Alibaba's DAMO Academy has introduced two new RISC-V processors—the flagship XuanTie C950 and the energy-efficient ...
Alibaba DAMO Academy launched the new-generation flagship CPU, XuanTie C950, at the 2026 Xuantie RISC-V Ecosystem Conference ...
The 3.2 GHz server chip, built using open-source RISC-V chip architecture, was billed as "the highest performing RISC-V ...
RISC-V International, the global open hardware standards organization, has announced that Intel has joined RISC-V at the Premier membership level. Let that sink in for a minute. Intel, which has made ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Synopsys announced its plans for expanding its processor intellectual ...
German chip start-up Ubitium has reached tape-out of its first silicon for its universal RISC-V processor on Samsung Foundry’s 8 nm process. The announcement was made at Embedded World 2026 in ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More SiFive, a pioneer of processors based on RISC-V computing, unveiled its ...
GOTHENBURG, Sweden--(BUSINESS WIRE)--Under a contract with the European Space Agency (ESA), Frontgrade Gaisler is designing a new RISC-V processor tailored to meet the requirements of microcontrollers ...
Andes Technology Corp. has launched a functional safety RISC-V processor, the AndesCore D45-SE, with ISO 26262 Automotive Safety Integrity Level D (ASIL-D) certification. The processor addresses a ...
SAN MATEO, Calif.--(BUSINESS WIRE)--SiFive, Inc., the founder and leader of RISC-V computing, today announced the availability of the SiFive Performance™ P650 processor, the new range-topping member ...
The semiconductor industry increasingly needs more flexible and scalable processor architectures, driving the growing adoption of RISC-V. Originally developed at the University of California, Berkeley ...
Verifying the security of processors has become an essential step in the design of modern electronic systems. Users want to be sure that their consumer devices can’t be hacked, and that their personal ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results