You are currently viewing SemiWiki as a guest which gives you limited access to the site. To view blog comments and experience other SemiWiki features you must be a registered member. Registration is fast, simple, and absolutely free so please, join our community today!

  • Semiconductor Experts (Front Page) RSS Feed

    by Published on 05-18-2018 10:00 AM
    1. Categories:
    2. Semiconductor Design,
    3. Silvaco,
    4. FinFET
    Want to learn 20 nm layout techniques!-c2ed9603-b346-4edc-ad93-f772e6f28d29.jpg

    It was 1988 when I got into SPICE (Simulation Program with Integrated Circuit Emphasis) while I was characterizing a 1.5 μm Standard cell library developed by students at my Alma-Mata Furtwangen University in Germany. My professor Dr. Nielinger was not only my advisor he also wrote the first SPICE bible in German language. At that time SPICE simulation was already established as the “golden” Simulator for circuit design for over a decade - and remains so to this day.
    by Published on 05-18-2018 05:00 AM
    1. Categories:
    2. Semiconductor Services,
    3. Semiconductor Advisors
    Article: The First 14nm FinFET Wafer Sighting!-trump-china.jpg

    We have been watching the ZTE saga play out on the public stage as we think it is an extremely important leading example of how the administration will truly act. As we all know, actions speak louder than words, and in the case of ZTE our words said one thing and our actions said something else. We need to analyze what the actions really mean about trade issues that impact technology and China as ZTE was perhaps both the first real test as well as the poster child for China trade issues.
    by Published on 05-16-2018 10:00 AM
    1. Categories:
    2. Security
    Article: IC Design at Analog Bits-5-ways-gain-advantage-over-cyber-attackers.jpg

    Asymmetric attacks, like those in cybersecurity, benefit the aggressor by maintaining the 'combat initiative'. That is, they determine who is targeted, how, when, and where attacks occur. Defenders are largely relegated to preparing and responding to the attacker’s tempo and actions. This is a huge advantage.

    Awakening Business
    The business world is beginning to ...
    by Published on 05-14-2018 05:00 AM
    1. Categories:
    2. Semiconductor Design
    Article: IC Design at Analog Bits-tutorial_same2005.jpg

    I moved from real layout work to management so I had little or no “hands-on” layout in my responsibility but I was very close to my team challenges in all 5 locations. During my 13 years in PMC Sierra I was involved in many initiatives some technical and some in developing relations with vendors. The biggest difference was that MOSAID was eager to get media coverage ...
    by Published on 05-13-2018 05:00 AM
    1. Categories:
    2. Automotive
    Article: Reducing Dynamic and Static Power in Memories-balkanize-automotive-safety.jpg

    The Wall Street Journal reported, last week, that auto makers are lining up on opposite sides of the talking cars debate. Some car makers – General Motors, Toyota and Volkswagen – are pushing Wi-Fi-based dedicated short range communication technology (DSRC) while others – Ford, Audi and BMW – are emphasizing 5G for the same application.

    "5G Race Pits ...
    by Published on 05-07-2018 05:00 AM
    1. Categories:
    2. General
    Article: The First 14nm FinFET Wafer Sighting!-steal-ip-silicon-valley.jpg

    In a videoconference hosted by Indian startup media publication Inc42, I gave entrepreneurs some advice that startled them. I said that instead of trying to invent new things, they should copy and steal all the ideas they can from China, Silicon ...
    by Published on 04-22-2018 10:00 AM
    Article: TSMC Apple Rumors Debunked!-digital-media-forgery.jpg

    Technology is reaching a point where it can nearly create fake video and audio content in real-time from handheld devices like smartphones.

    In the near future, you will be able to Facetime someone and have a real-time conversation with more than just bunny ears or some other cartoon overlay. Imagine appearing as a person ...
    by Published on 04-22-2018 05:00 AM
    1. Categories:
    2. General
    Article: Online Schematic Capture and SPICE Circuit Simulation-maybe-time-deletewhatsapp.jpg

    WhatsApp differentiates itself from Facebook by touting its privacy and end-to-end encryption. “Some of your most personal moments are shared with WhatsApp", it says, so “your messages, photos, videos, voice messages, documents, and calls are secured from falling into the wrong hands”. A WhatsApp founder ...
    by Published on 04-19-2018 10:00 AM
    1. Categories:
    2. Security

    It has taken the U.S. 16 years to enact Data Breach laws in each state. California led the way, with the first, in 2002 to protect its citizens. Last in line was Alabama, which just signed their law in March 2018. There is no overarching consistent data breach law at the federal level. It is all handled ...
    by Published on 04-19-2018 05:00 AM
    1. Categories:
    2. Semiconductor Services,
    3. Oski Technology
    Article: TSMC Apple Rumors Debunked!-spectre-meltdown-min.jpg

    Once again Oski delivered in their most recent Decoding Formal session, kicking off with a talk on the infamous Meltdown and Spectre bugs and possible relevance of formal methods in finding these and related problems. So far I haven’t invested much effort in understanding these ...

    Page 2 of 11 1 2 3 4 5 6 7 8