Drive World ESC is part of the Informa Markets Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Welcome to the Drive World with ESC 2019 Presentation Store. Here you can view and download conference presentations before, during, and after the event. If you’re looking for a presentation from a specific session that you’re unable to find here, note that it’s likely because the presenter has not provided permission for external use or has not yet shared their presentation with us. Please check back after the event for a more complete catalogue of available presentations.

How to Design Mission Critical FPGA Systems

Adam Taylor  (Director, Adiuvo Engineering Training ltd)

Location: Room 204

Date: Wednesday, August 28

Time: 2:05 pm - 3:00 pm

Track: ESC - Embedded Hardware Design & Verification

Format: Technical Session

Vault Recording: TBD

System-on-Chip technology is now at the core of systems, and many of the applications in which these systems are deployed are demanding, where failure could result in the loss of life or failure of the mission. This session will look at techniques which can be used when creating mission critical designs.

The challenges faced by the creators of functionally safe systems will be presented with a special focus on tool chain certification, component selection, common cause failure detection, and environmental considerations. We will also explain some of the standards we must meet as system designers.

Looking more into techniques for the development of mission critical FPGAs, this session will look at different elements of the development flow which should be considered for the concept, architecture, implementation, and validation of a design. Examples of this include the optimal use of architectural characteristics of devices, as well as an overview on support software & IP Cores. We will also look at how we can take advantage of error correcting codes to protect memories, device configurations, and communication channels.