Why Hardware-Dependent Software Is So Critical


Hardware and software are two sides of the same coin, but they often live in different worlds. In the past, hardware and software rarely were designed together, and many companies and products failed because the total solution was unable to deliver. The big question is whether the industry has learned anything since then. At the very least, there is widespread recognition that hardware-depen... » read more

Blog Review: June 22


Arm's Andrew Pickard checks out a project at Sorbonne Université in Paris that is using the Cortex-M3 processor source code to model what is happening in the hardware at the microarchitectural level and find ways to prevent side-channel leakage of sensitive cryptographic information. Cadence's Paul McLellan digs into the development of high-NA EUV lithography and some of the challenges ahea... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, mobility U.S. National Highway Traffic Safety Administration (NHTSA) release its first crash reports from ADAS (advanced driver assistance systems, i.e., SAE Level 2) and ADS (automated driving systems, i.e., SAE Levels 3-5).  The systems had to be in use at least 30 seconds before the crash in order for it to be reportable. The car may have had the system turned off at the time ... » read more

Blog Review: June 15


Ansys' Vidyu Challa considers common primary, or single-use, battery chemistries and how they affect that many important cell properties, such as energy density, flammability and safety, available cell constructions, temperature range, and shelf life. Synopsys' Rimpy Chugh and Rohit Kumar Ohlayan discuss some of the challenges arising from static linting of code, shifting linting left in the... » read more

Chips Can Boost Malware Immunity


Security is becoming an increasingly important design element, fueled by increasingly sophisticated attacks, the growing use of technology in safety-critical applications, and the rising value of data nearly everywhere. Hackers can unlock automobiles, phones, and smart locks by exploiting system design soft spots. They even can hack some mobile phones through always-on circuits when they are... » read more

Audio, Visual Advances Intensify IC Design Tradeoffs


A spike in the number of audio and visual sensors is greatly increasing design complexity in chips and systems, forcing engineers to make tradeoffs that can affect performance, power, and cost. Collectively, these sensors generate so much data that designers must consider where to process different data, how to prioritize it, and how to optimize it for specific applications. The tradeoffs in... » read more

Week In Review: Design, Low Power


Edge, embedded, IoT Renesas Electronics will acquire Reality Analytics, Inc. (Reality AI), a provider of embedded AI and TinyML solutions for advanced non-visual sensing in automotive, industrial, and commercial products. The inference-based AI solutions can be implemented across various endpoint AI applications. “Customers are increasingly demanding highly customized solutions involving emb... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, mobility Lightyear, an automotive company based in the Netherlands, announced its solar car, the Lightyear 0, which goes into production this year. The car has a Worldwide Harmonised Light Vehicle Test Procedure (WLTP) range of 625 kilometers/388 miles and can charge itself while driving or parked, using double curved solar arrays on its roof. The daily charging adds 70 kilometers/... » read more

Enabling SoC Visibility For Future Secure Hardware Architectures With In-Chip Environmental Monitoring


Billions of people around the world are now online and generating vast amounts of data every day. This data revolution, which is largely driven by user performance requirements, is a double-edged sword. On one hand it is enabling huge technology advancements, revolutionizing the way we connect with each other and the world around us, but on the other hand it is exposing major vulnerabilities in... » read more

AI-Powered Verification


With functional verification consuming more time and effort than design, the chip industry is looking at every possible way to make the verification process more effective and more efficient. Artificial intelligence (AI) and machine learning (ML) are being tested to see how big an impact they can have. While there is progress, it still appears to be just touching the periphery of the problem... » read more

← Older posts Newer posts →