Artificial Intelligence: Let Us Get The Math Right First!


Artificial intelligence is a hot topic these days and therefore doesn’t require a repeat of the current and future potential uses for AI. For most people, it means technology advancements on the software side. But if you ask people who are very close to this technology domain, building your own optimized hardware chips is where a significant part of the competitive edge lies. A few days ba... » read more

Do Large Batches Always Improve Neural Network Throughput?


Common benchmarks like ResNet-50 generally have much higher throughput with large batch sizes than with batch size =1. For example, the Nvidia Tesla T4 has 4x the throughput at batch=32 than when it is processing in batch=1 mode. Of course, larger batch sizes have a tradeoff: latency increases which may be undesirable in real-time applications. Why do larger batches increase throughput... » read more

Designing In The Cloud


Amazon AWS was launched back in 2006. Web based services such as Netflix and Expedia were early adopters, and AWS has grown rapidly, bringing in competition from Google (GCP), Microsoft (Azure) and others. It has taken a while for the design community to embrace the ‘cloud’ as some of the needs and concerns of design teams are different.  Cloud vendors have recognized this untapped market ... » read more

In Automotive, A Move From Microcontrollers To Massively Complex SoCs


Cars and custom, high-end chips. It’s a topic coming up more frequently these days. The most prominent example is Tesla’s FSD computer, described by Elon Musk as “the best chip in the world…objectively” during the company’s April Autonomy Day. When it comes to chips, Tesla is alone only when it comes to hyperbole, at least based on browsing job postings for big carmakers and supplie... » read more

Ethernet NIC For Fast Data Path


A bit of validation once in a while is good for all of us – that’s pretty true whether you are the one providing it or, conversely, the one receiving it. Most of the time it seems to be me that is giving out validation rather than getting it. Like the other day when my wife tried on a new dress and asked me, “How do I look?” Now, of course, we all know there is only one way to answer a ... » read more

Multiple Roots Of Trust And Isolation: Key Roles For Absolute Security


Today, there are many different security processors available to the SoC designer. A majority have a commonality, and that is they are based on the same architecture. You can call it a two-domain architecture. One is non-secure; the other is secure with a single bit dividing the secure from the non-secure. What’s more, different applications from different entities may be running in that o... » read more

The Rapid Success Of IP Reuse


The rise of IP use and reuse quickly became a challenge in the early 1990s as designs became more complex. Design teams quickly found themselves struggling to manage not only the vast numbers of IP cores that they were reusing but also versioning, permissions, legal approvals and so on. In the 1990s, software developers were established users of software configuration management (SCM) tools ... » read more

Neural Network Performance Modeling Software


nnMAX Inference IP is nearing design completion. The nnMAX 1K tile will be available this summer for design integration in SoCs, and it can be arrayed to provide whatever inference throughput is desired. The InferX X1 chip will tape out late Q3 this year using 2x2 nnMAX tiles, for 4K MACs, with 8MB SRAM. The nnMAX Compiler is in development in parallel, and the first release is available now... » read more

DAC: An Exhibitor’s Perspective


It is less than four weeks to DAC. At this point you should be deep into your planning and ready to drop down secure all your exhibit services before the deadline. While you are thinking about how to manage all the details of getting your booth on the show floor, this is a great time to take a step back and make sure you have clearly defined exhibit “takeaways” — think “goals” and ... » read more

FIAs Pose Tricky Security Attacks


Voltage and clock glitching are terms crowding into the emerging lexicon of chip security attacks. These are two popular methods adversaries use that can be categorized under the umbrella of fault injection attacks (FIAs). Micro-architectural vulnerabilities like Meltdown, Spectre, Foreshadow and Spoiler have been in the limelight for months. But now, FIAs are getting more attention as the indu... » read more

← Older posts Newer posts →