UFS 4.0 Explained: How the Latest Flash Storage Standard Propels Our 5G World
We explain the UFS 4.0 specification for flash storage and explore how data transfer rates up to 5800 MBps enhance smartphones, vehicles, AR/VR, and beyond.
We explain the UFS 4.0 specification for flash storage and explore how data transfer rates up to 5800 MBps enhance smartphones, vehicles, AR/VR, and beyond.
We explain how the MACsec protocol works as one of the fundamentals of network security, ensuring Ethernet interface security for automotive, HPC and beyond.
Learn how to design security into high-bandwidth DDR memory interfaces and protect DRAM devices & data from memory-scraping attacks like Rowhammer & RAMbleed.
Posted in Internet of Things, IP, Security
Part of the PCIe 6.0 specification, learn how the TEE Device Interface Security Protocol (TDISP) secures I/O virtualization & enables secure key exchange.
Explore quantum computing’s impact on cryptography and learn how to prepare SoC designs for post-quantum computing and evolving cryptographic standards.
Posted in Application Security, Cryptography, IP, Quantum Computing, Security
Learn how analog and mixed-signal (AMS) verification technology, which we developed as part of DARPA’s POSH and ERI programs, emulates analog designs.
Posted in Aerospace and Government, Application Security, Security, Verification
We share 4 strategies for protecting advanced SoCs & chip designs, including chip design tools embedded with security standards & third-party certifications.
Posted in Aerospace and Government, Security
We explore security for SoC interfaces and share how SoC design can enhance data security by protecting devices through authentication and encryption.
Learn how AI-powered cameras and neural network image processing enable everything from smartphone portraits to machine vision and automotive safety features.
Posted in Artificial Intelligence, Automotive, Internet of Things, IP, Robotics, Security
We explore the importance of cloud security in cloud-based chip design and verification, and unpack the key pillars of security in our cloud EDA tools.
Posted in Cloud, EDA, IP, Security, Verification