Designing CPUs: A Step-by-Step Guide

Designing CPUs: A Step-by-Step Guide

Click to follow Asynchronous Books, pin the public account Sharing IT good books, technical dry goods, and workplace knowledge with you every day Participate in the topic discussion at the end of the article, and receive Asynchronous Books daily. —— Asynchronous Editor The Eternal Hotspot — CPU Lights, waiting for the lights… —— Intel If … Read more

Analysis of 50 Chinese MCU Suppliers’ Comprehensive Strength

Analysis of 50 Chinese MCU Suppliers' Comprehensive Strength

Click Blue Text Follow Us The global MCU market is mainly occupied by companies from Europe, the United States, Japan, and Taiwan. Only European companies NXP, U.S. companies Microchip, ST, and Infineon account for over 80% of the market share, while TI, Nuvoton, Rohm, Samsung, and Toshiba occupy 11.4%. The share held by mainland Chinese … Read more

Defining the Future at a New Starting Point: A Comprehensive Overview of GD32 MCU Product Family

1, 1, 2, 3, 5, 8, 13, 21, 34 …… Many people are familiar with this series of numbers, which is the famous Fibonacci sequence, also known as the “rabbit sequence.” This sequence has two obvious characteristics: first, the sum of the two preceding terms forms the next term; second, excluding the first four numbers, … Read more

Comprehensive Summary of CPU Architecture

Comprehensive Summary of CPU Architecture

Recently, NVIDIA released the "Grace" CPU based on the Arm architecture, attracting considerable attention from peers in the hard technology field. This CPU and server architecture, designed specifically for accelerated computing, can provide up to 10 times the performance compared to the latest NVIDIA DGX systems based on x86 CPUs when combined with NVIDIA's GPUs. … Read more

Choosing Between General MCUs and Edge AI Chips: Arm or RISC-V?

Choosing Between General MCUs and Edge AI Chips: Arm or RISC-V?

The development of computing over the past 30 years can be roughly divided into three stages: in 1995, Microsoft Windows opened the PC era dominated by x86 architecture CPUs; in 2007, Apple’s iPhone ushered in the smartphone era led by Arm architecture; and in 2012, the success of the convolutional neural network AlexNet based on … Read more

Lichee D1 DocK Pro Development Board Review

Lichee D1 DocK Pro Development Board Review

The Lichee RV Dock is a single-board computer launched by Allwinner Technology in collaboration with Shenzhen Sipeed Technology, based on the Zhuhai Allwinner D1 CPU. Its main control unit, the Allwinner D1, features a 64-bit RISC-V core, 512MB of RAM, an SD card slot for system boot, an HDMI video output interface, a USB interface, … Read more

TJ375: From Zero to One in Just Three Months

TJ375: From Zero to One in Just Three Months

With the rapid development of the terminal industry, there is an increasing demand in the market for high-performance, flexible, and programmable solutions. As an innovator in the FPGA field, E-Link’s latest product, the 16nm Titanium series new member—TJ375, has completed nearly three months of verification and testing work and is ready to be launched into … Read more

SiFive 2018 Tech Seminar: RISC-V Leading Chip Customization Revolution

SiFive 2018 Tech Seminar: RISC-V Leading Chip Customization Revolution

SiFive 2018 Tech Seminar On May 17, the SiFive 2018 Tech Seminar, hosted by RISC-V and open-source hardware leader SiFive, and co-organized by CanSemi Semiconductor and China Integrated Circuit magazine, will be grandly held at the Changrong Crown Hotel in Shanghai. With the rapid development of the RISC-V ecosystem, SiFive, a company founded by the … Read more

SiFive Shield: An Open and Scalable Security Platform Architecture

SiFive Shield: An Open and Scalable Security Platform Architecture

SiFive Shield is an open and scalable platform architecture designed to provide a comprehensive SoC security approach for RISC-V based designs. The demands of modern SoC design dictate the need for scalable solutions for security, which provide a clear root-of-trust in the components of a trusted computing base, crucially, it is auditable. Customizable features are … Read more