Enabling Efficient and Flexible FPGA Virtualization for Deep Learning in the Cloud


SOURCE: Shulin Zeng, Guohao Dai, Hanbo Sun, Kai Zhong, Guangjun Ge, Kaiyuan Guo, Yu Wang, Huazhong Yang(Tsinghua University, Beijing, China).  Published on arXiv:2003.12101 [cs.DC])   ABSTRACT: "FPGAs have shown great potential in providing low-latency and energy-efficient solutions for deep neural network (DNN) inference applications. Currently, the majority of FPGA-based DNN accel... » read more

Virtualizing FPGAs For Multiple Cloud Users


Cloud computing has become the new computing paradigm. For cloud computing, virtualization is necessary to enable isolation between users, high flexibility and scalability, high security, and maximized utilization of hardware resources. Since 2017, because of the advantages of programmability, low latency, and high energy efficiency, FPGA has been widely adopted into cloud computing. Amazon ... » read more

Virtualization In The Car


As the automotive industry grapples with complexity due to electrification and increasing autonomy of vehicles, consolidation of ECUs within vehicles, more stringent safety and security requirements, automotive ecosystem players are looking to virtualization concepts in a number of ways to realize the vehicles of tomorrow. One way is with hardware virtualization; the ability of a device such... » read more

PowerPR Virtualization: A Critical Feature For Automotive GPUs


What is GPU virtualization? Conceptually, virtualization is the capability of a device to host one or more virtual machines (VMs) that each behave like actual independent machines with their own operating system (OS), all running on the same underlying device hardware. In regard to GPUs, this means the capability to support multiple concurrently running operating systems, each capable of submit... » read more

Ensuring A 5G Design Is Viable


Ron Squiers, network solutions specialist at Mentor, a Siemens Business, explains what’s different in 5G chips versus 4G, how to construct a front haul and back haul system so it is testable in the network stack. » read more

The Automation Of AI


Semiconductor Engineering sat down to discuss the role that EDA has in automating artificial intelligence and machine learning with Doug Letcher, president and CEO of Metrics; Daniel Hansson, CEO of Verifyter; Harry Foster, chief scientist verification for Mentor, a Siemens Business; Larry Melling, product management director for Cadence; Manish Pandey, Synopsys fellow; and Raik Brinkmann, CEO ... » read more

Arm Enterprise Virtualization With Arm System IP, Backplane Integration And Performance


Virtualization has become ubiquitous across the infrastructure market, increasing efficiency and security, boosting productivity and reducing operating costs. However, system performance remains crucial to ensuring a virtualized environment does not affect the end user’s experience. Performance within this environment depends on a number of factors such as transaction bandwidth, latencies an... » read more

Carriers Push Datacenter-Style Virtualization


The world’s largest telco carriers are leading a broad movement to bring data center-style virtualization to the core of their telecommunications networks. In an industry known for being extremely conservative when it comes to change, this one appears to be significant. The move has set off a scramble among a number of companies for unified control and forwarding plane designs, starting fr... » read more

Real-Time Virtualization – How Hard Can It Be?


What’s the first association you make when you hear of virtualization? Server farms? ‘The cloud’? Most people don’t think of embedded systems - never mind hard real-time - yet these are areas where virtualization is now becoming commonplace. Markets such as industrial, automotive and medical—many of which also have requirements around functional safety for products like car braking... » read more

Side-Channel Attacks Make Devices Vulnerable


As the world begins to take security more seriously, it becomes evident that a device is only as secure as its weakest component. No device can be made secure by protecting against a single kind of attack. Hypervisors add a layer of separation between tasks making sure that one task cannot steal secrets from another. Protection of the JTAG port is necessary to prevent access underneath the h... » read more

← Older posts Newer posts →