In 2020, the SolarWinds breach highlighted the emergence of software supply chain attacks as a very real security threat that impacted many high-profile companies. (The software supply chain includes third-party and open-source components used in a software product.) Then in late 2021, not to be outdone, the massive scope of the Log4j vulnerability emerged, impacting millions of consumer produc... » read more

← Older posts Newer posts →