White Papers PDFs

This Stream includes all of our Premium White Papers Issues

  • Qualified Code Generation Greatly Reduces Cost of Safety-Critical Automotive Software

    Qualified Code Generation Greatly Reduces Cost of Safety-Critical Automotive Software

    ANSYS SCADE Suite code generator for developing ISO 26262 compliant applications up to ASIL D, the highest safety requirement for automotive applications, substantially reduces the embedded software

    Download PDF
  • Enabling Embedded Devices for Industrial Internet of Things (IIoT)

    Enabling Embedded Devices for Industrial Internet of Things (IIoT)

    This paper seeks to outline a few of the key architectural considerations required for the successful operation of smart devices within an IIoT infrastructure with a focus on the software that runs on

    Download PDF
  • 18th Century Technology for Modern Medical IoT

    18th Century Technology for Modern Medical IoT

    Find out what accidentally discovered ancient technology powers a modern medical IoT design in this white paper.

    Download PDF
  • What They Didn’t Teach You in Engineering School About Pressure Drop

    What They Didn’t Teach You in Engineering School About Pressure Drop

    A guide to understanding how to solve even complex pressure related design issues.

    Download PDF
  • Practical Guide to Maximizing DC Measurement Performance

    Practical Guide to Maximizing DC Measurement Performance

    The various methods covered in this guide can help you achieve greater accuracy in your applications requiring DC measurements.

    Download PDF
  • 4 Game-Changing Underlying Technologies for Advanced Radar

    4 Game-Changing Underlying Technologies for Advanced Radar

    The underlying technologies that enable complex ISR systems are evolving. NI believes these four recent innovations will have the biggest enabling impact on radar technology over the next several year

    Download PDF
  • Bare-Metal High Performance Computing in the Cloud

    Bare-Metal High Performance Computing in the Cloud

    This whitepaper introduces different types of cloud computing, presents benefits and disadvantages and shows how “bare metal cloud” mitigates the disadvantages, and describes SkyScale’s Accelerated...

    Download PDF
  • Accelerated Genomic Analysis – Applying Massive Parallel Computing to Genomics Secondary Analysis

    Accelerated Genomic Analysis – Applying Massive Parallel Computing to Genomics Secondary Analysis

    This whitepaper presents results from a new method developed by Parabricks run on a SkyScale Accelerated Cloud system with up to 16 NVIDIA Tesla V100 GPUs that greatly reduces that time...

    Download PDF
  • Use Intel® SSF to Remove Bottlenecks to AI

    Use Intel® SSF to Remove Bottlenecks to AI

    Machine learning and AI push the limits of processing, data transport, and storage. To achieve performance and scalability while containing cost, desi...

    Download PDF
  • "Zero Touch" IoT Security Is Key to Continued Growth

    "Zero Touch" IoT Security Is Key to Continued Growth

    By now it’s clear that the IoT will miss the much-touted target of 50B connected devices by 2020. The problem? IT managers are so worried about secu...

    Download PDF
  • IoT Security (Finally) Delivers ROI

    IoT Security (Finally) Delivers ROI

    To protect sensitive device data and networks as a whole, developers should consider both hardware and software. Hardware security modules can enable...

    Download PDF
  • Connected Railways Bring New Efficiencies and Amenities

    Connected Railways Bring New Efficiencies and Amenities

    A secure, unified communications system boosts railway efficiency, lowers costs, and improves the passenger experience. Collecting data leads to new i...

    Download PDF
  • Securing the IIoT with Flexible Firewalls

    Securing the IIoT with Flexible Firewalls

    Traditional IT firewalls don’t translate well to the factory floor, necessitating a new class of industrial firewall appliances. Industrial firewall...

    Download PDF
  • Building a Smart City? Start with Smart Streetlights

    Building a Smart City? Start with Smart Streetlights

    Smart streetlights are an efficient and easy way to modernize your city while also providing a return on investment.

    Download PDF
  • Machine Vision Makes Industrial Robots See and Improve

    Machine Vision Makes Industrial Robots See and Improve

    How emerging technologies like CV and real-time 3D video capture can help improve productivity and efficiency in robotics applications

    Download PDF
  • A 4-Step Guide to Security Assurance for IoT Devices

    A 4-Step Guide to Security Assurance for IoT Devices

    Teams need to rethink how they deliver software quickly – with security, safety, and quality in mind from design to deployment. But “rethinking” should not be “restarting.”

    Download PDF
  • Finding Concurrency Errors with GrammaTech Static Analysis

    Finding Concurrency Errors with GrammaTech Static Analysis

    Multithreading adds entirely new classes of potential bugs to those that must be considered by developers.

    Download PDF
  • Making Safety-Critical Software Development Affordable with Static Analysis

    Making Safety-Critical Software Development Affordable with Static Analysis

    Safety-critical software is becoming exceedingly expensive to develop and manufacturers are looking for solutions that increase developer productivity. Static analysis tools are indispensable for safe

    Download PDF
  • Protecting Against Tainted Data in Embedded Apps with Static Analysis

    Protecting Against Tainted Data in Embedded Apps with Static Analysis

    This paper describes a static analysis technique – taint analysis – that can be used to find how potentially hazardous inputs can flow through a program to reach sensitive parts of code, empowering...

    Download PDF
  • Containerized Linux: The Secret to IoT Security

    Containerized Linux: The Secret to IoT Security

    A desire in the development community to use Linux is often at odds with the security requirements of an organization, leaving a gap between a company’s goals and the skill sets of its engineers.

    Download PDF
  • loading
    Loading More...