Top Stories
Virtualization In The Car
How and why abstraction layers are becoming essential in automotive design.
WiFi Evolves For The IoT
Extending the usefulness of a ubiquitous wireless technology.
Big Changes In AI Design
Experts at the Table: Why it’s becoming easier to develop AI for edge applications, and how AI will be partitioned between the edge and the cloud.
Blogs
Rambus’ Paul Karazuba shows how secure provisioning of cryptographic keys can fight the billions of dollars in counterfeit components, in Combating Counterfeit Chips.
OneSpin’s Sergio Marchese explains why it’s important for hardware engineers to be talking about security and trust in ASICs, FPGAs, and SoCs, in Welcome To 6 Minutes Of Security.
Tortuga Logic’s Andreas Kuehlmann advises that building secure products requires adjusting business priorities, maturing organizations and processes, and establishing clear metrics, in Hardware Security: A Critical Piece Of The Cybersecurity Puzzle.
Flex Logix’s Vinay Mehta outlines the challenges of defining a benchmark to assess inference hardware, in Performance Metrics For Convolutional Neural Network Accelerators.
Maxim Integrated’s Christine Young Key lays out the challenges to maintaining system reliability in the face of natural phenomena and malicious attacks, in When You Can’t Afford To Scrimp On System Reliability.
Mentor’s Jim Martens and RF Laboratories’ David Zima observe that systematically limiting the design scope at the beginning makes producing a successful layout more likely, in Best Practices And Constraint Management Tools Speed RF Design For The IoT.
Cadence’s Paul McLellan recounts five industry experts discussing how to bring automation to a safety-aware IP and SoC design flow, in Accellera Tackles Functional Safety.