IoT security is critical. Embedding a root of trust in hardware can provide the firm foundation necessary for a more secure IoT implementation.
Emulators have come a long way since their first introduction nearly three decades ago.
A look at the ways in which the I2C serial interface specification is being updated to form I3C, and its use in sensor subsystems
A look at how formal verification strategies can be used to check the security feature of complex SoCs for potential data leakage and data integrity issues
The challenges of creating a more secure IoT, and the role that hardware roots of trust can play in doing so.
Sequential equivalence checking can help trap errors introduced by clock gate insertion, uninitialised registers, and X propagation issues.
In both data centers and automobiles deep learning is taking hold. But it is a technique that challenges conventional microprocessors, leading system designers to look at alternative architectures for acceleration.
A look at three design challenges for USB Type-C: implementing two SuperSpeed datapaths on a reversible connector; partitioning the design to support multiple USB Type-C variants; and partitioning the management software.
Accelerating software testing is vital to speeding up embedded system development, especially for Android and Linux systems running on ARM-based hardware. Virtual prototyping strategies, including the use of VDKs, can help.
How to accelerate many aspects of software testing by using virtual prototypes to stand in for target hardware from early in the development cycle.
View All Sponsors