Ensuring A 5G Design Is Viable


Ron Squiers, network solutions specialist at Mentor, a Siemens Business, explains what’s different in 5G chips versus 4G, how to construct a front haul and back haul system so it is testable in the network stack. » read more

The Automation Of AI


Semiconductor Engineering sat down to discuss the role that EDA has in automating artificial intelligence and machine learning with Doug Letcher, president and CEO of Metrics; Daniel Hansson, CEO of Verifyter; Harry Foster, chief scientist verification for Mentor, a Siemens Business; Larry Melling, product management director for Cadence; Manish Pandey, Synopsys fellow; and Raik Brinkmann, CEO ... » read more

Arm Enterprise Virtualization With Arm System IP, Backplane Integration And Performance


Virtualization has become ubiquitous across the infrastructure market, increasing efficiency and security, boosting productivity and reducing operating costs. However, system performance remains crucial to ensuring a virtualized environment does not affect the end user’s experience. Performance within this environment depends on a number of factors such as transaction bandwidth, latencies an... » read more

Carriers Push Datacenter-Style Virtualization


The world’s largest telco carriers are leading a broad movement to bring data center-style virtualization to the core of their telecommunications networks. In an industry known for being extremely conservative when it comes to change, this one appears to be significant. The move has set off a scramble among a number of companies for unified control and forwarding plane designs, starting fr... » read more

Real-Time Virtualization – How Hard Can It Be?


What’s the first association you make when you hear of virtualization? Server farms? ‘The cloud’? Most people don’t think of embedded systems - never mind hard real-time - yet these are areas where virtualization is now becoming commonplace. Markets such as industrial, automotive and medical—many of which also have requirements around functional safety for products like car braking... » read more

Side-Channel Attacks Make Devices Vulnerable


As the world begins to take security more seriously, it becomes evident that a device is only as secure as its weakest component. No device can be made secure by protecting against a single kind of attack. Hypervisors add a layer of separation between tasks making sure that one task cannot steal secrets from another. Protection of the JTAG port is necessary to prevent access underneath the h... » read more

Simplifying Software Separation With Real-Time Virtualization


Electronic systems are becoming more complex across multiple markets including automotive, industrial control and healthcare. Vehicles are beginning to drive themselves, industrial robots are becoming increasingly collaborative, and medical systems are automated to assist with surgery or deliver medication. This trend is not a new phenomenon. What was a high-end capability in the last generatio... » read more

Hypervisors: Help Or Hindrance?


Hypervisors are seeing an increased level of adoption, but do they help or hinder the development and verification process? The answer may depend on your perspective. In the hardware world, system-level integration is rapidly becoming a roadblock in the development process. While each of the pieces may be known to work separately, as soon as they are put together, the interactions between th... » read more

Embedded Evolution


The design of embedded systems has changed drastically from the days when I was directly involved with them. My first job after leaving college was to design aircraft control systems. I had the dubious honor to be working on the first civilian fly-by-wire aircraft – the Airbus A310. The reason I say dubious is that we had so many eyes trained on us, and that system contained so much redundanc... » read more

Will Hypervisors Protect Us?


Another day, another car hacked and another report of a data breach. The lack of security built into electronic systems has made them a playground for the criminal world, and the industry must start becoming more responsive by adding increasingly sophisticated layers of protection. In this, the first of a two-part series, Semiconductor Engineering examines how hypervisors are entering the embed... » read more

← Older posts