Author's Latest Posts


IP For Centralized ADAS Domain Controllers


A centralized architecture is becoming more popular to integrate the ADAS applications into a centralized ADAS domain controller. A centralized architecture reduces cost, minimizes development of separate software applications and reduces system complexity. As automakers adopt multi-domain controllers with centralized ADAS processors, the required performance and functionality of the ADAS proce... » read more

USB 3.2: The Latest USB Type-C Challenge For SoC Designers


This white paper outlines applications that benefit from USB 3.2’s increased bandwidth, describes the latest USB 3.2 specification for USB Type-C, and explains how the latest specification affects speed using USB Type-C connectors and cables. Additionally, the white paper discusses USB 3.2 implementation, the new features of USB 3.2, and how designers can successfully integrate USB 3.2 IP in ... » read more

Choosing The Right Illumination Design Software


As a decision maker responsible for making the right choices for your company’s bottom line, which optical design software should you choose? If the performance or cost of your illumination subsystem is critical to the success of your products, the answer is LightTools. LightTools will increase your engineering productivity, enable faster time to market, and provide your products the competit... » read more

Scalable, Cloud-Ready IC Validator Solution For Advanced DRC Nodes


As we move to a data-centric world, semiconductor companies across the globe are working at a furious pace to develop and manufacture Artificial Intelligent [AI] chips. AI is all about an algorithm that mimics a human’s ability to learn and decide. For example, AI can be used to interpret and understand an image that helps a doctor make a better diagnosis for a patient. This requires chips to... » read more

Top 6 Application Security Hurdles And The Secret To Overcoming Them


Applications support some of the most strategic business processes and access an organization’s most sensitive data. These applications also contain 92% of reported security vulnerabilities, not networks. Yet application security continues to receive less budget and attention than network security. This means security-aware companies must find a cost-effective application security solution to... » read more

Right-Sizing Your Cryptographic Processing Solution


The cornerstone of all security solutions that deal with confidentiality, integrity and authentication is cryptography. Cryptography is a complex math problem used to help create security applications. Algorithms vary for different applications and are used for specific purposes. The common cryptographic algorithms are symmetric block ciphers for confidentiality, hash functions for integrity, a... » read more

How To Integrate SAST Into DevSecOps With Coverity


To reduce your time to market, your development teams must be able to scan every build for security weaknesses and vulnerabilities without sacrificing the efficiency of your development process. How can you effectively integrate application security testing tools throughout your CI/CD pipelines to create an exceptional DevSecOps culture and build secure, high-quality software faster? Ride th... » read more

Verdi Transaction Debug Platform


Design problems that appear in the late phases of the development cycle can be extremely difficult to track down and debug, thus putting project schedules at risk. It's not uncommon for an engineer to run the verification test on what appears to be the main design problem, only to find the problem in the dump. Traditional debug techniques don't always help to localize the issue. This whitepaper... » read more

The Impact of AI On Autonomous Vehicles


Automotive systems designers initially used traditional embedded-vision algorithms in advanced driver assistance systems (ADAS). One of the key enablers of vehicle autonomy moving forward will be the application of artificial intelligence (AI) techniques, particularly those based upon deep-learning algorithms implemented on multi-layer convolutional neural networks (CNNs). These algorithms show... » read more

Measuring And Analyzing SoC Performance With Verdi Performance Analyzer


SoC performance is a key competitive advantage in the marketplace. The choice and configuration of SoC components—protocol IP and interconnects, is geared towards maximizing overall SoC performance. A case in point is the use of HBM (High Bandwidth Memory) technology and controllers. Currently in its third generation, HBM boasts high-performance while using less power in a substantially small... » read more

← Older posts Newer posts →