IP Security: Protecting Your Most Important IP Assets With Methodics IPLM

IP Security: Protecting Your Most Important IP Assets With Methodics IPLM
by Admin on 05-19-2021 at 12:00 am

Live Webinar, May 19

Protecting IP is a challenge. Many companies are constantly dealing with leaky IP portfolios, either due to nefarious action or just accidental behavior.

The complexity of design, with IP being made up of large nested hierarchies of other designers, makes tracking IP that much more difficult.

Today we have

Read More

Podcast EP18: The Story Behind Combining Methodics and Perforce

Podcast EP18: The Story Behind Combining Methodics and Perforce
by Daniel Nenni on 04-30-2021 at 10:00 am

Dan and Mike are joined by Simon Butler, founder of Methodics and Brad Hart, CTO of Perforce. We explore the acquisition of Methodics by Perforce, including motivation, strategy and a look to the future. We also discuss some of the history of Methodics and how they became successful.

For further discussion, visit their blog TheRead More


How to Avoid Rework with Change Impact Visibility for All Teams

How to Avoid Rework with Change Impact Visibility for All Teams
by Admin on 03-11-2021 at 12:00 am

Live Webinar, March 11

In product development, the work of one team affects the work of other teams. Today’s agile world requires back-and-forth communication among the product team’s requirements definitions, the development team’s building, and the QA team’s testing.

These tests, artifacts, records— and the activities

Read More

How to Stop Hardware and Software Configuration Issues From Impacting Your Business

How to Stop Hardware and Software Configuration Issues From Impacting Your Business
by Daniel Payne on 02-25-2021 at 9:00 am

Managing the relationship between hardware and software during system design is challenging. Complexities in both the hardware domain and software domain mask configuration issues and unfortunately do not get caught — until it is too late.

The hardware register definition has dependencies for embedded software designers.… Read More


Single HW/SW Bill of Material (BoM) Benefits System Development

Single HW/SW Bill of Material (BoM) Benefits System Development
by Daniel Payne on 02-23-2021 at 10:00 am

Perforce - IP

Most large electronics companies take a divide and conquer approach to projects, with clear division lines set between HW and SW engineers, so quite often the separate teams have distinct methodologies and ways to design, document, communicate and save a BoM. This division can lead to errors in the system development process,… Read More


Conference: Embedded DevOps

Conference: Embedded DevOps
by Daniel Payne on 01-07-2021 at 6:00 am

embedded devops min

The catchy phrase DevOps is defined by Agile advocates as, “The practice of operations and development engineers participating together in the entire service lifecycle, from design through the development process to production support.

I’ve been developing software since the stone ages, which means… Read More


Perforce Software Acquires Methodics!

Perforce Software Acquires Methodics!
by Daniel Nenni on 07-20-2020 at 6:00 am

image press release perforce methodics

This has got to be one of the most interesting and disruptive EDA acquisitions I have seen in some time. Another one that comes to mind is Siemens acquiring Mentor Graphics. We have been covering EDA PLM companies since the start of SemiWiki and have worked with most of them. If I had to keep score I would say it’s about even but … Read More


SEMI Takes the Jim Hogan and Simon Butler Conversation Virtual

SEMI Takes the Jim Hogan and Simon Butler Conversation Virtual
by Mike Gianfagna on 05-13-2020 at 10:00 am

Jim Simon

As I originally reported a few weeks ago, the Jim Hogan fireside chat with Methodic’s CEO and founder Simon Butler was moved to a virtual event on May 1. The event was produced by the Electronic System Design (ESD) Alliance, a SEMI Strategic Technology Community. Bob Smith, executive director of ESDA, moderated the event. I am happy… Read More


WEBINAR: Generating and Measuring IP Security Threat Levels For Your SoCs

WEBINAR: Generating and Measuring IP Security Threat Levels For Your SoCs
by Daniel Nenni on 10-09-2019 at 6:00 am

IPs have an attack surface that indicates how they can be compromised in real world scenarios. Some portions of the attack surfaces are well known, others are discovered during analysis, testing or out in the field. SoCs that use large collections of IPs need a systematic and reliable way to determine the various security vulnerabilities… Read More


Workflow Automation Applied to IP Lifecycle Management

Workflow Automation Applied to IP Lifecycle Management
by Daniel Payne on 10-04-2019 at 10:00 am

Methodics, Flowable

I often blog about a specific EDA tool, or an IP block, but the way that SoC design teams approach their designs and then use tools and IP can either be a manual, ad-hoc process, or part of something that is well-documented, following a design methodology. Back in the 1980’s while at Intel our team first created a design methodology… Read More