A look at how collaboration between design, process and tool development is becoming increasingly important to get the best out of the most advanced nodes.
IoT security is critical. Embedding a root of trust in hardware can provide the firm foundation necessary for a more secure IoT implementation.
Enabling autonomous driving will demand embedded processors that can process multiple HD video streams and analyse them using convolutional neural networks.
A look at the ways in which the I2C serial interface specification is being updated to form I3C, and its use in sensor subsystems
By taking a pragmatic approach, the two technology giants have comfortably adopted high-level synthesis and verification - and have shared their experiences.
A look at three design challenges for USB Type-C: implementing two SuperSpeed datapaths on a reversible connector; partitioning the design to support multiple USB Type-C variants; and partitioning the management software.
A look at USB 3.1, which offers data rates of up to 10Gbit/s, and the way that the USB 3.1 protocol has changed to support this rate.
An analysis of what it takes to build true random number generators that can provide a strong cryptographic basis for systems security, especially for IoT devices.
A quick look at Bluetooth Smart and how it can be used to provide network connections in certain classes of IoT application.
Flash is the ice cream of memory technologies - everybody loves it. But you need to build the right verification environment to extract the greatest benefit.
View All Sponsors