Sondrel is sought out by its clients because we are known to deliver cost-competitive, secure, power efficient chips for Industrial IoT, smart city and consumer technology products.
These designs often include wireless connectivity, advanced processors and neural networks to enable limited AI capabilities. These 'edge nodes' devices often have on-board computing power that distinguishes them from the more basic end-node devices where raw data is simply fed back up to the cloud for processing.
AI Moves to 'The Edge'An IoT Chip Built Using an ARM SDK-200 Subsystem
As with any technology solution, a market-leading IoT design requires a deep understanding of the semiconductor supply chain. Your knowledge and choice of suitable IP, foundry, package type, technology, and engineering resource will substantially affect your build cost, and crucially, your packaged end unit cost. Even for so-called ‘smaller’ designs – there is a lot to think about.
When you partner with Sondrel you can be 100% confident in our knowledge of the silicon supply chain as we guide you through the process towards a successful outcome.
- Cost Reduction
- Reduction of Form Factor
- IP Protection
- Control of your Supply Chain
- Low Power
Reduction of a long components list down to one ASIC should save you money, reduce supply chain complexity and reduce circuit board field failure rates.
Reduction of Form Factor
For many IoT applications, size of device is a key driver in choosing the ASIC path. For performance and business reasons, small is beautiful!
In competitive markets it must be assumed your circuit board will be bought by competitors and analysed, often copied. This is much harder to do when the system is on one encrypted ASIC.
Protecting design copyright, protection against hacking, enabling field updates and improvements: security boils down to “what do you wish to protect and from whom”.
It may be tempting to use an off-the-shelf chip from a main industry supplier. But isn’t that what your competitors are doing? If you want unique selling points (USP) for your product that will give it desirability and longevity in the market, you’ll need to invest in them.
Control of your Supply Chain
Your bill of materials (BoM) may run to hundreds of parts from tens of suppliers. With an ASIC this could be 1 part number, 1 item.
It’s not just about the battery life, it’s also about the manpower cost to replace a battery in a remote field located node. Low power design increases service intervals, turning a problem into a potential USP.
Watch to learn more about the semiconductor supply chain and the pitfalls you should avoid when building a custom chip...
Industry 4.0 is the term used to describe the current revolution in automation and data management within manufacturing technologies. In an industrial setting, IoT edge nodes will be used to drive this automation and improved processing capability. These edge nodes will become increasingly complex, requring a larger digital element. They will take the form of ‘hubs’, that will process more information locally without having to rely on a cloud connection. This will help to avoid network security liabilities and will enable you to turn collected data into actionable intelligence quickly. It will also bring down data management and processing costs. This trend is connected to the continued development and adoption of AI technology. AI technology, for example, can support real-time data analytics within a factory setting, enabling quicker response times to changing conditions, thus increasing efficiency and decreasing costs.
We work with Arm®, as a DesignStart Partner, to support clients who choose to use Arm®technology to build secure low power custom solutions.
Watch this animation that explains how we can help you get the most out of your custom build
Sondrel’s experience in implementing security through the design process of an ASIC is only one part of a very important security chain that must then extend through the lifecycle of your product.
Tools and techniques can be deployed in the design phase that ensure the simple management of critical intellectual property, and secure key management to establish core Root of Trust.
For lifecycle-based security we would turn to one of our supply chain partners, Secure Thingz, whose Secure Deploy architecture has been designed to enhance and simplify security implementations across the lifecycle of product creation, manufacture, and management.