MIPI CSI2 rev 2.0 transmitter/controller for FPGA, with 8 lanes and 2.5Gbps per lane
![]() | |
IP / SOC Products Articles
-
Understanding Physical Unclonable Function (PUF) (Mar. 23, 2020)
A growing number of ASICs, microcontrollers and SoCs embed hardware cryptographic accelerators or software cryptographic libraries. The emergence of the Internet of Things (IoT) will call for an even faster adoption. We now can talk about cryptography pervasion.
-
Shift Power Reduction Methods and Effectiveness for Testability in ASIC (Mar. 16, 2020)
The purpose of this article is to highlight the different methodologies to reduce power consumption during ASIC manufacture testing. It distinguishes the different architectures & methodologies to optimize power consumption during a test mode of the design with implementation. There are number of techniques to reduce power consumption with different EDA tools available in the industry.
-
Testing Embedded MRAM IP for SoCs (Mar. 02, 2020)
With momentum building for Spin Transfer Torque MRAM (STT-MRAM) as the leading flavor of embedded MRAM technology, this white paper focuses on unique test challenges for STT-MRAM on-chip memory while considering needs for automotive applications.
-
SRAM PUF is Increasingly Vulnerable (Feb. 19, 2020)
As semiconductor technology advances, SRAM is becoming outmoded as a reliable PUF security solution.
-
Layout versus Schematic (LVS) Debug (Feb. 10, 2020)
In ASIC physical implementation, once layout is generated, it must follow all the design rules for successful manufacturing and must match the schematic of the required design. To ensure this in physical verification, Design Rule Check (DRC) is carried out to check whether the layout follows the rules for fault-less manufacturing or not.
-
Choosing the Right IP for Die-to-Die Connectivity (Feb. 03, 2020)
Higher data rates and more complex functionalities are increasing the SoC size for hyperscale data center, AI, and networking applications.
-
Securing Smart Connected Homes with OTP NVM (Jan. 06, 2020)
The market for piracy is huge and hackers have become increasingly sophisticated even when security is implemented in hardware. The race between the aggressors and protectors is a battle without end. Smart connected home devices are increasingly storing and processing very sensitive and private user data in addition to attempting to deliver copyright protected content from service providers. Protecting consumer data is vital.
-
Why the Memory Subsystem is Critical in Inferencing Chips (Dec. 23, 2019)
The number of new inferencing chip companies announced this past year is enough to make your head spin. With so many chips and no lack of any quality benchmarks, the industry often forgets one extremely critical piece: the memory subsystem. The truth is, you can’t have a good inference chip unless you have a good memory subsystem.
-
Enabling security in embedded system using M.2 SSD (Dec. 16, 2019)
Storage technologies are evolving at a high speed, thanks to new generations of memories such as Nandflash, ReRAM, MRAM and other flavors. That leads in an incredible performance increase in term of bandwidth and latency. By the way, security and data privacy features are still an important feature for critical storage systems.
-
Formal-based methodology cuts digital design IP verification time (Dec. 11, 2019)
Changing your methods of performing verification can reduce verification time by several weeks.
-
Internal JTAG - A cutting-edge solution for embedded instrument testing in SoC: Part 1 (Dec. 09, 2019)
This article is divided into two parts. The first part outlines the important features of the IJTAG use model, while the latter part describes a network interface, its architecture, and how it addresses the major challenges of the SoC test.
-
Pyramid Vector Quantization and Bit Level Sparsity in Weights for Efficient Neural Networks Inference (Nov. 28, 2019)
This paper discusses three basic blocks for the inference of convolutional neural networks (CNNs). Pyramid Vector Quantization (PVQ) is discussed as an effective quantizer for CNNs weights resulting in highly sparse and compressible networks. Properties of PVQ are exploited for the elimination of multipliers during inference while maintaining high performance. The result is then extended to any other quantized weights. The Tiny Yolo v3 CNN is used to compare such basic blocks.
-
Enabling Bluetooth Out-of-Band pairing through NFC (Nov. 18, 2019)
Many services offered over Bluetooth can expose private data or let a connecting party control the Bluetooth device. Security reasons make it necessary to recognize specific devices, and thus enable control over which devices can connect to a given Bluetooth device.
-
Advantages and Challenges of Designing with Multiple Inferencing Chips (Nov. 14, 2019)
Using multiple inferencing chips can deliver significant improvements in performance, but only when the neural network is designed correctly
-
Towards Self-Driving Cars: MIPI D-PHY Enabling Advanced Automotive Applications (Nov. 05, 2019)
Since the invention of the automobile well over a century ago, car manufacturers have been focused on creating the highest-speed, safest, and most fuel-efficient cars possible.
