Author's Latest Posts


Right-Sizing Your Cryptographic Processing Solution


The cornerstone of all security solutions that deal with confidentiality, integrity and authentication is cryptography. Cryptography is a complex math problem used to help create security applications. Algorithms vary for different applications and are used for specific purposes. The common cryptographic algorithms are symmetric block ciphers for confidentiality, hash functions for integrity, a... » read more

How To Integrate SAST Into DevSecOps With Coverity


To reduce your time to market, your development teams must be able to scan every build for security weaknesses and vulnerabilities without sacrificing the efficiency of your development process. How can you effectively integrate application security testing tools throughout your CI/CD pipelines to create an exceptional DevSecOps culture and build secure, high-quality software faster? Ride th... » read more

Verdi Transaction Debug Platform


Design problems that appear in the late phases of the development cycle can be extremely difficult to track down and debug, thus putting project schedules at risk. It's not uncommon for an engineer to run the verification test on what appears to be the main design problem, only to find the problem in the dump. Traditional debug techniques don't always help to localize the issue. This whitepaper... » read more

The Impact of AI On Autonomous Vehicles


Automotive systems designers initially used traditional embedded-vision algorithms in advanced driver assistance systems (ADAS). One of the key enablers of vehicle autonomy moving forward will be the application of artificial intelligence (AI) techniques, particularly those based upon deep-learning algorithms implemented on multi-layer convolutional neural networks (CNNs). These algorithms show... » read more

Measuring And Analyzing SoC Performance With Verdi Performance Analyzer


SoC performance is a key competitive advantage in the marketplace. The choice and configuration of SoC components—protocol IP and interconnects, is geared towards maximizing overall SoC performance. A case in point is the use of HBM (High Bandwidth Memory) technology and controllers. Currently in its third generation, HBM boasts high-performance while using less power in a substantially small... » read more

Examining DevSecOps Realities And Opportunities


We are still in the early days of including security in continuous integration (CI), continuous delivery (CD), and DevOps workflows. Given that only half of enterprise deployments include security testing elements today, there’s still plenty of room for improvement. Enterprises implementing CI, CD, and DevOps releases are working with large-scale infrastructures, focusing on faster release... » read more

Connected Car Driving Defect Detection Change


Automotive product design is rapidly evolving and the magnitude and pace of change facing engineering organizations is challenging incumbent processes and resources, especially in the area of software design. While connected cars are not new, the frequency and depth to which the industry is embracing this dynamic is accelerating. Software has emerged as a primary vehicle for innovation and diff... » read more

Synopsys’ Vision For The New Wave Of Chip Design


Learn how the recent semiconductor industry shifts are breaking the traditional RTL-to-GDSII flow, and how the new Synopsys Fusion Technology helps you cross the chasm. To read more, click here. » read more

How To Build Security Into Your Software Development Process


To standardize the software development life cycle (SDLC), organizations implement development methodologies to fulfill their objectives in a way that best suits their organizational goals. Whether you use Agile, Waterfall, or something in between, building security into your SDLC can improve efficiency and reduce costs if it’s done the right way. Download the eBook to: Learn how to a... » read more

Meeting ISO 26262 Software Standards


Software controls everything from safety critical systems like brakes and power steering, to basic vehicle controls like doors and windows. Yet the average car today may have up to 150,000 bugs, many of which could damage the brand, hurt customer satisfaction and, in the most extreme case, lead to a catastrophic failure. Software development testing is designed to help developers, management an... » read more

← Older posts