Blog Review: July 9

Different images; oort; C++; famous sayings; 3D manufacturing; five S’s; swipe and sign; algorithms.

popularity

Cadence’s Richard Goering walks through a keynote speech from DAC, which was delivered by Imagination Technologies’ Peter McGuinness, about the evolving role of image processing and what it can do. There are lots of changes ahead in this space.

Who’s financing the Internet of Things and what are they funding? ARM’s Brad Nemire takes a look at oort, a Bluetooth hub that looks like a hockey puck. You control it with a smart phone.

Mentor’s Colin Walls drills down into more questions involving C++ methods and class member variables. If you work with embedded code, here are some good insider tips.

Synopsys’ Mick Posner pulls out a list of politically correct and incorrect sayings that will either help your career, ruin your life, or confuse your dog. Timing is everything.

Applied’s David Chu and Sidney Huey look at what’s in store for high-volume manufacturing of 3D devices—3D NAND, finFETs, and ultimately stacked die.

Cadence’s Brian Fuller interviews colleague Jaswinder Ahuja about India’s semiconductor efforts, the Internet of Things, low power and mixed signal challenges and ecosystem collaboration. It’s hard to put a label on this one because it covers so much ground.

ARM’s Christopher Seidl reports back on Infineon’s customer workshops in Munich and Milan. Looks like they use the same chairs all over the world.

Cadence’s Mukul Dawar explains the NVM Express protocol in a four-minute white-board video.

ARM’s Lori Kate Smith lists five S’s of the IoT. No. 2 sounds like a forward-looking statement.

And in case you missed this week’s Security newsletter, here are some noteworthy blogs:

NXP’s Brintha Koether observes that the swipe-and-sign approach to credit card verification is weak…and about to be replaced.

Technology Editor Ernest Worthman argues that chip security is mostly an afterthought—a situation that has to change.

Executive Editor Ann Mutschler writes that with researchers cracking supposedly unassailable encryption algorithms, it’s back to the drawing board.



Leave a Reply


(Note: This name will be displayed publicly)