News, Analysis & Features
11/17/14 Security Advice from the US Department of Justice: Include “Back Doors” to enable Monitoring. How smart is this? By Alan Grau, Icon Labs In a recent statement issued by the U...0
11/12/14 Not just for plants, cross-pollination applies to know-how, too, and there may be no better example than what’s taking place among the mil-aero, medical, industrial and other markets as they seek to take on the complexities of security and safety for multicore systems....0
11/10/14 Coming to a meeting of minds on security, independent portability and virtualization will pave the way for IoT success....0
10/30/14 Smaller form factors combined with an increasing amount of data flowing through military infrastructures has created the need for ruggedized, miniature connectors at home in high-speed, data-driven systems.0
10/09/14 Two 32bit processor IPs have been released by Cortus, the company’s second generation of processor IP that takes a minimalist approach to the ‘third wave’ of applications. Caroline Hayes spoke to Roddy Urqhart, Vice President Sales & Marketing, Cortus....0
09/25/14 What makes USB 2.0 the universal battery charger—and what nuances make charging so efficient?...0
09/22/14 In October 2013, IDC forecast a whopping 212 billion “Things” on the Internet of Things...0
09/10/14 Helping deliver critical information for military operations are PCI Express and other communication fabrics available within ruggedized 3U VPX computing environments.0
Keysight Technologies Introduces Pulse Amplitude Modulation (PAM-4) Analysis Capability for 86100D DCA-X Series Oscilloscopes 01/29/15
Rugged Compact PC from Aitech Improves Reliable, High Performance Computing in Harsh Environments 12/15/14
Security Advice from the US Department of Justice: Include “Back Doors” to enable Monitoring. How...
USB, HDMI, or analog signals degrade to mush over long signal traces or cables; check out these “before...
While the main manufacturing flows are still focusing on optical lithography, eBeam and EUV are still...
Blogging has been something that slipped off my radar for the past year. Here’s a reboot to see if...
I attended the IEEE 802.3 meeting in Atlanta last week. I have blogged about Ethernet standards-making meetings before and I thought I should post an update on how things have progressed. Cadence has a comprehensive design and verification IP portfolio for Ethernet, and we strive to keep it aligned to the current standards. Before...
Blog Post: 5 technology trends to watch in 2015 / (TI E2E Community)
As we kick off 2015, it’s important that we take time to assess and anticipate the technical challenges and breakthrough innovations the new year will bring. Having met with a number of technologists across our ecosystem of strategic customers, university partners and TI’s product lines in 2014, I would like to highlight...
Using Generative List Pseudo Methods in Constraints – A Case Study / (Team Specman Blog)
This article highlights the use of list pseudo-methods constraining the content of lists, which is relatively new and offers a lot of power in terms of modelling, performance, and debugging. Ethernet-based communication is getting more pronounced today and will continue to do so in the future. This increases the need to...
Just in time for Christmas and other year-end holidays, I am pleased to announce that the latest issue of Verification Horizons is now available on-line. As usual, we have a great lineup of articles that I’m sure you’ll find informative: Integrate Ethernet QVIP in a Few Hours: an A-to-Z Guide - Shows how to...
Recommended Technology Papers
As demand for performance and security in harsh environments escalates, solid state flash drives are increasingly appearing in embedded rugged applications.
EECatalog on Facebook
Find Solutions for Your Project
Ethernet, as the most common communication protocol on the planet, continues to spread into new markets and presents Ethernet engineers with new test challenges. Specifically, With