Blog Review: May 15


Cadence's Sean Dart shares an example of the kind of optimizations HLS tools can perform that would be difficult to find and implement by hand-coding RTL. Synopsys' Taylor Armerding takes a look at three cybersecurity initiatives from the U.S. government, from an IoT bill to improved voting machines, and whether they're likely to work. In a video, Mentor's Colin Walls points to why flashi... » read more

Manufacturing Bits: May 14


Radiation thermometers The National Institute of Standards and Technology (NIST) has developed a thermometer that can measure radiation within a few thousandths of a degree Celsius. The so-called Ambient-Radiation Thermometer (ART) from NIST is a new type of radiation thermometer, which measures infrared radiation (IR) given off by objects without touching them. Measuring 60 centimeters ... » read more

System Bits: May 14


Faster U.S. supercomputers on the way The U.S. Department of Energy awarded a contract for more than $600 million to Cray for an exascale supercomputer to be installed at the Oak Ridge National Laboratory during 2021. Cray will provide its Shasta architecture and Slingshot interconnect for what is dubbed the Frontier supercomputer. Advanced Micro Devices will have a key role in building the... » read more

Power/Performance Bits: May 14


Detecting malware with power monitoring Engineers at the University of Texas at Austin and North Carolina State University devised a way to detect malware in large-scale embedded computer systems by monitoring power usage and identifying unusual surges as a warning of potential infection. The method relies on an external piece of hardware that can be plugged into the system to observe and m... » read more

Multiple Roots Of Trust And Isolation: Key Roles For Absolute Security


Today, there are many different security processors available to the SoC designer. A majority have a commonality, and that is they are based on the same architecture. You can call it a two-domain architecture. One is non-secure; the other is secure with a single bit dividing the secure from the non-secure. What’s more, different applications from different entities may be running in that o... » read more

Chiplet Momentum Builds, Despite Tradeoffs


Chip design is a series of tradeoffs. Some are technical, others are related to cost, competitive features or legal restrictions. But with the nascent 'chiplet' market, many of the established balance points are significantly altered, depending on market segments and ecosystem readiness. Chiplets provide an alternative mechanism for integrating intellectual property (IP) blocks into a semico... » read more

The Rapid Success Of IP Reuse


The rise of IP use and reuse quickly became a challenge in the early 1990s as designs became more complex. Design teams quickly found themselves struggling to manage not only the vast numbers of IP cores that they were reusing but also versioning, permissions, legal approvals and so on. In the 1990s, software developers were established users of software configuration management (SCM) tools ... » read more

Week In Review: Manufacturing, Test


Trade More trade news: "The Trump administration is hiking duties on $200 billion worth of Chinese products to 25% from 10%," according to CNBC. The following is attributed to Gary Shapiro, president and CEO of the Consumer Technology Association (CTA), in response to President Trump’s plan to increase tariffs on $200 billion worth of Chinese imports to 25%: “The president is seeking a bet... » read more

Week in Review: IoT, Security, Auto


Internet of Things Microsoft this week introduced IoT Plug and Play, a no-code toolkit for connecting Internet of Things devices to the cloud. The company touts it as a new modeling language to pump up the capabilities of IoT devices through the Microsoft Azure cloud service. The Azure IoT Device Catalog lists devices that support IoT Plug and Play, such as the STMicroelectronics SensorTile.bo... » read more

Week In Review: Design, Low Power


Tools & IP Cadence uncorked the latest version of JasperGold formal verification platform, providing improvements to the proof-solver algorithm and orchestration by using machine learning to select and parameterize solvers to enable faster first-time proofs and optimize successive runs for regression testing. Additionally, it increases design compilation capacity by over 2x with 50% reduct... » read more

← Older posts Newer posts →