Ecosystem Changes


Semiconductor Engineering sat down to discuss changes in the semiconductor ecosystem with Kelvin Low, senior director of foundry marketing at [getentity id="22865" e_name="Samsung Semiconductor"]; John Costello, vice president of product planning at [getentity id="22849" e_name="Altera"]; Randy Smith, vice president of marketing at [getentity id="22605" e_name="Sonics"], and Michiel Ligthart, p... » read more

Ecosystem Changes


Semiconductor Engineering sat down to discuss changes in the semiconductor ecosystem with Kelvin Low, senior director of foundry marketing at [getentity id="22865" e_name="Samsung Semiconductor"]; John Costello, vice president of product planning at [getentity id="22849" e_name="Altera"]; Randy Smith, vice president of marketing at [getentity id="22605" e_name="Sonics"], and Michiel Ligthart, p... » read more

3 Key IoT Benchmarks


The [getkc id="76" comment="Internet of Things"] has been billed as the next huge opportunity for semiconductors—tens of billions of things connected to a centralized infrastructure, to people, and in many cases to each other. After conducting hundreds of interviews with executives, engineers and university professors from all facets of the global supply chain over the past year and reviewin... » read more

Designing For Security


Stacked die may improve performance and lower power, but the use of [getkc id="203" kc_name="through-silicon vias"] (TSVs) could add new security risks. As IC structures go, the vertical component of these chip packages is both a boon and a bust. Three-dimensional geometries allow for much less complexity in design by stacking two-dimensional dies and interconnecting them in the third dimens... » read more

DNA For Cryptography Chips


Counterfeit chips are here to stay. There are all kinds of reasons they should never be used, but certain segments of the chip market have more critical fallout from such chips than others. In most cases counterfeit chip use is unintentional. It simply goes undetected in the vast supply chain, sometimes with life-threatening repercussions. But whether in life-safety or low-end consumer produ... » read more

The People Have Spoken, The Future Is Now


Last month, I mentioned we’d be doing a webinar to assess the impact of online capabilities in the semiconductor industry. On November 12th “Semiconductors Go Online and Worldwide” was broadcast. Bill Brennan from Credo Semi, Trevor Hiatt from IDT and Mahesh Tirupattur from Analog Bits joined us to share their experiences using eSilicon’s MPW and GDSII quoting portals. I have to ... » read more

Securing The IoT


Semiconductor Engineering sat down to discuss whether the [getkc id="76" comment="Internet of Things"] will be secure enough, or whether it will create new security issues, with Sami Nassar, general manager of [getentity id="22499" comment="NXP Semiconductor"]; Oleg Logvinov, director for special assignments at [getentity id="22331" comment="STMicroelectronics"]; and Lawrence Loh, application e... » read more

Changing The IP Supplier Paradigm


Semiconductor Engineering sat down with Rich Wawrzyniak, senior market analyst for ASIC and SoC at Semico Research; John Koeter, vice president of marketing for the Solutions Group at [getentity id="22035" e_name="Synopsys"]; Mike Gianfagna, vice president of marketing for [getentity id="22242" e_name="eSilicon"]; Peter McGuinness, director of technology marketing at [getentity id="22709" e_nam... » read more

Supply Chain Corruption


The more the chip supply chain relies on third-party sources, the greater the risk for a design containing potential malicious code or functions. Today, complex and sophisticated ICs are ubiquitous in virtually every industry. They are being relied upon, as never before, to control critical infrastructure subsystems such as power, finance, communications, and transportation. In a recent r... » read more

Secure SoC Manufacturing


As mobile usage continues to permeate daily lives with increasingly sensitive data and high-value transactions, the importance of device security has become even more important. Information security begins at the point when Internet- connected devices are designed and manufactured. But today’s complex global supply chains are fraught with numerous challenges that can result in both security b... » read more

← Older posts Newer posts →