The basics of USB 3.2, how to implement it in an SoC, and how USB Type-C connectors and cables are used in USB 3.2 systems.
How you can use the dedicated rule decks now being provided by foundries as the foundation for a reliability verification flow.
As AI becomes pervasive in computing applications, so too does the need for high-grade security in all levels of the system.
The proliferation of attacks against embedded systems is making designers realize that they need to do more to secure their products and ecosystems.
Machine-learning strategies for embedded vision are evolving so quickly that designers need access to flexible, heterogenous processor architectures that can adapt as the algorithms evolve.
Dina Medhat describes what you need to know about the types of waiver strategy that can be applied.
Designers need to understand how the architecture of electronic control units used to implement ADAS in vehicles is changing.
Choosing the right crypto processor implementation involves a complex set of design tradeoffs between speed, area, power consumption and flexibility. Using consistent benchmarks can help explore your options.
An evolution of the Ethernet standard enable time-sensitive networking with the predictable latencies and guaranteed bandwidth necessary for automotive applications.
Many car manufacturers are exploring the possibilities of autonomous vehicles. But what will it take to build sufficient AI performance into them to enable true autonomy?
View All Sponsors