RISC-V Toolchain and Compiler Optimization Techniques

About this Course

As RISC-V has made it easier to bring up processor chipsets, the need for compiler engineers in the RISC-V ecosystem has increased. There is an implicit need for toolchain experts who can help RISC-V vendors gain an edge over competitors with their expertise in compilation technologies. Learning about internals of the toolchain, building and debugging RISC-V applications will allow you to work with thousands of companies that are building the latest hardware technologies. This course is designed for engineers working with RISC-V vendors who are designing their own architectures, and those using RISC-V development boards to build applications. It is also useful for RISC-V application developers looking to improve performance or reduce the code size of their applications, toolchain developers, compiler engineers/performance engineers, and computer science students aspiring to major in systems software. This course begins with an introduction to the compiler toolchain and concepts of cross-compilation. You will learn how to use popular compiler toolchains (both LLVM and GCC) to build RISC-V applications. You will also learn how to debug toolchain issues and what resources to consult when you need help. This course will help you optimize applications for code size or performance and gain an understanding of the demands of applications with instrumentation techniques. The course prepares you to apply to in-demand job opportunities like toolchain engineers or systems performance engineers as most large organizations have a difficult time finding engineers who are good with performance optimizations. This is a beginner-level course to get you started with optimizing data center applications and mobile applications for performance. It enables you to work in startups building RISC-V-based devices and IOT systems that are resource-constrained. The course will also help undergraduate students get started with compiler toolchains and equip them with skills to optimize applications using compiler technologies.

Created by: The Linux Foundation

Level: Intermediate


Related Online Courses

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law. In this course, you will learn the principles and... more
The demand for software engineers doubled according to the “State of Software Engineers” report by the tech specialist Hired. Nearly every industry uses software to accelerate its growth, pro... more
Building on your prior knowledge of variables and operators, this course gets into the meat of programming. Organized into five chapters, this course starts by covering the fundamentals of what... more
Modern software is under constant attack, but many software developers have never been told how to effectively counter those attacks. This course works to solve that problem, by explaining the... more
Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL