Architecture & Design

December 16, 2016
Robert Vamosi, CISSP and security strategist at Synopsys

Software validation strategies for connected cars

Software validation strategies will become increasingly important as cars become more complex, connected and autonomous.
Expert Insight  |  Tags: , ,   |  Organizations:
December 14, 2016
IoTSF eye on security image

Guidelines attempt to build trust in IoT

When developing its security guidelines and checklists for consumer IoT and similar devices, the IoT Security Foundation's working groups tested their recommendations against what is known about real-world hacks and attacks.
Article  |  Tags: , , ,   |  Organizations:
December 12, 2016
Eric Huang, Synopsys

USB 2.0 as an integration standard for IoT products

USB 2.0 could become an integration standard for IoT SoCs, due to its ubiquity, available drivers, support for rapid prototyping, and area efficiency.
Expert Insight  |  Tags: , , ,   |  Organizations: ,
November 10, 2016
tdf_new-uses-for-mipi-interfaces-featimg

The advantages of MIPI specifications in mobile, automotive and multimedia applications

A look at the ways in which the evolving MIPI standard is being used to provide connectivity in automotive, mobile, multimedia, virtual reality, augmented reality and related applications.
Article  |  Tags: , , , ,
October 27, 2016
Ron Lowman, strategic marketing manager for IoT, Synopsys

Exploring the advantages of monolithic Bluetooth low energy radio integration

A look at implementing Bluetooth low energy interfaces into a design and the trade-offs involved in making different levels of integration
Expert Insight  |  Tags: , ,   |  Organizations: ,
August 12, 2016
Phil Brumby is a Senior Technical Marketing Engineer in the Mentor Graphics Embedded Systems Division.

How to analyze embedded GUI performance effectively

Users now demand a smooth GUI experience. Making sure they get one requires harvesting and understanding key metrics.
Expert Insight  |  Tags: , , ,   |  Organizations: ,
July 29, 2016
IoT and root of trust diag 5 featimg

Hardware roots of trust for IoT security

IoT security is critical. Embedding a root of trust in hardware can provide the firm foundation necessary for a more secure IoT implementation.
Article  |  Tags: , , ,   |  Organizations:
June 10, 2016
Mike Borza, Synopsys

Laying the foundations of a more secure IoT

The challenges of creating a more secure IoT, and the role that hardware roots of trust can play in doing so.
Expert Insight  |  Tags: , , , ,   |  Organizations:
May 23, 2016
Road signs used to train IDSIA neural network

Bit width tweaks point way to practical deep learning

In both data centers and automobiles deep learning is taking hold. But it is a technique that challenges conventional microprocessors, leading system designers to look at alternative architectures for acceleration.
May 10, 2016
USB Type C connector

Implementing USB Type-C

A look at three design challenges for USB Type-C: implementing two SuperSpeed datapaths on a reversible connector; partitioning the design to support multiple USB Type-C variants; and partitioning the management software.
Article  |  Tags: , ,   |  Organizations:

PLATINUM SPONSORS

Mentor Graphics GLOBALFOUNDRIES Synopsys Samsung Semiconductor Cadence Design Systems
View All Sponsors