By Pieter van der Wolf, Principal R&D Engineer, and Dmitry Zakharov, Senior Software Engineer
By Editorial Team
By Chris Clark, Senior Manager of Embedded Ecosystems
Posted in Internet of Things
Synopsys Chairman and co-CEO Aart de Geus discusses how 3DIC technology is infusing vitality into Moore’s Law, driving innovation for the semiconductor industry.
Synopsys joins DARPA’s AISS program as a chip design contractor, developing security-aware EDA tools to accelerate time to market in the chipset design process.
Attackers often take advantage of the complexity that comes with balancing greater end-user convenience with traditional security. Behind that cool and responsive interface of an IoT device is millions of lines of code and superfast processing. The weakest link is something basic — a faulty implementation of a protocol, or a lack of a trusted security zone on a chip. Exploitation, in either case, requires very little skill. Thus, a lot of the attacks today are carried out not by criminals with elite skills but those with very basic programming skills.
Cellular carriers would like to have their new 5G networks up by the end of 2018 or early 2019. One problem: they need a set of standards to create the new technology. Last weekend, tech representatives met and made significant first step for technology companies to start building out the necessary 5G chips and software.
5G holds the promise of a mobile-first experience with blazing-fast downloads and seamless streaming. 5G cellular service will be the first step. But 5G goes way beyond smartphones. It aims to transform wireless technology and deliver a new digital infrastructure for the world of connected everything. It will serve as the catalyst for mainstream adoption of autonomous vehicles, virtual reality, augmented reality, and smart cities. Some experts are lauding 5G as the next Industrial Revolution. But what exactly is 5G?
It might have been a deleted scene from one of the Ocean’s Eleven movies. Data thieves hack into a major casino. They attack not through the main but a secondary network and, once inside, bootstrap their way into other parts of the casino network until they get lucky and find a cache of sensitive data that they proceed to steal.
Women play vital roles in developing the tools that engineers around the world use to design smart chips and develop secure code for the amazing devices that are changing the way we work and play. USA Today recently featured three Synopsys engineers, who reflect on their experiences as women in tech and offer advice on carving out success in a male-dominated field.
Posted in Application Security, Artificial Intelligence, Automotive, Cryptography, EDA, Healthcare, Internet of Things, IP, Machine Learning, Malware, Optical Design, Privacy, Quantum Computing, Robotics, Security, Superconducting Electronics, TCAD