Quantum computing is the next big thing for the computing world. The semiconductor industry has been talking about it for years. It’s shiny, mysterious, and capable of some incredible things. Instead of using classical bits to represent information (which can be either a 0 or a 1), quantum computers use quantum bits or qubits… Read More
Podcast EP194: The Impact of Joining TSMC’s OIP From the Perspective of Agile Analog
Dan is joined by Chris Morrison. Chris has 15 years’ experience of delivering innovative analog, digital, power management and audio solutions for international electronics. Currently he is the director of product marketing at Agile Analog, the analog IP innovators. Previously he has held engineering positions, including… Read More
Agile Analog Visit at #60DAC
Chris Morrison, Director of Product Marketing at Agile Analog met with me on the Tuesday at DAC this year, and I asked what has changed in the last year for their analog IP business. The short answer is that the company has initially built up foundation IP for Analog Mixed-Signal (AMS) uses, then recently added new IP for data conversion,… Read More
Counter-Measures for Voltage Side-Channel Attacks
Nearly every week I read in the popular press another story of a major company being hacked: Twitter, Slack, LastPass, GitHub, Uber, Medibank, Microsoft, American Airlines. What is less reported, yet still important are hardware-oriented hacking attempts at the board-level to target a specific chip, using voltage Side-Channel… Read More
CEO Interview: Barry Paterson of Agile Analog
Barry Paterson is the CEO of UK-based analog IP pioneer, Agile Analog. He has held senior leadership, engineering and product management roles at Dialog Semiconductor and Wolfson Microelectronics. He has been involved in the development of custom, mixed-signal silicon solutions for many of the leading mobile and consumer … Read More
Webinar on Protecting Against Side Channel Attacks
SoC design for security has grown and evolved over time to address numerous potential threat sources. Many countermeasures have arisen to deal with ways hackers can gain control of systems through software or hardware design flaws. The results are things like improved random number generators, secure key storage, crypto, and… Read More

