Author's Latest Posts


How To Build Security Into Your Software Development Process


To standardize the software development life cycle (SDLC), organizations implement development methodologies to fulfill their objectives in a way that best suits their organizational goals. Whether you use Agile, Waterfall, or something in between, building security into your SDLC can improve efficiency and reduce costs if it’s done the right way. Download the eBook to: Learn how to a... » read more

Meeting ISO 26262 Software Standards


Software controls everything from safety critical systems like brakes and power steering, to basic vehicle controls like doors and windows. Yet the average car today may have up to 150,000 bugs, many of which could damage the brand, hurt customer satisfaction and, in the most extreme case, lead to a catastrophic failure. Software development testing is designed to help developers, management an... » read more

Data Converters IP For Automotive SoCs


Automotive applications place demanding requirements on IP designers and SoC integrators to meet all mandated reliability and functional safety requirements. A good understanding of such requirements and how to efficiently implement them in the SoC enables integrators to break down the challenges into manageable pieces while leveraging the characteristics (and qualification) of the integrated I... » read more

2017 Coverity Scan Report


Today, open source software (OSS) development is one of the primary driving forces of technological innovation. From artificial intelligence to the Internet of Things, autonomous driving, and cloud computing infrastructure, OSS plays a pivotal role in the evolution of a wide range of technologies. But what are the implications of its dominance? To answer this, we review what we’ve learn... » read more

CISO Research Identifies 4 Distinct Approaches To The Role


Every chief information security officer (CISO) is unique. They each have varying modes of operation that are influenced by long and distinguished careers. To understand CISO strategies and approaches, we decided to conduct a study. We gathered data in a series of extended in-person interviews with 25 CISOs with the goal of describing how a CISO’s work is organized and executed. To read mo... » read more

Achieving ISO 26262 Software Tool Confidence For Improved Automotive Functional Safety


Achieving ISO 26262 Software Tool Confidence for Improved Automotive Functional Safety The rapid adoption of advanced electronic systems in automobiles has prompted the automotive industry to develop the ISO 26262 functional safety standard to address the potential risks associated with failures in these systems. ISO 26262 is derived from the more general IEC 61508 standard and defines requirem... » read more

Who Needs OWASP?


A list of critical web application security vulnerabilities is a necessary risk management tool. Equally true is that each organization has a different set of vulnerabilities plaguing their applications. To complete a trifecta of fundamental truths, crowdsourced lists such as the OWASP Top 10 rarely reflect an individual organization’s priorities. Given these three points, many organizatio... » read more

Analyzing The Losses In Visually Lossless Compression Algorithms


Over the past few years there has been a remarkable progress in the quality of display devices, with 4K displays becoming the norm, and 8K and 10K displays following closely. However, this increase in quality has led to a tremendous increase in the amount of data being transmitted over display links. To meet these demands most display interfaces are now making use of compression. This white pap... » read more

Enabling Synchronized Hardware Software Debug With Verdi


Verdi HW SW Debug is an instruction-accurate embedded processor debug solution that offers fully synchronized views between hardware, as RTL or gate-level design models, and software, as C or assembly code enabling co-debug between RTL and software. To read more, click here. » read more

On-Chip Clock And Process Monitoring Using STAR Hierarchical System’s Measurement Unit


Functional safety is one of the most critical priorities for system-on-chips (SoCs) that are involved in automotive, aerospace and industrial applications. These requirements are driven by standards such as ISO 26262 and are the backbone of the design and testing of automotive ICs. Synopsys’ STAR Hierarchical System’s Measurement Unit helps ensure the accuracy of on-chip clock frequency and... » read more

← Older posts