Articles

  • How to choose cool running, high power, scalable POL regulators and save board space

    How to choose cool running, high power, scalable POL regulators and save board space

    IC designers often avoid dealing with the dreaded topic of heat — a job that usually falls to the package engineer.

    Read Article
  •  IoT-based smart and secure home automation

    IoT-based smart and secure home automation

    Existing smart home automation systems are uniquely designed to suit specific consumers home environments and requirements.

    Read Article
  • Advanced Bluetooth Angle Estimation Techniques Enhance Real-Time Locationing

    Bluetooth Angle of Arrival and Departure are the latest techniques for real-time tracking of people, mobile devices, and other assets.

    Read Article
  • Chances and challenges for machine learning in highly automated driving, part 2: Theoretical background

    Chances and challenges for machine learning in highly automated driving, part 2: Theoretical background

    Part two defines the theoretical background of machine learning technology, as well as the types of neural networks available to automotive developers.

    Read Article
  • From logistics regression to self-driving cars: Chances and challenges for machine learning in highly automated driving

    From logistics regression to self-driving cars: Chances and challenges for machine learning in highly automated driving

    In part one of this three-part series, the authors investigate the drivers behind and potential applications of machine learning technology in highly automated driving scenarios.

    Read Article
  • How fog computing disrupts the cloud services market

    For business, one unresolved challenge remains important: providing scalability for cloud technology.

    Read Article
  • Why closed-loop sensing provides the best white color-tuning performance in LED lights at the lowest cost

    Why closed-loop sensing provides the best white color-tuning performance in LED lights at the lowest cost

    With the rapid decline in the dollar-per-kilolumen price of LEDs, the economics of LED lighting have turned decisively in favor of white color tuning in commercial and high-end residential lighting.

    Read Article
  • Monetizing blockchain-based M2M service

    Monetizing blockchain-based M2M service

    Today, several publications and other media outlets writing about how to apply blockchain in fog computing mostly focus on the features directly brought by blockchain.

    Read Article
  • Automotive open source virtualization: Bringing open source virtualization in AGL

    Automotive open source virtualization: Bringing open source virtualization in AGL

    The AGL Software Defined Car Architecture white paper defines how the AGL target platform for software defined vehicles can be implemented by using virtualization techniques.

    Read Article
  • AdaCore Technologies for cyber security, part 4: Industrial scenario examples

    This part presents a number of security-related scenarios that may arise in real-world projects.

    Read Article
  • Getting back up: Coupling AI and memory class storage saves in a big way

    Getting back up: Coupling AI and memory class storage saves in a big way

    One of the weaknesses of the massively parallel architectures for AI is sensitivity to data loss on power failure, resulting in high costs for these data centers.

    Read Article
  • Designing more flexible power banks with USB Type-C PD

    Designing more flexible power banks with USB Type-C PD

    This article discusses the design of USB Type-C PD power banks; i.e., power bank with a USB Type-C connector and using the USB Power Delivery (PD) specification.

    Read Article
  • Measuring code execution time on ARM Cortex-M MCUs

    Measuring code execution time on ARM Cortex-M MCUs

    Measuring the actual execution time of portions of code can help you find the hot-spots in your code. This article will show how you can easily measure and display the execution time of code on live C

    Read Article
  • 28-nm ADCs enable next-generation electronic warfare receiver systems

    28-nm ADCs enable next-generation electronic warfare receiver systems

    The high-speed ADC is a primary design consideration in all wideband EW receivers and largely determines system architecture and overall detect and observe capability.

    Read Article
  • Designing smart home and wearables IoT applications, part one

    Designing smart home and wearables IoT applications, part one

    In part one of this series, we will cover IoT market trends and the relevance of smart home and wearable applications, followed by an example implementation of a smart home door lock controller.

    Read Article
  • Trends and innovations in the Industrial IoT

    Trends and innovations in the Industrial IoT

    This piece is part one of a three part series and explores some of the trends and innovations that are emerging in the Industrial Internet of Things (IIoT) and the challenges they will help overcome.

    Read Article
  • Take advantage of APIs to take a typical USB stick to the next level

    Take advantage of APIs to take a typical USB stick to the next level

    A smart controller can unlock the potential of the market-leading removable-storage standard in embedded applications.

    Read Article
  • Manufacturing MEMS to the quality standards of multiple industries

    Manufacturing MEMS to the quality standards of multiple industries

    Although the promise of MEMS is only starting to be tapped, the challenges of manufacturing MEMS are daunting because the category covers so many different types of devices.

    Read Article
  • AdaCore Technologies for cyber security, part 2: The challenge of secure software

    This article considers why building and operating secure computer systems appears to be so difficult, as evidenced by the frequency and magnitude of attacks reported in the media.

    Read Article
  • Sorting out security: Making sense of today’s solutions

    From antivirus software to encryption to intrusion detection systems to compartmentalization, all have value in our war against cybersecurity threats, but what’s the difference between them?

    Read Article
  • loading
    Loading More...