Thought Leadership

A selection of posts from T&VS and other industry thought-leaders on a variety of topics relating to making products more reliable, safe and secure.

EDA in The Cloud

This article from Semiengineering captures the conversation between industry experts on the migration of EDA tools into the cloud and describes how ready EDA is for the cloud. Read More Find out how T&VS Verification services help to meet the challenging requirements with respect to performance, flexibility and verify the today’s complex designs effectively.

2018-05-25T09:58:56+00:00 25th May, 2018|Blog, Thought Leadership|

Why Acceptance Testing is required?

Acceptance testing is a level of software testing where a system is tested for acceptability. The purpose of this test is to evaluate the system's compliance with the business requirements and assess whether it is acceptable for delivery. This article summarizes when to go for acceptance testing and describes the best practices for user acceptance [...]

2018-05-25T09:54:41+00:00 25th May, 2018|Blog, Thought Leadership|

Designing Hardware for Security

Cyber criminals are beginning to target weaknesses in hardware to take control of devices, rather than using the hardware as a stepping stone to access to the software. This article from Semiengineering explains the approach on how to design hardware for security and outlines how much security is necessary for hardware. Read More Find out [...]

2018-05-25T09:50:52+00:00 25th May, 2018|Blog, Thought Leadership|

Making healthcare IoT infrastructure safer

The healthcare sector can benefit greatly from IoT devices. It can help improve the effectiveness of staff, operational cost savings, and even improve patient outcomes. However, it could also bring with them new security risks. Connected devices are always a potential risk, so it’s imperative that healthcare institutions do everything they can to stem the [...]

2018-05-25T09:47:19+00:00 25th May, 2018|Blog, Thought Leadership|

How to extend formal property verification to protocol-driven datapaths

With a solid methodology base and upfront planning, the benefits of formal property verification, such as full path confidence and requirements-based property definition, can be leveraged for protocol-driven datapaths. Incorporating layered SystemVerilog constructs to provide a transaction-like protocol description simplifies property creation for both well-formed packets and error scenarios. This article from Tech Design Forum [...]

2018-05-24T06:23:35+00:00 24th May, 2018|Blog, Thought Leadership|

5 Things That Will Impact the Future of Software Testing

Software development industry is getting new changes as the year progresses. This article from Sticky Minds outlines the five key things that are going to shape the future of software testing. Read More Find out how T&VS Software Testing services help you to establish a cost-effective software testing facility that delivers improved quality, reduces risks [...]

2018-05-24T06:18:49+00:00 24th May, 2018|Blog, Thought Leadership|

A Step-by-Step Guide to Making Your Penetration Test a Success

Penetration testing is the process of testing various aspects of your IT infrastructure for vulnerabilities.The main objective of penetration testing is to determine security weaknesses.This article outlines the security benefits of penetration testing and describes the strategies for penetration testing success. Read More Understand how T&VS Penetration Testing services help you protect & defend against latest and [...]

2018-05-24T06:14:36+00:00 24th May, 2018|Blog, Thought Leadership|

The dangers of connected cars

Connected, autonomous vehicles are around the corner. Securing the connected, smart and increasingly autonomous cars of tomorrow against hackers and online criminals is a daunting task.This article explains the threat facing connected autonomous vehicles and outlines the tips to overcome connected car security challenges. Read More Learn more about how T&VS Automotive Verification and Test [...]

2018-05-24T06:11:42+00:00 24th May, 2018|Blog, Thought Leadership|

Does Power Verification Work?

Functional verification continues to evolve, but power verificationa somewhat new concernremains at levels of sophistication reminiscent of functional verification many years ago. This article from Semiengineering explores when will power verification catch up and what must to happen to make it possible. Read More Find out how T&VS services help to meet the challenging requirements with respect [...]

2018-05-23T10:47:17+00:00 23rd May, 2018|Blog, Thought Leadership|

What is Vulnerability Assessment?

A vulnerability assessment is merely a security testing procedure to measure the security risk with recommended corrective actions before the application is released to the public or the targeted users. This article explores the goals of vulnerability assessment that reduces the risks of security breaches and protects the confidentiality of an organization. Read More Find [...]

2018-05-23T10:43:34+00:00 23rd May, 2018|Blog, Thought Leadership|
The T&VS newsletters inform you about industry news, events and information from T&VS. No spam, we promise and it is always easy to unsubscribe.
We never share your information. Read our Privacy Statement
Interested in Formal Verification?
Then why not attend the TVS Formal
Verification Bootcamp training?
The 2-day Formal Verification Bootcamp is for design and verification engineers looking to enhance their knowledge of formal verification and to learn how to write effective assertions to find and fix bugs. The course is a mix of presentations and hands-on development exercises.
Bootcamp Enquiry Form
If you are interested in receiving additional information on the course then simply email Mike Bartley (TVS CEO and Course Leader) by entering your details below.
Interested in SystemC?
FREE SystemC UVM Library Now Available
The TVS SystemC UVM library closely mimics UVM but gives users a license free UVM-based verification environment.
Have your product requirements been successfully tested and implemented?
Find out how asureSIGN can help you implement a successful Requirements Driven Verification and Test Strategy by visiting asureSIGN or enter your details and we will be in touch.
Course Dates and Pricing
To receive additional information, including course dates and pricing, please contact our training team who will be happy to help.
Download Request
Please complete the following form then click 'submit' to access the download.
Presentation Request
Please complete the following form then click 'submit' to gain access to the presentations.
Please complete the following form and then click 'submit' to gain access to the download.
Did you get what you were looking?

Let the testing experts help. We will run a FREE QA assessment which will include our top 5 recommendations to help maximise your testing.