Chip Industry In Rapid Transition


Wally Rhines, CEO Emeritus at Mentor, a Siemens Business, sat down with Semiconductor Engineering to talk about global economics, AI, the growing emphasis on customization, and the impact of security and higher abstraction levels. What follows are excerpts of that conversation. SE: Where do you see the biggest changes happening across the chip industry? Rhines: 2018 was a hot year for fab... » read more

Security, Scaling and Power


If anyone has doubts about the slowdown and increasing irrelevance of Moore's Law, Intel's official unveiling of its advanced packaging strategy should leave little doubt. Inertia has ended and the roadmap is being rewritten. Intel's discussion of advanced packaging is nothing new. The company has been public about its intentions for years, and started dropping hints back when Pat Gelsinger ... » read more

What Makes A Chip Design Successful Today?


"Transistors are free" was the rallying cry of the semiconductor industry during the 1990s and early 2000s. That is no longer true. The end of Dennard scaling made the simultaneous use of all the transistors troublesome, but transistors remained effectively unlimited. This led to an era where large amounts of flexibility could be built into a chip. It didn't matter if all of it was being use... » read more

Open-Source RISC-V Hardware And Security


Semiconductor Engineering sat down with Helena Handschuh, a Rambus fellow; Richard Newell, senior principal product architect at Microsemi, a Microchip Company; and Joseph Kiniry, principal scientist at Galois. What follows are excerpts of that conversation. (L-R) Joseph Kiniry, Helena Handschuh and Richard Newell. SE: Is open-source hardware more secure, or does it just open up vulnera... » read more

Smart Manufacturing


Tom Salmon, vice president of collaborative technology platforms at SEMI, talks about smart manufacturing, and the role of AI, smart gateways, and digital twins. https://youtu.be/e9DQ_Xfc2K0     See other tech talk videos here.   » read more

Building Security into the Smart Home Devices with a Hardware Root of Trust


The growth in the semiconductor industry over the past years has been driven heavily by the storage and compute needs on smartphones, computers, servers and data centers. These conventional drivers are set to change. New-age technologies like big data, artificial intelligence (AI) and the Internet of Things (IoT) will fuel the demand for the future growth in semiconductors. Not only is IoT assi... » read more

Five steps to successful threat modeling


The Internet of Things (IoT) is changing the way we interact with the world around us. Over the next few years, billions more connected devices will enable us to drive efficiency, boost productivity, and enhance comfort and convenience in our personal and professional lives. And we’re not the only ones to see the potential of this market. IoT devices are the target of increasingly sophisti... » read more

Week in Review: IoT, Security, Auto


Internet of Things DHL Supply Chain reports that it will spend $300 million to install Internet of Things sensors and collaborative robots in its North American warehouses, bringing 60% of those facilities up to automation capabilities already implemented in 85 of DHL’s 430 warehouses in North America. The company will also employ robotic process automation software and other programs to red... » read more

Dawn Of The Data-Driven Age


Autonomous vehicles, 5G, a security breach at Marriott hotels, and AI. These may seem unrelated, but they're all linked by one common thread—data. Data creation, management and processing always have been a winning business formula. In 2004, IBM sold off its PC business on the assumption that it could still achieve significant growth by managing its customers' data. The rapid buildup by co... » read more

Dodging The Next Generation Of Car Thieves


The complexity of vehicle electronics is growing and brings with it more opportunities for hackers to penetrate the car’s defenses. More connections bring in multiple network topologies, which may or may not be secure. As they are all intertwined and interconnected, any connection to get into the vehicle’s electronics is a potential point of attack for hackers. For example, jamming RFID sig... » read more

← Older posts Newer posts →