D&R Industry Articles
Articles for the Week of February 18, 2019

Guide to Choosing the Best LDO for Your Application
To know which LDO you need, you must first define the application of your LDO and then examine which parameters are most important when dealing with that application. With the multiple parameters that characterize a particular LDO, it is not easy to determine which LDO is best suited. To help you figure this out, we have put together this reference. This guide presents a list of all the key LDO parameters along with their definitions, the most common applications of LDOs, and which parameters are critical for each.Articles for the Week of February 11, 2019

A Guide on Logical Equivalence Checking - Flow, Challenges, and Benefits
This white paper functions as a guide, outlining why LEC (Logical Equivalence Check) is important in the ASIC design cycle, how to check it, and what to do when LEC is failing.Articles for the Week of February 4, 2019

Achieving Groundbreaking Performance with a Digital PLL
This article compares analog, first-generation digital, and second-generation digital PLLs. It evaluates which type of PLL may be best in which situation. It further discloses a roadmap into other application areas, including general purpose / logic clocking, and regular low-jitter PLLs.Articles for the Week of January 28, 2019

The Tradeoffs of Low Dropout (LDO) Voltage Regulator Architectures and the Advantages of "Capless" LDOs
Power management of battery-powered electronic devices is becoming increasingly more important for the microelectronics industry. This white paper details the difference between low dropout (LDO) voltage regulators that use external output capacitors and those that do not, and how your system designs can benefit from not using an output capacitor. Well-designed capless LDO voltage regulators can have multiple benefits, and they are presented here.- Design patterns in SystemVerilog OOP for UVM verification
- The Four Characteristics of an Optimal Inferencing Engine
Articles for the Week of January 14, 2019

Secure SOC for Security Aware Applications
Security is a two-way sword, increasing the security makes user difficult to access the chip and increasing user access increases chances for the chip to be hacked.