SoC PLATFORM & IP CORES
Palmchip offers outsourced software and hardware designs to its clients in the U.S., Europe and worldwide.
Palmchip has moved forward from hardware to software and cloud computing applications. It continues to provide both technologies and resources at 40% less cost without compromising quality. More than 3 billion consumer products in the market use Palmchip’s design and technologies. More than 130 consumer products on the market today use our patented CoreFrame® IP Palmchip’s technology in WiFi, Cell phones, wireless modems, digital cameras, Bluetooth, Digital Media Adapters, home gateways, smartcards, DVD players, optical networking equipment, print servers, Network Attached Storage, HDD and SSD devices, and IoT devices.
SECURE SOC PLATFORMS
The 8051 and 80251 is still a very popular controller which is being embedded in an application-specific system on chip (SoC) designs in today’s market.
This can be seen from its usage in Wireless Sensor Networks, Home Appliance Networks(HAN), Zigbee, RFID, and removable storage market areas. The migration toward cloud computing has increased the demand for smart-grid networks, which enable remote green energy management,where at-home appliances could be controlled from smart phones or a PC to save energy. The Palm8051 has been designed keeping in mind this particular market.
CoreFrame
In 1997 Palmchip invented the CoreFrame® System on Chip Architecture which pioneered the system on a single-chip design for the consumer market, thus enabling high-performance and low-cost consumer devices.
Today CoreFrame is powering over 4 Billion devices which includes WiFi chips, Bluetooth chips, storage SSD controller chips for PCs and embedded devices, cell phones chips, IoT chips and network security chips.
Palmchip has enabled mass storage, disk drive, SSD, Bluetooth communications, WiFi communications, setup boxes, home gateways, internet cameras, and smartcard devices.
Static application security testing(SAST)
SAST is an application security technology that finds security problems in the code of applications by looking at the application source code statically as opposed to running the application. SAST technology typically involves finding specific patterns in the code that suggest suspicious code, without running the applications.
Some of the vendors use regular expressions, and others build a logic graph representing the code architecture and its relations.Regardless of the approach, the limitation of seeing the code statically is very important, because complex applications with multiple layers will behave differently in runtime depending on the conditions and input data.