SoCs in New Context Look beyond PPA – Part2

SoCs in New Context Look beyond PPA – Part2
by Pawan Fangaria on 05-10-2015 at 10:00 am

In the first part of this article, I talked about some of the key business aspects along with some technical aspects like system performance, functionality, and IP integration that drive the architecture of an SoC for its best optimization and realization in an economic sense. In this part, let’s dive into some more aspects that… Read More


SoC’s Shift Left Needs Software Integrity

SoC’s Shift Left Needs Software Integrity
by Pawan Fangaria on 05-05-2015 at 3:00 pm

Since Aart de Geus, co-CEO and co-founder of Synopsys, gave his keynote at the Synopsys User Group (SNUG) conference in Silicon Valley last March, I’ve been hearing a lot more about the “Shift Left” in semiconductor design. Although I couldn’t attend Synopsys’ 25[SUP]th[/SUP]SNUG, I found some short videos on the Synopsys website… Read More


Are There Trojans in Your Silicon? You Don’t Know

Are There Trojans in Your Silicon? You Don’t Know
by Paul McLellan on 04-22-2015 at 7:00 am

Yesterday was the Mentor users’ group U2U. As usual, Wally Rhines gave the keynote, this year entitled Secure Silicon, Enabler for the Internet of Things. Wally started off saying it was a challenge to find a new angle. The number of news articles on cloud computing has exploded from nothing to 72,000 last year. On IoT from … Read More


IoT Security: Your Refrigerator Attacks!

IoT Security: Your Refrigerator Attacks!
by Paul McLellan on 04-15-2015 at 7:00 am

Every time I see a presentation on IoT the forecast for the number of devices in 2020 seems to go up by a few billion. But behind the hype there are clearly going to be a large number of devices on (and even in) our bodies, our homes and cars. Not to mention in factories and workplaces. IoT devices cover a wide spectrum. Realtors like to expand… Read More


Security All Around in SoCs at DAC

Security All Around in SoCs at DAC
by Pawan Fangaria on 04-06-2015 at 12:00 am

Last month I was on my way to write a detailed article on important aspects to look at while designing an SoC. This was important in the new context of modern SoCs that go much beyond the traditional power, performance and area (PPA) requirements. I had about 12-13 parameters in my list that I couldn’t cover in one go, so I put the write-up… Read More


Mentor shows post-PC industrial device approach

Mentor shows post-PC industrial device approach
by Don Dingee on 02-18-2015 at 9:00 pm

The term “human machine interface” originated from the factory floor. In the context of HMI, machine refers not to the computer, but to a machine tool or other instrument the computer was attached to. For decades, if an HMI was needed, it was implemented on a PC or single-board computer running Microsoft Windows. Real-time processing… Read More


Secure Processor for IoT

Secure Processor for IoT
by barun on 02-16-2015 at 1:00 pm

In my last blog “Processor for IoT” I have discussed security as one of the key requirements for processor used in IoT devices. In this blog we will analyze different method of hacking and some techniques which can be used to prevent those security breaches.

One of the common ways of attack is to probe address and data … Read More


Secure Microprocessors the Andes Way

Secure Microprocessors the Andes Way
by Paul McLellan on 01-04-2015 at 7:00 am

Microprocessor vendors such as Andes have been saying for some time that security requires extensive hardware support. In particular, embedded processors in intelligent sensors inside IoT chips are now popular targets for hackers, who find it easy to change the program code and system parameters to alter the operation of the… Read More


Is the Internet of Things just a toy?

Is the Internet of Things just a toy?
by Bill Boldt on 01-03-2015 at 5:00 pm

picture1

The Internet of Things (IoT) is arguably the most hyped concept since the pre-crash dot-com euphoria. You may recall some of the phrases from back then such as “the new economy,” “new paradigm,” “get large or get lost,” “consumer-driven navigation,” “tailored web experience,” “it’s different now,” among countless other mediaRead More


What is Ambient Security?

What is Ambient Security?
by Bill Boldt on 12-17-2014 at 7:00 pm

ambient11

New technology and business buzzwords pop up constantly. Hardly a day goes by that you don’t see or hear words such as “cloud”, “IoT,” or “big data.” Let’s add one more to the list: “Ambient security.”


You’ll notice that big data, the cloud, and the IoT are all connected, literally and figuratively, and that is the point. Billions … Read More