Search

Your search for returns 8710 results:

Sort by
  • Relevance
  • Title
  • Date
Viewing 1-50 items of 8710
Results per page:
  • 10
  • 25
  • 50

AI Hardware Summit 2020 – Why Attend? | Synopsys

https://www.synopsys.com/ai/ai-hardware-summit-2020-us.html

Join Synopsys at this year’s AI Hardware Summit, the predominant leadership forum for AI hardware. Don’t miss our panel discussion.

5G vs. 4G: What’s the Difference? | Synopsys

https://www.synopsys.com/5g/5g-vs-4g.html

Population density, travel speed, and distance all affect how fast a device can communicate with a network. Many experts predict that 5G networks will enhance performance related to many of these ...

Synopsys | EDA Tools, Semiconductor IP and Application Security Solutions

https://www.synopsys.com/

Synopsys is at the forefront of Smart Everything with the world’s most advanced tools for silicon chip design, verification, IP integration, and application security testing. Our technology helps ...

AI Design Solutions & AI Technology | Synopsys

https://www.synopsys.com/ai.html

Artificial intelligence (AI) is a crucial differentiator. Synopsys helps you build chips and software that are smart from the start. Today’s data-intensive reality demands it. Tomorrow’s increased ...

5G Design Solutions & 5G Technology | Synopsys

https://www.synopsys.com/5g.html

From smart phones to entire smart cities, 5G will power the future of Smart Everything. With Synopsys technology, you can build advanced chipsets and mobile infrastructure that meet 5G speed, ...

What Is an AI Accelerator? – How It Works | Synopsys

https://www.synopsys.com/ai/what-is-an-ai-accelerator.html

An AI accelerator is a high-performance parallel computation machine that is specifically designed for the efficient processing of AI workloads like neural networks.

What is Glitch Power? – How it Works | Synopsys

https://www.synopsys.com/ai/what-is-glitch-power.html

In electronics design, glitch refers to unnecessary signal transitions in a combinational circuit, while glitch power refers to the power consumed by glitches. The extra switching activity can lead...

What is Reinforcement Learning? – Overview of How it Works | Synopsys

https://www.synopsys.com/ai/what-is-reinforcement-learning.html

Reinforcement Learning (RL) is the science of decision making. It is about learning the optimal behavior in an environment to obtain maximum reward. This optimal behavior is learned through ...

Automotive IP & Security Solutions | Synopsys Automotive

https://www.synopsys.com/automotive.html

Synopsys solutions to help you meet security, functional safety, reliability, & compliance requirements in your automotive SoCs & software.

Automotive Computing Conference 2020 | Synopsys

https://www.synopsys.com/automotive/automotive-computing-conference-2020.html

ACC is a two-day conference hosted by Arm, Elektrobit and Synopsys. The conference will cover topics such as the stricter standards and changing requirements for computing, safety, cloud ...

Functional Safety & Reliability Solutions | Synopsys Automotive

https://www.synopsys.com/automotive/functional-safety-and-reliability.html

Ensure functional safety and reliability with Synopsys chip design platforms and verification platforms. Learn more.

The 6 Levels of Vehicle Autonomy Explained | Synopsys Automotive

https://www.synopsys.com/automotive/autonomous-driving-levels.html

Before merging onto roadways, self-driving cars will have to progress through 6 levels of driver assistance technology advancements. SAE defines 6 levels of driving automation ranging from 0 (fully...

How to Build a Chip for Functional Safety Applications | Synopsys

https://www.synopsys.com/automotive/how-to-build-chips-functional-safety-applications.html

Watch Stewart Williams, senior automotive vertical marketing manager at Synopsys, discuss a comprehensive automotive workflow that enables designers to prove at the planning and implementation ...

MISRA–AUTOSAR Standards & the Future of the Connected Car | Synopsys Automotive

https://www.synopsys.com/automotive/misra-autosar-standards.html

The integrated MISRA–AUTOSAR C++ rule set will bring together the best ideas from two industry-leading organizations. It will deliver a unified industry standard with a common set of rules. The ...

What is ADAS (Advanced Driver Assistance Systems)? – Overview of ADAS ...

https://www.synopsys.com/automotive/what-is-adas.html

The role of ADAS is to prevent deaths and injuries by reducing the number of car accidents and the serious impact of those that cannot be avoided. Essential safety-critical ADAS applications ...

What is ASIL (Automotive Safety Integrity Level)? – Overview | Synopsys ...

https://www.synopsys.com/automotive/what-is-asil.html

ASIL refers to Automotive Safety Integrity Level. It is a risk classification system defined by the ISO 26262 standard for the functional safety of road vehicles. Learn more.

