Please turn JavaScript on
header-image

Semiconductor Engineering

Follow Semiconductor Engineering's news and updates in a matter of seconds! We will deliver any update via email, phone or you can read them from here on the site on your own news page.

You can even combine different feeds with the feed for Semiconductor Engineering.

Subscribing and unsubscribing is fast, easy and risk free.

The whole service is free of cost.

Semiconductor Engineering: Semiconductor Engineering - Deep Insights For Chip Engineers

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  3.83 / day

Message History

Multi-die assemblies coupled with leading-edge process nodes make signoff increasingly challenging and scary. There are more corner cases and more data to consider, but no slack in the delivery schedule. Marc Heyberger, product engineer group director at Cadence Design Systems, talks about full-chip timing, flat versus hierarchical timing analysis, the ongoing development of ...


Read full story
Computational electron microscopy

Researchers from Cornell University, TSMC, and ASM used electron ptychography for atomic-scale defect inspection of transistors.

The computational imaging method uses an extremel...


Read full story

New technical papers recently added to Semiconductor Engineering’s library:

AutoGNN: End-to-End Hardware-Driven Graph Preprocessing for Enhanced GNN Performance

Read full story

In the 1980s, a common expression was “nobody ever got fired for buying IBM.” It was considered the safe option, long after new technologies had emerged. While it may not have been the most advanced option available, it remained the safe bet. It had an established ecosystem, and it was a known quantity.

But who or what is the safe bet when it comes to AI? Who has the n...


Read full story

Researchers from Imperial College London and Bytedance released “Systems-Level Attack Surface of Edge Agent Deployments on IoT”.

Abstract “Edge deployment of LLM agents on IoT hardware introduces attack surfaces absent from cloud-hosted orchestration. We present an empirical security analysis of three architectures (cl...


Read full story