Author's Latest Posts


Semiconductor Industry Association Factbook, 2019


You may already know that semiconductors make possible the global trillion dollar electronics industry. But did you know that worldwide sales have increased at a compound annual rate of almost 7 percent per year since 1998? To find out more—including why it is critical for policymakers to enact measures that boost growth and promote innovation—download the 2019 SIA Factbook. The 2019 ... » read more

Power Management Techniques For Smart Grid Devices


Energy efficiency is a top concern among developers building connected devices for the smart grid. Initially, the application-centric approach to building a device was used. But today, with sophisticated hardware power management features available on most modern processors, this is no longer the case. What’s needed is an OS-level approach that allows developers to take advantage of the full ... » read more

big.LITTLE Technology: The Future of Mobile


With the evolution from the first mobile phones through smartphones to today’s superphones and tablets, the demand for compute performance in mobile devices has grown at an incredible rate. Today’s devices need to service smarter and more complex interactions, such as voice and gesture control, combined with seamless and reliable content delivery. Gaming and user interfaces have also grown ... » read more

System-Aware SoC Power, Noise And Reliability Sign-off


In globally competitive markets for mobile, consumer and automotive electronic systems, the critical success factors are power consumption, performance and reliability. To manage these conflicting requirements, design teams consider multiple options, including the use of advanced process technology nodes — especially FinFET-based devices. These advanced technology nodes allow chips to operate... » read more

Model Extraction And Circuit Simulation Approaches For Successful SSO Analysis Of Chip-Package-Board Systems


This paper concerns guidelines to support successful SSO analysis for Chip-Package- Board systems. The procedures detailed address extraction and circuit simulation application of high node-count (N>100) frequency domain models. The focus of this paper is the low frequency portion, including DC, of the spectrum for broadband S- parameters. Frequency domain model extraction options and transient... » read more

Ultra Low Power Integrated Platform For Connectivity And Audio/Voice/Sensing


A look at an integrated approach on a single DSP and why it's needed. To download this white paper, click here. » read more

Memory Power Reduction In SoC Designs Using PowerPro MG


Memories occupy over 50% of the silicon real estate on most modern SoCs and account for 50% to 70% of the power dissipation. We will show how Calypto’s PowerPro MG tool can significantly reduce the dynamic and leakage power consumption in memories by automatically inserting new memory gating logic to remove redundant reads/writes and control the sleep modes available in these memories. To ... » read more

Formal Verification Of Power-Aware Designs Using JasperGold Low Power Verification App


Power reduction and management methods are now all-pervasive in system-on-chip (SoC) designs. They are used in SoCs targeted at power-critical applications ranging from mobile appliances with limited battery life to big-box electronics that consume large amounts of increasingly expensive power. Power reduction methods are now applied throughout the chip design flow from architectural design, th... » read more

Leveraging Processor Extensibility To Build An Ultra Low-Power Embedded Subsystem


There is increasing demand for electronic devices to execute more functions while consuming less power and silicon area. To achieve this, systems instantiating multiple, heterogeneous processor cores optimized for low power and high performance are gaining popularity among design teams. In these systems, one or more deeply embedded processors execute a limited set of dedicated applications. The... » read more

DPA Countermeasures


Smartphones, tablets and other mobile devices con- tain cryptographic keys that protect payments, VPN/network connections and on-device flash memory. Although some smartphones and other devices contain countermeasures, many do not and can be easily compromised. Even a simple radio can tune into the radio frequency emissions from mobile devices and gather side channel information. In some cases,... » read more

← Older posts