What is an Autonomous Car? – How Self-Driving Cars Work | Synopsys

https://www.synopsys.com/automotive/what-is-autonomous-car.html

An autonomous car is a vehicle capable of sensing its environment and operating without human involvement. A human passenger is not required to take control of the vehicle at any time, nor is a ...

What is Automotive Hardware Functional Safety? | Synopsys

https://www.synopsys.com/automotive/what-is-automotive-hardware-functional-safety.html

The term functional safety (FuSa) is defined by ISO 26262 as the absence of unacceptable risk due to hazards caused by malfunctioning behavior of E/E (electrical and/or electronic) systems. Related...

What is ISO 26262 Functional Safety Standard? | Synopsys Automotive

https://www.synopsys.com/automotive/what-is-iso-26262.html

ISO 26262 mandates a functional safety development process that automotive OEMs and suppliers must follow and document to have their devices qualified to run inside commercial vehicles. It outlines...

What is MISRA (Motor Industry Software Reliability Association)? | Synopsys ...

https://www.synopsys.com/automotive/what-is-misra.html

MISRA (the Motor Industry Software Reliability Association) provides guidelines for developing safety- and security-related electronic systems, embedded control systems, software-intensive ...

What is Triple Shift Left? – Shift Left Testing Explained | Synopsys

https://www.synopsys.com/automotive/what-is-triple-shift-left.html

Triple Shift Left encourages designers to find mistakes earlier in the design process where they are not only cheaper to fix, but it gives OEMs visibility into the earliest parts of the design ...

Revolutionizing Automotive Development for the Digital Future | Synopsys

https://www.synopsys.com/automotive/white-paper/revolutionizing-automotive-development-for-the-digital-future.html

This white paper outlines a solution for automotive technical development teams seeking to integrate bleeding-edge electronic architecture development solutions into their operations through the ...

10 critical cloud security threats in 2018 and beyond | Synopsys

https://www.synopsys.com/blogs/software-security/10-cloud-security-threats-2018/

Don’t let cloud security threats rain on your parade. Explore our list of the top 10 security risks in cloud computing and what you can do to mitigate them.

2017 Coverity Scan Report: The future of open source security | Synopsys

https://www.synopsys.com/blogs/software-security/2017-coverity-scan-report-open-source-security/

The 2017 Coverity Scan report examines OSS project risk, initiatives form the Linux Foundation, and the future of open source software. Learn more.

Introducing the 2018 CISO Report: A Q&A with Gary McGraw | Synopsys

https://www.synopsys.com/blogs/software-security/2018-ciso-report/

We recently sat down with Dr. Gary McGraw to discuss his latest research effort around the CISO role. Learn more about the findings in a new report.

Application Security & Software Security Blog | Synopsys

https://www.synopsys.com/blogs/software-security/

We offer authoritative insight and opinions on software and application security breaking news, analysis, and business intelligence from the leading Software Integrity Group at Synopsys.

Experts talk 2019 application security trends at RSA | Synopsys

https://www.synopsys.com/blogs/software-security/2019-application-security-trends/

We asked a couple of AppSec experts and BSIMM participants about 2019 application security trends, challenges, obstacles, and solutions. Here’s what they said.

2019 OSSRA webinar: Trends in usage and risk management | Synopsys

https://www.synopsys.com/blogs/software-security/2019-ossra-webinar/

In our 2019 OSSRA webinar, Tim Mackey discusses trends in open source usage and risk management from the latest OSSRA report. Watch the recording now.

OWASP Top 10—A7: Request for removal and replacement | Synopsys

https://www.synopsys.com/blogs/software-security/2017-owasp-top-10-a7/

Proposed entry “A7 - Insufficient Attack Protection” is a potentially dangerous addition to the 2017 OWASP Top 10 Application Security Risks list.

Which 2020 cyber security predictions held up this year? | Synopsys

https://www.synopsys.com/blogs/software-security/2020-cyber-security-predictions-recap/

In a year marked by unprecedented challenges, we revisit the 2020 cyber security predictions to see which projections held up and which ones didn't.

6 Findings from DevSecOps Practices' Survey | Synopsys

https://www.synopsys.com/blogs/software-security/2020-devsecops-practices-survey/

Synopsys surveyed 1,500 IT professionals working in cyber security to analyze the DevSecOps practices used to address open source vulnerability management.

Infographic: 2020 OSSRA findings on open source trends | Synopsys

https://www.synopsys.com/blogs/software-security/2020-ossra-findings-infographic/

Our 2020 OSSRA infographic shows key findings and open source trends from the Synopsys Open Source Security and Risk Analysis report. Download the free PDF.

A look at 2021 software security predictions | Synopsys

https://www.synopsys.com/blogs/software-security/2021-software-security-predictions/

Experts share their 2021 software security predictions about DevSecOps adoption, the risks of social engineering and ransomware, cloud adoption, and more.

