RISC-V
Read Article
Read Article
An introductory look at RISC-V and how discrete chips and cores provide a learning experience that gives designers a head start in gaining familiarity with the architecture and tools.
Read Article
RISC-V is a straightforward list of what a CPU should do. It’s an open and frozen instruction set that can be used in many applications with a standard core or custom extensions using an FPGA.
Read Article
The Terasic T-Core FPGA MAX 10 Development Board is an optimal platform for developing RISC-V based gateway applications.
Read Blog
Sponsored by Mouser and Microchip
Watch Video
RISC-V is becoming a critical technology in commercializing 5G, IoT, and AI. Innovation is bolstered by a community that shares a vision and supports transparent idea sharing.
Read Article
This project will demonstrate how to set up an AI machine vision application using Maxiduino to collect real-time face detection readings and send them to Medium One
Read Article
Read Article
Physical reality is now balanced by immersive/extended reality (XR), which can add to and create new experiences, transporting users into new realities.
Read Article
Technology advancements in accelerometers, displays, audio, and graphics have furthered immersive realities, but the engineer’s work is not finished yet.
Read Article
Many new machines and robots will be able to take advantage of modular 3-D sensing and measurement thanks to the recent Analog Devices' Time of Flight development kit.
Read Blog
A 3D virtual reality room can be a place to solve problems or simply catch up with others, in ways that are far more engaging than Zoom meetings.
Read Article
Virtual and augmented reality provide an opportunity for education, machinery repair, surgery, navigation, and more and can extend the range of senses.
Read Article
Almost every industry thinks optimistically about the benefits immersive technology will bring, making the market for this technology as expansive as an engineer's imagination.
Read Article
Read Article
With more than 21 billion IoT devices worldwide and an increased reliance on cloud computing, security is critical—Yet billions of devices remain vulnerable to attack.
Read Article
Encryption is an essential tool for protecting data, and understanding its importance can make or break a design.
Read Article
A security breach is devastating, but use of best practices in design, like using "Trusted Zones," can limit attempts to access content from outside.
Read Article
(Source: Sashkin - stock.adobe.com) Most of the time, we're surrounded by dozens of devices that contain connectivity to the world wide web. Whether they are directly part of our inventory or...
Read Blog
(Source: Joe Prachatree/Shutterstock.com) Authenticating Andrew Jackson What is real? What is fake? Digital economies are an integral part of our digital age, and perhaps more than ever, we...
Read Blog
Loading More...