Issues and Solutions of Formality Formal Verification for Beginners
I recently met a couple of issues when running formality to check equivalence of RTL vs synthesized netlist. I...
Two Potential Issues with Glitch Free Clock Muxing
Rhoney has a good intro about glitch free clock muxing. The fundamental circuit is shown as below. ...
PEM and OBIRCH, Bright Spot Failure Analysis for Flip Chip
Photon Emission Microscopy (PEM) and optical beam induced current change (OBIRCH) are high efficient failure analysis techniques for fault...
Memory Tag Extension (MTE) in Armv8.5-A
ARM blog Arm A-Profile Architecture Developments 2018: Armv8.5-A announces several key features in Armv 8.5-A including memory tagging extension....
What are some semiconductor devices?
A semiconductor device is an electronic component in which electrical conductivity is between conductor and insulator, with the specific...
An Intrinsically Secure Processor and A Software Based Security Approach
Security is becoming a must-have feature for modern embedded and IoT systems. Many approaches are proposed and implemented to...
What are some creative uses of the Raspberry Pi?
As we all know, Raspberry Pi is a delicate and powerful ARM-based pocket computer whose powerful graphics processing and...
LBIST and MBIST
DFT normally consists of LBIST, MBIST, and some supporting logic. LBIST is to test combinational and flip-flops based on...
Several Techniques to Reduce Memory Block Current Consumption
On chip embedded memory is a critical building block of a System on Chip (SoC). It not only occupies...
BLE HADM Basic and Usage for Keyless Entry
wlsPark 08/18/2019 5 5/5 (1 )
In Nov 2018, Belgium IMEC demonstrated the first solution for secure and very accurate passive keyless car entry based...