中文 English

Blog Review: May 20

What fuzzing is; using uvm_config_db; mobile and the 3G era; debugging remote edge devices.

popularity

Synopsys’ Jonathan Knudsen demystifies fuzzing techniques and why the process of sending targeted, intentionally invalid data is important to determining security.

Mentor’s Chris Spear explains both the potential benefits and challenges of the UVM Configuration Database and guidelines to improve performance.

Cadence’s Paul McLellan continues the look back at mobile history with the beginning of the 3G era, emergence of mobile data through incremental upgrades, and the eventual convergence on LTE in the 4G era.

Arm’s Edmund Grimley Evans explains a way to debug remote edge devices when a direct SSH connection isn’t possible by deploying a privileged debug container and comms service.

Ansys’ Thierry Marchal makes the case for incorporating copper into high-touch surfaces and what gives the metal its antimicrobial and antiviral properties.

SEMI’s Bee Bee Ng chats with Dan Steele of GlobalFoundries Singapore about the necessity of business continuity planning regardless of an organization’s size.

Memory blogger Jim Handy considers whether NAND flash startup YMTC can really meet its target of supplying 8% of the global NAND market next year.

Plus, check out the highlighted blogs from last week’s Low Power-High Performance newsletter:

Editor in chief Ed Sperling sees the battery market suddenly become very interesting, in The Other Storage Race.

Mentor’s Progyna Khondkar spells out power-aware verification techniques for hard macro IP and important specifications to know.

Fraunhofer’s Benjamin Prautsch examines how to accelerate your IC design process with flexible layout automation controllable by the designer.

Rambus’ Suresh Andani reveals why disaggregated architectures become viable alternatives to the traditional monolithic SoC scaling approach.

Synopsys’ Rita Horner looks into the rising complexity of multi-die systems in compute-intensive markets.

Arm’s Paul Bradley digs into using SIM to provide a robust, scalable, and standardized hardware Root of Trust to protect IoT data communication.

Cadence’s Tyler Lockman points to a variety of shapes and which one to use when.

Moortec’s Richard McPartland explains why understanding variation in process speed is key to achieving timing closure and maximizing performance, power, and reliability.

Adesto’s Apurba Pradhan advocates for modernizing legacy LON networks to take advantage of advances in IoT and cloud technologies.

Ansys contributor David Shin shows how to estimate and fine-tune 5G RF components before a physical prototype is built.



Leave a Reply


(Note: This name will be displayed publicly)