中文 English

Author's Latest Posts


Verifying Safety-Critical FPGA Designs With Fault Simulation


Supporting safety and assurance in designs, such as the chips used in industrial, aerospace and defense applications, requires more than traditional functional verification. Even if every bug is found and fixed before release, these applications have additional requirements for functional safety. They must be able to handle a variety of faults and induced errors, either by correcting them or by... » read more

Guide To Application Security: What To Look For And Why


Does your organization do software development in-house? If you’d like to learn more about application security but don’t know where to start, this white paper will arm you with development and security fundamentals. Inside you'll find: Key concepts, terminology, and why DevSecOps and cloud development matters The trade-offs of different AppSec tools (e.g., SAST, DAST, IAST) and ... » read more

How 5G Is Influencing Silicon Design


5G is introducing a wide array of challenges in next-generation SoCs that go well beyond high bandwidth wireless. These include increasing system bandwidth, lowering SoC latency, and reducing power significantly for the connected internet of things. Using trusted standards-based IP and proven processing and analog IP at the most aggressive process technology nodes is needed to bring 5G to marke... » read more

Change Management With Impact Analysis During Safety-Critical IP And SoC Development


Standards like ISO 26262 provide guidance to mitigate safety risks by defining safety analyses requirements and processes. The standard describes Change Management as a way to analyze and control changes in safety-related work products, items, and elements throughout the safety lifecycle. Impact analysis, a part of the Change Management process, is a systematic approach for evaluating changes t... » read more

Software Due Diligence: A Buyer’s Checklist And Guidelines


The potential risk and exposure posed by M&A transactions demand thorough and robust due diligence practices. When an acquisition involves software, it's critical to ensure that associated risks are identified and fully understood. Knowing what questions to ask when performing due diligence is key to avoiding potential risks and legal complications. This is especially true for the acquisiti... » read more

The Growing Market For Specialized Artificial Intelligence IP In SoCs


Over the past decade, designers have developed silicon technologies that run advanced deep learning mathematics fast enough to explore and implement artificial intelligence (AI) applications such as object identification, voice and facial recognition, and more. Machine vision applications, which are now often more accurate than a human, are one of the key functions driving new system-on-chip (S... » read more

Lower Process Nodes Drive Timing Signoff Software Evolution


A dramatic rise in design complexity has led to a slew of new signoff challenges that impact the ability to predictably meet PPA targets. Smaller technology nodes and larger design sizes have caused the number of corners and modes to grow exponentially leading to much longer turnaround times for timing signoff. Moreover, larger design sizes demand huge compute resources for timing signoff. I... » read more

Comprehensive Simulation Of Power Electronics Systems


Power electronics systems are at the heart of many important and growing industries, from all-electric vehicles to renewable energy generation. Optimizing the design of these systems requires accurate modeling and simulation long before construction of physical prototypes. SPICE-level simulation has been the traditional solution and, while it still plays a key role, it cannot satisfy all requir... » read more

Know Your Code: Open Source Security Risks During Development


Exploits of software security vulnerabilities can result in loss of sensitive customer and company information, disruption of business operations, and costly litigation. Organizations are increasingly turning to open source software to save time and money, but few have sufficient visibility into, or control of, open source usage to head off potential open source risks. Read this white paper ... » read more

Lower Process Nodes Drive Timing Signoff Software Evolution


A dramatic rise in design complexity has led to a slew of new signoff challenges that impact the ability to predictably meet PPA targets. Smaller technology nodes and larger design sizes have caused the number of corners and modes to grow exponentially leading to much longer turnaround times for timing signoff. Moreover, larger design sizes demand huge compute resources for timing signoff. I... » read more

← Older posts Newer posts →