Hardware/Software Tipping Point


It doesn't matter if you believe [getkc id="74" comment="Moore's Law"] has ended or is just slowing down. It is becoming very clear that design in the future will be significant different than it is today. Moore's law allowed the semiconductor industry to reuse design blocks from previous designs, and these were helped along by a new technology node—even if it was a sub-optimal solution. I... » read more

Focus Shifts To System Quality


For the past decade, many semiconductor industry insiders predicted that software would take over the world and hardware would become commoditized. The pendulum seems to have stopped, and if anything, it is reversing course. Initial predictions were based on several advantages for software. First, software is easier to modify and patch. Second, universities turn out far more software develop... » read more

Verification And The IoT


Semiconductor Engineering sat down to discuss what impact the IoT will have on the design cycle, with Christopher Lawless, director of external customer acceleration in [getentity id="22846" e_name="Intel"]'s Software Services Group; David Lacey, design and verification technologist at Hewlett Packard Enterprise; Jim Hogan, managing partner at Vista Ventures; Frank Schirrmeister, senior group d... » read more

Capturing The Future, Frame By Frame


A lot has changed over the past year, and more changes are on the way. Consider what's happening in API tracing. All of the functions from the Vulkan specification can be traced correctly in MGD. This means that you will be able to see exactly what Vulkan calls your application makes and in what order. You will also be able to see what threads each of these function calls occur in. Figu... » read more

Five Things You Need To Know Before Selecting An RTOS


Almost any embedded device is likely to need an operating system of some description. Making the decision to use an OS, selecting it and planning its deployment are all challenging. In this paper, we will take a detailed look at the 5 key issues facing an embedded developer, who is considering the selection of an OS: 1. Does the design need an operating system at all? Some designs might appear... » read more

Avoiding The Top 10 Software Security Design Flaws


Half of the software-related security defects that provide entry to threat agents are not found in buggy code – they are flaws embedded in software design. The IEEE Center for Secure Design brought together some of the foremost experts in software security in a working group to tackle the issue of secure software design. This whitepaper covers their findings. Find out why so many design... » read more

Maintaining Power Profiles At 10/7nm


Understanding power consumption in detail is now a must-have of electronic design at 10nm and below, putting more pressure on SoC verification to ensure a device not only works, but meets the power budget. As part of this, the complete system must be run in a realistic manner — at the system-level — when the design and verification teams are looking at the effects of power during hardwar... » read more

Autonomous Cars Drive New Software


Autonomous driving and other advanced features will require much more sophisticated software than what is used in vehicles today. To make this all work will require complex algorithms as well as co-designed hardware, which can make real-time decisions to avoid accidents and adjust to changing road conditions. Automobiles already take advantage of sophisticated software executed by a variety ... » read more

Building Secure Software At Enterprise Scale


The cost of finding and remediating a software defect reduces dramatically the earlier it is found in the development life cycle. This is not new news. What is new news is an approach that builds security into the development process in a way that is easy for developers to adopt, without slowing down their workflow. Download the paper to learn how you can: Prevent common bugs and flaw... » read more

Testing For Security


Ever since the IoT became a household name, people have been strategizing about ways to utilize non-secure devices to mount an attack. The first instances of using electricity to overload a device's circuits, thereby neutralizing existing security features, came to light in some of the earliest car hacking incidents. These are basically side-channel attacks using what amounts to an electroni... » read more

← Older posts