part

Draconian past and present: History is neither partial nor merciful towards anybody

A timely reminder that foundations of India’s authoritarian laws were laid right after independence, to be exploited by successive regimes




part

Vista Equity Partners to invest Rs 11,367 crore in Jio Platforms

The rise in Jio’s ARPU (average revenue per user) during Q4FY20 was lacklustre, analysts said despite the fairly sharp 14-53% hike in tariffs in early December.




part

Lockdown 3.0: More firms across sectors partially resume operations

The government had last week permitted the companies to restore their manufacturing operations in red, green and organ zones with certain riders.




part

Partly Cloudy and Windy and 42 F at White Plains - Westchester County Airport, NY


Winds are from the Northwest at 28.8 gusting to 34.5 MPH (25 gusting to 30 KT). The pressure is 1010.2 mb and the humidity is 40%. The wind chill is 31. Last Updated on May 9 2020, 11:56 am EDT.




part

Partly Cloudy and Breezy and 44 F at New York, La Guardia Airport, NY


Winds are from the Northwest at 21.9 gusting to 29.9 MPH (19 gusting to 26 KT). The pressure is 1011.0 mb and the humidity is 34%. The wind chill is 35. Last Updated on May 9 2020, 11:51 am EDT.




part

Zoetis to Participate in the 34th Annual J.P. Morgan Healthcare Conference




part

Powerful Partnerships Drive Innovation

Dr. Scott A. Brown, Vice President of External Innovation, Veterinary Medicine Research & Development at Zoetis, shares Zoetis approach to research alliances with organizations and companies across the pharmaceutical, biotechnology, agribusiness and animal health industries and describes the company’s research areas of interest.




part

~$CPIL$372150$title$textbox$Wicklow Site Acquisition Part of Wider Irish Expansion Plan - Zoetis$/CPIL$~




part

Partly Cloudy and Breezy and 42 F at Poughkeepsie, Dutchess County Airport, NY


Winds are from the West at 20.7 gusting to 34.5 MPH (18 gusting to 30 KT). The pressure is 1009.0 mb and the humidity is 41%. The wind chill is 33. Last Updated on May 9 2020, 11:53 am EDT.




part

Partly Cloudy and Breezy and 45 F at New York, Kennedy International Airport, NY


Winds are from the West at 23.0 gusting to 31.1 MPH (20 gusting to 27 KT). The pressure is 1011.3 mb and the humidity is 39%. The wind chill is 36. Last Updated on May 9 2020, 11:51 am EDT.




part

Smart lock company LockState closes $5.8M Series A to fast track sales & partnerships

Smart Lock Company LockState raised $5.8M Series A in new investment to fund its aggressive sales and marketing and partner development plan. The company previously raised $740K seed round and $1M in a round led by angel investors. The lead investor in latest round was Iron Gate Capital. Other investors include Kozo Keikaku Engineering Inc, Nelnet and Service Provider Capital.

Access Control Dashboard and WiFi Smart Locks

The company’s Wi-Fi-enabled RemoteLock is used by 1000s of Airbnb and other vacation rental hosts. It helps hosts remotely provide access to guests. Locking/unlocking codes can be generated via a host’s computer or smartphone.

RemoteLock’s prices start at $299 which is its algorithmic ResortLock. The most pricey lock by LockState is its ‘RemoteLock 7i Black WiFi Commercial Smart Lock’ which costs $479.

Another core product of LockState is its cloud-based remote access platform for internet-enabled locks. It implies users can remotely manage their (internet-enabled) locks via LockState’s cloud platform.

Unlike smartphones and watches, customers don’t look forward to upgrading their smart locks or buying one when new models are launched. Thus, smart lock companies offset this disadvantage by partnering with property management and short-term rental companies to get new customers.

LockState has partnered with vacation rental brands like Airbnb, HomeAway, and other listing partners to automate guest access.

