Articles

  • AdaCore Technologies for cyber security, part 2: The challenge of secure software

    This article considers why building and operating secure computer systems appears to be so difficult, as evidenced by the frequency and magnitude of attacks reported in the media.

    Read Article
  • Sorting out security: Making sense of today’s solutions

    From antivirus software to encryption to intrusion detection systems to compartmentalization, all have value in our war against cybersecurity threats, but what’s the difference between them?

    Read Article
  • Edge processing points to custom SoC

    Edge processing points to custom SoC

    A major, often hidden cost in an IoT application can be that of installation, particularly for sensor nodes that need to be placed in locations that are difficult to access.

    Read Article
  • Powering single-board computer and computer-on-module systems

    Powering single-board computer and computer-on-module systems

    Single-board computers and computer-on-module systems embed all of the functions of a computer onto a single circuit board, and are commonly used in industrial applications.

    Read Article
  • Power, cost, performance, and security demands put mid-range FPGAs on new process roadmap

    Power, cost, performance, and security demands put mid-range FPGAs on new process roadmap

    While the focus in the data center is workload acceleration, systems in these other applications need a challenging combination of low power and cost without sacrificing performance and reliability.

    Read Article
  • Fog computing: Bringing SDN to IIoT

    Fog computing: Bringing SDN to IIoT

    Fog Computing offers an innovative solution to address these challenges by providing secure access to Operational Technology infrastructure within the framework of Information Technology toolsets

    Read Article
  • Edge computing bridges cloud and embedded worlds

    If you aren’t living on the edge, you’re taking too much room.

    Read Article
  • 2018 Top Embedded Innovator – Jason Kridner, BeagleBoard.org

    2018 Top Embedded Innovator – Jason Kridner, BeagleBoard.org

    Jason Kridner, Co-Founder of BeagleBoard.org and a 2018 Top Embedded Innovator, explains how “Making” has become perhaps the most effective means of educating young engineers.

    Read Article
  • 2018 Top Embedded Innovator – Allison Clift-Jennings, Filament

    2018 Top Embedded Innovator – Allison Clift-Jennings, Filament

    One of Embedded Computing Design’s Top Embedded Innovators for 2018, Allison Clift-Jennings of Filament gives her views on the blockchain technology evolution.

    Read Article
  • 2018 Top Embedded Innovator – Dan Cauchy, Automotive Grade Linux

    2018 Top Embedded Innovator – Dan Cauchy, Automotive Grade Linux

    Vehicles are becoming software-defined networks on wheels. Dan Cauchy, a 2018 Top Embedded Innovator and Executive Director of Automotive Grade Linux offers insight on open source software in auto.

    Read Article
  • Using a memory protection unit with an RTOS, part 4

    Using a memory protection unit with an RTOS, part 4

    In this last installment of this series on using an RTOS with an MPU, we’ll look how you group RAM by process and conclude with a list of recommendations when using the Cortex-M MPU.

    Read Article
  • Using a memory protection unit with an RTOS, part 3

    Using a memory protection unit with an RTOS, part 3

    This installment looks at how a process can communicate with another process and what happens when a process attempts to access a memory location or a peripheral device outside its allocated space.

    Read Article
  • Low power solutions for always-on, always-aware voice command systems, part 3

    Low power solutions for always-on, always-aware voice command systems, part 3

    Recent advances in hardware and software have made it possible for compact, battery-powered products to include always-on voice command systems.

    Read Article
  • Edge node security for the Industrial IoT, part 2

    Edge node security for the Industrial IoT, part 2

    While servers and PCs are complex enough to allow for security provisions, IIoT nodes are usually low in power consumption and processing power.

    Read Article
  • AdaCore Technologies for cyber security, part 1

    We're all serious about security, some more than others. This first in a series of articles on cyber-security shows that it's really necessary and it's really possible to be secure.

    Read Article
  • Using a memory protection unit with an RTOS, part 2

    Using a memory protection unit with an RTOS, part 2

    Introduced in 2004, the ARM Cortex-M architecture is currently the most popular 32-bit architecture on the market, adopted by most, if not all major MCU manufacturers.

    Read Article
  • Edge node security for the Industrial IoT, part 1

    Edge node security for the Industrial IoT, part 1

    As part of the IIoT, embedded sensor systems lack the past two decades of evolution that web servers have had in the hostile environment of the internet.

    Read Article
  • Low power solutions for always-on, always-aware voice command systems, part 2

    Low power solutions for always-on, always-aware voice command systems, part 2

    Recent advances in hardware and software have made it possible for compact, battery-powered products to include always-on voice command systems.

    Read Article
  • Using a memory protection unit with an RTOS

    Memory-protection units (MPUs) have been available for years on processors such as the Cortex-M, and yet, embedded developers shy away from using them. Is it because they aren’t useful?

    Read Article
  • PCIe in the connected car

    Car makers are looking at lots of alternatives to transport the vast amount of data that’s being generated within the car. PCIe may provide solution.

    Read Article
  • loading
    Loading More...