Geoff Lees, VP/GM of MCUs at NXP explains the latest i.MX microprocessor announcement, aimed at the Edge of the IoT. It offers a 600-MHz frequency, improved memory performance, and integrated power-management functionality. For more information on NXP, visit www.nxp.com. For more things that you missed at ARM TechCon 2017, click here.
Reflex Photonics introduces two new series of transceivers
Reflex Photonics is proud to introduce two new lines of products targeting high-end space and industrial ap...
We also recommend:
Audio Support Added to SEGGER emUSB-Host
Audio is added to emUSB-Host at runtime to minimize memory footprint.
People & Products Podcast: The State of GaN with Transphorm's Philip Zuk
Industry's focus is shifting from the promise of Gallium Nitride (GaN) to the reality of the products enabled by it, with new packaging options available for emerging application spaces.
Lauterbach Launches Full SAFERTOS Awareness in TRACE32 Arm Debug Environment
Lauterbach has extended kernel awareness for WITTENSTEIN high integrity systems’ SAFERTOS to all Arm processors in its TRACE32 debug environment.
Collaborate Without Complexity Using Smart Video Displays
Fifty years after Bell Labs first showed off its Picturephone, videoconferencing systems are ubiquitous across the enterprise—but many solutions are difficult to deploy and use.
congatec at Embedded World 2019
congatec's Zeljko Loncaric at Embedded World 2019 booth #1-358. Follow Embedded Computing Design: https://twitter.com/embedded_comp Visit congatec: https://www.congatec.com
PMK Mess und Kommunikationstechnik at Embedded World 2019
Steve Sandler of Picotest at the PMK booth #4-403 at Embedded World. Follow Embedded Computing Design: https://twitter.com/embedded_comp Visit PMK: www.pmk.de/en/home Visit Picotest: https://www.p
RISC-V: Too Open to Fail
For some, RISC-V is the answer to Arm. For others, it offers a new path to innovation. It can also provide insurance in turbulent times. Whatever the reason, RISC-V is too open to fail.
How to Establish an Effective Data Quality Policy for Your Business
By focusing on ad-hoc incident resolution, organizations struggle to identify and address recurring data quality problems in a structural way.
CES 2019: Attendance Slightly Down, Innovation Way, Way Up
Attendance may have been down at the 2019 Consumer Electronics Show, based on observed foot traffic alone. But, that didn't stop electronics vendors from innovating at the highest levels. From...
Linux, RISC-V Foundations to Collaborate on Open Architectures
In addition to tools, services, and training support, the Linux Foundation will provide neutral governance, best practices for open source development, community outreach, marketing, and legal advice.
OCF 1.0 ratified by ISO/IEC JTC 1 as secure IoT interoperability protocol
The OCF standard will be published as ISO/IEC 30118 (Parts 1-6).
NASA InSight Lands Safely on Mars with VxWorks
VxWorks was responsible for complex automated maneuvers of the InSight landing craft, providing system-wide determinism and synchronization through a Red Planet atmosphere 100x thinner than Earth's.
Embedded Insiders: Is There Really an Engineering Shortage, and Why?
Rumors of a shortage of electronics engineers have been circulating for years, but with Fortune 500 technology firms now gobbling up as much engineering talent as possible for IT and enterprise...
Hex-Five Multi-Zone Security for RISC V Simplifies the Terrible TEEs
Trusted Execution Environments (TEEs) such as Arm TrustZone, while well-intentioned, present challenges for engineers. First, they doesn't allow for partitioning between many sensitive functions withi
Spectre, Meltdown, and Tortuga Logic's Hardware Security Verification at Arm TechCon
The Spectre and Meltdown vulnerabilties resulted from speculative execution, designed to satisfy our need for speed. These could have been prevented through the use of hardware security verification,
So, How Secure are your Coding Practices? Ask AdaCore
Developing secure code is no longer optional, but that doesn't mean it's easy. Some software engineers use vulnerability databases like CWE and OWASP to ensure their code is robust as possible, howeve
Achronix eFPGA Technology Offers AI Flexibility, Today and Tomorrow
With Moore’s law coming to an end and the growing volume of data that will require to be processed to drive the next wave of AI applications, CPUs are no longer able to keep up with the compute requir
Neural Network Optimization with Sparse Computing and Facebook Glow
There are 27 different types of neural networks. The number of neural network types has increased as engineers and data scientists seek out optimized implementations of AI for use cases.
Software Development Life Cycle Stages When Getting Started on a New Idea
When you work in the software industry, you're likely aware of how open, flexible and innovative the market is.
Voltage Dividers in Power Supplies