Effective Configuration Of Security Tools


To do a job well, you need the right tools. But it’s just as important—perhaps even more so—to use those tools correctly. A hammer will make things worse in your construction project if you’re trying to use it as a screwdriver or a drill. The same is true in software development. The intricacies of coding and the fact that it’s done by humans means that throughout the software deve... » read more

Model Variation And Its Impact On Cell Characterization


EDA (Electronic Design Automation) cell characterization tools have been used extensively to generate models for timing, power and noise at a rapidly growing number of process corners. Today, model variation has become a critical component of cell characterization. Variation can impact circuit timing due to process, voltage, and temperature changes and can lead to timing violations, resulting i... » read more

Dependent Failure Analysis For Safety-Critical IP And SoCs


By Shivakumar Chonnad, Radu Iacob, and Vladimir Litovtchenko Due to the increased complexity in safety-critical system hardware, software, and mechatronics, the functional safety development process must address systematic and random hardware failures. Numerous safety-related activities are performed during safety-critical IP and SoC developments, as part of the safety lifecycle, from produc... » read more

How Cybersecurity Is Driving Business Forward


Cybersecurity is a topic that continues to grow in importance for both the general population and those who work in the tech industry. While news headlines about security breaches affecting various companies are now almost a daily occurrence, many still don’t understand the responsibility that every one of us has to keep our own personal and workplace networks secure. This October, Synopsys w... » read more

For AI Hardware, Power Optimization Starts With Software And Ends At Silicon


Artificial intelligence (AI) processing hardware has emerged as a critical piece of today’s tech innovation. AI hardware architecture is very symmetric with large arrays of up to thousands of processing elements (tiles), leading to billion+ gate designs and huge power consumption. For example, the Tesla auto-pilot software stack consumes 72W of power, while the neural network accelerator cons... » read more

Upgrade Your SoC Design With USB4 IP


USB4 is a new standard of connectivity by the USB Implementers Forum (USB-IF). USB4 supports multiple high-speed interface protocols, including USB4, DisplayPort, PCI Express, and Thunderbolt 3 for efficient data transfer and simultaneous delivery of data, power, and high-resolution video through a single USB Type-C cable. USB4 offers up to 40Gbps, which is twice that of the preceding USB 3.2 G... » read more

Automotive Gateway IP Enabling Scalable Automotive Platforms


As automakers introduce new electronic platforms, the system architectures are changing from distributed ECUs to integrated domain compute modules. This evolution, along with the increased number and types of sensors for ADAS systems, is having a big impact on the automotive Ethernet network and gateway function. Automotive Ethernet and gateways do more than support mobile connectivity, they en... » read more

Faster Formal Verification Closure For Datapaths In AI Designs


In recent years, many longstanding assumptions about formal verification have been rendered obsolete by ever-improving technology. Applications such as connectivity checking have shown that formal can work on large system-on-chip (SoC) designs, not just small blocks. Standard SystemVerilog Assertions (SVA) have eliminated the need to learn an abstruse mathematical language for each new formal t... » read more

Optimizing Embedded Narrowband IoT Modem Solutions To Meet IoT Connectivity Challenges


As the concept of the internet-of-things (IoT) was taking shape, the communications industry started addressing the anticipated need to connect these “billions of IoT devices” (Figure 1). Since these devices are meant to address low-cost, low-power (battery operated) applications, cellular technology trends to increase bandwidth – driven largely by mobile phones – needed to be revisite... » read more

Security Verification For Processor-Based SoCs


By Ruud Derwig and Nicole Fern Security in modern systems is of utmost importance. Device manufacturers are including multiple security features and attack protections into both the hardware and software design. End-product system security, however, cannot be guaranteed by using a secure processor alone. The final product security results not only from using proven, secure hardware component... » read more

← Older posts Newer posts →