- Working with wide 5G Downlink and Uplink OFDM waveforms
- Configuring wideband test benches for extensive frequency coverage
- Common sources of error in 5G beamforming
- Reducing test times of Over-the-air TX and RX test procedures
- Alternative to RF chambers for high volume production for mmWave RFICs
In this week’s Five Minutes With…podcast, I spoke to Lawrence Romine, a vice president of Altium, one of th...
We also recommend:
The technology uses an open architecture and has a suite of analytics with a set of automation workflows and rules to adapt the solution to each enterprise’s needs.
OEMs looking to effectively improve their competitive position with new product introductions need to adopt a platform strategy for their products. Such a strategy allows manufacturers to develop an..
STMicroelectronics announced a new STM32* Nucleo display shield that leverages the affordability of STM32G0 microcontrollers (MCUs).
Stolen IP can be modified to include backdoors and side channels. The means modified Software IP can potentially enter safety-critical systems like a modern car. Here’s how to protect your connected..
Cylynt Ranger Can Detect Tampering and Piracy in Legacy Software Products
Automatic text reading from natural environments, also known as scene text detection/recognition or PhotoOCR, has become an increasingly popular and an important research topic in computer vision.
Welcome to another edition of Dev Kit Weekly, where this week we’ll be reviewing and raffling off this GS-EVB-AUD-BUNDLE1-GS, an audio evaluation board from GaN Systems.
GUI toolkit for Linux enhances 32-bit microprocessor capabilities for low- and mid-range- resolution graphical displays.
Learn how to bake cybersecurity into can’t-fail edge devices in this educational video series with Wind River. The seven-part series compresses the entire security lifecycle into less than 30 minutes.
Deciding what hardware to use for your embedded GUI application? From understanding performance and storage requirements to estimating memory needs, you’ll be faced with quite a few important...
Initial netlists in a formal verification process must be optimized, so additional logic is needed for Design for Test. Here we offer formal verification flow and debugging techniques for 16 nm node.
Multicore embedded systems are becoming increasingly common. This paper looks at using a hypervisor or multicore framework, or both, to control and mange a multicore system, which is a critical...
There are many things to consider when moving from RTOS to Linux for embedded projects. This white paper provides practical information so developers can be fully aware of the trade-offs and the...
The Past, Present and Future of Cybersecurity in Embedded Systems explores how security requirements have changed from the early days of embedded systems. It examines how vulnerabilities have...
SystemLink helps enable seamless test operations and data management across an entire organization.
ESD Alliance to Lead Joint Effort with Cadence, Mentor, a Siemens Business, and Synopsys to Create Server Certification Protocol
OpenXR is an open, industry standard API that enables the development and deployment of portable, cross-platform AR/VR (XR) runtimes.
You need to be sure that the software you send to the plant is exactly the same as the software that gets installed into the manufactured products. No exceptions.
Why do less than four percent of IoT devices implement the security measures necessary to protect an organization's IP and customers from local or network-borne threats?
In this series of five webcasts, we’ll run through the five key security-related problems that will impact your design, and more importantly, how to solve them.