Architecture & Design

February 8, 2017
Veloce featured image for SSD Verification article

Emulation strategies for SSD verification

SSD controllers are becoming increasingly complex and as a result emulation is now the first choice for SSD verification. But your strategy must still meet five key criteria.
December 16, 2016
Robert Vamosi, CISSP and security strategist at Synopsys

Software validation strategies for connected cars

Software validation strategies will become increasingly important as cars become more complex, connected and autonomous.
Expert Insight  |  Tags: , ,   |  Organizations:
December 14, 2016
IoTSF eye on security image

Guidelines attempt to build trust in IoT

When developing its security guidelines and checklists for consumer IoT and similar devices, the IoT Security Foundation's working groups tested their recommendations against what is known about real-world hacks and attacks.
Article  |  Tags: , , ,   |  Organizations:
December 12, 2016
Eric Huang, Synopsys

USB 2.0 as an integration standard for IoT products

USB 2.0 could become an integration standard for IoT SoCs, due to its ubiquity, available drivers, support for rapid prototyping, and area efficiency.
Expert Insight  |  Tags: , , ,   |  Organizations: ,
November 10, 2016

The advantages of MIPI specifications in mobile, automotive and multimedia applications

A look at the ways in which the evolving MIPI standard is being used to provide connectivity in automotive, mobile, multimedia, virtual reality, augmented reality and related applications.
Article  |  Tags: , , , ,
October 27, 2016
Ron Lowman, strategic marketing manager for IoT, Synopsys

Exploring the advantages of monolithic Bluetooth low energy radio integration

A look at implementing Bluetooth low energy interfaces into a design and the trade-offs involved in making different levels of integration
Expert Insight  |  Tags: , ,   |  Organizations: ,
August 12, 2016
Phil Brumby is a Senior Technical Marketing Engineer in the Mentor Graphics Embedded Systems Division.

How to analyze embedded GUI performance effectively

Users now demand a smooth GUI experience. Making sure they get one requires harvesting and understanding key metrics.
Expert Insight  |  Tags: , , ,   |  Organizations: ,
July 29, 2016

Hardware roots of trust for IoT security

IoT security is critical. Embedding a root of trust in hardware can provide the firm foundation necessary for a more secure IoT implementation.
Article  |  Tags: , , ,   |  Organizations:
June 10, 2016
Mike Borza, Synopsys

Laying the foundations of a more secure IoT

The challenges of creating a more secure IoT, and the role that hardware roots of trust can play in doing so.
Expert Insight  |  Tags: , , , ,   |  Organizations:
May 23, 2016
Road signs used to train IDSIA neural network

Bit width tweaks point way to practical deep learning

In both data centers and automobiles deep learning is taking hold. But it is a technique that challenges conventional microprocessors, leading system designers to look at alternative architectures for acceleration.

PLATINUM SPONSORS

Synopsys Cadence Design Systems Mentor - A Siemens Business
View All Sponsors