Game Of Eco Systems


My first ever blog post on May 28, 2008, was called “May you live in interesting times …”, starting with “the view from the top” at Synopsys. At the time, my focus was abstraction levels and how the industry has been moving upwards for decades. While it is not a Chinese proverb after all (read my blog above), we still do live in interesting times, perhaps more so that ever. One of the... » read more

Confessions Of An ESL-Aholic


At DAC 1997 – 17 years ago – Gary Smith coined the term “Electronic System-Level” (ESL) design. Around the same time I entered EDA when becoming part of Cadence and became very involved in ESL. Things have changed over the last 17 years quite a bit. While some of the predictions did not come true, others definitely did. Over the last couple of years the tools to be counted as part of sy... » read more

How To Shorten Hardware-Software Development Cycles


Doing more hardware-software development prior to silicon promises significant productivity and time-to-market improvements. Part of this is shifting software development “to the left,” which can compress development Last month, I blogged about “The Great Shift to the Left,” and I pointed out some of the organizational challenges associated with compressing the development cycle usin... » read more

The Great Shift To The Left


Writing this while I am at DATE in Dresden, Germany, I am also preparing for two panels on system-level trends later today and one on software-driven verification tomorrow. I am also visiting partners and customers to discuss our current and planned technologies. A while ago I had augmented “Leibson’s Law” stating that it takes 10 years for any disruptive technology to be adopted by desig... » read more

Are Value And Security Needs Misaligned In The IoT?


Today’s keynote given by Green Hills Software CTO David Kleidermacher here at Embedded World in Nuremberg continued on the security thread from last year and was—interestingly enough—titled like a blog post I wrote about the Amphion Forum in late 2012: “Securing the Internet of Things”. Unfortunately, security has not become less scary. In fact, it’s the opposite. David started h... » read more

10 Years Later—Will Project Delays Stop Faster Technology Innovation?


Every January I enjoy looking back 10 years to learn from the past, consider implications for the future, and have fun picking the worst prediction that did not come true. This year I even can combine my annual trip to the garage where I keep some January issues of IEEE Spectrum with reviewing my own blogging. Five years ago in 2009, I did my first “10-year-lookback” that I called “Bac... » read more

Top 5 Trends For 2014


My daughter’s and my traditional yearly cookie baking party last weekend reminded me of two things: There is still no easy recipe for system design and verification and – of course – the year is almost over again. Ouch. Let’s look back at 2013 first. Earlier this year we held a System to Silicon Verification Summit in San Jose, with an interesting technical keynote by Brian Bailey an... » read more

The Hunt For The Next Application To Drive System-Level Design And Verification


In recent years, most of my customer presentations highlighted some type of mobile device – system and system on chip (SoC) — to explain the challenges for system-level design and verification. But I also like to look into other application domains to understand how challenges may develop over time and to identify similarities and differences in challenges between application domains. Co... » read more

Verification 2.0: From Tool To Flow


Recently, Cadence held a System-to-Silicon Verification Summit at which companies like Broadcom, Zenverge, NVIDIA, and Ambarella shared their experiences and visions for verification. In one of the keynotes, Brian Bailey shared his vision of how verification would transition from tools to flows. Brian’s presentation was quite insightful. He started with a brief status of where we are curre... » read more

How Much Verification Can One Engineer Handle?


By Frank Schirrmeister When reviewing the agenda of our upcoming Verification Summit here in San Jose this Thursday, the question came to mind of who can actually execute the required complex verification tasks. Can they understand enough detail in hardware, software, and the system aspects to efficiently rid the design of bugs? The reality is that the task requires not one engineer who can do... » read more

← Older posts Newer posts →