- Machine Learning
- Power Electronics
- Dev Tools & OS
- Dev Kit Selector
- White Papers
- Upcoming Activities & Events
- embedded world 2020
- Embedded Executive
embedded world 2017: Virtium Delivers on Nuances of Storage in Industrial IoT
There are some major differences between storage solutions for the Industrial versus Consumer Internet of T...
We also recommend:
Recapping the 2020 Consumer Electronics Show
In this episode of Embedded Insiders, Brandon and Rich review some of the highlights from the 2020 Consumer Electroncis Show (CES).
Collaborating on Collaboration Technology Brings Innovation
Traditional collaboration solutions like video teleconferencing have been around for years. But with innovations in security, communication, presentation, and management systems, meetings can ...
Audio Support Added to SEGGER emUSB-Host
Audio is added to emUSB-Host at runtime to minimize memory footprint.
People & Products Podcast: The State of GaN with Transphorm's Philip Zuk
Industry's focus is shifting from the promise of Gallium Nitride (GaN) to the reality of the products enabled by it, with new packaging options available for emerging application spaces.
Lauterbach Launches Full SAFERTOS Awareness in TRACE32 Arm Debug Environment
Lauterbach has extended kernel awareness for WITTENSTEIN high integrity systems’ SAFERTOS to all Arm processors in its TRACE32 debug environment.
Collaborate Without Complexity Using Smart Video Displays
Fifty years after Bell Labs first showed off its Picturephone, videoconferencing systems are ubiquitous across the enterprise—but many solutions are difficult to deploy and use.
congatec at Embedded World 2019
congatec's Zeljko Loncaric at Embedded World 2019 booth #1-358. Follow Embedded Computing Design: https://twitter.com/embedded_comp Visit congatec: https://www.congatec.com
PMK Mess und Kommunikationstechnik at Embedded World 2019
Steve Sandler of Picotest at the PMK booth #4-403 at Embedded World. Follow Embedded Computing Design: https://twitter.com/embedded_comp Visit PMK: www.pmk.de/en/home Visit Picotest: https://www.p
RISC-V: Too Open to Fail
For some, RISC-V is the answer to Arm. For others, it offers a new path to innovation. It can also provide insurance in turbulent times. Whatever the reason, RISC-V is too open to fail.
How to Establish an Effective Data Quality Policy for Your Business
By focusing on ad-hoc incident resolution, organizations struggle to identify and address recurring data quality problems in a structural way.
CES 2019: Attendance Slightly Down, Innovation Way, Way Up
Attendance may have been down at the 2019 Consumer Electronics Show, based on observed foot traffic alone. But, that didn't stop electronics vendors from innovating at the highest levels. From...
Linux, RISC-V Foundations to Collaborate on Open Architectures
In addition to tools, services, and training support, the Linux Foundation will provide neutral governance, best practices for open source development, community outreach, marketing, and legal advice.
OCF 1.0 ratified by ISO/IEC JTC 1 as secure IoT interoperability protocol
The OCF standard will be published as ISO/IEC 30118 (Parts 1-6).
NASA InSight Lands Safely on Mars with VxWorks
VxWorks was responsible for complex automated maneuvers of the InSight landing craft, providing system-wide determinism and synchronization through a Red Planet atmosphere 100x thinner than Earth's.
Embedded Insiders: Is There Really an Engineering Shortage, and Why?
Rumors of a shortage of electronics engineers have been circulating for years, but with Fortune 500 technology firms now gobbling up as much engineering talent as possible for IT and enterprise...
Hex-Five Multi-Zone Security for RISC V Simplifies the Terrible TEEs
Trusted Execution Environments (TEEs) such as Arm TrustZone, while well-intentioned, present challenges for engineers. First, they doesn't allow for partitioning between many sensitive functions withi
Spectre, Meltdown, and Tortuga Logic's Hardware Security Verification at Arm TechCon
The Spectre and Meltdown vulnerabilties resulted from speculative execution, designed to satisfy our need for speed. These could have been prevented through the use of hardware security verification,
So, How Secure are your Coding Practices? Ask AdaCore
Developing secure code is no longer optional, but that doesn't mean it's easy. Some software engineers use vulnerability databases like CWE and OWASP to ensure their code is robust as possible, howeve
Achronix eFPGA Technology Offers AI Flexibility, Today and Tomorrow
With Moore’s law coming to an end and the growing volume of data that will require to be processed to drive the next wave of AI applications, CPUs are no longer able to keep up with the compute requir
Neural Network Optimization with Sparse Computing and Facebook Glow