“We are expanding our footprint and moving into a new warehouse office that is more than twice the size of our current office. We’re also staffing up our sales and marketing teams. We’ve accomplished a lot without investing heavily in marketing so we’ll support that area to keep our momentum going. We intend to expand into new business-to-business and enterprise verticals where we’re seeing the market grow. We are also dedicating budget toward development.” Nolan Mondrow, CEO of LockState in a statement released to news site Venture Beat

Igloohome a Singapore-based smart lock company also raised an investment of $4M in April this year.




part

Partly Cloudy and Breezy and 44 F at Islip, Long Island Mac Arthur Airport, NY


Winds are from the West at 24.2 gusting to 33.4 MPH (21 gusting to 29 KT). The pressure is 1009.8 mb and the humidity is 35%. The wind chill is 35. Last Updated on May 9 2020, 11:56 am EDT.




part

Fidentia Pension Fund Fraudster J Arthur Brown Part of Special COVID-19 Parole

[Daily Maverick] Pension fund fraudster, J Arthur Brown, is one of around 19,000 low-risk prison inmates set to be released as part of President Cyril Ramaphosa's Special Covid-19 parole dispensation.




part

GM: Warriors to be 'good partners' if season starts

Warriors president of basketball operations Bob Myers said his organization will be "good partners" if and when the NBA regular season resumes.




part

DAC 2015 Cadence Theater – Learn from Customers and Partners

One reason for attending the upcoming Design Automation Conference (DAC 2015) is to learn about challenges other engineers have faced, and hear about their solutions. And the best place to do that is the Cadence Theater, located at the Cadence booth (#3515). The Theater will host continuous half-hour customer and partner presentations from 10:00 am Monday, June 8, to 5:30 pm Wednesday June 4.

As of this writing, 43 presentations are scheduled. This includes 17 customer presentations, 23 partner presentations, and 3 Cadence presentations, The presentations are open to all DAC attendees and no reservations are required.

Cadence customers who will be speaking include engineers from AMD, ams, Allegro Micro, Broadcom, IBM, Netspeed, NVidia, Renesas, Socionet, and STMicroelectronics. Partner presentations will be provided by ARM, Cliosoft, Dini Group, GLOBALFOUNDRIES, Methodics, Methods2Business, National Instruments, Samsung, TowerJazz, TSMC, and X-Fab.

These informal presentations are given in an interactive setting with an opportunity for questions and answers. Audio recordings with slides will be available at the Cadence web site after DAC. To access recordings of the 2014 DAC Theater presentations, click here.

 

This Cadence DAC Theater presentation drew a large audience at DAC 2015

Here’s a listing of the currently scheduled Cadence DAC Theater presentations. The latest schedule is available at the Cadence DAC 2015 site.

Monday, June 8

 

Tuesday, June 9

 

Wednesday, June 10

 

In a Wednesday session (June 10, 10:00 am) at the theater, the Cadence Academic Network will sponsor three talks on academic/industry collaboration models. Speakers are Dr. Zhou Li, architect, Cadence; Prof. Xin Li, Carnegie-Mellon University; and Prof. Laleh Behjat, University of Calgary.

As shown above, there will be a giveaways for a set of Bose noise-cancelling headphones, an iPad Mini, and a GoPro Hero3 video camera.

See the Cadence Theater schedule for further details. And be sure to view our Multimedia Site for live blogging and photos and videos from DAC. For a complete overview of Cadence activities at DAC, see our DAC microsite.

Richard Goering

Related Blog Posts

DAC 2015: See the Latest in Semiconductor IP at “IPTalks!”

Cadence DAC 2015 and Denali Party Update

DAC 2015: Tackling Tough Design Problems Head On




part

Mediatek Deploys Perspec for SoC Verification of Low Power Management (part 3 of 3)

Here we conclude the blog series and highlight the results of Mediatek 's use of Cadence Perspec™ System Verifier for their SoC level verification. In case you missed it, Part 1 of the blog is here , and Part 2 of the blog is here . One of their key...(read more)




part

BoardSurfers: Training Insights: Placing Parts Manually Using Design for Assembly (DFA) Rules

If I talk about my life, it was much simpler when I used to live with my parents. They took good care of whatever I wanted - in fact, they still do. But now, I am living alone, and sometimes I buy...

