Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

Blog Review: Dec. 12

0
0

Mentor’s Harry Foster checks out how much time and effort is spent on verification of FPGAs and points to the increasing demand for verification engineers.

Cadence’s Paul McLellan digs into IC Insights’ year-end report to see how some of the top semiconductor companies stack up.

Synopsys’ Taylor Armerding warns that air gaps, a valuable barrier against cyberattacks, are disappearing from industrial control systems and considers what that means for the global shipping industry.

UltraSoC’s Gadge Panesar looks at using RISC-V alongside Arm cores and argues for heterogeneous architectural and modeling exploration systems and the importance of open APIs.

GlobalFoundries’ Dave Lammers checks out the effort to come up with new, less power-hungry devices for neuromorphic computing and why advanced packaging will play a key role.

PDF Solutions’ Dave Huntley contends that traceability throughout the supply chain, even for component parts, is necessary for security and anti-counterfeiting with the introduction of a proposed new standard for a common traceability scheme.

A Rambus writer takes a look at the differences between GDDR6 and HBM2 and how that impacts system design.

Arm’s Jason Andrews provides a walkthrough of how to set up Arm’s Development Studio and connect to a custom Fast Model simulation for early software debugging.

ANSYS’ Shawn Wasserman points out a new design for offshore wind turbines that could be cheaper to deploy and easier to install and maintain than traditional designs.

And don’t miss the blogs featured in the latest IoT, Security & Automotive and Packaging, Test & Materials newsletters:

Editor In ChiefEd Sperling contends that making sense of technology directions requires a different starting point.

Mentor’sAndrew Macleod explains why autonomous vehicles shouldn’t be considered in isolation.

Synopsys’Mike Borza shows how a hardware Root of Trust can thwart attacks on ever more complex vehicles.

Achronix’sAlok Sanghavi looks at why processing data from multiple cameras in real time is a challenge for surround-view systems.

Flex Logix’sGeoff Tate examines how to beat latency in neural networks while retaining high hardware utilization.

Marvell’sSree Durbha zeroes in on why pushing intelligence into everyday things means demand for low power, cost-sensitive designs.

Editor in ChiefEd Sperling finds the normally quiet test segment is suddenly boiling over with challenges.

Advantest’sJudy Davies examines the good and bad of using technology to modify what we eat.

Rambus’Nisha Amthul points out the best practices for protecting personal assets from cyber criminals.

Arm’sSuresh Marisetty explains how to build a security plan and put it into action.


Viewing all articles
Browse latest Browse all 12749