3 long-term benefits of an application security training strategy | Synopsys

https://www.synopsys.com/blogs/software-security/3-benefits-application-security-training-strategy/

An application security training strategy can help your organization build key software security capabilities. Here are just three long-term benefits.

3 ways to improve your software development skills | Synopsys

https://www.synopsys.com/blogs/software-security/3-ways-improve-software-development-skills/

Learn how to broaden your knowledge, hone your software development skills, decide on a specialization—and stand out in an increasingly competitive field.

DevSecOps and the modern application security program | Synopsys

https://www.synopsys.com/blogs/software-security/3-reasons-devsecops-application-security-program/

Interest in DevSecOps is on the rise. What’s driving this interest? And how can teams use this knowledge to modernize their application security programs?

Life-forms descend on Leipzig #34C3: Chaos Communication Congress

https://www.synopsys.com/blogs/software-security/34c3-chaos-communication-congress/

At the 34th Chaos Communication Congress (#34C3), life-forms descended on Leipzig to encourage people to use technology to make the world better. Or TUWAT.

The 4 Most Important Secure Development Disciplines | Synopsys

https://www.synopsys.com/blogs/software-security/4-important-secure-development-disciplines/

Building security into their DevOps culture by following 4 development disciplines enables Dynatrace to focus on secure software & product development.

Online safety tips to promote within your company | Synopsys

https://www.synopsys.com/blogs/software-security/4-online-safety-tips/

Raise security awareness in your organization. You’ll protect your employees and your business. Get started with these online safety tips.

4 Risks in connected cars: security implications of open source | Synopsys

https://www.synopsys.com/blogs/software-security/4-risks-connected-cars/

At Flight Amsterdam I led a panel discussion on the security implications of open source in connected cars, joined by Gordon Haff and Simon Gutteridge.

5 DevSecOps essentials and how to achieve them | Synopsys

https://www.synopsys.com/blogs/software-security/5-essentials-devsecops-world/

Embracing a DevSecOps practice requires key cultural and practical changes to integrate security into the SDLC. Learn about the 5 essentials for DevSecOps.

Open source trends revealed in the 2020 OSSRA report | Synopsys

https://www.synopsys.com/blogs/software-security/5-open-source-trends-2020-ossra/

Our analysis of 1,250+ codebases reveals trends in open source use, security, and license compliance that affect development, security, and legal teams.

The 5 pillars of a successful threat model | Synopsys

https://www.synopsys.com/blogs/software-security/5-pillars-successful-threat-model/

Threat modeling identifies risks and flaws affecting a system. Here are 5 primary activities to perform when creating or updating a threat model.

5 reasons to use third-party authentication instead of your own | Synopsys

https://www.synopsys.com/blogs/software-security/5-reasons-third-party-authentication/

Relying on third-party authentication services can be considerably easier, cheaper, and more secure than creating your own authentication. Here’s why.

5 things to do before your threat modeling assessment | Synopsys

https://www.synopsys.com/blogs/software-security/5-things-threat-modeling-assessment/

Here are 5 activities to undertake before your next threat modeling assessment that will set your team and organization up for success.

5 software security courses to prepare for whatever comes next | Synopsys

https://www.synopsys.com/blogs/software-security/5-recommended-software-security-courses/

We’ve chosen five software security courses to help you and your team members prepare for the future of software development—no matter what it looks like.

5 types of software licenses you need to understand | Synopsys

https://www.synopsys.com/blogs/software-security/5-types-of-software-licenses-you-need-to-understand/

Different types of software licenses require you to meet certain obligations if you want to reuse the code. Here are 5 common types of software licenses.

Top hackers meet at the first 5G Cyber Security Hackathon | Synopsys

https://www.synopsys.com/blogs/software-security/5g-cyber-security-hackathon/

Our Defensics research team put a couple of Synopsys tools to the test in the 5G Cyber Security Hackathon in Oulu, Finland, and placed in two competitions.

5 ways to pay back your technical debt | Synopsys

https://www.synopsys.com/blogs/software-security/5-ways-to-pay-your-technical-debt-back/

Technical debt accumulates if you don’t build security in throughout your development cycle. Here’s how to pay off old debt and stop creating new debt.

5G and IoT device security and the enterprise attack surface | Synopsys

https://www.synopsys.com/blogs/software-security/5g-iot-device-security-enterprise-attack-surface/

As 5G standards continue to evolve, what steps can development organizations take now to improve the security of billions of 5G and IoT devices and systems?

  • 1
  • 2
  • 3
  • 4
  • 5
  • ​
  • ...
  • 175
  • ​
Next