Latest posts

How Any Verification Engineer Can Quickly Create a Complex Testbench

How Any Verification Engineer Can Quickly Create a Complex Testbench

Over the past decade or so, the state of the art in design verification has taken a huge leap forward…

How To Connect Your Testbench to Your Low Power UPF Models

How To Connect Your Testbench to Your Low Power UPF Models

Face facts: power supply nets are now effectively functional nets, but they are typically not defined in the design’s RTL….

Holiday UVM Register Indigestion

Holiday UVM Register Indigestion

Happy Holidays! Hopefully, wherever you are you are enjoying some time off. At our house, we’re planning a large dinner,…

Conclusion: The 2016 Wilson Research Group Functional Verification Study

Conclusion: The 2016 Wilson Research Group Functional Verification Study

Deeper Dive into First Silicon Success and Safety Critical Designs This blog is a continuation of a series of blogs…

DVCon U.S. 2017: Bigger and Better!

DVCon U.S. 2017: Bigger and Better!

Technical Program is Live For the past several months, the DVCon U.S. Steering Committee has been meeting to craft a…

Emulation and simulation; invaluable tools for IC verification

Emulation and simulation; invaluable tools for IC verification

Emulation technology has been around for a long time—more than four decades by my count—and industry observers believe more than…

Part 12: The 2016 Wilson Research Group Functional Verification Study

Part 12: The 2016 Wilson Research Group Functional Verification Study

ASIC/IC Verification Results This blog is a continuation of a series of blogs related to the 2016 Wilson Research Group…

Part 11: The 2016 Wilson Research Group Functional Verification Study

Part 11: The 2016 Wilson Research Group Functional Verification Study

ASIC/IC Power Trends This blog is a continuation of a series of blogs related to the 2016 Wilson Research Group…

How Formal Techniques Can Keep Hackers from Leaving You in the Cold

How Formal Techniques Can Keep Hackers from Leaving You in the Cold

While internet connected vehicles remain a popular target for hackers, the new breed of “smart” devices have the potential to…