EDACafe Weekly Review June 22nd, 2018

China accounted for 7 of top 10 leading smartphone suppliers in 2017, share grows to 42%.

IC Insights recently released its Update to its 2018 IC Market Drivers Report.  The Update includes IC Insights’ latest outlooks on the smartphone, automotive, PC/tablet and Internet of Things (IoT) markets.

The Update shows a final 2017 ranking of the top smartphone leaders in terms of unit shipments.  As shown in Figure 1, 9 of the top 12 smartphone suppliers were headquartered in China.  Two South Korean companies (Samsung and LG) and one U.S. supplier (Apple) were the other leaders.

Figure 1

Samsung and Apple dominated the smartphone market from 2015 through 2017.  In total, these two companies shipped 526 million smartphones and held a combined 35% share of the total smartphone market in 2016. Moreover, these two companies shipped over one-half billion smartphones (533 million) in 2017 with their combined smartphone unit marketshare increasing one point to 36%.

Intel and Ecosystem Partners Introduce New Solutions to Secure Data in Emerging Technologies

rick echevarriaBy Rick Echevarria

The future of a trusted and secure computing environment hinges on our collective ability to deliver solutions that improve the performance across a variety of workloads, while also optimizing security.

This week, at Cyber Week in Israel, I am joined by partners, customers, and cybersecurity industry and policy leaders from across the globe. Intel is committed to providing silicon-based security solutions that address the most pressing issues. There are three key themes at the conference, highlighting the challenges and opportunities facing our industry.

Emerging Workloads Deliver More Data to Analyze and Secure

Incoming data is increasingly difficult to effectively leverage without the computing power to process and learn from its growing volume and complexity. Machine learning (ML) algorithms, and other artificial intelligence (AI) applications and capabilities, have achieved remarkable results and are being extensively used in different domains. ML algorithms often require access to sensitive data, especially as the focus on data privacy increases around the world. Limiting access to the right data may limit the outcomes that can be achieved with the use of AI. In the case of blockchain, the security and privacy of data join transaction scalability as key technical considerations.

Write-only ports in C++
June 18, 2018  by Colin Walls

I recently wrote about write-only ports and discussed how they worked and the challenges presented to software developers who need to program them. The solutions proposed were quite straightforward, but the challenge remained to ensure that all the code utilizing the ports complied with the requirements.

I commented at the time that there are several ways to mandate the correct handing of write-only ports, but an approach that interested me was the use of C++ …

DownStream: Solutions for Post Processing PCB Designs
Altair
TrueCircuits: UltraPLL


You are registered as: [_EMAIL_].

CafeNews is a service for EDA professionals. EDACafe.com respects your online time and Internet privacy. Edit or Change my newsletter's profile details. Unsubscribe me from this newsletter.

Copyright © 2018, Internet Business Systems, Inc. — 25 North 14th Steet, Suite 710 San Jose, CA 95112 — +1 (408) 882-6554 — All rights reserved.