Contact Us
- Phone number: 03-6173737
- Fax : 073-2016920
Direction
- Shimshon St 9, Petah Tikva 4952707
11:00 – 12:00
It’s Time for a Software-Defined Perimeter. As applications move to the cloud, and workers are increasingly mobile, IT needs a better approach to providing secure application access than the conventional, site-centric VPN. Today we’re building a software-defined perimeter around the user and delivering zero-trust network security from the cloud
It’s Time for a Software-Defined Perimeter. As applications move to the cloud, and workers are increasingly mobile, IT needs a better approach to providing secure application access than the conventional, site-centric VPN. Today we’re building a software-defined perimeter around the user and delivering zero-trust network security from the cloud
17:00 Gathering and Welcome
17:30 Portable Stimuli over UVM – using portable stimuli in HW verification flow, by Liran Kosovizer (Texas Instruments)
18:00 Using Formal Verification to Complement Verification – A Case Study, by Elchanan Rappaport (Veriest)
18:30 Panel: Verification technology adoption – the right pace and the right approach for managers/engineers
Host: Avidan Efody, Verification Expert
Guests: David Barkai (Mellanox Technologies), Elihai Maicas (Intel), Liran Kosovizer (Texas Instruments)
19:00 Networking & Beers
17:00 Gathering and Welcome
17:30 Portable Stimuli over UVM – using portable stimuli in HW verification flow, by Liran Kosovizer (Texas Instruments)
18:00 Using Formal Verification to Complement Verification – A Case Study, by Elchanan Rappaport (Veriest)
18:30 Panel: Verification technology adoption – the right pace and the right approach for managers/engineers
Host: Avidan Efody, Verification Expert
Guests: David Barkai (Mellanox Technologies), Elihai Maicas (Intel), Liran Kosovizer (Texas Instruments)
19:00 Networking & Beers
לקוחות המעוניינים בפגישה דיגיטלית או בפרטים נוספים מוזמנים ליצור קשר: נוי בר 054-8082821 [email protected]