Building Multipurpose Systems With Dynamic Function Exchange Part Three: Tools For Deploying DFX


In our previous two articles, we introduced you to the concept of Dynamic Function Exchange (DFX), a design approach that dynamically reallocates unused system resources to other tasks. We also introduced you to some techniques for bundling and managing your DFX resources. In this article, we will discuss some of the adaptive computing tools that make DFX possible. As part of its investment ... » read more

Meet Both Security And Safety Needs In New Automotive SoCs


With advances in hardware and software, smart vehicles are improving with every generation. Capabilities that once seemed far-off and futuristic—from automatic braking to self-driving features—are now either standard or within reach. However, as vehicle architectures evolve, the ways that both security and safety can be addressed at the system-on-chip (SoC) level also must evolve. Cars a... » read more

The Indispensables: The Diverse Electronic System Design Ecosystem


My summer of 2021 reading included a book called “The Indispensables: The Diverse Soldier-Mariners Who Shaped the Country, Formed the Navy, and Rowed Washington Across the Delaware” by Patrick K. O'Donnell. The book told the thrilling and largely forgotten history of the fishermen from Marblehead, Mass., a town 20 miles north of Boston, and their critical role in the Revolutionary War. M... » read more

ISO/SAE 21434: Secure Hardware Development In Modern Vehicles


Demonstrating the importance of security doesn't get much more memorable than Charlie Miller and Chris Valasek successfully hacking a Jeep and driving it into a ditch. The effects of that drive have been long-reaching, sparking conversations in both the media and automotive industry about the evolving threat landscape as vehicles become increasingly automated. The average car contains over 1... » read more

Building A Defense In Depth Against Cyberattacks


As the number and type of cyberattacks, from the “simple and cheap” to the “expensive and sophisticated,” continues to grow at a dramatic pace, protection of chips and devices must employ a defense in depth strategy. In this way, if an attacker successfully bypasses a mechanism of protection, they’ll face another layer of defense, rather than a clear path to the assets they seek to ex... » read more

Do You Know For Sure Your RISC-V RTL Doesn’t Contain Any Surprises?


Given the relative novelty and complexity of RISC-V RTL designs, whether you are buying a commercially supported core or downloading a popular open-source offering, there is the small but non-zero risk of unwanted surprises escaping undetected into your end-product. In order of high-to-low probability, consider: The presence of a weird-yet-entirely-possible corner-case bug Bugs “insid... » read more

Building Multipurpose Systems With Dynamic Function Exchange Part Two: Bundling And Managing Resources


In our previous article, we mentioned that one of the most-common oversights that designers can make is to not fully use available system resources, and we introduced you to the concept of Dynamic Function Exchange (DFX), a design approach that dynamically reallocates unused system resources to other tasks. From a technical standpoint, implementing DFX is relatively straightforward using a c... » read more

Why Does “Matter” Matter?


There is a good chance that you have come across "Matter" in recent news related to IoT and smart home. Matter was everywhere at CES 2022, and smart home ecosystems all talk about Matter when launching new devices. Matter helps IoT devices like your coffee maker and smart speaker talk to each other easily so that you as the end user don’t need to read complex user manuals or become an IoT con... » read more

Verification Signoff Beyond Coverage


A common design view of verification signoff is to start with a comprehensive verification plan, covering every requirement defined among specifications and use-cases, the architectural definition, and any other relevant documents. Tests are then developed to cover every feature of the verification plan. Those tests are run and debugged, and identified issues are addressed within the design. Th... » read more

HDCP 2.3: Enabling Robust Security Of High-Res Displays


Displays, monitors and touchscreens are the interface to our digital lives everywhere—at home, at work, and in the car. Display designers continuously upgrade their products with higher bandwidth, new technologies, and innovative features. New, modular products incorporate micro LEDs to allow new form factors, such as designing displays that are as thin as a canvas, can be rolled up, or can b... » read more

← Older posts Newer posts →