Maintaining Power Profiles At 10/7nm


Understanding power consumption in detail is now a must-have of electronic design at 10nm and below, putting more pressure on SoC verification to ensure a device not only works, but meets the power budget. As part of this, the complete system must be run in a realistic manner — at the system-level — when the design and verification teams are looking at the effects of power during hardwar... » read more

Autonomous Cars Drive New Software


Autonomous driving and other advanced features will require much more sophisticated software than what is used in vehicles today. To make this all work will require complex algorithms as well as co-designed hardware, which can make real-time decisions to avoid accidents and adjust to changing road conditions. Automobiles already take advantage of sophisticated software executed by a variety ... » read more

Building Secure Software At Enterprise Scale


The cost of finding and remediating a software defect reduces dramatically the earlier it is found in the development life cycle. This is not new news. What is new news is an approach that builds security into the development process in a way that is easy for developers to adopt, without slowing down their workflow. Download the paper to learn how you can: Prevent common bugs and flaw... » read more

Testing For Security


Ever since the IoT became a household name, people have been strategizing about ways to utilize non-secure devices to mount an attack. The first instances of using electricity to overload a device's circuits, thereby neutralizing existing security features, came to light in some of the earliest car hacking incidents. These are basically side-channel attacks using what amounts to an electroni... » read more

Software Modeling And KPI


In Software Modeling Goes Mainstream, Ed Sperling recently wrote how chipmakers are applying use case modeling techniques to better understand the interactions between software and hardware and how they impact system performance and energy efficiency. As the software content for multicore SoCs grows, these interactions are becoming increasingly complex. For system designers and SoC architect... » read more

Custom Hardware Thriving


In the early days of the IoT, predictions about the commoditization of hardware and the end of customized hardware were everywhere. Several years later, those predictions are being proven wrong. Off-the-shelf components have not replaced customized hardware, and software has not dictated all designs. In fact, in many cases the exact opposite has happened. And where software does play an elev... » read more

What Does AI Really Mean?


Seth Neiman, chairman of eSilicon, founder of Brocade Communications, and a board member and investor in a number of startups, sat down with Semiconductor Engineering to talk about advances in AI, what's changing, and how it ultimately could change our lives. What follows are excerpts of that conversation. SE: How far has AI progressed? Neiman: We’ve been working with AI since the mid 1... » read more

Connected Car Driving Change In Defect Detection


Automotive product design is rapidly evolving and the magnitude and pace of change facing engineering organizations is challenging incumbent processes and resources, especially in the area of software design. While connected cars are not new, the frequency and depth to which the industry is embracing this dynamic is accelerating. Software has emerged as a primary vehicle for innovation and diff... » read more

Logic Analyzers Never Die


Logic analyzers, long a mainstay of chip design, are finding new demand for IoT devices—and frequently in different forms than in the past. Once associated with big, bulky benchtop instruments, this technology has evolved significantly over the past 40 years. In some cases it has been moved into software, where the measurement results are more likely to be viewed upon a laptop screen or a ... » read more

Uncovering Unintended Behavior


Very few companies ever had to worry about security until recently. Over the past couple of years, we have seen increasing evidence that our connected systems are vulnerable. The recent distributed denial of service (DDoS) attack, which made many Internet sites unavailable, has focused attention on Internet of Things (IoT) devices such as digital video recorders and cameras that have Internet a... » read more

← Older posts