IC DESIGN

FORMAL VERIFICATION - SOLUTIONS

Siemens_Expert-Partner

OneSpin® - SOFTWARE PRODUCT SOLUTIONS

360 DV-INSPECT™

Automatic and exhaustive analysis of a code base for classic implementation problems 

360 DV-INSPECT

Source: OneSpin® - A Siemens Business

Integrated circuit designers are under constant pressure to deliver bug free code that meets evermore rigorous requirements. It is well known that the more bugs that can be detected early in the development process, the faster and easier that development effort will be. However, early bug detection requires a verification overhead on the designer that can be onerous and impact the design process. 

OneSpin 360 DV-Inspect™ takes the designers' pain away and automatically and exhaustively analyzes RTL source code prior to functional verification and synthesis, eliminating hard to find implementation errors early in the design process. 

Contact Free Trial

    Privacy Policy*
    I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

    Loading...

    Fields marked with * are mandatory.

      How is the MAC address generated?

      Windows
      Start a command shell by typing: cmd in the Windows menu search box and then Enter. A command line window opens. Enter: ipconfig /all. All your system network adapters will be listed. Find an adapter with a network connection and copy the physical address. This consists of 6 x 2-digit hexadecimal numbers separated by hyphens.

      Linux/Unix
      Open a terminal and enter the following command: ifconfig. Confirm with Enter.
      Look for the network eth0, depending on distribution it can also have a different name. The line with ether specifies the MAC ID: Here are 6 x 2-digit hex numbers separated by a colon.

      Privacy Policy*
      I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

      Loading...

      Fields marked with * are mandatory.

      360 DV-VERIFY™

      360-DV-VERIFY

      Source: OneSpin® - A Siemens Business

      Unified, coverage-driven assertion-based verification, including a fully automated apps library 

      Formal assertion checking has traditionally been hard to adopt, and has been viewed as a tool for specialists only. This has significantly changed with automation of recurring verification tasks using formal apps, as well as the widespread adoption of assertion languages, and vastly increased capacity of formal tools. Today a huge number of point tools for formal verification is available, each covering different formal use models. 

      OneSpin 360 DV-Verify™ goes beyond that by providing a unified, coverage-driven assertion-based verification flow, and including a full verification app library, as well as means for easy design exploration, all in one tool. 

      Contact Free Trial

        Privacy Policy*
        I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

        Loading...

        Fields marked with * are mandatory.

          How is the MAC address generated?

          Windows
          Start a command shell by typing: cmd in the Windows menu search box and then Enter. A command line window opens. Enter: ipconfig /all. All your system network adapters will be listed. Find an adapter with a network connection and copy the physical address. This consists of 6 x 2-digit hexadecimal numbers separated by hyphens.

          Linux/Unix
          Open a terminal and enter the following command: ifconfig. Confirm with Enter.
          Look for the network eth0, depending on distribution it can also have a different name. The line with ether specifies the MAC ID: Here are 6 x 2-digit hex numbers separated by a colon.

          Privacy Policy*
          I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

          Loading...

          Fields marked with * are mandatory.

          360 DV-CERTIFY™

          360-DV-VERIFY-2

          Source: OneSpin® - A Siemens Business

          Automatic detection of verification gaps, specification omissions and errors 

          SystemVerilog Assertions and Operational SVA are very powerful in capturing functional requirements and verifying entire circuit operations. OneSpin Quantify™ provides intuitive coverage metrics, helping engineers spot verification gaps even in the presence of bounded proof results. OneSpin’s automatic integration with third-party verification planning tools ensures that all foreseen functional coverage points and checks are implemented and pass. This allows the user to efficiently achieve formal functional sign-off and provides a high confidence level. However, subtle bugs and skillfully crafted malicious issues in both design and specification could still go unnoticed. 

          OneSpin 360 DV-Certify™ automates the analysis of sets of Operational SVA, detecting inconsistencies, errors, and gaps in both verification plans and specifications. An intuitive debug environment enables engineers to pinpoint shortcomings and guides them on how to systematically improve their sets of assertions. 

          Contact Free Trial

            Privacy Policy*
            I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

            Loading...

            Fields marked with * are mandatory.

              How is the MAC address generated?

              Windows
              Start a command shell by typing: cmd in the Windows menu search box and then Enter. A command line window opens. Enter: ipconfig /all. All your system network adapters will be listed. Find an adapter with a network connection and copy the physical address. This consists of 6 x 2-digit hexadecimal numbers separated by hyphens.

              Linux/Unix
              Open a terminal and enter the following command: ifconfig. Confirm with Enter.
              Look for the network eth0, depending on distribution it can also have a different name. The line with ether specifies the MAC ID: Here are 6 x 2-digit hex numbers separated by a colon.

