Dana Neustadter |  October 16, 2018
As AI becomes pervasive in computing applications, so too does the need for high-grade security in all levels of the system.
Allen Watson |  October 3, 2018
Exchange frameworks are emerging to make it easier for neural-network developers to swap between development environments.
Gordon Cooper |  September 23, 2018
Machine-learning strategies for embedded vision are evolving so quickly that designers need access to flexible, heterogenous processor architectures that can adapt as the algorithms evolve.
Gandharv Bhatara |  September 11, 2018
Gandharv Bhatara looks at how the OPC and RET elements of Calibre are getting ready for the EUV age.
Ashish Darbari |  August 14, 2018
Ashish Darbari breaks down formal's value to this challenging verification task with code examples and reference to VC Formal from Synopsys.
Dina Medhat |  August 13, 2018
Dina Medhat describes what you need to know about the types of waiver strategy that can be applied.
Ashish Darbari |  July 23, 2018
Doc Formal sets out the 10 cost points in verification that formal will help you control and reduce.
Sean Safarpour |  July 17, 2018
Effective formal verification demands striking a careful balance in the use of constraints – too many slows things down, but too few may let bugs slip through.
Ruud Derwig |  July 11, 2018
Choosing the right crypto processor implementation involves a complex set of design tradeoffs between speed, area, power consumption and flexibility. Using consistent benchmarks can help explore your options.
Andy Ladd |  June 18, 2018
Andy Ladd highlights the wide range of peak-power concerns around plugged-in devices.