Fast forward to 2025, and the tone has shifted. This year, the pressure is on. The question is no longer whether RISC-V can attract interest—it’s when it will truly deliver.
Nowadays, it is (rightfully) impossible to put an embedded device into the market without comprehensive embedded device security measures. Most new devices store private data that we do not want to see leaked in dark corners of the Internet. We also want to avoid our device ending up as part of a botnet.
The 2025 RISC-V Summit China reached an unprecedented level of excitement, drawing a record-breaking crowd of over 4,000 attendees. The main venue was filled to capacity, with many standing along the walls just to be part of the event. This was my second time attending the RISC-V Summit, since starting development work on RISC-V, and in just two days, there was a lot to take in and reflect upon.
Idle states allow parts of the CPU to be de-clocked and/or powered off to minimize the power they consume. These features, selectively disabling clock or power to parts of the circuit, are sometimes referred to as clock- or power-gating.
Every embedded Linux system eventually needs data showing the system behavior in order to make informed decisions. This might include detailed tracing of a particular problem, reasoning about system performance, or long-term data collection of metrics to identify regressions in software
Learn how Dynamic Voltage and Frequency Scaling (DVFS) can extend battery life by 3x in embedded Linux systems. Expert implementation strategies from RISCstar.