The Impact Of 5G On Silicon Design


5G, the next-generation of mobile broadband, is driving tremendous increases in data throughput for mobile applications by introducing carrier aggregation, massive MIMO, advanced modulation, and high bandwidth channels in the mmWave spectrum. However, 5G and its governing body, 3GPP, has very high expectations to expand its capabilities well beyond the mobile market, and move into many new area... » read more

Managing Device Certificates Is Becoming Harder


As the number of devices connected to the Internet balloons, certificate management is becoming more complex, more essential, and significantly harder to keep track of. There are many different certificates for many different purposes, not to mention certificates that are unique to each device. And the lifetimes of those certificates may vary, making it even tougher to keep operating certifi... » read more

Electronics Supply-Chain Trust Standards Emerge


Creative new ideas for electronics supply-chain trust are in rich supply, whether securing identity, protecting logistics, or establishing provenance. But underlying these efforts are wide-ranging standards in development from a broad set of organizations. Today, no one-stop-shop for supply-chain standards exists. Instead, there is huge fragmentation. It can be difficult to identify all of t... » read more

Guide To Application Security: What To Look For And Why


Does your organization do software development in-house? If you’d like to learn more about application security but don’t know where to start, this white paper will arm you with development and security fundamentals. Inside you'll find: Key concepts, terminology, and why DevSecOps and cloud development matters The trade-offs of different AppSec tools (e.g., SAST, DAST, IAST) and ... » read more

Blog Review: Jan. 6


In a video, Synopsys' Tim Mackey and Laurie Carr discuss the most substantial threats to today’s IoT devices and what considerations IoT manufacturers need to keep in mind as they release new products, plus the role governments should play in IoT regulation. Cadence's Paul McLellan explains the recent breach caused by a hacked update of SolarWinds' network management software and what expe... » read more

Top Tech Videos Of 2020


2020 shaped up to be a year of major upheaval, emerging markets and even increased demand in certain sectors. So it's not surprising that videos focusing on AI, balancing power and performance, designing and manufacturing at advanced nodes, advanced packaging, and automotive-related subjects were the most popular. Of the 68 videos published this year, the following were the most viewed in ea... » read more

Blog Review: Dec. 30


Cadence's Paul McLellan considers what the next ten years will look like for the RISC-V ISA with an expanding software ecosystem and increasing number of commercial and open cores available. Siemens EDA's Harry Foster checks out the languages and libraries being used to design and verify FPGAs and how they've changed over the last several years. Synopsys' Jonathan Knudsen contends that IT... » read more

Why It’s So Hard To Stop Cyber Attacks On ICs


Semiconductor Engineering sat down to discuss security risks across multiple market segments with Helena Handschuh, security technologies fellow at Rambus; Mike Borza, principal security technologist for the Solutions Group at Synopsys; Steve Carlson, director of aerospace and defense solutions at Cadence; Alric Althoff, senior hardware security engineer at Tortuga Logic; and Joe Kiniry, princi... » read more

Blog Review: Dec. 23


Cadence's Paul McLellan checks out how Arm is becoming a powerhouse in the server and high-end space with the addition of new R&D and a focus on getting the most out of its architecture. Siemens EDA's Harry Foster continues his look at verification trends in FPGAs by checking out adoption of different simulation and formal technologies. Synopsys' Taylor Armerding looks ahead to 2021 w... » read more

RISC-V Verification Challenges Spread


The RISC-V ecosystem is struggling to keep pace with rapid innovation and customization, which is increasing the amount of verification work required for each design and spreading that work out across more engineers at more companies. The historical assumption is that verification represents 60% to 80% or more of SoC project effort in terms of cost and time for a mature, mainstream processor... » read more

← Older posts Newer posts →