Author's Latest Posts


Co-modeling: A Powerful Capability For Hardware Emulation


Understanding co-modeling technology, its impact on verification and validation should be a critical aim for anyone selecting and deploying emulation co-modeling resources. This paper explores how emulation co-modeling — specifically for the Veloce Strato emulation platform from Mentor, a Siemens business — is architected to meet the needs of advanced verification and validation. To rea... » read more

Preventing IoT Edge Device Vulnerabilities


As an EDA toolchain provider, Mentor keeps a close eye on security issues that occur in the world of electronics. We see volumes of research centered on protecting complex SoCs from attacks and interesting studies about detecting malicious logic in these ICs. But, security issues around IoT edge devices are rarely mentioned in the literature. However, the projected billions of IoT edge devices ... » read more

High-Performance 7nm IP Verification With The AFS Platform At Silicon Creations


While there are many benefits to migrating to smaller process geometries, such as lower power and higher performance, the increased design complexity places an even higher burden on fast and efficient simulation technology. In addition, fast and accurate resistor/capacitor (RC) extraction is becoming increasingly important. Interconnect resistance is an increasing percentage of the total path r... » read more

Automating Tests With Portable Stimulus From IP To SoC Level


The aim of the Portable Stimulus Working Group is to make the creation of highly-efficient automated tests portable. Portable stimulus tools help to raise the level of test description and enable modeling of scenarios that would be very challenging to create with directed and transaction-level constrained random tests. This paper describes the goals of the portable stimulus specification as wel... » read more

Automotive Defect Recall?


Automotive recalls can be devastating financially and a nightmare for an automaker’s reputation. Tracking down the cause of a defect means working through the electronic system wheel of failure, checking everything from wiring and connections, software, to the hardware. A key component to preventing defects is a rigorous requirement specification and management process, especially for meeting... » read more

Drones, Augmented Reality, UHD TV


New markets for multimedia and high-definition video chips are quickly becoming the next wave fueling the electronics industry. One market that demonstrates a mega-appetite for electronics is the drone market. The main IC components in drones that require exhaustive verification are the video capture circuitry and data collection components that either store data in-system or upload that data t... » read more

Automated Body Bias Validation For High Performance, Low Power Electronics


Using a device’s body bias effect allows designers to tune a circuit’s behavior to meet both power and performance specifications, but getting it right isn’t always easy. Accurate, fast, automated body bias verification is critical to ensure today’s complex designs meet demanding performance, reliability, and power usage specifications. To read more, click here. » read more

True Costs Of Process Node Migration


Deciding when and how to make a process node transition is critical to business success. The solution that requires the least amount of total change—in the form of license configurations, required hardware resources, necessary tool qualifications, and adequate support infrastructure—will always be the most “inexpensive” option. Do you have all the information you need to make the right ... » read more

Fusing CMOS IC And MEMS Design For IoT Edge Devices


Creating a sensor-based IoT edge device is challenging, due to the multiple design domains involved (Analog, digital, RF, and MEMS). But, creating an edge device that combines the electronics using the traditional CMOS IC flow and a MEMS sensor on the same silicon die can seem impossible. In fact, many IoT edge devices combine multiple dies in a single package, separating electronics from the M... » read more

Linux Security Primer: SELinux And SMACK Frameworks


With the increased expansion of the IoT, software developers are called upon to do more to protect their devices from malicious attacks. Building a secure system involves many components and layers of security. This paper offers an introductory review of two popular Linux security frameworks: SELinux and SMACK. Readers will gain an understanding of these two frameworks and when to best implemen... » read more

← Older posts Newer posts →