#chetanpatil – Chetan Arvind Patil

Author name: By Chetan Arvind Patil

Semiconductor Fabrication

Photo by Mathew Schwartz on Unsplash. Samsung’s technical blog has series of articles on semiconductor fabrication. It covers majors steps from tape out to packaging. All nine parts of the series are not linked together, so I thought of creating a list that may help those interested in learning about semiconductor manufacturing. All the images below are from respective part of the series linked in the title. Part 1: Creating the Wafer Part 2: The Oxidation Process Part 3: The Integrated Circuit Part 4: Drawing Structures in Nano-Scale Part 5: Etching A Circuit Pattern Part 6: The Addition of Electrical Properties Part 7: The Metal Interconnect Part 8: Electrical Die Sorting (EDS) Part 9: Packaging and Package Testing

Semiconductor Fabrication Read More »

Building A World Around Passwords

Photo by CMDR Shane on Unsplash Microsoft has massive plans to let user access its services without having the need to use passwords. In the latest preview build of Windows 10 they have taken giant step towards doing so. As internet user and usage grows year on year, many companies are following the similar approach. After being an internet/system user for last two decades, I believe it’s nearly impossible to access systems without passwords. I will be super surprised if password less systems can be created for mass usage. More than creating password less systems, what is required is how to make systems more secured by creating easy to use tools around passwords that add second layer of authentication. It is also important to ensure that such additional authentication system don’t end up

Building A World Around Passwords Read More »

Who Is Winning Facial Recognition Tech?

Photo by Warren Wong on Unsplash The answer to above question is straight forward, it’s China. In this article, I want to summarize how China is doing by separating it into three categories: The Good, The Bad and The Ugly. The Good: China uses the facial recognition tech to provide citizen with services. For example, if you are running a marathon and need your pictures to be clicked, then you simply sign up for services that will facially recognize you and send all your digital copies at the end of marathon. This is very simple and at the same time very complex service where China scores. I have to say China scores instead of a specific tech company, as most of the big giants in China do have government backing, without which they

Who Is Winning Facial Recognition Tech? Read More »

Smart Speakers With Smart Processors

Photo by Paul Esch-Laurent on Unsplash Hardware plays crucial role in product success as much as software does. Smart speakers are getting lot of traction and every big tech giant with smart assistant is fighting to get hold of this market share. Part of the reason is to get the services delivered using a different medium, however major goal is to get hold of the data that can be used to make algorithms better to provide much personalized services. Amazon Echo was one of the first devices to bring smart speaker solution. It kick started race and Big-5 (Apple, Amazon, Google, Microsoft and Samsung) started gearing up to get similar solution out. Amazon never had success in smartphone business, but it got good traction in smart speaker domain due to seamless connectivity to

Smart Speakers With Smart Processors Read More »

Top Semiconductor Resources

Photo by Alexandre Debiève on Unsplash If you are looking to keep track of semiconductor industry then here I am listing few resources that provide good insight into this industry. Top Semiconductor Resources: The Linley Group: Linley Group is the best resource to get 360 degree view of semiconductor industry. They publish semiconductor focused reports that cover range of products and domains. The only (big) caveat is that the reports they publish are too costly. So, unless your institute or employer provides access to you it will be very difficult to access it. But there are few resources that are open to all and can really help you gain insight into different semiconductor domains. ChipDesign Mag: Articles from ChipDesign Mag (CDM) are very technical written by leading domain experts. It really helps in understanding all products that

Top Semiconductor Resources Read More »

Exploration of Memory and Cluster Modes in Directory-Based Many-Core CMPs.

Networks-on-chip have become the standard interconnect solution to address the communication requirements of many-core chip multiprocessors. It is well-known that network performance and power consumption depend critically on the traffic load. The network traffic itself is a function of not only the application, but also the cache coherence protocol, and memory controller/directory locations. Communication between the distributed directory to memory can introduce hotspots, since the number of memory controllers is much smaller than the number of cores. Therefore, it is critical to account for directory memory communication, and model them accurately in architecture simulators. This paper analyzes the impact of directory memory traffic and different memory and cluster modes on the NoC traffic and system performance. We demonstrate that unrealistic models in a widely used multiprocessor simulator produce misleading power

Exploration of Memory and Cluster Modes in Directory-Based Many-Core CMPs. Read More »

Two Factor Authentication – Hardware vs Software

Photo by NeONBRAND on Unsplash Two factor authentication (2FA) is a type of multi-factor authentication that allows users to secure any type of account using a second authentication apart from the regular password protection. 2FA has been around for a long time and received mixed reaction from security researchers. With growing number of internet and smart device users it is becoming increasingly important to take 2FA seriously. Let’s take a quick look at types of 2FA, which I have separated into hardware and software depending on where the second authentication code comes from. Software 2FA: Software 2FA (S2FA) is straightforward. Any website which supports S2FA will first walk user through account creation which requires password (first authentication). Then it will provide three options: First: Register cell number in order to receive unique code via

Two Factor Authentication – Hardware vs Software Read More »

Online Identity

Photo by Elijah O’Donell on Unsplash World population has reached 7.5 billion. In 2017 about 3.5 billion users were active on internet, that is approximately 50% of world population. If internet was a country, it will be twice the size of the most populated country in the world. Anyone who is on internet can literally find any details about anything at click of a button. I think this simple statistic should be good enough for anyone who has anything positive to share to come online, write something and share with potentially 3.5 billion customers. The reason for this blog is to share simple steps on how to get online identity with the hope that it can help someone looking to get one. What Is An Online Identity? Online identity as per my definition is

Online Identity Read More »

Encryption Everywhere

Photo by Markus Spiske on Unsplash Since the time Edward Snowden leaked classified information, the focus has been on how governments across the world use surveillance to keep tap on digital activities. Lately, I have been reading about it and have come to the conclusion that there is no way around it. However, precautions can be taken if one is worried about his/her digital privacy. Encryption in software/hardware largely boils down to the developers and if they wish then they can strongly encrypt the communication/data. For example, WhatsApp has partnered with Open Whisper Systems to provide end-to-end encryption. The reason to trust this partnership is because Signal Protocol, the technology which WhatsApp uses to encrypt messages, is open. Thus allowing anyone to go through the code to understand what exactly has been implemented and whether that matches up

Encryption Everywhere Read More »

Time We Have Delete Button On All Websites

Photo by Devin Avery on Unsplash Since last one month, I started logging the websites I visit and use, mostly those which require user to login. To my surprise I have account at over 50+ different websites. The number may be much more, considering I wasn’t able to recall all those websites where I created account just because that was the only way to get in, and later on never used it. This may be the case with many internet users. What Is The Problem? Well, the problem is that 90% of these 50+ websites I visit don’t have SSL and some of these send plain text password reset or email the password itself. Showcasing there inner genius in handling user sensitive data. I have taken care not to repeat the mistake of using dump passwords,

Time We Have Delete Button On All Websites Read More »

Get In

Touch