Blog Review: Mar. 13

Deep learning and coverage; Huawai defends security; making fins.


Mentor’s Tom Fitzpatrick questions whether deep learning approaches can really help improve coverage in modern, complex designs.

Cadence’s Paul McLellan listens in at MWC as Huawei chairman Guo Ping defends the company’s security practices and shows where its heading in 5G.

Synopsys’ Eric Huang checks out the newly announced USB4 specification, changes to previous USB names, and a few things to watch for when buying cables.

Applied Materials’ Matt Cogorno and Toshihiko Miyashita discuss the challenges in making tall, thin finFET devices and present a method for trimming fins with minimal deformation.

In a video, VLSI Research’s Dan Hutcheson discusses the future of Moore’s Law with Intel’s Mark Bohr, including new layout techniques and the need for heterogeneous integration.

SEMI’s Steve Whalley visits the largest field crop analytics robot in the world to see how massive sensor platforms are being used to measure a range of attributes to better inform plant research and breeding.

Arm’s Simon Tatham explains how he ported the free SSH client PuTTY to Windows on Arm, including newly optimized cryptography code.

NI’s Charles Schroeder notes that 5G was everywhere at MWC and companies are taking a more realistic view of the challenges ahead.

Plus, don’t miss the blogs featured in the latest IoT, Security & Automotive and Test, Measurement & Analytics newsletters:

Editor In Chief Ed Sperling argues that searching for esoteric hardware vulnerabilities may be missing the point.

Arteris IP’s Kurt Shuler describes what the market for AI hardware might look like in 2025.

Mentor’s Andrew Macleod demonstrates how, from rapid changes in AI algorithms to ensuring functional safety and reliability, tools tackle automotive chip design challenges.

Flex Logix’s Geoff Tate looks at what two different neural network models can show us about the importance of using memory effectively.

Achronix’s Alok Sanghavi talks about how Bitcoin mining works and why unforeseen consequences are driving new cryptocurrencies.

Synopsys’ Anders Nordstrom explains why security verification through formal analysis should be part of the verification plan for SoCs and IP blocks.

Marvell’s Nishant Lodha questions why, with so many NVMe fabric options, there is a need for another one.

Editor In Chief Ed Sperling contends that the focus is shifting from how much data a company controls to what can be done with that data.

Delta ASIC’s Gert Jorgensen describes how to build an artificial eye for less than $2.

National Instruments’ David Vye demonstrates how to combine circuit and electromagnetic simulations for antennas with multiple feeds.

Optimal Plus’ Randy Hierbaum explains why reducing the rate of defective parts calls for a whole new quality paradigm.

Advantest’s Judy Davies contends that decentralized ledger technology isn’t just for cryptocurrencies anymore.

Leave a Reply

(Note: This name will be displayed publicly)