-
Data Over Sound: Encryption is Key (Oct. 28, 2019)
You can send data over audio and it just might be more secure than using RF.
-
Designing AI enabled System with SOTIF (Safety Of The Intended Functionality) (Oct. 21, 2019)
Autonomous Vehicles (AV) needs more intelligence when it is on the move. The intelligence is not just an algorithm driven based on multiple sensor inputs alone, but here the intelligence need to be highly situational aware and by keeping the current vehicle dynamics. This needs lot situational and scenario based complex computation and communication with multiple Electronic Control Unit (ECU) within the vehicle.
-
PUF: A Crucial Technology for AI and IoT (Oct. 14, 2019)
One of the key challenges for AIoT is the protection of AI assets. AI functions often need to detect, evaluate and respond in real time. As a result, a critical security concern is the fact that internal databases and interfaces for AI are not suitable for encryption because such an operation would demand too much time and resources.
-
IP Security Assurance Standard (Oct. 03, 2019)
This paper introduces an emerging new standard called IP Security Assurance (IPSA) to address these concerns in a manner that is low-overhead, non-disruptive, and scalable across IP families. The standard specifies an approach to highlight IP assets and associated entries in the Common IP Security Concerns Enumeration (CIPSCE) knowledge base for the mitigation implementer to address.
-
Implementing Secure Boot in Your Next Design (Sep. 30, 2019)
The number of new viruses and malwares created every day is getting close to 1 million. Thus, in an always more connected world, getting protected against these attacks becomes absolutely critical. To make a device trustable one needs to make sure it runs only genuine firmware.
-
How to Design SmartNICs Using FPGAs to Increase Server Compute Capacity (Sep. 26, 2019)
An FPGA-based SmartNIC employs the expanded hardware programmability of FPGAs to build any data-plane functions required by the tasks offloaded to the SmartNIC. Because FPGAs are reprogrammable, the data-plane functions implemented by the FPGA can be torn down and reconfigured at will and in real time. All such offloaded functions operate at hardware – not software – speeds.
-
The Age of the Monster Chip (Sep. 18, 2019)
What are the system designs that require a leap in SoC complexity? It's not only big datacenter artificial intelligence (AI) chips, but also autonomous vehicles such as cars, trucks and drones; they are self-landing, reusable rockets; they are medical devices carrying out remote diagnostics.
-
The Gatekeeper of a Successful Design is the Interconnect (Sep. 03, 2019)
An effective interconnect makes delivering a complex SoC easier, more predictable, and less costly.
-
Re-Architecting SoCs for the AI Era (Aug. 26, 2019)
This paper will define AI, describe its applications, the problems it presents, and how designers can address those problems through new and holistic approaches to SoC and network on chip (NoC) design. It also describes challenges implementing AI functionality in automotive SoCs with ISO 26262 functional safety requirements.
-
Time Sensitive Networking: An Introduction to TSN (Jul. 29, 2019)
In the future, Industry 4.0 applications will require increasingly more consistent Ethernet networks. Such networks can only be produced at great cost with the traditional structure. Time-Sensitive networking (TSN) provides a solution aiming to change these current conditions.
-
Configure, Confirm, Ship: Build Secure Processor-Based Systems with Faster Time-to-Market (Jul. 29, 2019)
Security is a first-order design requirement for processor-based systems. Processor designers implement security functionality directly into the hardware itself to protect the system at its most fundamental layer.
-
How to use snakes to speed up software without slowing down the time-to-market? (Jul. 22, 2019)
At BitSim, we have a way to simplify and speed up the development cycle. In this document, we will discuss the issue of network load in an IoT environment as well as "our" way to speed up the development.
-
NVMe/TCP Improves Data Storage (Jul. 01, 2019)
Adding TCP lets the NVMe protocol for solid-state drives operate SSDs anywhere while appearing as local drives.
-
Testing Of Repairable Embedded Memories in SoC: Approach and Challenges (Jun. 17, 2019)
This article focuses on how to test repairable memories when we include the repair feature, and it will also look at how it will be affected during Automatic Test Pattern Generation (ATPG) or built-in pattern generation. In addition, it focuses on the common challenges and includes a comparative case study on enabling and disabling BIRA features in memories.
-
SoC Interconnect: Don't DIY! (Jun. 13, 2019)
With so many acquisitions in the interconnect IP market, you might be forgiven for thinking DIY interconnect is a good idea.