              Privacy Policy*
              I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

              Loading...

              Fields marked with * are mandatory.

              360 EC-ASIC™

              ASIC synthesis verification from RTL code to final netlist 

              Systematic design errors, introduced by automated design refinement tools, such as ASIC synthesis, can be hard to detect, and damaging if they make it into the final device. Formal Equivalency Checking (EC) has become a standard part of the ASIC development flow, replacing almost all gate level simulation with a rigorous consistency check between pre- and post-synthesized code.  

              OneSpin 360 EC-ASIC excels by automated state and phase mapping, automatic handling of sequential optimizations such as clock gating and pipeline retiming, and more, leveraging decade-long technology development and field use. 

              Contact Free Trial

                Privacy Policy*
                I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

                Loading...

                Fields marked with * are mandatory.

                  How is the MAC address generated?

                  Windows
                  Start a command shell by typing: cmd in the Windows menu search box and then Enter. A command line window opens. Enter: ipconfig /all. All your system network adapters will be listed. Find an adapter with a network connection and copy the physical address. This consists of 6 x 2-digit hexadecimal numbers separated by hyphens.

                  Linux/Unix
                  Open a terminal and enter the following command: ifconfig. Confirm with Enter.
                  Look for the network eth0, depending on distribution it can also have a different name. The line with ether specifies the MAC ID: Here are 6 x 2-digit hex numbers separated by a colon.

                  Privacy Policy*
                  I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

                  Loading...

                  Fields marked with * are mandatory.

                  360 EC-RTL™

                  Sequential equivalence checking between RTL design revisions 

                  During a typical development process, there are many occasions where a change needs to be made to a block, which must then be retested to ensure functional equivalence. For example, once a block has been proven to operate correctly, a designer may wish to optimize some section, maybe to improve the coding style, reduce the gate count or streamline operation. Today, an engineer must execute an entire simulation regression run to verify each change. This often requires a lot of time and may also need additional stimulus, with no possibility that an exhaustive functional check will be performed.  

                  OneSpin 360 EC-RTL is an easy to use Sequential Equivalency Checking tool that ensures functional equivalence between RTL design revisions. 

                  Contact Free Trial

                    Privacy Policy*
                    I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

                    Loading...

                    Fields marked with * are mandatory.

                      How is the MAC address generated?

                      Windows
                      Start a command shell by typing: cmd in the Windows menu search box and then Enter. A command line window opens. Enter: ipconfig /all. All your system network adapters will be listed. Find an adapter with a network connection and copy the physical address. This consists of 6 x 2-digit hexadecimal numbers separated by hyphens.

                      Linux/Unix
                      Open a terminal and enter the following command: ifconfig. Confirm with Enter.
                      Look for the network eth0, depending on distribution it can also have a different name. The line with ether specifies the MAC ID: Here are 6 x 2-digit hex numbers separated by a colon.

                      Privacy Policy*
                      I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

                      Loading...

                      Fields marked with * are mandatory.

                      FMEDA ISO 26262

                      Automate ISO 26262 FMEDA and minimize fault simulation 

                      A central concept in ISO 26262 is that of safety goals. Random hardware failures may lead to violation of safety goals and hazards that could result in loss of human lives. Automotive ASICs/FPGAs/SoCs include safety mechanisms that prevent or control random hardware failures. Engineers must list potential failure modes and provide evidence that the safety architecture achieves the target automotive safety integrity level (ASIL) of the chip or safety element out of context (SEooC). Failure Modes, Effects, and Diagnostic Analysis (FMEDA) is a powerful method to assess the safety architecture and implementation. 

                      Contact Free Trial

                        Privacy Policy*
                        I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

                        Loading...

                        Fields marked with * are mandatory.

                          How is the MAC address generated?

                          Windows
                          Start a command shell by typing: cmd in the Windows menu search box and then Enter. A command line window opens. Enter: ipconfig /all. All your system network adapters will be listed. Find an adapter with a network connection and copy the physical address. This consists of 6 x 2-digit hexadecimal numbers separated by hyphens.

                          Linux/Unix
                          Open a terminal and enter the following command: ifconfig. Confirm with Enter.
                          Look for the network eth0, depending on distribution it can also have a different name. The line with ether specifies the MAC ID: Here are 6 x 2-digit hex numbers separated by a colon.

                          Privacy Policy*
                          I have read the TRIAS mikroelektronik GmbH privacy policy and I agree that my details and data are collected and stored electronically in order to answer my request.

                          Loading...

                          Fields marked with * are mandatory.