Cadence® system design and verification solutions, integrated under our System Development Suite, provide the simulation, acceleration, emulation, and management capabilities.
System Development Suite Related Products A-Z
Cadence® digital design and signoff solutions provide a fast path to design closure and better predictability, helping you meet your power, performance, and area (PPA) targets.
Full-Flow Digital Solution Related Products A-Z
Cadence® custom, analog, and RF design solutions can help you save time by automating many routine tasks, from block-level and mixed-signal simulation to routing and library characterization.
Overview Related Products A-Z
Driving efficiency and accuracy in advanced packaging, system planning, and multi-fabric interoperability, Cadence® package implementation products deliver the automation and accuracy.
Cadence® PCB design solutions enable shorter, more predictable design cycles with greater integration of component design and system-level simulation for a constraint-driven flow.
An open IP platform for you to customize your app-driven SoC design.
Comprehensive solutions and methodologies.
Helping you meet your broader business goals.
A global customer support infrastructure with around-the-clock help.
24/7 Support - Cadence Online Support
Locate the latest software updates, service request, technical documentation, solutions and more in your personalized environment.
Cadence offers various software services for download. This page describes our offerings, including the Allegro FREE Physical Viewer.
Get the most out of your investment in Cadence technologies through a wide range of training offerings.
This course combines our Allegro PCB Editor Basic Techniques, followed by Allegro PCB Editor Intermediate Techniques.
Virtuoso Analog Design Environment Verifier 16.7
Learn learn to perform requirements-driven analog verification using the Virtuoso ADE Verifier tool.
Exchange ideas, news, technical information, and best practices.
The community is open to everyone, and to provide the most value, we require participants to follow our Community Guidelines that facilitate a quality exchange of ideas and information.
It's not all about the technlogy. Here we exchange ideas on the Cadence Academic Network and other subjects of general interest.
Cadence is a leading provider of system design tools, software, IP, and services.
While I had looked at the challenges of hardware/software integration in various application domains like automotive, industrial and wireless before, I had the most unsettling experience last week at the Amphion Forum in San Francisco in the application area of device security. I am officially scared. And I am somewhat hopeful that hardware/software co-development will help address the security issues I heard about.
When Kurt Stammberger, VP of Market Development at security firm Mocana, kicked off the event at 8:30am with the words that "we as an industry are behind and at risk of losing the fight on device security," I was brushing it off as good marketing after I had endured a long, rainy drive from Silicon Valley to San Francisco to attend. About ½ hour in I was on the edge of my seat because the examples given were real, and really scary.
Here are my favorite three scary stories:
OK, before I add to my Christmas wish list a safe place to put my retirement money, an emission suppressing case for my iPhone and an USB/Ethernet printer without wireless access, let's look how pervasive all this with be.
According to Mocana CEO Adrian Turner's presentation, the number of connected devices will grow from 9.8 billion connected devices to 28 billion in the next couple of years, with a business impact of $4.5 trillion. Some big numbers here.
Securely managing all those connected devices will be hard, given the complexity of various user segments combined with multiple platforms like iOS and Android, combined with a rapidly growing number of internal and external applications a corporation has to deal with, and then again combining this with a large number of different security policies.
In a panel called "2013 - When Devices Take Over," David Kleidermacher, CTO of Green Hills, emphasized software complexity and called for a government mandate on how to evaluate the quality of security. I asked the question whether this is mostly a software or a hardware problem or spans both areas, David was leaning towards software being the culprit while the other attendees were pointing to a balance of hardware and software.
Later in the Forum, Bev Crair, general manager for Intel's Intelligent Systems Framework, gave an interesting keynote, confirming that hardware and software are both part of the solution. That's where the combination of Intel's processors and specific hardware with McAfee's security technology makes intuitive sense to me.
Bev defined the Internet of Things (see the screenshot from her presentation associated with this blog post) as a "Global Revolution where billions of devices seamlessly connect, and are managed and securely interacting over a network for the purpose of intelligently acquiring data and turning data into actionable information that delivers value services." The resulting massive industry shift is driven by immersive experiences, cloud connectivity, data analytics, security and trust and workload consolidation. And security poses a real threat to this opportunity. I especially found a slide on the different stages of cyber attacks very insightful; early attacks were "ego" based, then they became "financial," evolved into real "espionage," to "weaponry" and eventually "purpose" -- Bev used the term "hacktivists" -- another form of ego again.
Security is a big issue. It spans all application domains like computers, wireless, industrial, automotive and is a combined hardware/software challenge. The EDA industry has a unique position here -- we know how to help users to develop chips without any bugs and verify appropriately. With software's growing importance and offerings like our System Development Suite for hardware/software co-development we can help play an essential role to secure the Internet of Things!