If we thought about verfication-for-security in a different way, the Spectre and Meltdown vulnerabilities could well have been avoided.
Ashish Darbari concludes his series on the need for new verification strategies by considering Debug and Signoff & Review.
Richard Pugh shows how the fast-growing market for drone silicon highlights emulation's power where high data volumes are critical.
In part two of this series, Ashish Darbari introduces a checklist to address verification challenges and build the meta model.
John Ferguson reviews the key capital metrics you need to review when deciding whether to move to a new process.
Why is verification still such a challenge in spite of all the technologies and techniques being brought to bear
The assumption has been that extra security eats into profit margins. But with some lateral thinking it can actually improve the bottom line.
Doc Formal concludes his introduction to formal verification with a practitioner's view of the technology.
Doc Formal begins a two-part series by describing the solid and well-established foundations of formal verification.
Our new columnist introduces himself and traces the progress of formal verification over the last two decades. Join the discussion.
View All Sponsors