Author's Latest Posts


Synopsys SoundWire Test Suite


Validation and interoperability are always a challenge for any new protocol. An earlier white paper, Digital Audio Simplified: MIPI SoundWire, discussed the basics of digital audio transmission, and benefits of SoundWire over other audio interfaces. This whitepaper describes how easy it is to integrate and validate a SoundWire design using Synopsys SoundWire VIP Test Suite. To read more, cli... » read more

The Path To (Virtually) Zero Defective Parts Per Million


Despite thorough wafer and package testing, a small number of defective ICs can make their way into systems. These test "escapes" often return as field failures, increasing costs and eroding profit margins. They can also present a hazard if deployed in safety-critical systems, which is why companies purchasing semiconductors for automotive, medical, or aerospace applications often demand a zero... » read more

Connected Car Driving Change In Defect Detection


Automotive product design is rapidly evolving and the magnitude and pace of change facing engineering organizations is challenging incumbent processes and resources, especially in the area of software design. While connected cars are not new, the frequency and depth to which the industry is embracing this dynamic is accelerating. Software has emerged as a primary vehicle for innovation and diff... » read more

Meeting ISO 26262 Guidelines


The average car today contains up to 100 million lines of code. Software controls everything from safety critical systems like brakes and power steering, to basic vehicle controls like doors and windows. Yet the average car today may have up to 150,000 bugs, many of which could damage the brand, hurt customer satisfaction and, in the most extreme case, lead to a catastrophic failure. Software d... » read more

How A Complete IP Solution Speeds Time-to-Market And Reduces Risk For 10 Gigabit Ethernet Applications


This paper discusses the merits of IP for the growing 10G Ethernet market and introduces Synopsys’ complete DesignWare 10G Ethernet IP solution in the context of the technology and the target market. To read more, click here. » read more

Don’t Let Bad Apples Ruin Your Pie


The quality of a pie depends heavily on the ingredients you use. Do you use bleached white flour or organic multigrain flour? Do you use sugar or a carcinogenic artificial sweetener? Do you use Granny Smith apples, or Honeycrisp, or those funky apples that fell off the tree that’s in your neighborhood? Managing ingredients is crucial to your success. Suppose you’re not paying close atten... » read more

Assessing ESD Sensitivity Of Interface IP Using Charged Device Model


An electronic device is susceptible to Electrostatic Discharge (ESD) damage during its entire life cycle, especially from the completion of the silicon wafer processing to when the device is assembled in the system. The most commonly used ESD test models are the Human Body Model (HBM) and the Charged Device Model (CDM). Both models assess the ESD sensitivity of a device, however due to the rapi... » read more

From Specification To Virtual Prototype


Differentiation and success for any embedded system comes from how effectively and rapidly new software features can be added. System and semiconductor manufacturers that historically aimed only at being effective at developing hardware have found themselves less competitive in the fierce battle for volume sockets in the mobile, consumer or automotive domains. The secret for success comes in mi... » read more

Three Power-Saving Techniques Using PCI Express IP


The increasing data traffic between devices in a computing application environment is causing a large power footprint, and for that reason designers are looking for ways to lower the power consumption of their SoCs during sparse or idle times. The smaller, battery-powered devices are often idle and in deep sleep modes, but these deep power saving modes come at the cost of slow resume times to s... » read more

What Is Fuzzing?


Fuzzing is an excellent technique for locating vulnerabilities in software. The basic premise is to deliver intentionally malformed input to target software and detect failure. A complete fuzzer has three components. A poet creates the malformed inputs or test cases.A courier delivers test cases to the target software. Finally, an oracle detects target failures. Different fuzzing techniques ... » read more

← Older posts Newer posts →