Counterfeit chips are large and growing problem putting both civilian and military supply chains at risk. Estimates of the size of the counterfeit market run to $75B and more. With electronics at the heart of so many of the products we depend upon, the risks of counterfeit semiconductors range from inconvenience to loss of property and life.
Webinars
2.5D/3D Packaging Solutions for AI and HPC (Chinese)
For AI and HPC applications, HBM2E memory can deliver excellent bandwidth, capacity and latency in a very compact footprint thanks to its 2.5D/3D structure. The flipside is that this same structure leads to greater design complexity and raises a new set of implementation considerations.
5G and AI Raise Security Risks for IoT Devices
5G represents a revolution in mobile technology with performance that will rival that of wireline networks. 5G’s Ultra-reliable Low Latency Communication (uRLLC) links will enable a profusion of artificial intelligence (AI)-powered IoT devices from delivery drones to smart cities. The rapid rise in the number of smart IoT devices, coupled with expanded connectivity, will greatly escalate the growth of data and network traffic.
2.5D/3D Packaging Solutions for AI and HPC
For AI and HPC applications, HBM2E memory can deliver excellent bandwidth, capacity and latency in a very compact footprint thanks to its 2.5D/3D structure. The flipside is that this same structure leads to greater design complexity and raises a new set of implementation considerations.
Implementing Strong Security for AI/ML Accelerators [Part One]
Dedicated accelerator hardware for artificial intelligence and machine learning algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle important data which has value and must be protected. Many security threats exist that can compromise these assets. Fortunately, there are security techniques which can mitigate these threats.
Implementing Strong Security for AI/ML Accelerators [Part Two]
Dedicated accelerator hardware for artificial intelligence and machine learning algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle important data which has value and must be protected. Many security threats exist that can compromise these assets. Fortunately, there are security techniques which can mitigate these threats.
