An Ideal Always-Sensing Subsystem Architecture


Always-sensing cameras are a relatively new method for users to interact with their smartphones, home appliances, and other consumer devices. Like always-listening audio-based Siri and Alexa, always-sensing cameras enable a seamless, more natural user experience. Through continuous sampling and analyzing visual data, always-sensing enables use cases such as: “Find a face” detection for... » read more

Connectivity Challenges In Industry 4.0


Industry 4.0 is characterized by interoperability (such as IIoT), information transparency (digital plant models: virtual copy of physical world), technical support (the ability of cyber-physical systems to support humans by executing various tasks), and decentralized decision-making. IIoT allows devices to be connected, creating a virtual copy of real-world data that allows operators to visual... » read more

No One-Size-Fits-All Approach To RISC-V Processor Optimization


As the demand for high-performance processors continues to grow and semiconductor scaling laws continue to show their limits, the need for processor optimization is inevitable. As I explained in a previous blog, RISC-V is designed to enable this. However, there is no one-size-fits-all approach to processor optimization. As each workload and each application will have their own requirements, th... » read more

Distribution Of Currents In Via Arrays


It has become increasingly difficult in recent years to provide adequate PDNs on a PCB. The sheer number of different voltages, combined with increased current demands, makes distributing current around the board a substantial layout challenge. This paper demonstrates that by using appropriate and accurate simulations, combined with the improved intuition that such simulations bring, it is a ch... » read more

Architectural Considerations For Compute-In-Memory In AI Inference


Can Compute-in-Memory (CIM) bring new benefits to AI (Artificial Intelligence) inference? CIM is not an AI solution; rather, it is a memory management solution. CIM could bring advantages to AI processing by speeding up the multiplication operation at the heart of AI model execution. To read more, click here. » read more

A Formal-Based Approach For Efficient RISC-V Processor Verification


The openness of RISC-V allows customizing and extending the architecture and microarchitecture of a RISC-V based core to meet specific requirements. This appetite for more design freedom is also shifting the verification responsibility to a growing community of developers. Processor verification, however, is never easy. The very novelty and flexibility of the new specification results in new fu... » read more

Blog Review: May 24


Siemens' Patrick McGoff finds that designers have not had easy tools to address solderability, leaving a critical part of the manufacturing success of a PCB to the component engineer or the contract manufacturer, and points to manufacturing-driven design as a way to avoid quality issues later. Cadence's Rich Chang finds that effective UPF low-power verification and debug involves more than o... » read more

Advanced RISC-V Verification Methodology Projects


The open standard of RISC-V offers developers new freedoms to explore new design flexibilities and enable innovations with optimized processors. As a design moves from concept to implementation new resources are appearing to help with standards for testbenches, verification IP reuse, and coverage analysis. RISC-V offers every SoC team the possibility to design an optimized processor, but this a... » read more

Automotive Relationships Shifting With Chiplets


The automotive industry is in the midst of a tremendous and rapid change on many fronts. OEMs are exploring new functions and features to add to their vehicles, including chiplets, electrification, autonomous features, as well as new vehicle architectures that will determine how vehicles are going to be designed from the foundation up. All of this is dependent on the relationships between all o... » read more

Improving Network Security Threat Detection


Collecting security-related information is one thing. Getting the most benefit from that data is another. Security analysts get lots of alerts from their security tools. This forces them to prioritize the ones that will get investigated. When additional context is added to the security data, it makes it easier to see what traffic needs a closer look. For instance, discovery, forensics, and reme... » read more

← Older posts Newer posts →