While VAR Impacts Soccer, The IoT Impacts The World


While the 2022 FIFA World Cup was in full swing and all the excitement was on the players giving their utmost out on the field — black Technology throughout the global IoT industry was stirring up heated debates. Be it Croatian players sending the ball slightly offside or Japanese players hanging it over the line, VAR seems to have played an integral role in last year's World Cup. Technolo... » read more

How The Productivity Advantages Of High-Level Synthesis Can Improve IP Design, Verification, And Reuse


Engineering teams are under more pressure than ever before—systems on chip (SoCs) are growing more complex and design schedules are increasingly tighter. With its productivity advantages, high-level synthesis (HLS) has long been touted as part of the solution, but its sweet spot has traditionally been limited to datapath-centric blocks. Moreover, design productivity is only one part of ... » read more

Cut Power + Cost 5 – 10x: Integrate FPGA In Your SoC


FPGA chips are high cost devices with a high profit margin for the manufacturer: this goes away when you integrate. FPGA packages are large and expensive because of the large number of very high speed signals that require expensive signal integrity design and packaging layers. When you integrate this goes away. And you save the board area the FPGA package took; and eliminate expensive voltage r... » read more

Simplifying the Connected Future: Navigating Complexity In The IoT Landscape


Smart home devices, appliances, ear buds, personal medical devices, smart energy meters, POS machines, asset, and fitness trackers, … Whatever device you can think of that makes our lives more convenient, safer and more enjoyable, in today’s world it’s likely to be connected, often wirelessly. Almost everywhere, connectivity is no longer an extra, it’s expected. And expectations are gro... » read more

How To Meet The IoT Security Requirements Of Today And Tomorrow


Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world. Connectivity is good and, in fact, great but bad things can happen to people with unprotected or poorly protected IoT devices. Failing to meet government regulations or guidelines may lead to the inability to sell products in a r... » read more

Post-Quantum Cryptography/PQC: New Algorithms For A New Era


Quantum computing is being pursued across industry, government and academia globally with tremendous energy, and powerful quantum computers will become a reality in the not-so-distant future. To ensure today’s data remains protected into the future, we need to implement now security solutions that safeguard against quantum attacks. Click here to read more. » read more

Successful 3D-IC Design, Verification, And Analysis Requires An Integrated Approach


3D-IC designs enable improvements in performance, power, footprint, and costs that cannot be attained in system-on-chip (SoC) and IC design. However, the leap from traditional SoC/IC design to 3D-IC designs brings not only new opportunities, but also new challenges. Siemens EDA provides multiple 3D-IC design analysis and verification functionalities that address the diverse needs of 3DIC des... » read more

Accelerate 5G Testing


The promise of 5G is faster and more reliable communications. To enable mobile broadband communications, 5G uses existing and new technologies to achieve extreme data throughputs. In this white paper, you will learn about the impact of the 3GPP evolution on your testing and solutions available to help you scale to production quickly. Click here to read more. » read more

The Evolution Of RISC-V Processor Verification: Open Standards And Verification IP


The OpenHW Group’s [1] Verification task group has been a pioneer in the development of methodologies and verification collateral for RISC-V processor verification. Since 2019 the members have worked together to develop CORE-V-VERIF: a UVM environment for the verification of RISC-V processor cores. Over this period of time the CORE-V-VERIF environment has evolved as new processor verification... » read more

Curvilinear Mask Patterning For Maximizing Lithography Entitlement


Curvilinear Mask Patterning is a cutting-edge lithography technique that promises to maximize lithography entitlement by addressing complex design challenges and critical yield limiters. However, its widespread deployment has been limited by significant computational challenges. This paper includes practical solutions to overcome the computational challenges associated with this technique, as w... » read more

← Older posts Newer posts →