The challenge for designers is to find ways of providing high levels of security in low-cost devices that have become worthwhile targets because of their role as gateways to more valuable information.
Why is verification still such a challenge in spite of all the technologies and techniques being brought to bear
The assumption has been that extra security eats into profit margins. But with some lateral thinking it can actually improve the bottom line.
Doc Formal concludes his introduction to formal verification with a practitioner's view of the technology.
Using VESA's Display Stream Compression (DSC) standard to enable visually lossless performance and low latency for ultra-high-definition displays.
Doc Formal begins a two-part series by describing the solid and well-established foundations of formal verification.
CCIX is a cache coherency protocol, based on PCI Express, for interconnecting high-performance heterogenous multiprocessing systems.
Quadrupling the performance of a dedicated CNN engine within an embedded vision processing core brings more complex graph processing within reach.
SoC developers who want to use USB Type-C in their designs will have to implement HDCP 2.2 content protection so that the target devices will be able to play protected content.
German consultancy E-Cooling describes its strategy for thermal and airflow analysis.
View All Sponsors