[[ Click on the title to access the full blog on the Cadence Community site. ]]




part

Automotive Security in the World of Tomorrow - Part 1 of 2

Autonomous vehicles are coming. In a statistic from the U.S. Department of Transportation, about 37,000 people died in car accidents in the United States in 2018. Having safe, fully automatic vehicles could drastically reduce that number—but the trick is figuring out how to make an autonomous vehicle safe. Internet-enabled systems in cars are more common than ever, and it’s unlikely that the use of them will slow or stop—and while they provide many conveniences to a driver, they also represent another attack surface that a potential criminal could use to disable a vehicle while driving.

So—what’s being done to combat this? Green Hills Software is on the case, and they explained the landscape of security in automotive systems in a presentation given by Max Hinson in the Cadence Theater at DAC 2019. They have software embedded [FS1] in most parts of a car, and all the major OEMs use their tech. The challenge they’ve taken on is far from a simple one—between the sheer complexity of modern automotive computer systems, safety requirements like the ISO 26262 standard, and the cost to develop and deploy software, they’ve got their work cut out for them. It’s the complexity of the systems that represents the biggest challenge, though. The autonomous cars of the future have dynamic behaviors, cognitive networks, require security certification to at least ASIL-D, require cyber security like you’d have on an important regular computer system to cover for the internet-enabled systems—and all of this comes with a caveat: under current verification abilities, it’s not possible to test every test case for the autonomous system. You’d be looking at trillions of test cases to reach full coverage—not even the strongest emulation units can cover that today.

With regular cars, you could do testing with crash-test dummies, and ramming the car into walls at high speeds in a lab and studying the results. Today, though, that won’t cut it. Testing like that doesn’t see if a car has side-channel vulnerabilities in its infotainment system, or if it can tell the difference between a stop sign and a yield sign. While driving might seem simple enough to those of us that have been doing it for a long time, to a computer, the sheer number of variables is astounding. A regular person can easily filter what’s important and what’s not, but a machine learning system would have to learn all of that from scratch. Green Hills Software posits that it would take nine billion miles of driving for a machine learning system of today’s caliber to reach an average driver’s level—and for an autonomous car, “average” isn’t good enough. It has to be perfect.

A certifier for autonomous vehicles has a herculean task, then. And if that doesn’t sound hard enough, consider this: in modern machine-vision systems, something called the “single pixel hack” can be exploited to mess them up. Let’s say you have a stop sign, and a system designed to recognize that object as a stop sign. Randomly, you change one pixel of the image to a different color, and then check to see if the system still recognizes the stop sign. To a human, who knows that a stop sign is octagonal, red, and has “STOP” written in white block letters, a stop sign that’s half blue and maybe bent a bit out of shape is still, obviously, a stop sign—plus, we can use context clues to ascertain that sign at an intersection where there’s a white line on the pavement in front of our vehicle probably means we should stop. We can do this because we can process the factors that identify a stop sign “softly”—it’s okay if it’s not quite right; we know what it’s supposed to be. Having a computer do the same is much more difficult. What if the stop sign has graffiti on it? Will the system still recognize it as a stop sign? How big of an aberration needs to be present before the system no longer acknowledges the mostly-red, mostly-octagonal object that might at one point have had “stop” written on it as a stop sign? To us, a stop sign is a stop sign, even with one pixel changed—but change it in the right spot, and the computer might disagree.

The National Institute of Security and Technology tracks vulnerabilities along those lines in all sorts of systems; by their database, a major vulnerability is found in Linux every three days. And despite all our efforts to promote security, this isn’t a battle we’re winning right now—the number of vulnerabilities is increasing all the time.

