Which Fuel Will Drive Next-Generation Autos?


With gasoline prices hitting uncomfortable highs, consumers increasingly are looking toward non-gasoline-powered vehicles. But what ultimately will power those vehicles is far from clear. Inside the cabin and under the hood, these vehicles will be filled with semiconductors. Yet what the energy source is for those semiconductors is the subject of ongoing debate. It could be batteries, hydrog... » read more

Safeguarding A Digital Transformation Across The Entire Product Lifecycle


In 2020, the SolarWinds breach highlighted the emergence of software supply chain attacks as a very real security threat that impacted many high-profile companies. (The software supply chain includes third-party and open-source components used in a software product.) Then in late 2021, not to be outdone, the massive scope of the Log4j vulnerability emerged, impacting millions of consumer produc... » read more

Responding To The Rapid Advancement Of Cockpit Domain Controllers


Every aspect of a modern vehicle’s performance is controlled by a complex network of hardware and software. Nowhere is this more apparent than the interface between the driver and the machine, in what is known as the cockpit domain. In order to succeed in this domain of fast-paced advancement, today’s OEM needs to understand the trends in this arena, the current challenges and solutions, an... » read more

Blog Review: July 6


Synopsys' Mike Gianfagna looks at how the data center paradigm has shifted in the last ten years with an exponential increase in the amount of data demanding new approaches to storage that rely on distributed networks. Cadence's Frank Schirrmeister explains multidisciplinary design analysis and optimization, or MDAO, and how it is being combined with machine learning models to enhance classi... » read more

Risks Rise As Robotic Surgery Goes Mainstream


As robotic-assisted surgery moves into the mainstream, so do concerns about security breaches, latency, and system performance. In the operating room, every second is critical, and technology failures or delays can be life-threatening. Robotic-assisted surgery (RAS) has around for a couple decades, but it is becoming more prevalent and significantly more complex. The technology often include... » read more

Who Does Processor Validation?


Defining what a processor is, and what it is supposed to do, is not always as easy as it sounds. In fact, companies are struggling with the implications of hundreds of heterogenous processing elements crammed into a single chip or package. Companies have extensive verification methodologies, but not for validation. Verification is a process of ensuring that an implementation matches a specif... » read more

Why Hardware-Dependent Software Is So Critical


Hardware and software are two sides of the same coin, but they often live in different worlds. In the past, hardware and software rarely were designed together, and many companies and products failed because the total solution was unable to deliver. The big question is whether the industry has learned anything since then. At the very least, there is widespread recognition that hardware-depen... » read more

High-Performance 5G IC Designs Need High-Performance Parasitic Extraction


By Karen Chow and Salma Ahmed Elhenedy We are rapidly approaching a future where 5G telecommunications will be the norm. With its increased data speeds and bandwidth, 5G has the potential to change the way we live our lives. But what does that mean for the average person? Think about cellphones, for one. You don't just use your phone for calling or texting anymore—you surf the web, chec... » read more

Enhance IC Reliability Design Verification With Coordinate-Based P2P And CD Checking


Coordinate-based P2P and CD checks with the Calibre PERC reliability platform enable quick early-stage design verification of ESD protection and other IC reliability issues. Using coordinate-based checking minimizes the amount of rule deck coding required, enabling design teams to start Calibre PERC P2P/CD verification very quickly, and understand and debug the results easily. Because P2P/CD ch... » read more

Power Domain Implementation Challenges Escalate


The number power domains is rising as chip architects build finer-grained control into chips and systems, adding significantly to the complexity of the overall design effort. Different power domains are an essential ingredient in partitioning of different functions. This approach allows different chips in a package, and different blocks in an SoC, to continue running with just enough power t... » read more

← Older posts Newer posts →