EDPS: Transitioning From 5G To 6G


At the recent EDPS, the keynote on the second day was by Mallik Tatipamula. He is the CTO of Ericsson Silicon Valley and also has experience all over the telecom industry with stints at F5, Juniper Networks, Cisco, Motorola, Nortel, and the Indian Institute of Technology Madras. Mallik started with a potted history of mobile. You may already know all this, and I've covered my version ... » read more

Balancing Power And Heat In Advanced Chip Designs


Power and heat use to be someone else's problem. That's no longer the case, and the issues are spreading as more designs migrate to more advanced process nodes and different types of advanced packaging. There are a number of reasons for this shift. To begin with, there are shrinking wire diameters, thinner dielectrics, and thinner substrates. The scaling of wires requires more energy to driv... » read more

Blog Review: Nov. 9


Cadence's Claire Ying finds that the latest update to CXL, which introduced memory-centric fabric architectures and expanded capabilities for improving scale and optimizing resource utilization, could change how some of the world’s largest data centers and fastest supercomputers are built. Synopsys' Gervais Fong and Morten Christiansen examine the latest updates in the USB 80Gbps specifica... » read more

Enabling Accurate Electronic-Photonic Co-Design with a Synergetic Workflow on GlobalFoundries Fotonix Platform


Massive growth in research, development, and applications of CMOS-compatible integrated photonics in recent years, along with its expected potential for the years to come, has sparked an ever-increasing demand from designers for seamless and all-inclusive design automation solutions that can enable electronic-photonic co-design while being accurate and easy to use. Here, we demonstrate an end-t... » read more

Unleash The Potential of CFD


Classic CFD to High-Order Scalability Instead of relying on expensive prototype testing or experimentation, users now have access to numerous open-source and paid computational fluid dynamics (CFD) software that can help them solve application-specific problems. Today, CFD is no longer about getting one solution at a time; it is about getting the best possible solution from multiple design tes... » read more

Memory-Based Cyberattacks Become More Complex, Difficult To Detect


Memories are becoming entry points for cyber attacks, raising concerns about system-level security because memories are nearly ubiquitous in electronics and breaches are difficult to detect. There is no end in sight with hackers taking aim at almost every consumer, industrial, and commercial segment, and a growing number of those devices connected to the internet and to each other. According... » read more

AI Feeds Vision Processor, Image Sensor Boom


Vision systems are rapidly becoming ubiquitous, driven by big improvements in image sensors as well as new types of sensors. While the sensor itself often is developed using mature-node silicon, increasingly it is connected to vision processors developed at the most advanced process nodes. That allows for the highest performance per watt, and it also allows designs to incorporate AI accelera... » read more

Post-Quantum And Pre-Quantum Security Issues Grow


General-purpose quantum computers will be able to crack the codes that protect much of the world’s information, and while these machines don’t exist yet, security experts say governments and businesses are starting to prepare for encryption in a post-quantum world. The task is made all the more challenging because no one knows exactly how future quantum machines will work, or even which mat... » read more

RISC-V Is Thriving: Here’s What You Need to Know


RISC-V, the open-standard Instruction Set Architecture (ISA) conceived by UC Berkeley developers in 2010, is going from strength to strength. The RISC in RISC-V stands for Reduced Instruction Set Computer, meaning it’s designed to simplify each individual instruction given to the computer. As RISC-V is an open standard, anyone can implement, customize, and expand the ISA to suit their r... » read more

Blog Review: Nov. 2


Siemens EDA's Harry Foster examines how successful FPGA projects are in terms of verification effectiveness, finding that only 16% of all FPGA projects were able to achieve no non-trivial bug escapes into production, worse than IC/ASIC in terms of first silicon success. Synopsys' Jamie Boote and The Chertoff Group's David London break down best practice guidance and directives U.S. governmen... » read more

← Older posts Newer posts →