The real role of EDA in the Cloud
Rob Irwin, Altium
EETimes (3/22/2011 8:05 PM EDT)
It seems that everywhere you turn these days you’re under a cloud. Whether it’s downloading tunes for your iPod, reading your Gmail, or backing up your precious photographic memories to that great big storage bucket in the sky – the vast array of networked devices we call ‘The Cloud’ is a growing presence in our lives.
From an end-user perspective, the changes often appear subtle – books magically appear on your Kindle, and you no longer need a massive portable hard drive on which to back up your system. But this simplicity belies the incredible sophistication of the back-end systems that make it all happen. And that’s where engineers, software developers, and designers come in. They are the ones who are tasked with building not only ever-more sophisticated devices, but increasingly a complete online ecosystem to which these devices connect and derive much of their functionality and value.
To read the full article, click here
Related Semiconductor IP
- Verification IP for C-PHY
- Band-Gap Voltage Reference with dual 2µA Current Source - X-FAB XT018
- 250nA-88μA Current Reference - X-FAB XT018-0.18μm BCD-on-SOI CMOS
- UCIe D2D Adapter & PHY Integrated IP
- Low Dropout (LDO) Regulator
Related Articles
- EDA in the Cloud Will be Key to Rapid Innovative SoC Design
- Paving the way for the next generation of audio codec for True Wireless Stereo (TWS) applications - PART 5 : Cutting time to market in a safe and timely manner
- The Future of Embedded FPGAs - eFPGA: The Proof is in the Tape Out
- AI, and the Real Capacity Crisis in Chip Design
Latest Articles
- SCENIC: Stream Computation-Enhanced SmartNIC
- Agentic AI-based Coverage Closure for Formal Verification
- Microarchitectural Co-Optimization for Sustained Throughput of RISC-V Multi-Lane Chaining Vector Processors
- RISC-V Functional Safety for Autonomous Automotive Systems: An Analytical Framework and Research Roadmap for ML-Assisted Certification
- Emulation-based System-on-Chip Security Verification: Challenges and Opportunities