Essential Analog IC Information On-The-Go


Ever find that you need to review a technical detail or look up IC specs, but you're not in front of your computer? Whether you are sheltering in place at home, working in the lab, or walking outside to get fresh air, Maxim Integrated has developed a way to bring analog expertise directly into your hands. Our new Essential Analog mobile app, available for iOS and Android, provides quick and ... » read more

Bridging The Gap Between Driven And Driverless Cars


Today, 91% of car accidents worldwide are caused by some form of human error. Moving to ADAS functions, such as Automatic Emergency Braking or Lane Keep Assist, and autonomous vehicles (AVs) will significantly improve road safety and reduce costs associated with accidents, such as car and highway repair, police, ambulance, and insurance. However, to be fully autonomous will take many years, if ... » read more

Assessing Synchronization And Graphics-Compute-Graphics Hazards


In modern rendering environments, there are a lot of cases where a compute workload is used during a frame. Compute is generic (non-fixed function) parallel programming on the GPU, commonly used for techniques that are either challenging, outright impossible, or simply inefficient to implement with the standard graphics pipeline (vertex/geometry/tessellation/raster/fragment). In gener... » read more

Upgrade Your SoC Design With USB4 IP


USB4 is a new standard of connectivity by the USB Implementers Forum (USB-IF). USB4 supports multiple high-speed interface protocols, including USB4, DisplayPort, PCI Express, and Thunderbolt 3 for efficient data transfer and simultaneous delivery of data, power, and high-resolution video through a single USB Type-C cable. USB4 offers up to 40Gbps, which is twice that of the preceding USB 3.2 G... » read more

Combating Counterfeit Chips


The harsh reality is that today, the authenticity of chips is often impossible to guarantee. The counterfeit chip market is sizeable and growing with a worldwide value estimated at $75B in 2019. Those counterfeits are believed to have been integrated into more than $169B of electronic devices. Recent confirmed incidents of counterfeit parts found in electronic systems include defibrillators, ai... » read more

Welcome To 6 Minutes Of Security


Yet another blog on security! Oh, wait, this is hardware security – and trust. While secure hardware should be free from vulnerabilities in general, I use the term trust to refer to the belief that a semiconductor intellectual property (IP) or integrated circuit (IC) is free from malicious, intentionally inserted vulnerabilities. Hardware security is on the rise. The media is helping. ... » read more

Hardware Security: A Critical Piece Of The Cybersecurity Puzzle


Cybersecurity is a critical foundation of our rapidly expanding digital world spanning hardware and software that powers everything from our personal devices to the global infrastructure. Over the past decade, significant progress has been made in many security domains, especially in maturing secure software development processes. So far, hardware security has received limited attention, howeve... » read more

Performance Metrics For Convolutional Neural Network Accelerators


Across the industry, there are few benchmarks that customers and potential end users can employ to evaluate an inference acceleration solution end-to-end. Early on in this space, the performance of an accelerator was measured as a single number: TOPs. However, the limitations of using a single number has been covered in detail in the past by previous blogs. Nevertheless, if the method of cal... » read more

When You Can’t Afford To Scrimp On System Reliability


Failure happens, whether we like it or not. What’s important is to be prepared for failure to occur, which involves putting in place measures that allow us to quickly address or resolve the problem. But not all failures are created equally. For example, a laptop that you use daily might experience occasional glitches. If it’s well-designed, you can simply reset the machine to get it back to... » read more

Best Practices And Constraint Management Tools Speed RF Design For The IoT


By Jim Martens and David Zima The IoT has increased the demand for good radio frequency (RF) design practices from the mains, to wall outlet power, all the way to the antenna. With several IoT standards employed today, constraint management has become critical to ensuring that designs meet product performance and reliability. Even the simplest of IoT designs can benefit from constraint ma... » read more

← Older posts Newer posts →