2022-12-22 - Efinix Inc.

Efinix launches Efinity RISC-V embedded software IDE

Efinix's Efinity RISC-V Embedded Software IDE simplifies the creation, management, and debug of projects running on the Efinix Sapphire RISC-V…

2022-12-22 - Majeed Ahmad

IP architect Tariq Kurd wins the RISC-V Contributor Award

Codasip Lead IP Architect Tariq Kurd has won the RISC-V Technical Contributor Award from the RISC-V Board of Directors.

2022-12-21 - Majeed Ahmad

Imagination’s RISC-V gambit reaches its next level

Imagination has consolidated its commitment to the rapidly expanding RISC-V ecosystem by upgrading its membership to the premier level.

2022-12-15 - Majeed Ahmad

Intel Pathfinder for RISC-V unifies platform, adds features

Intel Pathfinder for RISC-V is unifying its Starter and Professional Editions into a single version.

2021-08-19 - Kevin McDermott

Enabling industrial-grade open verification for RISC-V

Here's a look at an open-source IP with industrial-grade verification and open methodology to support verification of an open-source CV32E40P…

2021-08-02 - Majeed Ahmad

Configurable analog IP supplier joins the RISC-V fray

RISC-V International has accepted Agile Analog as a strategic member and that underscores critical role of analog building blocks in…

2020-09-21 - Nitin Dahad

RISC-V speaks on options after Nvidia-Arm news

As the embedded industry digests the implications of the proposed acquisition of Arm by Nvidia, RISC-V International, the organization supporting…

2020-06-12 - Lee Moore, Duncan Graham

A guide to accelerating applications with just-right RISC-V custom instructions

With RISC-V, standard extensions can be used to configure the base processor...

2020-06-08 - Nitin Dahad

Drag and drop with new software and IP for processor-based FPGA design

A new design environment to empower developers of any skill level to quickly design FPGA-based applications using a drag-and drop…

2020-04-27 - Sergio Marchese

How to make processors trustworthy?

The RISC-V assurance process presented in this article detects scenarios that could affect security, and systematically unveils undocumented functions and…