Tag Archives: Hardware

How to Successfully Design for Testing or DFT

Design for testing or DFT consists of IC design techniques that add testability features to a hardware product design. The added features make it easier to develop and apply manufacturing tests to the designed hardware.

The purpose of manufacturing tests is to validate that the product hardware contains no manufacturing defects that could adversely affect the product’s correct functioning. This article outlines the tips on how to successfully design for testing.

Read More


Find out how T&VS are helping clients with its effective DFT solutions & services to design and implement a DFT strategy that delivers improved execution, quality and reduced time-to market.

Unexpected Security holes

Security is beginning to creep into semiconductor design. It is being designed into the hardware at the architectural stage in recognition that every part of a connected system needs to be resistant to security breaches. The rapid rise in the number of connected devices comes with a commensurate increase in the number of security issues. This article from Semiengineering describes why security is an essential element for a connected world.

Read More


Find out how T&VS Security services help companies to efficiently and effectively address the threats of security vulnerabilities.

Security Improvements ahead

Security is being designed into the hardware at the architectural stage in recognition that every part of a connected system needs to be resistant to security breaches. Managing security is about managing risk, and the best way to deal with that is layered security. This article from SemiEngineering outlines how security is one of the biggest problems facing the IoE (Internet of Everything).

Read More


Learn more about the TVS Automotive Verification and Test solutions.

What it takes to secure an SoC

In the era of Internet-of-Things (IoT), security has become one of the most vital parts of a SoC. Secured SoCs are used to provide authentication, confidentiality, integrity, non-reproduction, and access control to the hardware and software.

This article from Freescale outlines the four key functionalities (Secure Booting, Secure Memory, Run time data integrity check, and Central security breach response) to develop a secure system.

Read More