The headlines continue to grow as more companies move their embedded projects to the RISC-V platform. Before you decide to move your next embedded project to RISC-V, know how to get the most out of this innovative ISA. This white paper explores the history of RISC-V and what it is (and isn’t), and explores the current state of open-source RISC-V toolchains, and how Mentor toolchain services can make the most of your application on RISC-V platforms.

Ready to download this white paper?
Most Recent Flipbooks
ADLINK and LEDA Technology Create AI-enabled Contact Lens Inspection Solution
Linux continues to be the leading choice for embedded device operating systems but the decision to choose Linux for use in a medical device setting includes the additional considerations of patient...
Edge computing has not fully evolved from theoretical and experimental to being deployed at scale. In this paper, we discuss how leveraging separation kernel hypervisors can enable the secure and...
The developer’s journey toward a secure system starts right at the very beginning of the product development, well before one line of code is written. Security must become part of the developer’s...
How can you protect your data? Part 4 of Nuvation Engineering's article series discusses the many threats your device can be vulnerable to, and how to implement proper preventative measures in the...

Capturing IoT data about facilities performance is just the first step. The application of effective algorithms is key to implementing and capitalizing on a data analytics strategy.

Video analytics for critical operations at the edge presents numerous challenges, including computing resources, server deployment, and systems integration.

By leveraging powerful algorithms, deep learning technology, and intelligent analytics, the power of video has moved beyond security, providing a range of data that can help streamline operations.

IoT endpoints are a top target of cyberattacks. But centralized security architectures like PKI leave deployments susceptible to man-in-the-middle attacks. Blockchain at the edge could be the answer.
See how a commercial unit testing tool can make the most of your effort in testing safety-critical software. Download our whitepaper to learn more.
Prepare for a new and different way of testing. In this paper, we’ll explore some top tips for setting up labs and infrastructure—not just to address 2020’s immediate concerns, but to make...
A sensor device that triggers a certain function when an object is either present or not may sound simple. But in reality, there are numerous factors to consider in order to avoid false positive...
Trying to decide between Off the Shelf and custom hardware? Don't forget to consider these important factors!
OEMs looking to effectively improve their competitive position with new product introductions need to adopt a platform strategy for their products. Such a strategy allows manufacturers to develop an..
Stolen IP can be modified to include backdoors and side channels. The means modified Software IP can potentially enter safety-critical systems like a modern car. Here’s how to protect your connected..
From intense vibrations, mechanical shocks, wide temperature swings and so much more, designing for harsh environments requires extensive experience. But what could go wrong if you miss one of these..

The advent of new technologies—and the resulting rollout of value-added services—has brought about seismic shifts for digital signage networks.
Traditional parallel attached DRAM memory has presented a major roadblock for next-generation CPUs. Microchip’s serial memory controller delivers higher memory bandwidth and media independence to...
Deciding what hardware to use for your embedded GUI application? From understanding performance and storage requirements to estimating memory needs, you’ll be faced with quite a few important...