Week In Review: Design, Low Power


M&A ANSYS will acquire Livermore Software Technology Corp. (LSTC), a provider of explicit dynamics and other advanced finite element analysis technology. Based in Livermore, CA, LSTC was founded in 1987 to commercialize the DYNA3D technology developed at the Lawrence Livermore National Laboratory. DYNA3D became the company's premier product LS-DYNA, a general purpose nonlinear finite eleme... » read more

Week In Review: Design, Low Power


The MIPI Alliance released MIPI I3C Basic v1.0, a subset of the MIPI I3C sensor interface specification that bundles 20 of the most commonly needed I3C features for developers and other standards organizations. The royalty-free specification includes backward compatibility with I2C, 12.5 MHz multi-drop bus that is over 12 times faster than I2C supports, in-band interrupts to allow slaves to not... » read more

Week In Review: Design, Low Power


Arm acquired Treasure Data, a provider of enterprise data management solutions. Along with Mbed Cloud and the recent acquisition of Stream, which provides connectivity and device management, it will form the basis of Arm's new IoT management platform. Treasure Data was founded in 2011. Terms of the deal were not disclosed, although Bloomberg reported the price at $600 million. UltraSoC n... » read more

The Week In Review: Design


Tools & IP Synopsys uncorked ASIL B, C, and D ready versions of its DesignWare EV6x Embedded Vision Processors for automotive SoCs. An included Safety Enhancement Package provides hardware safety features, safety monitors, and lockstep capabilities for safety-critical designs. The processors integrate scalar, vector DSP, and CNN processing units for automotive systems that require deep lea... » read more

The Week In Review: Design


M&A IoT-focused memory chipmaker Adesto Technologies acquired S3 Semiconductors, a provider of mixed-signal and RF ASICs and IP. Based in Ireland, S3 Semiconductors was founded in 1986. S3 Semiconductors will become a business unit of Adesto and will continue to operate under its current model in the $35 million deal. S3 Semiconductor's parent company, S3 Group, will continue as a separate... » read more

The Week In Review: Design


M&A ANSYS finalized its acquisition of OPTIS. Founded in 1989, OPTIS provided software for scientific simulation of light, human vision and physics-based visualization. The acquisition boosts the company's automotive simulation portfolio with radar, lidar and camera simulation. Terms were not disclosed. IP Arm debuted the Cortex-M35P processor. Aimed at IoT applications, the IP combine... » read more

The Week In Review: Design


M&A Alibaba acquired C-Sky Microsystems, which focuses on 32-bit embedded CPU IP cores in both low power and high performance varieties, as well as SoC and MCU platforms. Founded in 2001, the Hangzhou, China-based C-Sky previously received investment from Alibaba, and the two companies collaborated on a hardware and software platform for IoT and cloud integration. The deal comes on the hee... » read more

The Week In Review: Design


M&A Synopsys acquired PhoeniX Software, expanding its photonic integrated circuit design range. Founded in 2003 and based in the Netherlands, PheoniX adds photonic aware physical layout capabilities, enabled by support for foundry-specific PDKs, along with a full photonic chip design package. Terms of the deal were not disclosed. Siemens PLM Software will acquire Sarokal Test Systems, w... » read more

Embedded Display IP Solution For 4K Resolutions


By Licinio Sousa, Synopsys, and Vassilis Androutsopoulos, Arm To meet consumers’ demands for high-resolution content and visual quality, high-end smartphones are moving from wide quad HD (WQHD) displays to ultra-high-resolution 4K displays. For AR/VR applications, since the display is closer to the eyes and must maintain visual quality, more pixels and high refresh rates are needed. Higher... » read more

The Week In Review: Design


Security Security researchers identified a major exploit of the "speculative execution" technique used to optimize performance in modern processors. The flaws allow an attacker to read sensitive information in the system's memory such as passwords, encryption keys, or sensitive information open in applications, according to Google's Jann Horn. Multiple researchers discovered the issues indepen... » read more

← Older posts