时间：2021-06-14 01:40:15 来源：网络整理编辑：GEDORE Tools, Inc.
Su Weimin, Chairman of the ZigBee Member Group China
Su Weimin, Chairman of the ZigBee Member Group China
Mentor CEO Wally Rhines — who has long advocated diversification among the Big Three — considers the trend encouraging. I think EDA has had the problem that too much time is spent focusing on taking market share from each other and too little time on figuring out ways to create new value for our customers,” Rhines said in a recent interview with EE Times.
According to Laurie Balch, research director at Pedestal Research, each of the Big Three are staking out very different strategies for where they see themselves in the overall technology tools space beyond traditional EDA. I think they all have a different vision, but they are all bolstering their position in EDA by pursuing the various paths they are taking,” Balch told EE Times.
After remaining relatively stagnant for much of the 2000s, the EDA market has now grown for nine consecutive years through 2018. Most recently, the market grew by 3.7% last year, according to the Electronic System Design (ESD) Alliance.
But the market contracted on a quarterly basis in the fourth quarter after 11 straight quarters of growth, leading many to speculate that EDA may be headed for a downturn in light of darkening conditions in the semiconductor industry. EDA revenue fell 3.1% to $2.57 billion in the fourth quarter, according to the ESD Alliance. Meanwhile, most major forecasters are now projecting that semiconductor sales will be down for 2019.
While the immediate future for EDA may be clouded, most in the industry — including both Rhines and Balch — still believe that the future is bright, particularly given the prospects for advanced AI chips, the increasing semiconductor content in cars, and moves by big OEMs to design more of their own custom chips.
Still, the EDA market of the future is likely to look very different than it does today. Diversification of the Big Three ties into the fact that no one really knows exactly what the next era of EDA is going to look like,” said Balch.
Many — including Balch — see the future being defined by system design. Rather than offering tools that focus on one component of a system — be it just the hardware, or just the chip, or just a board — tool vendors must offer the capability to actually understand the full system, including mechanical components and software, she said. It’s a very complex problem with lots of other stakeholders involved in the design process.”
All three of these vendors are dipping their toes in the water in slightly different ways,” she added. I don’t think anyone knows exactly what the winning solution will be. It’s probably some combination of all of the things that the three players are doing, but they are all moving in interesting and useful directions.”
Image by VIN JD from Pixabay
Increasingly, cyber criminals are focusing lower on the enterprise stack with advanced persistent threats using rootkits and other means to compromise low-level components such as hypervisors, boot drivers, BIOS, firmware, and even hardware. From cryptojacking to malicious actors with insider access, IT can’t simply ‘bolt on’ security features,” Adam Miller, director, New Initiatives, Lockheed Martin Missiles and Fire Control told EETimes. To improve security in the data center, IT needs to start at the processor foundation, take a holistic view of the organization’s risks, and establish controls, not just deploy random products.”
With the changing threat landscape in mind, the two companies collaborated to create a solution that combines hardware, software and firmware. With this new solution, Intel and Lockheed Martin are delivering a hardened virtualization platform for enhanced data center security, featuring improved confidentiality via virtual machine encryption and isolation,” Miller said. Intel’s integrated approach combines hardware security and encryption acceleration with software optimizations and enabling solutions. This lays a secure foundation for data throughout its lifecycle: at rest, in flight, and in use.”
Image courtesy: Intel
The Intel Select Solution for Hardened Security with Lockheed Martin is available on second Generation IntelXeon Scalable processors. Intel’s RDT, Boot Guard, and AES-NI technologies, which are in Xeon 2nd Gen processor combined with Lockheed Martin’s hardened hypervisor and runtime security, increases virtual machine integrity at every level,” said Miller.
SSM-105-L-DH-LC_Datasheet PDF2021-06-14 01:35
P51-200-A-AD-MD-5V-000-000_Datasheet PDF2021-06-14 01:21
221539-7_Datasheet PDF2021-06-14 01:01
BCS-111-L-D-DE-002_Datasheet PDF2021-06-14 00:50
BQ27520EVM_Datasheet PDF2021-06-14 00:38
803-87-040-10-003101_Datasheet PDF2021-06-14 00:25
P51-1000-S-AA-P-20MA-000-000_Datasheet PDF2021-06-14 00:16
LM4125AIM5-2.5_Datasheet PDF2021-06-14 00:15
ESQ-115-34-T-S-LL_Datasheet PDF2021-06-14 00:04
66953-004LF_Datasheet PDF2021-06-13 23:37
resistive position sensor2021-06-14 01:38
MMS-107-02-SM-DV-A-M-TR_Datasheet PDF2021-06-14 00:43
functions of transistor2021-06-14 00:01
315-87-152-41-001101_Datasheet PDF2021-06-13 23:52
jinkai hand crimper2021-06-13 23:38
CLT-110-02-L-D-P_Datasheet PDF2021-06-13 23:35
centrifugal switches2021-06-13 23:00
ESQT-111-02-F-D-315_Datasheet PDF2021-06-13 22:58
strain gauge pressure sensors2021-06-13 22:57
CLP-122-02-F-D-A_Datasheet PDF2021-06-13 22:54