Author's Latest Posts


Made in the Cloud!


While software developers have been building and delivering software in the cloud for many years now, how much IC hardware is “made in the cloud”? We’re here to help you understand the case for IC hardware development in the cloud and answer the most common questions. Download the paper and learn: Why isn’t everybody doing it? Why cloud? Why now? Can you afford to ignore i... » read more

Efficient Data Transfer With High-Speed Serial Flash Interface IP


Technology advancement and increasing data transfer rate, have made serial flash memories widely popular to store data on off-chip locations. Traditionally, flash memory devices use a primary controller to interface with the CPU and get the data from the memory device. For large amounts of data, the communication with the CPU is mostly performed by the external Direct Memory Access (DMA) contro... » read more

System Innovation For Aerospace, Defense And Government


Tools for developer and user challenges Performance in a small package — low size, weight and power (SWaP) Long-life and upgradability with high-reliability, security, and safety Reliability in a range of operating environments, from ground to space End-to-end support: from the IoT network edge to the datacenter Process massively parallel sensor data with low latency S... » read more

Improving Performance And Simplifying Coding With XY Memory’s Implicit Parallelism


Instruction-level Parallelism (ILP) refers to design techniques that enable more than one RISC instruction to be executed simultaneously in the same instruction, which boosts processor performance by increasing the amount of work done in a given time interval, thereby increasing the throughput. This parallelism can be explicit, where each additional instruction is explicitly part of the instruc... » read more

2021 Software Vulnerability Snapshot


The Synopsys Cybersecurity Research Center (CyRC) examined anonymized data from thousands of commercial software security tests performed by Synopsys application security testing services in 2020. The CyRC team measured this data against the 2021 OWASP Top 10 list of the most critical security risks to web applications. Key findings in the report include   97% of tests uncovered vul... » read more

Fuzz Testing Software-Defined Vehicles Using Agent Instrumentation


Cybersecurity has become intertwined into each step of the automotive development process. In particular, fuzz testing has proven to be a powerful approach to detect unknown vulnerabilities in automotive systems. But with limited instrumentation, especially on software-heavy systems such as high-performance computers (HPCs), several types of issues go undetected, including memory leaks and case... » read more

Calibrate And Configure Your Power Management IC With NVM IP


Power Management Integrated Circuits (PMICs) are the first to turn on and the last to turn off in a system. They perform the task of delivering the right voltage to component chips by regulating or boosting the voltage levels to the component chips. Some PMICs are configured once at the factory and an area-efficient OTP NVM is the best choice. When a PMIC is expected to be re-configured mult... » read more

Evolution Of Data Center Networking Technology — IP And Beyond


Ethernet is ubiquitous—it is the core technology that defines the Internet and serves to connect the world in ways that people could not imagine even one generation ago. HPC clusters are working on solving the most challenging problems facing humanity—and cloud computing is the service hosting many of the application workloads struggling with these questions. While alternative network infra... » read more

Augment Or Replace? How IAST Fits Into The AppSec Landscape


As the pace, volume, and complexity of application development continue to escalate, it becomes increasingly difficult to maintain software security and quality. More speed, more volume, and more complexity too often lead to less security and less quality. Interactive application security testing (IAST) is an exciting option for organizations looking to maintain both the speed and complexity... » read more

Accelerating Software Development With Fast Virtual Prototypes


Most of today's largest semiconductor devices are highly complex system on chip (SoC) designs, which means that they include one or more embedded processors. This indicates that software provides some of the key functionality of the chip. The system cannot be fully verified or validated without both hardware and software. However, software development generally takes more time and resources to ... » read more

← Older posts Newer posts →