Micro FPGAs And Embedded FPGAs


When people hear “FPGA” they think “big, expensive, power hungry.”  But it doesn’t need to be that way. Renesas has announced their Forge FPGA family. Details are at their website and in one of the many articles that covered their press release. Forge FPGAs show that FPGAs don’t have to be big, power hungry, and expensive. Forge FPGAs are tiny, draw standby current measure... » read more

5 Takeaways From The RISC-V Summit


After an intense week at the 2022 RISC-V Summit in San Jose, California, I am fueled with energy and positive thoughts. I had plenty of time to reflect on the event, which was unique in many ways. A lot happened in a few days for us at Codasip as well as for the wider RISC-V community, and here are 5 things I will remember from this conference. 1. RISC-V is inevitable If you have read our a... » read more

The New Convergence: IoT, AI, And 5G Bring Actionable Intelligence To The Factory Floor


Last year, I reflected on the Renesas Renaissance in terms of how our long-term growth strategy is positioning the company as a full-spectrum, global technology solutions provider with an extended physical footprint in the U.S., Europe, and China. Thanks to the acquisitions of Intersil, IDT, Dialog Semiconductor, and Celeno we now have expansive design capabilities that surround our embedded... » read more

Integrating 16nm FPGA Into 28/22nm SoC Without Losing Speed Or Flexibility


Systems companies like FPGA because it gives parallel processing performance that can outdo processors for many workloads and because it can be reconfigured when standards, algorithms, protocols or customer requirements change. But FPGAs are big, burn a lot of power and are expensive. Customers would like to integrate them into their adjacent SoC if possible. Dozens of customers are now u... » read more

Security Highlight: Compromising Printers Via Malicious Third-Party Cartridges


This fall, HP Inc. published an article describing a buffer overflow vulnerability in their printer software which would allow an attacker to obtain persistent remote code execution on the printer. Buffer overflow vulnerabilities are common, but what makes this one noteworthy is that it can be exploited remotely by a malicious third-party printer cartridge. In the printer ecosystem, there ... » read more

Enable Application Design Without Considering Device Configuration


The software-defined vehicle, which defines in-vehicle value through software, requires new applications to be deployed in a variety of vehicle models. To achieve this, developers need a solution that allows them to easily develop applications without considering device configuration in the ECU and to take maximum performance of the hardware. However, there are currently issues (figure 1). W... » read more

Ernest Worthman blogs


» read more

A New Dimension In Optical CD


One of the biggest challenges for nanoscale fabrication is how to measure devices on such a minute scale. As the semiconductor industry demands ever smaller devices, the need for reliable, robust measurements for quality control and process optimization increases. One robust and commonly used technique in semiconductor manufacturing is optical critical dimension (OCD) metrology. Standard, al... » read more

Manage Your Risk In RISC-V


Adoption of RISC-V processors is accelerating. This technology, like everything, comes with benefits and risks. The open standard means freedom for many developers, but success depends on the development of a support ecosystem around RISC-V. Industry collaboration is making broad adoption of RISC-V possible, and one example is the introduction of efficient trace for RISC-V cores. When incorp... » read more

Creating Comprehensive And Verifiable Hardware Security Requirements


Developing effective hardware security requirements is one of the trickiest aspects of building trustworthy electronic products. Even highly skilled and experienced teams don’t always get it right. Why? First, it’s very difficult to anticipate every security risk – much less cover every possible scenario with a specific security requirement. Instead, hardware security requirements o... » read more

← Older posts Newer posts →