The basics of USB 3.2, how to implement it in an SoC, and how USB Type-C connectors and cables are used in USB 3.2 systems.
How the digital twin can fuel automotive verification flows impossible in the real world.
As AI becomes pervasive in computing applications, so too does the need for high-grade security in all levels of the system.
Exchange frameworks are emerging to make it easier for neural-network developers to swap between development environments.
Machine-learning strategies for embedded vision are evolving so quickly that designers need access to flexible, heterogenous processor architectures that can adapt as the algorithms evolve.
Gandharv Bhatara looks at how the OPC and RET elements of Calibre are getting ready for the EUV age.
Ashish Darbari breaks down formal's value to this challenging verification task with code examples and reference to VC Formal from Synopsys.
Dina Medhat describes what you need to know about the types of waiver strategy that can be applied.
Doc Formal sets out the 10 cost points in verification that formal will help you control and reduce.
Effective formal verification demands striking a careful balance in the use of constraints – too many slows things down, but too few may let bugs slip through.
View All Sponsors