The tool suite automatically analyzes shared memory and measures worst-case execution time to ensure deterministic execution time for RISC-V processors. Developers working on real-time and safety-critical systems—particularly in aerospace, automotive,…
Read More
Incredibly, Angelina Jolie called it. The year was 1995. Picture Jolie, short of both hair and acting experience, as a teenage hacker in Hackers. Not a lot of people saw this movie.…
Read More
This blog looks at the benefit of Rivos and Canonical partnering and how this partnership will impact future AI and Data Analytics use cases. Artificial intelligence is transforming business operations…
Read More
Marc Evans, Director of Business Development and Marketing at Andes Technology, demonstrates the company’s latest edge AI and vision technologies and products at the March 2025 Edge AI and Vision…
Read More
Cryptography is a way of encoding and decoding information to guarantee its confidentiality and protection from unauthorised individuals. Within the realm of digital security and cryptographic algorithms, digital signatures play…
Read More
UK defence contractor BAE Systems is using a security digital twin of a RISC-V processor from SiFive for a radiation hardened chip for space applications. Cycuity in the US has…
Read More
What you’ll learn: Discover the advantages of the open-source RISC-V architecture in promoting efficiency and innovation in semiconductor design. Learn how RISC-V facilitates the development of multicore SoC designs that…
Read More
At Embedded World in Nuremberg, Germany, Maurizio Di Paolo Emilio, Editor-in-Chief of Embedded.com, interviewed Gregor Zink, CEO, and Christoph Herzog, CTO of Tasking. The discussion focused on Tasking’s new brand…
Read More
The RISC-V Privileged ISA specification, allows for controlling the core data endian (the order in which the data is stored in memory) at runtime, using bits in the STATUS register. However, it…
Read More
