How Formal Techniques Can Keep Hackers from Leaving You in the Cold

How Formal Techniques Can Keep Hackers from Leaving You in the Cold

While internet connected vehicles remain a popular target for hackers, the new breed of “smart” devices have the potential to…

Part 10: The 2016 Wilson Research Group Functional Verification Study

Part 10: The 2016 Wilson Research Group Functional Verification Study

ASIC/IC Language and Library Adoption Trends This blog is a continuation of a series of blogs related to the 2016…

Part 5: The 2016 Wilson Research Group Functional Verification Study

Part 5: The 2016 Wilson Research Group Functional Verification Study

FPGA Verification Technology Adoption Trends This blog is a continuation of a series of blogs related to the 2016 Wilson…

Prologue: The 2016 Wilson Research Group Functional Verification Study

Prologue: The 2016 Wilson Research Group Functional Verification Study

This is the first in a series of blogs that presents the findings from our new 2016 Wilson Research Group…

5 Things I Learned at the 2016 SAE World Congress

5 Things I Learned at the 2016 SAE World Congress

A few weeks ago I had the honor of presenting a paper related to my prior Verification Horizons blog posts…

DVCon USA 2016: Heralding Formal’s New Wave

DVCon USA 2016: Heralding Formal’s New Wave

If you were wondering whether formal verification is becoming a cornerstone of mainstream verification flows, several events at the recent…

Goal posts Aren’t Only for Football – Use Them in Formal Analysis Too!

Goal posts Aren’t Only for Football – Use Them in Formal Analysis Too!

With both DVCon and the annual Super Bowl championship football game coming up, one can’t help but think of ……

Conclusion: The 2014 Wilson Research Group Functional Verification Study

Conclusion: The 2014 Wilson Research Group Functional Verification Study

Impact of Design Size on First Silicon Success This blog is a continuation of a series of blogs related to…

How Formal Techniques Can Keep Hackers from Driving You into a Ditch, Part 2 of 2

How Formal Techniques Can Keep Hackers from Driving You into a Ditch, Part 2 of 2

In Part 1 of this series, inspired by security researchers that were able take over a new Jeep and drive…