fish fry
Subscribe Now

Treasure of the Semiconductor Madre

Seeking EDA Gold (and Answers) with Xerxes Wania

Bust out the pickaxes and dynamite, we’re looking for gold in ‘dem ‘der hills. Xerxes Wania (CEO – Sidense) joins Fish Fry this week to dig into the treasure trove of issues found deep in the semiconductor and EDA industries today. Xerxes and I scour the land for faults and break out our trusty gold pans to find the answers… and it ain’t pretty my friends. Also this week, I delve into a brand new world of inductance-to-digital converters that will revolutionize position and rotation sensing in our IoT designs.


 

Download this episode (right click and save)

Links for June 26, 2015

More information about Sidense

New Episode of Chalk Talk:  Inductance-to-Digital Converters Revolutionize Position & Rotation Sensing


Leave a Reply

featured blogs
Jul 3, 2020
[From the last episode: We looked at CNNs for vision as well as other neural networks for other applications.] We'€™re going to take a quick detour into math today. For those of you that have done advanced math, this may be a review, or it might even seem to be talking down...
Jul 2, 2020
Using the bitwise operators in general -- and employing them to perform masking, bit testing, and bit setting/clearing operations in particular -- can be extremely efficacious....
Jul 2, 2020
In June, we continued to upgrade several key pieces of content across the website, including more interactive product explorers on several pages and a homepage refresh. We also made a significant update to our product pages which allows logged-in users to see customer-specifi...

Featured Video

Product Update: DesignWare® TCAM IP -- Synopsys

Sponsored by Synopsys

Join Rahul Thukral in this discussion on TCAMs, including performance and power considerations. Synopsys TCAMs are used in networking and automotive applications as they are low-risk, production-proven, and meet automotive requirements.

Click here for more information about DesignWare Foundation IP: Embedded Memories, Logic Libraries & GPIO

Featured Paper

Cryptography: A Closer Look at the Algorithms

Sponsored by Maxim Integrated

Get more details about how cryptographic algorithms are implemented and how an asymmetric key algorithm can be used to exchange a shared private key.

Click here to download the whitepaper

Featured Chalk Talk

Keeping Your Linux Device Secure

Sponsored by Mentor

Embedded security is an ongoing process, not a one-time effort. Even after your design is shipped, security vulnerabilities are certain to be discovered - even in things like the operating system. In this episode of Chalk Talk, Amelia Dalton chats with Kathy Tufto from Mentor - a Siemens business, about how to make a plan to keep your Linux-based embedded design secure, and how to respond quickly when new vulnerabilities are discovered.

More information about Mentor Embedded Linux®