Silicon Lifecycle Management Platform


Silicon Lifecycle Management (SLM) is an emerging paradigm within the industry that is making product development and deployment more deterministic. In-silicon observability and insight are key when it comes to SLM and as an industry we can no longer afford to be blind to what is happening inside the chip. SLM is starting to close the loop between design and in-field. Click here to read more. » read more

Change Management With Impact Analysis During Safety-Critical IP And SoC Development


Standards like ISO 26262 provide guidance to mitigate safety risks by defining safety analyses requirements and processes. The standard describes Change Management as a way to analyze and control changes in safety-related work products, items, and elements throughout the safety lifecycle. Impact analysis, a part of the Change Management process, is a systematic approach for evaluating changes t... » read more

Utilizing IP Lifecycle to Author IP for Successful Reuse


Successful reuse of IP relies on the entire IP lifecycle. Developing and maintaining documentation, reference designs and test suites requires a significant effort. Learn how they are vital for reuse in this white paper. Click here to read more. » read more

Challenges In IP Reuse


Jeff Markham, software architect at ClioSoft, explains why IP reuse is so important in advanced process node SoC chip designs, what companies need to keep track of when working with third-party IP, and how it needs to be characterized. » read more

Thermal Impact On Reliability At 7/5nm


Haroon Chaudhri, director of RedHawk Analysis Fusion at Synopsys, talks about why thermal analysis is shifting left in the design cycle and why this is so critical at the most advanced process nodes. https://youtu.be/wjkrEFLb2vY » read more

Developing Effective Design Strategies For Today’s Wearable Devices: Security


We love our wearables, but wearable devices connected to public networks supporting bi-directional data flow make our devices...and us...highly susceptible to attack. Security can no longer be thought of as an “afterthought” to embedded system design; development teams must design in security methods and adopt a security development lifecycle approach that meets the appropriate security lev... » read more