The chip verification industry could adopt technique from the software business to improve productivity, said a leading engineer in a keynote to the DVcon Europe conference in Munich
Techniques such as machine learning, agile processes and languages such as Python could be incorporated more effectively alongside cloud technologies, says Moshe Zalcberg, CEO of Veriest (above).
“The software guys are not imagining how to use AI, it’s happening,” he said. “Microsoft and Facebook are using AI-aware tools for catching bugs and suggesting snippets of code, searching for security vulnerabilities. These are already on [software repository] GitHub.”
He points to releases in the last year from Cadence Design Systems and Synopsys on AI, as well as Intel using machine learning techniques for ‘intent-driven validation’ and startups such as VerifAI but says there is a longway to go in verification.
He also points to the need to adopt native cloud technologies for scaling and to provide more data to improve the verification and validation process, but there are still issues with EDA licenses on the cloud. “We are still not there on the EDA license scheme,” he said.
“Besides the IT resources there’s all the different data we have in verification, there’s a lot of things to capture and work on,” he said. “We already do descriptive and diagnostic analytics but beyond that its less common to do predictive analytics and prescriptive analytics. Today it tends to be based on experience and gut feeling when we have the data on the clr enable us to analyse the data in a different way.”
Then there are more graduates skilled in newer languages such as Python that could be used alongside SystemVerilog and e for building frameworks. “For the first time we see people are using Python for verification and the fact that this is part of the design means the industry is looking for other solutions.”
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.