Check back next time to see the other side: what does Green Hills Software propose we do about these problems? Read part 2 now.




part

Automotive Security in the World of Tomorrow - Part 2 of 2

If you missed the first part of this series, you can find it here.

So: what does Green Hills Software propose we do?

The issue of “solving security” is, at its core, impossible—security can never be 100% assured. What we can do is make it as difficult as possible for security holes to develop. This can be done in a couple ways; one is to make small code in small packs executed by a “safing plan”—having each individual component be easier to verify goes a long way toward ensuring the security of the system. Don’t have sensors connect directly to objects—instead have them output to the safing plan first, which can establish control and ensure that nothing can be used incorrectly or in unintended ways. Make sure individual software components are sufficiently isolated to minimize the chances of a side-channel attack being viable.

What all of these practices mean, however, is that a system needs to be architected with security in mind from the very beginning. Managers need to emphasize and reward secure development right from the planning stages, or the comprehensive approach required to ensure that a system is as secure as it can be won’t come together. When something in someone else’s software breaks, pay attention—mistakes are costly, but only one person has to make it before others can learn from it and ensure it doesn’t happen again. Experts are experts for a reason—when an independent expert tells you something in your design is not secure, don’t brush them off because the fix is expensive. This is what Green Hills Software does, and it’s how they ensure that their software is secure.

Now, where does Cadence fit into all of this? Cadence has a number of certified secure offerings a user can take advantage of when planning their new designs. The Tensilica portfolio of IP is a great way to ensure basic components of your design are foolproof. As always, the Cadence Verification Suite is great for security verification in both simulation and emulation, and JasperGold platform’s formal apps are a part of that suite as well.

We are entering a new age of autonomous technology, and with that new age we have to update our security measures to match. It’s not good enough to “patch up” security at the end—security needs to beat the forefront of a verification engineer or hardware designer’s mind at all stages of development. For a lot of applications, quite literally, lives are at stake. It’s uncharted territory out there, but with Green Hills Software and Cadence’s tools and secure IP, we can ensure the safety of tomorrow.




part

BoardSurfers: Training Insights: Placing Parts Manually Using Design for Assembly (DFA) Rules

So, what if you can figure out all that can go wrong when your product is being assembled early on? Not guess but know and correct at an early stage – not wait for the fabricator or manufacturer to send you a long report of what needs to change. That’s why Design for Assembly (DFA) rules(read more)



  • Allegro PCB Editor

part

Multiple parts for single reference designator

Variants seem to be defined as present or not present.

Is there a variant that can assign different parts to the same reference designator? i.e.  R17 can be either 0 ohm 0805 jumper or 12k ohms 0805 resistor.

The simplest way I can think of is to use two parts with the same footprint and overlay them.

Is there a more functional way of doing this?  So that the variant would put the correct part in the BOM and the parts would of course have the same identical footprint.




part

Virtuoso Meets Maxwell: Help with Electromagnetic Analysis - Part V

Here is another blog in the multi-part series that aims at providing in-depth details of electromagnetic analysis in the Virtuoso RF solution. Read to learn about the nuances of port setup for electromagnetic analysis.(read more)




part

Lockdown Part 3- રેડ, ગ્રીન અને ઓરેન્જ ઝોનમાં શું ખુલ્લું રહેશે અને શું બંધ

લૉકડાઉનને (Lockdown Part 3)4 મે થી આગામી બે સપ્તાહ સુધી વધારવાની જાહેરાત કરવામાં આવી છે. એટલે કે 17 મે સુધી લૉકડાઉન રહેશે




part

Lockdown Part 2 : બેંક અને ATM અંગે નવા નિયમો જાહેર, અહીં તપાસો

લૉકડાઉન પાર્ટ-2 : કેન્દ્ર સરકારની નવી ગાઇડલાઇન્સ પ્રમાણે ભારતીય રિઝર્વ બેંક, બેંકો, એટીએમ તેમજ વીમા કંપનીઓ પહેલાની જેમ કામ કરતા રહેશે.




