AI At The Edge: Optimizing AI Algorithms Without Sacrificing Accuracy


The ultimate measure of success for AI will be how much it increases productivity in our daily lives. However, the industry has huge challenges in evaluating progress. The vast number of AI applications is in constant churn: finding the right algorithm, optimizing the algorithm, and finding the right tools. In addition, complex hardware engineering is rapidly being updated with many different s... » read more

Security Highlight: Evil Never Sleeps


Recently, Apple introduced a useful but potentially dangerous feature to its iPhones. Most of us would assume that a phone becomes inactive when switched off by the user or due to low power. Surprisingly, newer phones continue limited functionality for several hours in low power mode or even if it is off. This includes cards in your Wallet and the Find My service. This feature caught the attent... » read more

eFPGAs Bring A 10X Advantage In Power And Cost


eFPGA LUTs will out-ship FPGA LUTs at some point in the near future because of the advantages of reconfigurable logic being built into the chip: cost reduction, lower power, and improved performance. Many systems use FPGAs because they are more efficient than processors for parallel processing and can be programmed with application specific co-processors or accelerators typically found in da... » read more

Don’t Put Up With Industrial Fake News


“Fake news has become a major problem, influencing elections, affecting major political events and the credibility of every piece of content on social media, fake news or not. And ‘industrial fake news’ in turn is indeed a big problem for businesses,” says Patrick Lamplmair, CEO of the European deep tech startup Tributech, data trust expert, and guest on our new #MakeIoTwork podcast epi... » read more

Mesh Generation And CFD For A Drone’s Coaxial Rotor


Our Cadence Channel Partner in Scandinavia, neptech, shares a case study investigating the interaction of a coaxial rotor system and how to optimize its efficiency. Coaxial rotor systems are appealing for multirotor drones, as they increase thrust without increasing the vehicle’s footprint. However, the thrust of a coaxial rotor system is reduced compared to having the rotors in line. It... » read more

A New Phase In The Journey To Trustworthy Electronic Products


Semiconductor chips drive our everyday lives – and our global economy – in more ways than any of us could have envisioned when Tortuga Logic was founded in 2014. And similarly, the importance of hardware security has grown dramatically beyond what anyone could have predicted at that time. This has led us to redouble our effort to help the industry develop trustworthy products in the next ph... » read more

Safeguarding A Digital Transformation Across The Entire Product Lifecycle


In 2020, the SolarWinds breach highlighted the emergence of software supply chain attacks as a very real security threat that impacted many high-profile companies. (The software supply chain includes third-party and open-source components used in a software product.) Then in late 2021, not to be outdone, the massive scope of the Log4j vulnerability emerged, impacting millions of consumer produc... » read more

Toward Democratized IC Design And Customized Computing


Integrated circuit (IC) design is often considered a “black art,” restricted to only those with advanced degrees or years of training in electrical engineering. Given that the semiconductor industry is struggling to expand its workforce, IC design must be rendered more accessible. The benefit of customized computing General-purpose computers are widely used, but their performance improv... » read more

Traceability Is Not My Problem (Is It?)


What is all the fuss about traceability? If it is that important, should it be handled by a compliance group? Delegating to a separate team would be the preference for most design and verification team members, but it is not possible in this case. Traceability stops short of a big brother organization constantly looking over the shoulders of the development team. The more reasonable approach is... » read more

The Methods Of Memory Encryption To Protect Data In Use


In my blog “The Importance of Memory Encryption for Protecting Data in Use,” I discussed the growing industry consensus on the imperative of incorporating memory encryption in computing architectures. In part two of this series, I’ll explore the cipher algorithms and modes that can be used to protect data stored in and accessed from memory, or in other words, used to protect data in use. ... » read more

← Older posts Newer posts →