EDA in the Cloud: OneSpin says your design is secure
Several companies have tried to move EDA into the cloud, and for very good reasons. EDA tools are expensive and smaller companies may feel that they do not get enough utilization from a tool to make the buy price worth it. They require small amounts of tool usage during certain parts of their flow and the rest of the time, it sits there idle even though they continue to pay maintenance on it. Larger companies also have problems although somewhat different. At peak times they may like to have many more licenses available, but cannot justify it based on average utilization rates. The cloud promises to make any number of copies of an EDA tool available on an as-needed basis. The demand is there, but there has always been that large bogey – the security of the design. Companies do not like that they have to upload their design onto a server, that is who-knows-where, and unclear how well the security is set up. We hear almost daily about data being stolen from one company or another, and many of these are large companies, who presumably take their security somewhat seriously. There are probable many more cases of data theft that go unreported or even undetected.
To read the full article, click here
Related Semiconductor IP
- Process/Voltage/Temperature Sensor with Self-calibration (Supply voltage 1.2V) - TSMC 3nm N3P
- USB 20Gbps Device Controller
- SM4 Cipher Engine
- Ultra-High-Speed Time-Interleaved 7-bit 64GSPS ADC on 3nm
- Fault Tolerant DDR2/DDR3/DDR4 Memory controller
Related Blogs
- EDA in the Cloud: Astera Labs, AWS, Arm, and Cadence Report
- What does Amazon's multiday cloud outage mean for EDA cloud services?
- Amazon's cloud service crash permanently lost data. Think this has implications for EDA?
- Scaling EDA in the Cloud
Latest Blogs
- Shaping the Future of Semiconductor Design Through Collaboration: Synopsys Wins Multiple TSMC OIP Partner of the Year Awards
- Pushing the Boundaries of Memory: What’s New with Weebit and AI
- Root of Trust: A Security Essential for Cyber Defense
- Evolution of AMBA AXI Protocol: An Introduction to the Issue L Update
- An Introduction to AMBA CHI Chip-to-Chip (C2C) Protocol