The Challenge Of Optimizing Chip Architectures For Workloads


It isn't possible to optimize a workload running on a system just by looking at hardware or software separately. They need to be developed together and intricately intertwined, an engineering feat that also requires bridging two worlds with have a long history of operating independently. In the early days of computing, hardware and software were designed and built by completely separate team... » read more

What’s In A Name(space)? Optimizing SSD Controller Performance And Verification


Solid state drives (SSDs) have come to the forefront as a promising solution for today and tomorrow’s immense data transfer and storage demands. And SSDs themselves are constantly evolving with upgrades of their critical components to provide higher access speeds. One such component for the NVMe specification is created by the division of non-volatile memory (NVM) into what are commonly known... » read more

NVMe-oF: Simple, Invisible Fabric For Distributed Storage Networks


In today’s fast paced world, we need seamless access to huge chunks of data and new-world technologies, such as artificial intelligence (AI), machine learning (ML), cloud computing, and real-time data analytics. AI researchers are deriving applications such as cyber security analysis and intelligent virtual assistants (IVA) where the computer needs to process an intense amount of data. Theref... » read more

Hidden Impacts Of Software Updates


Over-the-air updates can reduce obsolescence over longer chip and system lifetimes, but those updates also can impact reliability, performance, and affect how various resources such as memory and various processing elements are used. The connected world is very familiar with over-the-air (OTA) updates in smart phones and computers, where the software stack — firmware, operating systems, dr... » read more

Where And When End-to-End Analytics Works


With data exploding across all manufacturing steps, the promise of leveraging it from fab to field is beginning to pay off. Engineers are beginning to connect device data across manufacturing and test steps, making it possible to more easily achieve yield and quality goals at lower cost. The key is knowing which process knob will increase yield, which failures can be detected earlier, and wh... » read more

Automotive Safety Island


The promise of autonomous vehicles is driving profound changes in the design and testing of automotive semiconductor parts. Automotive ICs, once deployed for simple functions like controlling windows, are now performing complex functions related to advanced driver-assist systems (ADAS) and autonomous driving applications. The processing power required results in very large and complex ICs that ... » read more

Cybersecurity Through Hardware-Based Threat Detection And Mitigation


SoC design teams fill a mission-critical role in ensuring cyber-physical safety and security for electrical and electronic systems that are connected to the internet. The requirements and tools available to achieve this goal are ever-shifting, but we can be fairly sure that traditional software-only security measures are unlikely to be sufficient; a new class of hardware-level monitoring is als... » read more

Week In Review: Auto, Security, Pervasive Computing


Automotive, mobility Stellantis is buying Share Now, a car sharing service owned by BMW and Mercedes-Benz. Through the acquisition, Stellantis will be adding 3.4 million car sharing customers, 10,000 vehicles, and 14 new European cities to its Free2move car sharing service, which currently has 2 million users, 2,500 vehicles, and has 7 “mobility hubs” in the U.S. and Europe. ShareNow was a... » read more

Week In Review: Design, Low Power


Rambus will acquire Hardent, a provider of design services and IP. Rambus said Hardent's silicon design, verification, compression, and Error Correction Code (ECC) expertise will provide key resources for the Rambus CXL Memory Interconnect Initiative. “Driven by the demands of advanced workloads like AI/ML and the move to disaggregated data center architectures, industry momentum for CXL-base... » read more

Building Security Into ICs From The Ground Up


Cyberattacks are becoming more frequent and more sophisticated, but they also are starting to compromise platforms that until recently were considered unbreakable. Consider blockchains, for example, which were developed as secure, distributed ledger platforms. All of them must be updated with the same data for a transaction to proceed. But earlier this year a blockchain bridge platform calle... » read more

← Older posts Newer posts →