In 2019, Velodyne Lidar, Inc., a global leader in lidar solutions for automotive and autonomous applications, selected IP from CAST to add Time-Sensitive Networking (TSN) capabilities to its sensor products.
Focused exclusively on lidar and with a heritage of technical innovation and customer satisfaction, Velodyne sought a similar partner
Data processing accelerators are often designed with streaming interfaces and are meant for continuous flow through a custom hardware processing pipeline. Such cores include engines for compression, cryptography, or packet processing. A custom hardware pipeline built of such cores would be similar to this:
Sometimes, though, designers
LONDON, February 8th, 2021 – Crypto Quantique, a specialist in quantum-driven cybersecurity for the internet of things (IoT), is collaborating with Renesas Electronics Corporation (TSE:6723), a premier supplier of advanced semiconductor solutions, to add its universal IoT security platform, QuarkLink, to the Renesas secure microcontroller ecosystem. QuarkLink supports devices that use
Read MoreAnySilicon, the leading marketplace for ASIC service providers, announced today that Chipus, a semiconductor company focused on the development of mixed-signal ASICs, intellectual property (IP) blocks and IC design services, has joined AnySilicon to promote its IC design services and IP blocks. As part of the AnySilicon platform, Chipus will
Read MoreAnalogX, the leading provider of multi-standard connectivity SerDes IP solutions, today announces the availability of its silicon-proven 7nm & 6nm SERDES. AnalogX is the market leader in low-power SERDES IP, serving the chiplet and chip-interconnect market with 16nm, 12nm, and now 7 nm & 6 nm technology nodes. The company also
Read MoreCesson-Sévigné and Valbonne (France), January 12th, 2021 – Since entering into a strategic partnership in February of 2020, Menta and Secure-IC today announce that they have successfully co-developed a flexible solution that will allow next-generation SoCs to follow market security requirements over time.
Security standards evolve over time due