Author's Latest Posts


Fast Cycle Approximate Simulation Using ARC nSIM NCAM


One of the key factors of successful software (e.g. firmware/application) development is the ability to quickly run and profile software in the absence of target hardware. The earlier in the design process that this is possible, the better, i.e. during the pre-silicon phase. Typically, the pre-silicon phase is dominated by three activities, each with different challenges: Exploring the Ha... » read more

Achieving Faster Closure With Reduced Setup And Debug Using Advanced RTL Static Signoff Platform


Many design houses are continually seeking ways to shorten their effective design cycle to address demanding market requirements, gain a formidable technological advantage, and secure leadership in their respective industries. This pressure can cause designers to get extremely overwhelmed by strict timelines. To meet tight project timelines, design teams often resort to identifying industry-lea... » read more

Distributed Development Of IP And SoC In Compliance With Automotive ISO 26262


Automotive functional safety System-on-Chips (SoCs) for Advanced Driver Assistance Systems (ADAS) contain several complex Intellectual Property (IP) cores. The IP cores are developed as a Safety Element out of Context (SEooC), meaning the context of the end application is not fully known at delivery time. In addition, IP development might be distributed across the globe. To reduce the risk of f... » read more

Accelerating SoC Verification Closure With Unified Verification Management Solution


Functional verification of system-on-chip (SoC) designs requires best-in-class tools linked together in a unified solution in order to address exponential complexity challenges. There is no one-size-fits-all method for verification. Complex designs require a combination of virtual prototyping, static checks, formal analysis, simulation, emulation and FPGA prototyping. The execution of all the t... » read more

10 Things You Ought To Know Before You Benchmark Your Software Security Program


Benchmarking can help you get a new software security initiative off the ground or better navigate an existing one. It is different from other measurement techniques because it focuses on excellence, includes detailed comparisons, and pools confidential information among numerous organizations. To get you started in the right direction, we’ve put together some quick tips so you get the mos... » read more

Machine Learning — Everywhere: Enabling Self-Optimizing Design Platforms for Better End-to-End Results


Machine-learning offers opportunities to enable self-optimizing design tools. Very much like self-driving cars that observe real-world interactions to improve their responses in different (local) driving conditions, AI-enhanced tools are able to learn and improve in (local) design environments after deployment. These new, ML-driven capabilities can be embedded in different design engines, gi... » read more

Verifying Safety-Critical FPGA Designs With Fault Simulation


Supporting safety and assurance in designs, such as the chips used in industrial, aerospace and defense applications, requires more than traditional functional verification. Even if every bug is found and fixed before release, these applications have additional requirements for functional safety. They must be able to handle a variety of faults and induced errors, either by correcting them or by... » read more

Guide To Application Security: What To Look For And Why


Does your organization do software development in-house? If you’d like to learn more about application security but don’t know where to start, this white paper will arm you with development and security fundamentals. Inside you'll find: Key concepts, terminology, and why DevSecOps and cloud development matters The trade-offs of different AppSec tools (e.g., SAST, DAST, IAST) and ... » read more

How 5G Is Influencing Silicon Design


5G is introducing a wide array of challenges in next-generation SoCs that go well beyond high bandwidth wireless. These include increasing system bandwidth, lowering SoC latency, and reducing power significantly for the connected internet of things. Using trusted standards-based IP and proven processing and analog IP at the most aggressive process technology nodes is needed to bring 5G to marke... » read more

Change Management With Impact Analysis During Safety-Critical IP And SoC Development


Standards like ISO 26262 provide guidance to mitigate safety risks by defining safety analyses requirements and processes. The standard describes Change Management as a way to analyze and control changes in safety-related work products, items, and elements throughout the safety lifecycle. Impact analysis, a part of the Change Management process, is a systematic approach for evaluating changes t... » read more

← Older posts Newer posts →