To stay competitive, chemical companies like BASF must develop new materials that meet evolving industry demands. High-performance computing now plays a critical role in this process, enabling ...
“Silicon Saxony will be in every smartphone, in every car, in every intelligent system worldwide in the next five to 10 years,” said Wenke Weinreich, deputy director of Fraunhofer IPMS. Wenke ...
CSCS director Thomas Schulthess explained how the design of Alps, the world’s seventh largest computer, anticipated the needs of the current generation of AI as early as 2020. A few months after ETH ...
To learn more about the technical challenges and potential use cases behind chiplet adoption, EE Times Europe spoke to Kurt Herremans, director of imec’s automotive chip program. The foundations ...
ETH Zurich spinoff ZuriQ has raised $4.2 million to commercialize an architecture that the startup claims could overcome the quantum computing scaling barrier. Trapped ions have very low errors but ...
In a video interview, Thomas Schulthess, director of the Swiss National Supercomputing Centre and full professor of computational physics at ETH Zurich, describes the development of the seventh most ...
Welcome to the Embedded Processing Design Center. From microcontrollers, processors, connectivity and more, here you will find the resources, tips and tools that will help you with your embedded ...
Berlin-based startup UltiHash said it has developed a reliable way of significantly reducing redundancy in incoming data streams. One of the biggest challenges in data management is the huge scale ...
A spinoff from the University of Edinburgh has emerged from stealth and unveiled two SPAD-based image sensors. Singular Photonics, a spinoff from the University of Edinburgh, claims it is transforming ...
Dr. Zhou Zhenyu pointed out that AI applications, from edge AI to generative AI, have different requirements for computing power. Many edge AI applications are specialized and do not demand large ...
The key principles of Secure by Design include defense in depth, attack surface minimization and privilege access management, all with the goal of increasing resilience and lowering the chance of ...