In this video, Jeff Schnabel of CUI talks to Alix Paultre of Embedded Computing Design about software-defined intelligent power solutions on display at PCIM 2017.
Previous Video
Rich Nass talks with David Kleidermacher at MEDSec 2017
Rich Nass of Embedded Computing Design discusses security and privacy for the Internet of Medical Things wi...
Next Video
PCIM: Ericsson introduces new board-level power modules
In this video, Martin Hägerdal, President of Ericsson Power Modules, talks to Alix Paultre of Embedded Comp...
For some, RISC-V is the answer to Arm. For others, it offers a new path to innovation. It can also provide insurance in turbulent times. Whatever the reason, RISC-V is too open to fail.
CES 2019: Attendance Slightly Down, Innovation Way, Way Up
Attendance may have been down at the 2019 Consumer Electronics Show, based on observed foot traffic alone. But, that didn't stop electronics vendors from innovating at the highest levels.
From...
Linux, RISC-V Foundations to Collaborate on Open Architectures
In addition to tools, services, and training support, the Linux Foundation will provide neutral governance, best practices for open source development, community outreach, marketing, and legal advice.
VxWorks was responsible for complex automated maneuvers of the InSight landing craft, providing system-wide determinism and synchronization through a Red Planet atmosphere 100x thinner than Earth's.
Embedded Insiders: Is There Really an Engineering Shortage, and Why?
Rumors of a shortage of electronics engineers have been circulating for years, but with Fortune 500 technology firms now gobbling up as much engineering talent as possible for IT and enterprise...
Hex-Five Multi-Zone Security for RISC V Simplifies the Terrible TEEs
Trusted Execution Environments (TEEs) such as Arm TrustZone, while well-intentioned, present challenges for engineers. First, they doesn't allow for partitioning between many sensitive functions withi
Spectre, Meltdown, and Tortuga Logic's Hardware Security Verification at Arm TechCon
The Spectre and Meltdown vulnerabilties resulted from speculative execution, designed to satisfy our need for speed. These could have been prevented through the use of hardware security verification,
So, How Secure are your Coding Practices? Ask AdaCore
Developing secure code is no longer optional, but that doesn't mean it's easy. Some software engineers use vulnerability databases like CWE and OWASP to ensure their code is robust as possible, howeve
Achronix eFPGA Technology Offers AI Flexibility, Today and Tomorrow
With Moore’s law coming to an end and the growing volume of data that will require to be processed to drive the next wave of AI applications, CPUs are no longer able to keep up with the compute requir
Neural Network Optimization with Sparse Computing and Facebook Glow
There are 27 different types of neural networks. The number of neural network types has increased as engineers and data scientists seek out optimized implementations of AI for use cases.
In the design of power supplies, the desired output voltages can be set manually. This is accomplished in most integrated power supply circuits with the help of voltage dividers.
With increasing desire to move more intelligence and connectivity closer to the edge of Internet of Things networks, industry is pushing through the fog and towards mist computing.
Self-taught start-up CEOs have gone on record declaring that computer science degrees are a waste of time and resources, and some argue that self-taught programmers are more resourceful and skilled.
Get Ready for Scalable Video Streaming with the H.265 Codec
HEVC provides a 50 percent improvement in file compression over its predecessor while delivering the same image quality. And it supports 8K resolutions.