Posts Tagged ‘IoT’
Thursday, September 28th, 2017
Sage Design Automation offers iDRM – integrated design rule management – a “true design rule compiler that enables quick graphical capturing of design rules and uses them as executable expressions for Specification, Communication, Validation, DRC, Analysis, Deck validation and coverage, and DRC deck generation.”
But this is not about Sage, it’s about how Sage fits into an evolving industry from the point of view of Raul Camposano, EDA veteran, former CTO at Synopsys, and currently CEO at Sage. Like so many serving in leadership roles in the industry, Dr. Camposano is a man of good cheer and an optimistic observer.
Thursday, August 25th, 2016
This week’s blog post is authored by Bill Finch, Senior VP at CAST, Inc., long-time provider of IP cores and platform IP products. The discussion below maps the evolution of technologies and strategies that produced today’s IoT to the critical road map needed to achieve tomorrow’s.
IoT: The Second Coming
The second wave of the IoT is about to start. In the first wave, there was little clarity about what functionality really mattered. Engineers were tasked with getting products out ASAP. Because of the uncertainty and rush, most first-wave products were built around off-the-shelf parts made by IDMs (Integrated Device Manufacturers). The emphasis was on getting things working, not on optimization.
This will not be true in the second wave.
Thursday, July 21st, 2016
Who better qualified to post reactions to this week’s astonishing news out of Tokyo and Cambridge – SoftBank is buying ARM in an all-cash deal for 24.3 billion British pounds – than the leaders of two highly regarded IP companies and an articulate Brit with total street cred in EDA.
Thursday, May 26th, 2016
There are clearly a lot of collateral distractions at the Design Automation Conference: Networking. Social Hours. Parties. Chotzkies. But the real fun at DAC comes from carving time out to attend technical sessions. This is year in Austin, the offerings are particularly rich.
On Sunday, June 5th, my two favorites are: The Workshop on Design Automation for Cyber-Physical Systems, and The Workshop on Computing in Heterogeneous, Autonomous ‘N’ Goal-Oriented Environments. Both of these all-day events feature experts from academia and industry, most speaking for at least 30 minutes. The topics will be very technical and the schedules allow for detailed presentations. Of course, this doesn’t mean the other workshops on Sunday don’t have great merit, but the two I have identified look to be particularly rich opportunities for learning.
Sunday evening, for the first time, there will also be a 2-hour panel focused on Career Perspectives in EDA, a discussion sponsored by CEDA. Although many will be obliged to attend networking dinners on Sunday evening, or will still be busy setting up booths for Monday morning’s Exhibit Hall opening, attending this Career Panel seems an opportunity not to be missed, particularly as it will be moderated by the supremely knowledgeable Bill Joyner from SRC. Admittedly, this is not a technical session, but the implications for the industry are profound. [File under the heading: ‘Concern for an Aging Industry’]
Thursday, July 2nd, 2015
Once again it’s an acquisition, and once again the lucky winner’s Synopsys. This time the prize is Elliptic Technologies, “a provider of cryptography cores, security protocol accelerators and processors, Root of Trust embedded security IP modules, secure boot and cryptography middleware, and content protection IP for integration into SoCs. [In other words], security IP cores and software solutions for mobile, automotive, digital home, IoT and cloud computing applications.”
Per the Press Release: “Elliptic’s integrated solutions enable the most efficient silicon design and highest level of security to help prevent a wide range of evolving threats in connected devices such as theft, tampering, side channels attacks, malware and data breaches. As a founding member of the prpl Foundation’s Security Working Group, Elliptic has been dedicated to defining an open security framework for deploying secured and authenticated virtualized services in the IoT and related emerging markets.”
Thursday, April 23rd, 2015
I’ve got a friend who received an Android Wear (read “watch”) as a gift earlier this year. In the last several months, he’s become addicted to wearing the darn thing although its usefulness is distinctly limited: He can check the time and screen calls without digging a phone out of his pocket. Oh yeah, and when messages and/or emails come in, he knows straightaway.
Other than being a fascinating toy, however, and something to diddle with – particularly for those who like the openness of Android – Wear is really not much more than a distinctive fashion statement and not too much of that.
Nonetheless, now that Apple’s claiming more stupendous success with yet another highly over-hyped product launch (read, “the Apple Watch”), it’s time to re-consider the importance, even gravitas, of this Android Wear thing. After all, let’s not just lay down in the road and let Apple run over us yet again. Let’s cheer on these Android Wear users. Let’s celebrate anybody willing to stand up to the Apple juggernaut. Yay!
Tuesday, March 24th, 2015
We’re only gifted with so many hours of life here on earth, so why would anyone waste them listening to the same lengthy keynote twice in one month? That was the thought that raced through my mind when Synopsys’ Aart de Geus stepped up onto the stage in front of 500+ SNUG attendees at the Santa Clara Convention Center yesterday morning and clicked on his title foil.
“Shift Left,” it said.
“Oh no,” I said. For pity’s sake, this was the exact same talk co-CEO de Geus offered up less than three weeks ago on March 3rd at DVCon in San Jose. I looked around for the nearest exit.
Then, cooler heads prevailed. Mine.
Wait a minute, I said. Three weeks ago I sat in the back of a ballroom at the DoubleTree, listening over the heads of 350 people at DVCon, and typed everything the good doctor said into my tablet, verbatim. I’ve already done the heavy lifting here, I thought. I’ve got his script on my tablet, I’ve seen the slides, and I’ve heard the jokes.
Does Synopsys believe an entirely different audience attends DVCon than that which attends SNUG? Why else would they present the exact same talk at the two venues? Perhaps no one at SNUG actually does verification? Why not compare the SNUG talk to the one at DVCon?
So, with that much entertainment guaranteed I sat back and enjoyed the show.
Thursday, February 26th, 2015
In a recent phone call, Silicon Cloud co-founder and CEO, Mojy Chian asserted that the IoT has inspired a new set of initiatives from his lively startup enterprise.
“If you look at the Internet of Things in its entirety, it includes the transmission, aggregation, processing, cloud services and so on.” Chain said, “But it all starts with the nodes, the endpoints, which are the sensors.
“Today we are positioning Silicon Cloud to provide a design-enablement infrastructure for the IoT, a large part of which is the chip design. But now we are extending our services to include design tools for sensors, concentrating on the node itself, and providing a complete infrastructure for node design enablement. We don’t design the semiconductor or the sensor, of course. We provide the design enablement for others to use to design these things.”
Thursday, January 8th, 2015
In October, IPextreme hosted a day-long meeting in San Jose to “Unlock the Mysteries of IP”. The morning started off with an hour-long panel discussion that touched at times on security. Not the security having to do with elusive and dangerous elements in this treacherous world, but that related to the more banal dangers of insurance companies.
In the emerging era of an IoT a’glitter with wearable gadgets for tracking our blood pressure, heartbeat, temperature, calorie consumption, steps per day, hours sleeping, and brain waves – those trendy connected devices pursued and celebrated by technologists on panels everywhere – three problems have emerged.
First, where in heck is all of this data going to be stored? Second, how is it going to be processed and determined to be normal or not? And finally, how can we be guaranteed that all of this data, particularly the abnormal stuff, will not be presented to our insurance companies, or other bureaucracies, without our permissions?