Automating Failure Mode Analysis For Automotive Safety


By Chuck Battikha and Doug Smith If you’ve ever had to create a Failure Modes, Effects and Diagnostic Analysis (FMEDA), you know how difficult and painstaking a task it can be. But FMEDAs are essential in ensuring that your SoCs satisfy ISO 26262 functional safety analysis requirements for automotive designs and for demonstrating that your design is indeed safe. Because of the intens... » read more

Penetration Tests, Prison Security, And Mothers


There is always an interesting sounding presentation at RSA that looks like it might be a good blog post topic just based on the title. This year it was "I Had My Mom Break Into A Prison Then We Had Pie" by John Strand of Black Hills Information Security. A pen test is short for a penetration test. They can take various forms from trying to log in to a system they shouldn't, to trying to g... » read more

Bluetooth LE Audio Makes Its Debut


The Bluetooth Low Energy 5.2 specification introduces LE audio, which is a significant step forward for Bluetooth audio, both in terms of sounds quality and functionality. LE Audio, based on our new iEB110 IP, will enable manufacturers to create low power audio devices that offer several revolutionary new features that weren’t possible before, even with third-party proprietary solutions. T... » read more

Tracking Re-Use Of Design IPs


Design teams have a great incentive to create design blocks or IPs that can be reused: Each time an IP is successfully reused, precious time is saved from project schedule. Of course, as easy as it sounds, achieving this goal in real life is not simple. In reality, the observation is that design libraries cannot be used as-is by multiple projects. Consider this scenario: A smart new graduate... » read more

Security Is Key When AI Meets 5G


5G represents a revolution in mobile technology with performance that will rival that of wireline networks. Relative to its 4G predecessor, 5G promises 10X the data rate, 100X the efficiency, and 1000X the capacity, at 1/100th the latency. With 1Gbps speed at 1ms latency, 5G makes it possible to offer a host of real-time applications and services. Real-time is critical, because in parallel t... » read more

Automotive Industry On Course To Disruption And Evolution


Consumers expect a lot from their vehicles. We expect vehicles to serve not only as transportation, but as hubs of entertainment and connectivity that can help us manage busy lives, or relax after long days. Someday, we may even expect our cars to do the driving themselves, without any human intervention. Automotive manufacturers consistently strive to meet these expectations by delivering high... » read more

Machine Learning… Everywhere


AI is transforming the world around us, creating an avenue to innovation across all sectors of the global economy. Today, AI can interact with humans through natural language; identify bank fraud and protect computer networks; drive cars around city streets; and play complex games like chess and Go. Machine-learning is offering solutions to many complex problems around us where analytical solut... » read more

Software Is At Least As Important As Hardware For Inference Accelerators


In articles and conference presentations on Inference Accelerators, the focus is primarily on TOPS (frequency times number of MACs), a little bit on memory (DRAM interfaces and on chip SRAM), very little on interconnect (also very important, but that’s another story) and almost nothing on the software! Without software, the inference accelerator is a rock that does nothing. Software is wha... » read more

Signal Integrity Through The Years


Yesterday, I started to talk about how new technologies find their way over time into EDA tools in my post How Technologies Get into EDA. Let's look at signal integrity as an example. We used not to worry about signal integrity at all. The first time anything like that impinged on my consciousness was in the early 1980s when we realized that we needed to start to consider the inductance... » read more

Unprotected IoT Devices Threaten Consumer Privacy And Safety


Unprotected IoT devices continue to pose a disturbing threat to both consumer privacy and security. For example, a camera installed in the Memphis bedroom of a young girl was recently hijacked by a hacker who seized control of the device to spy on the 8-year-old, taunt her with music and encourage destructive behavior. Another infamous instance of a camera falling victim to a hacker was reporte... » read more

← Older posts Newer posts →