Author's Latest Posts


Secure at First Silicon: Reducing Cost and Risk


Security weaknesses related to side-channel leakage are often discovered far too late in the lifecycle of a chip. Design teams may focus on functionality, performance, and power, assuming that a robust algorithm like AES is enough to guarantee security. Only after first silicon comes back – and an expert lab starts probing power traces or EM emissions – do they realize that sensitive inform... » read more

Scale AI: Engineering the Next Leap in LPDDR6 Low-Power Memory


Scaling AI is often described as adding more GPUs and building bigger clusters, but real progress comes from system balance. As compute and throughput rise, pressure shifts to bandwidth, latency, power delivery, and thermal headroom. Memory becomes one of the earliest constraints because it sits on the critical path for feeding accelerators efficiently and consistently. In that context, JEDEC L... » read more

Electronic Warfare: Vying for Control of the Electromagnetic Spectrum


Over the past decade, preeminent countries involved in major military conflicts mainly focused on asymmetrical warfare — surprise attacks by small groups armed with modern, high-tech weaponry. During that same period, however, near-peer adversaries began attaining impressive electronic warfare (EW) capabilities. As a result, a plethora of new, dynamic threats flooded the EW spectrum, pushing ... » read more

Purpose-Built Tools for Connected Design


Modern semiconductor design is a massive, data-driven effort—often involving terabytes of files and globally distributed teams. Yet many organizations still rely on disconnected workflows and generic version control tools not designed for the scale or complexity of chip development. These fragmented systems slow innovation, reduce efficiency, and make collaboration increasingly difficult. ... » read more

The Power of Proof: Turning CMMC Compliance into Competitive Credibility


To help the U.S. Defense Industrial Base (DIB) navigate the path to Cybersecurity Maturity Model Certification (CMMC), Keysight Technologies commissioned SIS International Research to conduct an independent, multi-phase study evaluating cybersecurity readiness among contractors, subcontractors, and suppliers. The research combines a thorough review of regulatory frameworks and market structures... » read more

The Next-Generation of Circuit Simulation in RF EDA


Radio-Frequency (RF) Electronic Design Automation (EDA) is at a turning point. Historically, engineers adapted their workflows to rigid software tools, often sacrificing flexibility and efficiency. With the rise of increasingly complex, multi-domain hardware systems, these constraints are no longer sustainable. Keysight is reimagining RF simulation as a programmatically controlled, extensible p... » read more

Five Tips To Avoid Security Errors In Product Development


Riscure, now part of Keysight, has been helping chip vendors and device manufacturers improve the security of their products for years. The security scenario has changed a lot over time. The attacker profile evolved from individuals motivated by curiosity, with very limited resources and attack potential, to well-funded and organized adversaries with malicious motivations and the capacity to ex... » read more

Accelerating Semiconductor Innovation Through Machine Learning-Driven Modeling


The semiconductor industry is entering an era of unprecedented complexity, driven by advanced architectures such as Gate-All-Around (GAA) transistors, wide-bandgap materials like GaN and SiC, and heterogeneous integration strategies. Traditional physics-based modeling approaches are increasingly challenged by nonlinear effects, electro-thermal interactions, and variability across device geometr... » read more

Don’t Get Knocked Off the Curve: Fault Injection on Elliptic Curve Cryptosystems


Elliptic Curve Cryptography (ECC) is a core component in securing digital systems, widely used in applications ranging from internet communications to embedded devices. It supports key cryptographic protocols such as the Elliptic Curve Digital Signature Algorithm (ECDSA) and Elliptic Curve Diffie-Hellman (ECDH), both of which rely on the presumed difficulty of underlying mathematical problems. ... » read more

IP And Data Management: Challenges, Solutions, And Best-in-Class Approaches


As electronic design becomes increasingly complex, traditional approaches to IP and design data management are reaching their limits. Fragmented systems, inconsistent documentation, and unclear version control are slowing collaboration, increasing rework, and ultimately constraining innovation. The ability to manage design data effectively is no longer a background concern — it’s a foundati... » read more

← Older posts