Blog Review: April 17

Embedded power management; Industry 4.0 and semi; security survey.


In a video, Mentor’s Colin Walls digs into power management in embedded software with a particular look at the Power Pyramid model.

Synopsys’ Taylor Armerding checks out the state of application security at this year’s RSA and finds that while organizations are paying attention to security through training and dedicated teams, roadblocks still remain.

Cadence’s Paul McLellan considers how advances in machine learning means designing new chairs looks a lot like figuring out ideal photonic structures.

Lam Research’s Kerry Farrell shares highlights from Lam CEO Tim Archer’s SEMICON China keynote, including why the semiconductor industry should take advantage of the Industry 4.0 innovations it has helped make possible.

A Rambus writer points to a study on how voltage glitches can introduce timing violations into a digital circuit, with an example of the PlayStation Vita as susceptible to the fault injection attack.

Arm’s Beau Paisley presents some use cases on how offline debugging with Arm DDT HPC can be expanded by running from the command line and post-processing CSV output.

Intrinsix’s Eric Bass argues that heterogeneous SoCs composed of individual chiplets are the wave of the future as monolithic integration reaches a point of unaffordability.

ANSYS’ Bill Kulp points to how simulation helped determine what impact destructive wind storms have on motorized solar panel installations.

Walt Custer of Custer Consulting Group considers the state of manufacturing expansion and when electronic equipment sales can be expected to recover.

Nvidia’s Isha Salian checks out why a medical AI company wants to take a look at your sinuses.

And don’t miss the blogs from last week’s Low Power-High Performance newsletter:

Editor In Chief Ed Sperling digs into why power, performance and area are becoming increasingly difficult to balance.

Mentor’s Harry Foster warns that increased design size is only one dimension of the growing complexity challenge.

Rambus’ Frank Ferro looks at why memory choices for AI systems depend on the application.

Synopsys’ Ribhu Mittal explains why the length of tests, failure reproduction, and the sheer amount of data generated pose problems for emulation.

Arm’s Paul Williamson argues that trusted, independent security testing is critical to enabling widespread deployment of IoT devices.

Leave a Reply

(Note: This name will be displayed publicly)