You Get What You Measure – How to Design Impossible SoCs with Perforce

You Get What You Measure – How to Design Impossible SoCs with Perforce
by Mike Gianfagna on 08-16-2021 at 10:00 am

You Get What You Measure – How to Design Impossible SoCs with Perforce

We all know that a trusted, reliable, and well-integrated design flow is critical to successful advanced SoC design. So is proven, robust IP. While these elements are necessary for success, they are not, by themselves, sufficient. There are other aspects to consider – measurement, tracking and coordination. We’ve all heard … Read More


Your IP Portfolio is Probably Leaking. What Can You Do About It?

Your IP Portfolio is Probably Leaking. What Can You Do About It?
by Mike Gianfagna on 05-13-2021 at 2:00 pm

Your IP Portfolio is Probably Leaking What Can You Do About It

This topic is inspired by a presentation at last year’s DAC presented by Methodics, now part of Perforce. The issues raised by the original presentation are still quite relevant in the current business climate. IP leakage is something everyone should consider as part of their normal business operations. Your design IP really … Read More


IP Security: Protecting Your Most Important IP Assets With Methodics IPLM

IP Security: Protecting Your Most Important IP Assets With Methodics IPLM
by Admin on 05-03-2021 at 2:33 pm

Live Webinar, May 19

Protecting IP is a challenge. Many companies are constantly dealing with leaky IP portfolios, either due to nefarious action or just accidental behavior.

The complexity of design, with IP being made up of large nested hierarchies of other designers, makes tracking IP that much more difficult.

Today we have

Read More

WEBINAR: Generating and Measuring IP Security Threat Levels For Your SoCs

WEBINAR: Generating and Measuring IP Security Threat Levels For Your SoCs
by Daniel Nenni on 10-09-2019 at 6:00 am

IPs have an attack surface that indicates how they can be compromised in real world scenarios. Some portions of the attack surfaces are well known, others are discovered during analysis, testing or out in the field. SoCs that use large collections of IPs need a systematic and reliable way to determine the various security vulnerabilities… Read More


Enterprise IP Management – A Whole New Gamut in Semiconductor Space

Enterprise IP Management – A Whole New Gamut in Semiconductor Space
by Pawan Fangaria on 07-29-2014 at 8:00 pm

The world of IPs in the semiconductor landscape has completely changed the semiconductor design scenario, specifically the fabless design space. Today IPs are key components of any large semiconductor design, in the same way as auto ancillaries in auto design. It’s just the beginning, in the days to come we will see SoCs just as… Read More


What is Authentication and Why Should You Care?

What is Authentication and Why Should You Care?
by Bill Boldt on 06-18-2014 at 10:00 pm

Authentication means making sure that something is real, just like it sounds.In the real world, authentication has many uses. One of the most recognizable is anti-counterfeiting, which means validating the authenticity of a removable, replaceable, or consumable client. Examples include system accessories, electronic Read More


SemiWiki and Mentor Graphics Seminar Series!

SemiWiki and Mentor Graphics Seminar Series!
by Daniel Nenni on 01-28-2012 at 10:49 am

For the greater good of the semiconductor ecosystem, SemiWiki and Mentor Graphics present SemiWiki Seminars, a free seminar and software demonstration series addressing the latest innovations in IC design. SemiWiki Seminars discuss interesting new challenges and potential solutions aimed at increased circuit density … Read More