|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
u |
Implementation
|
|
|
|
l |
Almost no
re-design of IP is required (memory implementations)
|
|
|
n |
Significantly
lower investment from IP vendors
|
|
|
u |
Compatibility
with ASIC Flow
|
|
|
|
l |
Ensures core
availability
|
|
|
|
l |
Allows use of
soft IP
|
|
|
u |
Support for IP
Vendor Business Model
|
|
|
|
l |
Design security
features ensure a high degree of protection
|
|
|
|
l |
Unique licensing
capability to support IP vendor
|
|
|
|
n |
Allows IP to
be licensed to a given # of devices
|
|
|
|
n |
Follows the
¡°royalty¡± model developed by ASIC community
|
|
|
|
n |
Factory
programming further protects IP
|
|