Discovery sprint
Scoping, architecture review, risk audit. You leave with a written plan you can hand to any team — us, your in-house engineers, or another contractor.
DiscussSet up your digital design flow, take a stubborn block or full SoC all the way to sign-off, or carry an embedded platform through Common Criteria and FIPS evaluation. You keep everything we build — flow, RTL, BSP, Security Target, and the documentation that lets your team carry it forward.
Most teams bleed weeks bolting together a flow before the first line of RTL. We install a complete, reproducible flow — design entry through sign-off — using your preferred EDA stack or a fully open-source toolchain. Your team owns it on day one.
SIM ?= verilator
TOP ?= fir_lowpass
TB_TOP ?= tb_$(TOP)
regress: lint $(SIM) coverage report
lint:
verilator --lint-only -sv $(RTL_FILES)
verilator:
verilator --cc --trace --exe $(RTL_FILES) tb/$(TB_TOP).cpp
$(MAKE) -C obj_dir -f V$(TOP).mk V$(TOP)
./obj_dir/V$(TOP)
coverage:
verilator_coverage --annotate logs/annotate logs/coverage.dat
From initial spec through tape-out hand-off. Every stage produces an artefact you keep, in your own repo, runnable by your team.
Block, subsystem, or full SoC. We take architecture, RTL, or microarchitecture and rework it against measurable targets — area, throughput, power, latency — and ship it back as soft IP with a self-checking testbench and a clean synthesis report. Wireless PHY (BLE, BT, 802.15.4, RFID), DSP (fixed-point filters, FEC, equalizers), NPU and matrix accelerators, bus and interconnect architecture all live here.
Take a Linux-based embedded platform from BSP through certification — Yocto, secure boot, OP-TEE, full-disk encryption, authenticated OTA, post-quantum crypto — and deliver the Security Target and assurance evidence a Common Criteria or FIPS evaluator expects to see. We have authored Security Targets against NdCPP, integrated FIPS-validated stacks into Yocto, and migrated production WPA3 links to Kyber.
A grouped view of the languages, methodology, and tooling we use across every engagement.
Three engagement shapes. Each one priced predictably so you can plan around it.
Scoping, architecture review, risk audit. You leave with a written plan you can hand to any team — us, your in-house engineers, or another contractor.
DiscussA scoped block, subsystem, or BSP delivered with RTL or Yocto image, testbench or evaluation pack, docs, lint/hardening clean, and synthesis or cert-ready reports. Weekly check-ins, code in your repo from day one.
DiscussA few days a month embedded with your team — code reviews, mentoring, sign-off support, ISO 26262 or Common Criteria questions. For when you need senior bandwidth without a hire.
DiscussAnything not covered here? Send a brief at /contact.
Yes. Mutual NDAs before sharing any design specifics, and project work is covered by a written agreement that assigns IP ownership to the client.
You do. All RTL, testbenches, BSPs, Security Targets, scripts, and documentation produced under a project engagement are work-for-hire and fully assigned to the client.
Yes — short on-site stays for kick-off, integration, or sign-off support. The bulk of the work is remote unless your tooling or security boundary requires otherwise.
That’s the point of the open-source flow option. Verilator, Yosys, OpenROAD, and SymbiYosys cover most digital flows for early-stage designs. We can switch to commercial tools later without rewriting RTL.
Yes — designs taped out to multiple processes, both with commercial PDKs and on open shuttle programmes (e.g. SkyWater 130nm).
Yes. We have authored Security Target documents against NdCPP, interfaced directly with external CC evaluation bodies, and integrated FIPS 140-3 validated cryptographic libraries (including CorSSL) into Yocto images. STIG-aligned hardening, structured audit logging, and CRL/OCSP revocation chains are part of the standard deliverable.
Yes. We have integrated Kyber (ML-KEM, FIPS 203) into wpa_supplicant/hostapd via OpenSSL + liboqs to replace ECDH in production WPA3 links. We can plan and execute a migration of your TLS, SSH, or link-layer key exchange onto the NIST PQC suite.
Fixed fee for discovery sprints. Milestone-based for project engagements. Monthly retainer for fractional work. No hourly billing — predictable for both sides.
Discovery sprints from one week. Project engagements from a month. We respond within one business day.