Power Management Becomes Top Issue Everywhere


Power management is becoming a bigger challenge across a wide variety of applications, from consumer products such as televisions and set-top-boxes to large data centers, where the cost of cooling server racks to offset the impact of thermal dissipation can be enormous. Several years ago, low-power design was largely relegated to mobile devices that were dependent on a battery. Since then, i... » read more

Blog Review: Mar. 11


Rambus' Steven Woo examines how the upcoming deployment of 5G will enable processing at the edge, and how the edge is getting refined further into the near edge and the far edge with a range of AI solutions across it. A Synopsys writer explains the types of Compute Express Link devices and CXL's unique verification challenges like maintaining the cache coherency between a host CPU and an acc... » read more

5G And AI Raise Security Risks For IoT Devices


This IDC Technology Spotlight, sponsored by Rambus, highlights the fifth generation of cellular network technology (5G) is scaling further in 2020, enabling a new wave of AI-powered end points. To remain competitive, manufacturers must implement enhanced security measures on edge and IoT devices designed for the increased performance in speed, latency, and connection density. Click here to r... » read more

High-Performance Memory For AI And HPC


Frank Ferro, senior director of product management at Rambus, examines the current performance bottlenecks in high-performance computing, drilling down into power and performance for different memory options, and explains what are the best solutions for different applications and why. » read more

Battling Persistent Hacks At The Flash Level


Hardware vendors are beginning to close up security vulnerabilities across a broader range of technology than in the past, a sign that they are taking potential hardware breaches much more seriously. Awareness of security flaws has been growing since the introduction of Meltdown, Spectre and Foreshadow, and more recently, the Cable Haunt attack. The general conclusion among chipmakers is tha... » read more

Implementing Strong Security For AI/ML Accelerators


A number of critical security vulnerabilities affecting high-performance CPUs identified in recent years have rocked the semiconductor industry. These high-profile vulnerabilities inadvertently allowed malicious programs to access sensitive data such as passwords, secret keys and other secure assets. The real-world risks of silicon complexity The above-mentioned vulnerabilities are primaril... » read more

HBM2E and GDDR6: Memory Solutions for AI


Artificial Intelligence/Machine Learning (AI/ML) growth proceeds at a lightning pace. In the past eight years, AI training capabilities have jumped by a factor of 300,000 driving rapid improvements in every aspect of computing hardware and software. Meanwhile, AI inference is being deployed across the network edge and in a broad spectrum of IoT devices including in automotive/ADAS. Training and... » read more

Blog Review: March 4


Mentor's Shivani Joshi provides a primer on design rule checks and how they can help flag potential issues in PCB design. Synopsys' Taylor Armerding argues that while better IoT security requires a change in consumer culture and habits, manufacturers and government should be doing more as well. Cadence's Johnas Street chats with several colleagues about what Black History Month means to t... » read more

An Increasingly Complicated Relationship With Memory


The relationship between a processor and its memory used to be quite simple, but in modern SoCs there are multiple heterogeneous processors and accelerators, each needing a different means of accessing memory for maximum efficiency. Compromises are being made in order to preserve the unified programming model of the past, but the pressures are increasing for some fundamental changes. It does... » read more

Blog Review: Feb. 19


Arm's Urmish Thakker takes a look at TinyML, some of the challenges in developing efficient architectures for resource constrained devices, and an explanation of Kronecker product compression. Mentor's Colin Walls considers whether it's better to use single or multiple returns for a function when writing understandable, readable code. Cadence's Paul McLellan shares highlights from a prese... » read more

← Older posts Newer posts →