Architecture & Design

October 27, 2016
Ron Lowman, strategic marketing manager for IoT, Synopsys

Exploring the advantages of monolithic Bluetooth low energy radio integration

A look at implementing Bluetooth low energy interfaces into a design and the trade-offs involved in making different levels of integration
Expert Insight  |  Tags: , ,   |  Organizations: ,
August 12, 2016
Phil Brumby is a Senior Technical Marketing Engineer in the Mentor Graphics Embedded Systems Division.

How to analyze embedded GUI performance effectively

Users now demand a smooth GUI experience. Making sure they get one requires harvesting and understanding key metrics.
Expert Insight  |  Tags: , , ,   |  Organizations: ,
July 29, 2016

Hardware roots of trust for IoT security

IoT security is critical. Embedding a root of trust in hardware can provide the firm foundation necessary for a more secure IoT implementation.
Article  |  Tags: , , ,   |  Organizations:
June 10, 2016
Mike Borza, Synopsys

Laying the foundations of a more secure IoT

The challenges of creating a more secure IoT, and the role that hardware roots of trust can play in doing so.
Expert Insight  |  Tags: , , , ,   |  Organizations:
May 23, 2016
Road signs used to train IDSIA neural network

Bit width tweaks point way to practical deep learning

In both data centers and automobiles deep learning is taking hold. But it is a technique that challenges conventional microprocessors, leading system designers to look at alternative architectures for acceleration.
May 10, 2016
USB Type C connector

Implementing USB Type-C

A look at three design challenges for USB Type-C: implementing two SuperSpeed datapaths on a reversible connector; partitioning the design to support multiple USB Type-C variants; and partitioning the management software.
Article  |  Tags: , ,   |  Organizations:
April 12, 2016

Understanding the USB 3.1 protocol

A look at USB 3.1, which offers data rates of up to 10Gbit/s, and the way that the USB 3.1 protocol has changed to support this rate.
Article  |  Tags: , , , ,   |  Organizations: ,
March 24, 2016

True random number generators for a more secure IoT

An analysis of what it takes to build true random number generators that can provide a strong cryptographic basis for systems security, especially for IoT devices.
Article  |  Tags: , , , , ,   |  Organizations: ,
March 3, 2016

What’s cooking at the Flash Diner?

Flash is the ice cream of memory technologies - everybody loves it. But you need to build the right verification environment to extract the greatest benefit.
January 11, 2016

FPGA design for functional safety

Using triple modular redundancy, error detection and correction, and 'safe' FSMs to ensure greater functional safety in FPGA-based designs

PLATINUM SPONSORS

Synopsys Cadence Design Systems Siemens EDA
View All Sponsors