Car Becomes A Living Platform


Future generations of vehicles will age like any other electronic or mechanical devices, but they also will need to adapt, grow, and change in unexpected ways over time to avoid being hacked, rendered obsolete, or otherwise compromised. This adds a whole new set of challenges never seen before in automotive development, and OEMs are working feverishly to bring system architectures up to ... » read more

The Right Kind Of Fun


A couple of weeks ago I went to see “Together Again At Last…For The Very First Time” by John Cleese and Eric Idle at the Center for the Performing Arts in San Jose. I hope all of you recognize both gentlemen as two members of Monty Python. As you can imagine, it was quite an exciting night. With the audience being Monty Python fanatics, every video clip or skit was received with a lot ... » read more

Optimizing Multiple IoT Layers


As the number of connected devices rises, so do questions about how to optimize them for target markets, how to ensure they play nicely together, and how to bring them to market quickly and inexpensively. [getkc id="76" kc_name="IoT"] is broad term that encompasses a lot of disparate pieces for devices, systems, and connected systems. At the highest levels are hardware and software, but with... » read more

Accelerating DO-254 Approval


This white paper explores software tools as they relate to meeting the DO-254 Design Assurance Guidance for Airborne Electronic Hardware specifications, and what steps must be performed in order to use your typical design automation tools such as simulation, synthesis, etc. In this paper, we will explore how DO-254 views tools, learn which tools receive the highest scrutiny and why, and how to ... » read more

From Specification To Virtual Prototype


Differentiation and success for any embedded system comes from how effectively and rapidly new software features can be added. System and semiconductor manufacturers that historically aimed only at being effective at developing hardware have found themselves less competitive in the fierce battle for volume sockets in the mobile, consumer or automotive domains. The secret for success comes in mi... » read more

The Limits Of Parallelism


Parallelism used to be the domain of supercomputers working on weather simulations or plutonium decay. It is now part of the architecture of most SoCs. But just how efficient, effective and widespread has parallelism really become? There is no simple answer to that question. Even for a dual-core implementation of a processor on a chip, results can vary greatly by software application, operat... » read more

Oscilloscopes: The EE’s Stethoscope


Oscilloscopes are like the electricity to your house. You don't give it much thought until a storm knocks it out. The entire electronics industry can't function without oscilloscopes. But this equipment is such a constant and so consistent, we sometimes forget it's there. Semiconductor Engineering spent time with three Test & Measurement (T&M) industry stalwarts to talk about Oscillo... » read more

Toward Real-World Power Analysis


The expansion of emulation into new fields, rather than just functional verification, is making it possible to do power analysis over longer spans of time. The result is a fast and effective way to analyze real-world scenarios. This is a new field, and it marks a new use of this technology. While it is still evolving, several ideas have surfaced about the best methodology and the best way to... » read more

What’s Next For IoT Security?


By Ed Sperling & Jeff Dorsch With security, the little things can cause as much of a problem as the big things. As shown in the recent distributed denial of service attack (DDoS) on Dyn, which created waves of attacks using Mirai malware, connected devices of all sizes can be amassed into an army of bots that can bring even giants like Amazon and Netflix to a dead stop. This attack was ... » read more

Is Security All Talk?


Security is the No. 1 recurring theme at conferences these days. And given the explosion in the number of conferences this year—up to a half dozen some weeks just in Silicon Valley—that's a lot of attention being showered on security. At nearly all of these talks, there is at least a mention about recent breaches, pervasive and persistent risks, and the growing threat level. The topic of... » read more

← Older posts Newer posts →