IC Manage Announces BIG DATA Product: Envision Real-Time Design & IP Progress Analytics

Envision offers Tapeout Prediction, Tool Analytics for Resource Optimization, IP Theft Prevention

CAMPBELL, Calif. — (BUSINESS WIRE) — June 9, 2015 — IC Manage today announced its Big Data Predictive Analytics tool Envision, which provides  real-time design progress analytics to allow project leaders, engineering managers, and integration leads to predict and manage their projects - keeping them on target. Envision also achieves IP Theft Prevention, to protect a company’s design IP from insider threats.

Design & IP Progress Analytics

Managing design and verification projects to schedule is the top priority for design teams. As the design progresses, strategic resource allocation decisions can make an enormous impact on whether schedules are met.

Envision offers the following design & IP progress analytics:

  1. Real-time Design Progress analytics

    You can do schedule and resource management by capturing the engineering effort for a design module, based on the time delta between designer check out and check in, accessing activity down to the file level.
  2. SoC/Chip Real-Time IP Progress

    Envision minimizes the burden of asking team members and management to spend scarce project and design time compiling status reports. Integration and assembly leads can view a real-time heat map of detailed progress reports for each IP across all specified tools. You can define automatic threshold levels for each tool to quantify the progress, such as error count, then flexibly modify your threshold.
  3. Tool Analytics for Resource Optimization

    Envision continuously mines the millions of file changes that occur during a complex SoC project and effectively utilizes the design tool log files that are typically discarded today. It then uses Big Data analytics to filter and track specific aspects of various IPs and projects, automatically extrapolating to determine expected project delays according to a team or IP group. This tool drilldown allows you to make improved decisions on where to focus additional engineering, compute or license resources.
  4. Tape-Out Prediction

    Project leads that have completed at least one project with IC Manage GDP can begin to take advantage of tapeout prediction analytics. As your first teams fully complete particular tasks (e.g. DRC) for your current design, you can uncover the relative resources (person-hours) required and compare it with your prior design.

    These metrics can be categorized by design task, type or complexity so that realistic correlation can be achieved for active projects. Depending on the rate of resource usage vs expectations, you can make resource adjustments such as to compensate for delays and bring your project back on schedule.

Built-in Data Anonymization Option

Envision can anonymize your data for separation of analytics data from individual users, to prevent data abuse and maintain compliance with local laws and regulations regarding tracking employees.

IP Theft Prevention

Insider threats to your company's design IP are insidious; IP thefts often go unnoticed, or are not caught until after the fact. Envision deploys four critical technologies to protect your IP against insider theft.

  1. Collects all your relevant data

    You must track all your data to be able to detect suspicious activity. Envision collects and logs exactly who accesses what data, because it works with IC Manage GDP design and IP management system, where all design data is accessed over the TCP connection. This user activity is directly tied to the design data and changes, with timestamps.
  2. Stores your data securely

    When data is simply synced from a repository, there is risk of it being read, stolen and copied to other directories, then hidden. Envision uses IC Manage Views virtual storage management, so that all file data is automatically logged at the server. Further, because the data is logged at the server, end point software monitoring tools, which can be potential attack points running on every node, are not required.
  3. Assigns Granular Data Access Permissions

    With traditional systems, the security plane is often embedded in your metadata. So either complex file access attributes must be maintained, or users are given access to a broader set of data than necessary.

    Envision works with IC Manage Views and allows you to assign granular permissions by cluster, so that design team members only see & modify their own authorized subspace. For example, an IP owner only sees his IP, not the rest of design. A designer only sees his design module, and the RTL for the various IP he is incorporating in it.
  4. Applies Threat Prevention Big Data Analytics

    1 | 2  Next Page »



Review Article Be the first to review this article

EMA:

Featured Video
Editorial
Peggy AycinenaWhat Would Joe Do?
by Peggy Aycinena
Retail Therapy: Jump starting Black Friday
Peggy AycinenaIP Showcase
by Peggy Aycinena
REUSE 2016: Addressing the Four Freedoms
More Editorial  
Jobs
Manager, Field Applications Engineering for Real Intent at Sunnyvale, CA
AE-APPS SUPPORT/TMM for EDA Careers at San Jose-SOCAL-AZ, CA
FAE FIELD APPLICATIONS SAN DIEGO for EDA Careers at San Diego, CA
ACCOUNT MANAGER MUNICH GERMANY EU for EDA Careers at MUNICH, Germany
Development Engineer-WEB SKILLS +++ for EDA Careers at North Valley, CA
Upcoming Events
Zuken Innovation World 2017, April 24 - 26, 2017, Hilton Head Marriott Resort & Spa in Hilton Head Island, SC at Hilton Head Marriott Resort & Spa Hilton Head Island NC - Apr 24 - 26, 2017
CST Webinar Series
Verific: SystemVerilog & VHDL Parsers
TrueCircuits: IoTPLL



Internet Business Systems © 2016 Internet Business Systems, Inc.
595 Millich Dr., Suite 216, Campbell, CA 95008
+1 (408)-337-6870 — Contact Us, or visit our other sites:
AECCafe - Architectural Design and Engineering TechJobsCafe - Technical Jobs and Resumes GISCafe - Geographical Information Services  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy Policy