editor's blog archive
Subscribe Now

AMD and Other Peoples’ Technology

Today is all about acronyms: AMD, ARM, ATI, GloFo, and OPT. Haven’t heard of that last one? I just coined it, as “other peoples’ technology.” As in, AMD’s upcoming server chips won’t have a lot of AMD’s technology in them.

AMD announced today that it was becoming a full-fledged ARM licensee, with plans to make 64-bit ARM-based server chips by 2014. AMD isn’t giving up on x86; the company will offer both ARM- and x86-based server chips and let the customer decide which is better. Both flavors will include the on-chip network … Read More → "AMD and Other Peoples’ Technology"

Hardware Security in the Cloud

Some time back, we covered “physically unclonable functions,” or PUFs. These are techniques for deriving a key from the random characteristics of a specific piece of hardware, making it unique to that hardware and therefore unclonable by others. One of the companies covered was Intrinsic ID.

Intrinsic ID has now taken a step to make what is otherwise a low-level wonky technology available at the consumer and corporate level. They have created a cloud portal where data can be stored securely, … Read More → "Hardware Security in the Cloud"

featured blogs
Oct 5, 2022
This year's Jasper User Group is coming up later this month on October 19th and 20th. Once again, we are back in person (I'll be there!) on the Cadence campus. There will also be a 3-hour webinar available before the event to provide an introduction to formal techni...
Oct 4, 2022
We share 6 key advantages of cloud-based IC hardware design tools, including enhanced scalability, security, and access to AI-enabled EDA tools. The post 6 Reasons to Leverage IC Hardware Development in the Cloud appeared first on From Silicon To Software....
Sep 30, 2022
When I wrote my book 'Bebop to the Boolean Boogie,' it was certainly not my intention to lead 6-year-old boys astray....