Guest Blogs

  • How Edge Processing Can Achieve CCPA Compliance by Default

    How Edge Processing Can Achieve CCPA Compliance by Default

    The California Consumer Privacy Act (CCPA) was designed to address how to keep consumers’ data safe without compromise.

    Read Article
  • Thermal Detection, Computer Vision Could Help Curve the Coronavirus Pandemic

    Thermal Detection, Computer Vision Could Help Curve the Coronavirus Pandemic

    Industrial GPU computers are now available with the performance and expandability to execute these neural network algorithms at the edge, enabling large-scale, contactless screening.

    Read Article
  • MISRA Coding Standard and Static Code Analyzers

    MISRA Coding Standard and Static Code Analyzers

    Originally, MISRA (Motor Industry Software Reliability Association) was founded for the purpose of designing a set of guidelines for development of software for microcontrollers used in road vehicles.

    Read Article
  • Security in Our IoT Products: We’ve Never Needed It, So Why Start Now?

    Security in Our IoT Products: We’ve Never Needed It, So Why Start Now?

    Is device security necessary? Most companies have a solid portfolio of products deployed out to the field, and many could claim they’ve been in the market for more than 20 years without incident.

    Read Article
  • Makers Join the War on COVID-19

    Makers Join the War on COVID-19

    While you may have never considered it, generating effective treatments for a disease can involve a massive amount of computing power.

    Read Article
  • Secure Flash – The Cure for Insecurity in Connected Automotive and Industrial Applications – Part 2

    Secure Flash – The Cure for Insecurity in Connected Automotive and Industrial Applications – Part 2

    In part 2 of this series, we will cover Secure Flash, the next generation of smart memory. Designing secure embedded systems, whether using eFlash or external Flash, is an onerous endeavor.

    Read Article
  • The QorIQ Layerscape Technology

    The QorIQ Layerscape Technology

    This name stands for the combination of an energy-efficient Arm®-Core and the high-speed peripherals of the QorIQ® Power® architecture.

    Read Article
  • Secure Flash – The Cure for Insecurity in Connected Automotive and Industrial Applications – Part 1

    Secure Flash – The Cure for Insecurity in Connected Automotive and Industrial Applications – Part 1

    With the autonomous and connected revolution underway in the automotive and industrial markets, edge nodes are rapidly becoming cyber-attack targets.

    Read Article
  • LiDAR Beyond Automotive Applications

    LiDAR Beyond Automotive Applications

    Serving as a key component to many real-word applications, LiDAR enables machines to perceive the world in 3D.

    Read Article
  • Performing End-to-End Traffic Traceability Using Functional Coverage

    Performing End-to-End Traffic Traceability Using Functional Coverage

    For each of the functional features of a DUT to verify, all possible stimulus generation is developed through test cases and with the help of scoreboard, models, checkers, and assertions.

    Read Article
  • The Future of Battery-Free Bluetooth Devices

    The Future of Battery-Free Bluetooth Devices

    While electrical power cords are no longer required, the use of batteries is still a continued challenge in the market today.

    Read Article
  • Increasing Importance of Arm-Based Platforms

    Increasing Importance of Arm-Based Platforms

    As a market trend, it is clearly visible that more and more customers are asking for Arm-based solutions.

    Read Article
  • Architecting HIPAA in the Cloud Using AWS

    Architecting HIPAA in the Cloud Using AWS

    As per HIPAA compliance guidelines, each covered entity must follow the HIPAA security rules. AWS services are certified to ensure HIPAA compliance.

    Read Article
  • Momentum Builds for PSA Certified

    Momentum Builds for PSA Certified

    In these days of the Internet of Things (IoT), Industrial IoT (IIoT), and Artificial Intelligence of Things (AIoT), you cant assume everything is going to be secure…and everything has to be.

    Read Article
  • Overcoming the Outdoor Design Challenges of Complex AIoT Systems

    Overcoming the Outdoor Design Challenges of Complex AIoT Systems

    Companies looking to deliver value in the AIoT marketplace will be faced with extreme design requirements.

    Read Article
  • Security Checklist for IoT Sensors

    Security Checklist for IoT Sensors

    Security can become an afterthought. As a result, examples of insecure devices abound, from medical devices with hard-coded passwords to home routers with backdoors.

    Read Article
  • Three Cases Where the Open Source Model Didn't Work

    Three Cases Where the Open Source Model Didn't Work

    Last year, Microsoft announced support for the inclusion of the exFAT technology into the Linux Kernel.

    Read Article
  • RF Simulation in Product Design Life Cycle

    RF Simulation in Product Design Life Cycle

    Whether it is in Consumer, Automotive, Medical, or the Industrial Industry, the latest trend in technology is converting all wired interfaces to wireless.

    Read Article
  • Keeping Connected Cars Safe and Secure

    Keeping Connected Cars Safe and Secure

    In connected cars, we need a two-way connection from the vehicle to a central server in order to roll out updates, enable new features, and gather data.

    Read Article
  • Digilent Helps Home-Bound Engineers with Deep Discounts

    Digilent Helps Home-Bound Engineers with Deep Discounts

    Digilent is immediately instigating a 20% discount on a selection of products they feel would be most valuable to engineers working at home.

    Read Article
  • loading
    Loading More...