AI Races To The Edge


AI is becoming increasingly sophisticated and pervasive at the edge, pushing into new application areas and even taking on some of the algorithm training that has been done almost exclusively in large data centers using massive sets of data. There are several key changes behind this shift. The first involves new chip architectures that are focused on processing, moving, and storing data more... » read more

Cut Power + Cost 5 – 10x: Integrate FPGA In Your SoC


FPGA chips are high cost devices with a high profit margin for the manufacturer: this goes away when you integrate. FPGA packages are large and expensive because of the large number of very high speed signals that require expensive signal integrity design and packaging layers. When you integrate this goes away. And you save the board area the FPGA package took; and eliminate expensive voltage r... » read more

Security Becomes Much Bigger Issue For AI/ML Chips, Tools


Security is becoming a bigger issue in AI and machine learning chips, in part because the chip industry is racing just to get new devices working, and in part because it's difficult to secure a new technology that is expected to adapt over time. And unlike in the past, when tools and methodologies were relatively fixed, nearly everything is in motion. Algorithms are being changed, EDA tools ... » read more

Modular FPGA Makes FPGA Easier To Use


Traditionally FPGAs are configured once at boot/power-on. This is because they almost always store the configuration file in a Flash memory which is updated from time to time (like your smart phone’s OS and apps). But eFPGA is in your SoC, so you can provide the configuration files from on chip SRAM, on chip NVM and/or off chip DRAM. EFLX eFPGA is reconfigurable. Process nodes like 40nm... » read more

Solving The Quantum Threat With Post-Quantum Cryptography On eFPGAs


The quantum threat and post-quantum cryptography Advances in quantum computing technology threaten the security of current cryptosystems. Asymmetric cryptography algorithms that are used by modern security protocols for key exchange and digital signatures rely on the complexity of certain mathematical problems. Currently, the main problems used for asymmetric cryptography are integer f... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, mobility Siemens Digital Industries Software and climate-tech company sustamize devised a way to add carbon emissions data to Siemens Xcelerator. Siemens created its Teamcenter Carbon Footprint Calculator software to help teams measure, simulate, reduce, and track their product carbon footprint early in the development phase. The calculator uses sustamize’s Product Footprint Engi... » read more

Big Changes In Architectures, Transistors, Materials


Chipmakers are gearing up for fundamental changes in architectures, materials, and basic structures like transistors and interconnects. The net result will be more process steps, increased complexity for each of those steps, and rising costs across the board. At the leading-edge, finFETs will run out of steam somewhere after the 3nm (30 angstrom) node. The three foundries still working at th... » read more

Cities Strive For More Smarts, Security


As cities around the world move beyond their first completed smart city projects and add more systems, they face hurdles in expanding but have more standards, technical resources, and real-world examples to draw on when making project design decisions. The main concern is keeping the smart city systems and their data and functions safe, especially if the system is touching critical infrastructu... » read more

Week In Review: Auto, Security, Pervasive Computing


Security Flex Logix Technologies is partnering with Intrinsic ID to secure and protect any device using its eFPGA, so the device can’t be modified maliciously, through physical attacks or remote hacking. Flex Logix’s EFLX ePFGA will have Intrinsic ID’s SRAM physical unclonable function (PUF), a military-grade security IP that gives a device a unique silicon ID. The ID secures confidentia... » read more

Telecare Challenges: Secure, Reliable, Lower Power


The adoption of telecare using a variety of connected digital devices is opening the door to much more rapid response to medical emergencies, as well as more consistent monitoring, but it also is adding new challenges involving connectivity, security, and power consumption. Telecare has been on the horizon for the better part of two decades, but it really began ramping with improvements in s... » read more

← Older posts