Week In Review: Manufacturing, Test


Packaging ASE, AMD, Arm, Google, Intel, Meta, Microsoft, Qualcomm, Samsung, and TSMC have announced the formation of a consortium that will establish a die-to-die interconnect standard and foster an open chiplet ecosystem. The founding companies also ratified the UCIe specification, an open industry standard developed to establish a standard interconnect at the package level. The UCIe 1.0 s... » read more

Data Center Architectures In Flux


Data center architectures are becoming increasingly customized and heterogeneous, shifting from processors made by a single vendor to a mix of processors and accelerators made by multiple vendors — including system companies' own design teams. Hyperscaler data centers have been migrating toward increasingly heterogeneous architectures for the past half decade or so, spurred by the rising c... » read more

Why RISC-V Is Succeeding


There is no disputing the excitement surround the introduction of the RISC-V processor architecture. Yet while many have called it a harbinger of a much broader open-source hardware movement, the reasons behind its success are not obvious, and the implications for an expansion of more open-source cores is far from certain. “The adoption of RISC-V as the preferred architecture for many sili... » read more

Improving PPA In Complex Designs With AI


The goal of chip design always has been to optimize power, performance, and area (PPA), but results can vary greatly even with the best tools and highly experienced engineering teams. Optimizing PPA involves a growing number of tradeoffs that can vary by application, by availability of IP and other components, as well as the familiarity of engineers with different tools and methodologies. Fo... » read more

Week In Review: Auto, Security, Pervasive Computing


Pervasive computing, IoT and 5G Infineon added to its NFC (near-field communications) IP by acquiring NFC patent portfolios from France Brevets and Verimatrix. “With this acquisition, Infineon further strengthens its IP and technology portfolio, specifically in our leadership markets for security and connectivity for the IoT,” said Thomas Rosteck, president of Infineon’s Connected Secure... » read more

Week In Review: Auto, Security, Pervasive Computing


Security Arm shipped a prototype CHERI-enabled Morello processor, SoC, and board, the first products coming from the security Morello research program that aims to make more secure hardware that will block certain common attacks. The first board prototypes are going to testing teams at Google, Microsoft, and other major stakeholders and partners across the industry and academia.  The UKRI (UK... » read more

Improving Energy And Power Efficiency In The Data Center


Energy costs in data centers are soaring as the amount of data being generated explodes, and it's being made worse by an imbalance between increasingly dense processing elements that are producing more heat and uneven server utilization, which requires more machines to be powered up and cooled. The challenge is to maximize utilization without sacrificing performance, and in the past that has... » read more

Will Markets For ML Models Materialize?


Developers are spending increasing amounts of time and effort in creating machine-learning (ML) models for use in a wide variety of applications. While this will continue as the market matures, at some point some of these efforts might be seen as reinventing models over and over. Will developers of successful models ever have a marketplace in which they can sell those models as IP to other d... » read more

Startup Funding: November 2021


There's nothing virtual about the level of interest in AR/VR startups. As the concept of the 'metaverse' becomes more widespread with Nvidia's recent GTC announcements and Facebook's rebranding, investors poured money into startups with enabling technology for augmented, virtual, and extended reality. Most of those are developing waveguides and other display technology that is light enough to b... » read more

Gaps In The AI Debug Process


When an AI algorithm is deployed in the field and gives an unexpected result, it's often not clear whether that result is correct. So what happened? Was it wrong? And if so, what caused the error? These are often not simple questions to answer. Moreover, as with all verification problems, the only way to get to the root cause is to break the problem down into manageable pieces. The semico... » read more

← Older posts Newer posts →