Updates for RF design analysis include carrier-analysis improvements that deliver significantly better scalability and performance on multicore CPUs, improved performance of carrier and SSNA noise analyses, fast yield-contributor analyses for RF and analog/mixed-signal designers, including DC, AC and oscillator analysis, and enhanced fast circuit-envelope analysis that accelerates RF functional path simulations by an order of magnitude or more.
The software offers broader support for RFIC-centric source configurations for models including memory effects, it provides an enhanced crystal oscillator convergence option that reduces the frustration of simulating crystal oscillators. GoldenGate version 2011 boasts a number of improvements for wireless design verification. Fast mismatch analysis dramatically accelerates the block and functional path verification that RFIC designers perform every day, without loss of accuracy, including new support for Cadence corners tool.
The updated adslib for the GoldenGate library now includes delay-defined transmission lines and Philips-TU Delft standard/user-defined bondwire models. Using this, engineers can simulate more of their designs by including RF package and board effects. Additionally, by closing the loop between system and circuit designers using the new SystemVue and GoldenGate links and flows, designers can greatly accelerate system-level verification of RFICs.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.