Don’t Have A Meltdown Over A Spectre In Your SoC


You may be concerned about last year’s widely published Spectre and Meltdown vulnerabilities affecting most processors. Are your phone and computer OK? Or more importantly, if you are designing or verifying a System on Chip (SoC), do you have a specter in your design? Let’s first look at what these two vulnerabilities are and how they may be affecting your system. Both vulnerabilitie... » read more

Enterprise or Open Source: Which SAST Tool Is Right for You?


Static application security testing (SAST) is an essential part of any secure development workflow. But not all SAST tools are created equal. It’s crucial that you weigh your options carefully when choosing a SAST tool to avoid unnecessary costs in the future. This white paper compares open source and enterprise SAST solutions and provides relevant information to help you select the option th... » read more

Hidden Signals: The Memories And Interfaces Enabling IoT, 5G, And AI


This IDC Technology Spotlight Report, sponsored by Rambus, highlights key, often hidden, memory and interface technologies that are enabling high performance electronic systems to serve the disruptive trends of the next decade like IoT, 5G, and Artificial Intelligence. The report discusses: Data and the importance of connectivity, both from the physical (analog) world to the digital wor... » read more

Crisis In Data


The push toward data-driven design, debug, manufacturing and reliability holds huge promise, but the big risk is none of this will happen in an organized fashion and everyone will be frustrated. One of the clear messages coming out of DVCon this week is that standards need to be established for data. Even within large chipmakers and systems companies, the data they extract from tools is not ... » read more

Hot Technologies In Cold Weather


It is a busy week for verification and software development. DVCon in San Jose; Embedded World in Nuremberg, Germany; and Mobile World Congress (MWC) in Barcelona, Spain are all happening at the same time. I ended up covering embedded software in Germany (as I also had a paper on “Shift Left” here). At chilly minus 1° Celsius in the morning, the technologies had to be pretty hot to warm me... » read more

The Challenge Of RISC-V Compliance


The open-source RISC-V instruction set architecture (ISA) continues to gain momentum, but the flexibility of RISC-V creates a problem—how do you know if a RISC-V implementation fits basic standards and can play well with other implementations so they all can run the same ecosystem? In addition, how do you ensure that ecosystem development works for all implementations and that all cores that ... » read more

Can Debug Be Tamed?


Debug consumes more time than any other aspect of the chip design and verification process, and it adds uncertainty and risk to semiconductor development because there are always lingering questions about whether enough bugs were caught in the allotted amount of time. Recent figures suggest that the problem is getting worse, too, as complexity and demand for reliability continue to rise. The... » read more

Using AI Data For Security


Artificial intelligence is migrating from the cloud to IoT edge devices. Now the question is how to apply that same technology to protect data and identify abnormal activity in those devices and the systems connected to them. This is a complex problem because AI is being used on multiple fronts in this battle, as well as for multiple purposes. The technology has advanced to the point where e... » read more

Gearing Up For 5G


5G has been touted as the new enabler for many market segments, including mobile phones, automotive, virtual reality, and IoT. But there are many questions and much speculation about when and how this new wireless standard will impact different market segments and what effect it will have on semiconductor design. With a promise of orders of magnitude improvement in communication speed an... » read more

Blockchain May Be Overkill for Most IIoT Security


Blockchain crops up in many of the pitches for security software aimed at the industrial IoT. However, IIoT project owners, chipmakers and OEMs should stick with security options that address the low-level, device- and data-centered security of the IIoT itself, rather than the effort to promote blockchain as a security option as well as an audit tool. Only about 6% of Industrial IoT (IIoT) p... » read more

← Older posts Newer posts →