part

তিন সপ্তাহে পরপর তিনটি চমক ! এবার জিও-তে ১১,৩৬৭ কোটি টাকা বিনিয়োগের ঘোষণা Vista Equity Partners-র




part

Reliance Jio-তে ১১,৩৬০ কোটি টাকা বিনিয়োগ Vista Equity Partners-র




part

How To Hack A Company By Circumventing Its WAF For Fun And Profit - Part 2






part

State Department Passport Snoop Faces Little Or No Jail Time





part

Malware Analysis Part I

Malware Analysis Part I - This guide is the first part of a series of three where we begin with setting up the very foundation of a analysis environment; the analysis station. It will give the reader a quick recap in the different phases of malware analysis along with a few examples. It will then guide the reader in how to build an analysis station optimized for these phases. Along with this, the guide also introduces a workflow that will give the reader a good kick-start in performing malware analysis on a professional basis, not only on a technical level.






part

BIND Comes Apart Thanks To Ancient Denial Of Service Vuln






part

Iranian Internet Attacked Saturday, Knocked Partially Offline




part

Passion Capital partner puts faith in London fintech scene

Passion Capital's Eileen Burbidge talks to fDi about what fintech companies should consider when expanding internationally, and why London will always be a key market in the sector.




part

Utility partners with climate experts on new carbon emission goals

Community stakeholders and climate experts from the University of Arizona are helping Tucson Electric Power to build an energy portfolio that supports reliable, affordable and increasingly sustainable service over the next 15 years.




part

Energy storage sites provide unique wholesale market participation

ENGIE Storage has announced it will supply and operate a 19 MW/38 MWh portfolio of six energy storage sites that will contribute to the Solar Massachusetts Renewable Target Program and participate in ISO-New England wholesale markets.




part

Despite criticism, solar roads remain part of Georgia sustainable highway lab

While solar roads have been criticized as impractical and inefficient, a Georgia foundation says they will continue to be part of its research lab for greener highways.




part

New report shows Baltic States ahead of western EU counterparts in renewable energy targets

Findings in a recently published European Union report showed that the Baltic States of Lithuania, Latvia, and Estonia make up over 30 percent of the EU countries that have already met their 2020 renewable energy targets.





part

Three ways utilities can partner with smart renewable cities to deliver on their objectives

Cities and renewable electricity have, respectively, become the habitat and energy of choice globally. The two are increasingly inseparable. Urbanization and electrification trends have turned cities and the grid into leading platforms for human activity, presenting unique opportunities for today’s utilities to partner with municipalities to achieve their smart city goals.




part

Anheuser-Busch partners with Recurrent Energy to meet renewable energy goals

Anheuser-Busch President and CEO Michel Doukeris wouldn't give financial details of the agreement, but says it's a smart investment




part

Utility partners with climate experts on new carbon emission goals

Community stakeholders and climate experts from the University of Arizona are helping Tucson Electric Power to build an energy portfolio that supports reliable, affordable and increasingly sustainable service over the next 15 years.




part

U.S. Department of Energy announces funding for six marine energy projects

The U.S. Department of Energy has awarded a total of $6.7 million in funding to six recipients, with the goal of developing innovative marine energy technologies "capable of generating reliable and cost-effective electricity from U.S. water resources."




part

PennWell Partners with Folds of Honor Foundation

In commemoration of Flag Day, PennWell Corp. is partnering with the Folds of Honor Foundation to raise money for military families. The effort is in conjunction with PennWell’s Wall of Honor, a traveling wall highlighting the names of our military service personnel (past and present) and displayed at all PennWell power generation events in North America. The wall displays the branch, the company and the name of each person honored.




part

New DERMS Partnership Helps Utilities Use Residential Batteries as Virtual Power Plants

This week Autogrid announced that it entered into a partnership with Swell Energy to provide software for managing Swell’s growing fleet of distributed energy resources (DER).