Blog Review: July 19


Synopsys' Prishkrit Abrol provides a detailed explanation of how the USB Type-C connector works. Mentor's Ricardo Anguiano examines how the RISC-V ecosystem is expanding and latest developments in the open source toolchain. Cadence's Gopi Krishnamurthy explains the lane margining requirements of the PCIe 4.0 specification. ARM's Chet Babla unravels some claims about Narrowband IoT, Cat... » read more

What Does An IoT Chip Look Like?


By Ed Sperling and Jeff Dorsch Internet of Things chip design sounds like a simple topic on the face of it. Look deeper, though, and it becomes clear there is no single IoT, and certainly no type of chip that will work across the ever-expanding number of applications and markets that collectively make up the IoT. Included under this umbrella term are sensors, various types of processors, ... » read more

Memory Buffer Chips: Satisfying Amdahl’s Law To Sustain Moore’s Law


Moore’s Law, the observation that the available transistors in an integrated circuit doubles every two years, has driven the semiconductor and IT industries to unparalleled growth over the last 50+ years. These transistors have been used in CPUs to increase the number of parallel execution units and instruction fetches, expand the levels of on-chip cache (and overall capacity), support spe... » read more

Blog Review: July 12


Mentor's Puneet Sinha points to five big engineering stumbling blocks in building commercially-viable autonomous vehicles. Synopsys' Anders Nordstrom checks out some exotic applications of formal verification. Cadence's Paul McLellan listens in on a talk by Cadence's Michelle (Xuehong) Mao on how the company's deep neural network, CactusNet, works for optimizing network architecture. S... » read more

IoT Security? Let Them Eat Cake!


Often attributed to Marie Antoinette, the now famous phrase “let them eat cake” (qu'ils mangent de la brioche) is typically used to highlight one’s lack of understanding of a serious issue. This attitude is particularly noticeable in the world of IoT security. Everyone acknowledges that the clear majority of IoT devices are vulnerable and easily compromised, as many lack even the most ... » read more

IoT Startups Rake In Cash


Corporate and venture investors are still eagerly backing Internet of Things startups, with more than $850 million committed during the first six months of 2017. This year’s total may not reach the heights of 2014, when investors put more than $5 billion into IoT startups, or 2016, which saw IoT firms receiving about $4.75 billion, the Venture Scanner website estimates. Still, a once white... » read more

5 Reasons Retailers Should Have Their Own Digital Wallet


As online and mobile commerce channels continue to expand, retailers are being forced to re-evaluate their offering and approach. Retailers must now find new and powerful ways to engage with consumers. Payments are increasingly being identified not just as a necessary process to be managed, but as an opportunity. Topics covered include: Security and risk Transaction fees Experienc... » read more

Blog Review: July 5


Cadence's Paul McLellan checks out the current state of System-in-Package technology and how different products incorporate SiP. Synopsys' Robert Vamosi digs into the differences between two major recent ransomware outbreaks, WanaCry and Petya. A Mentor staff writer shares some highlights from this year's DAC. ARM's Rene Haas examines what consumers think about AI and the impact it wil... » read more

Blog Review: June 28


Mentor's Craig Armenti notes the benefits, and challenges, of investing in modular design in the PCB domain. Cadence's Paul McLellan covers a DAC chat with CEO Lip-Bu Tan on the rise of advanced packaging and investments in AI and autonomous driving. Synopsys' Jim Hartnett examines some of the challenges and tradeoffs involved in building good security practices in hospital environments. ... » read more

Safety Plus Security: Solutions And Methodologies


By Ed Sperling & Brian Bailey As more technology makes its way into safety-critical markets—and as more of those devices are connected to the Internet—security issues are beginning to merge with safety issues. The number of attempted cyberattacks is up on every front, which has big implications for devices used in safety-related applications. There are more viruses, ransomware, an... » read more

← Older posts