Who Is Most Likely To Link Financial And Manufacturing Data?


Experts at the Table: Semiconductor Engineering sat down to discuss which companies have the most to gain from linking financial data with manufacturing data analytics platforms with Dieter Rathei, CEO of DR Yield; Jon Holt, senior director of product management at PDF Solutions, Alex Burlak, vice president of advanced analytics and test at proteanTecs; and Dirk de Vries, technical program ma... » read more

Blog Review: May 7


Cadence’s Mayank Bhatnagar examines the challenge of ensuring the functional safety of disaggregated designs and how UCIe can serve as a certified way to connect individual components. Siemens’ Charlie Olson explores the causes of inter-domain leakage when a DC path is formed between two power rails and how to overcome the limitations of traditional electrical rule checking. Synopsys�... » read more

Three-Way Race To 3D-ICs


Intel Foundry, TSMC, and Samsung Foundry are scrambling to deliver all the foundational components of full 3D-ICs, which collectively will deliver orders of magnitude improvements in performance with minimal power sometime within the next few years. Much attention has been focused on process node advances, but a successful 3D-IC implementation is much more complex and comprehensive than just... » read more

Chip Industry Week in Review


Check out the Inside Chips podcast for our behind-the-scenes analysis of changes at Intel Foundry. Intel rolled out its updated process technology roadmap this week, along with early process design kit (PDK) for its 14A gate-all-around process technology. That node will utilize high-NA EUV, and include direct contact power delivery, the second generation of its backside power delivery techno... » read more

Functional Safety Insights For Today’s Automotive Industry


As cars have evolved into rolling computing platforms, vehicle safety now extends well beyond the traditional seat belt. While they still take us to the grocery store, they also integrate advanced technology, enabling the rapid fusion of multimodal data through edge devices such as sensors and actuators. Modern vehicles offer unprecedented safety, but they can contain between one to three th... » read more

Cyber Threats Multiply With Commercial Chiplets


The commercialization of chiplets will significantly boost the potential for attacks on hardware, requiring a much broader set of security measures and processes at every level of the supply chain, including traceability from initial design to end of life. Much progress has been made in recent years on security measures, including everything from identifying unusual data traffic inside a chi... » read more

Smarter Cars, Higher Stakes


Artificial intelligence is turbocharging automotive innovation, but it's also unleashing a tangle of high stakes risks that engineers and security experts are scrambling to contain. The push to embed AI deep into today’s vehicles is changing how cars are built, how they handle the road, and how they keep passengers safe. But as onboard intelligence expands, so do the risks. AI systems that... » read more

From Tool Agents To Flow Agents


Experts At The Table: AI is starting to impact several parts of the EDA design and verification flows, but so far these improvements are isolated to single tool or small flows provided by a single company. What is required is a digital twin of the development process itself on which AI can operate. Semiconductor Engineering sat down with a panel of experts to discuss these issues and others, in... » read more

Blog Review: Apr. 30


Cadence’s Sree Parvathy points out how electrothermal analysis can help designers understand how temperature changes affect device behavior, such as mobility, threshold voltage, and saturation to mitigate potential failures due to thermal overstress. In a podcast, Siemens’ Conor Peick, Dale Tutt, and Mike Ellow chat about the transition towards software-defined products and why companies... » read more

Security Power Requirements Are Growing


Determining how much power to budget for security in a chip design is a complex calculation. It starts with a risk assessment of the cost of a breach and the number of possible attack vectors, and whether security is active or passive. Different forms of root of trust and cryptography have different power costs. Different systems could require tradeoffs between performance and security, whic... » read more

← Older posts Newer posts →