Guest Blogs

  • To Cloud or Not to Cloud: The Challenge of Deciding Where to Process IoT Data

    The cloud is an enticing alternative to edge-based processing.

    Read Article
  • Protect your Circuits from Electrostatic Discharge Damage

    This type of damage is most apt to occur in the assembly process or before the chips have been assembled into their final PCB resting place.

    Read Article
  • Increase Battery Life of Consumer Products Using Architecture Simulation

    For any new system, the number of power states, concurrent thread operations, transition times and switching require a detailed power evaluation prior to finalizing the specification.

    Read Article
  • Keys to Developing Safety-Critical Software

    The U.S. mandates compliance with standards for the software development lifecycle (SDLC) of safety critical projects.

    Read Article
  • For Real-Time System Developers, "Dynamic" is a Dirty Word

    There is no keyword dynamic (in C/C++), but the word is widely used to describe particular behaviors and should strike a chill in the heart of any real-time system developers.

    Read Article
  • Cypress Semiconductor CYW20819 and CYBT-213043-MESH Bluetooth Mesh Networking Evaluation Kits

    Cypress Semiconductor CYW20819 and CYBT-213043-MESH Bluetooth Mesh Networking Evaluation Kits

    A technology that’s become ubiquitous over its 20 years of existence is Bluetooth. This mesh technology is specified to support up to a staggering 32,000 nodes per network.

    Read Article
  • Smart System Maintenance: Artificial Intelligence in the System Integrator Toolbox

    Artificial intelligence plays a new role in long-term, predictive maintenance strategies. Predictive algorithms improve reliability of industrial image processing systems.

    Read Article
  • Uncovering Real-Time Bugs with Specialized RTOS Tools - Part 2

    In this section, we’ll explore some of the common issues encountered by developers when using an RTOS and show how those can be detected and corrected.

    Read Article
  • Uncovering Real-Time Bugs with Specialized RTOS Tools - Part 1

    In this paper, we will look at tools specifically designed to help RTOS-based application developers uncover some elusive bugs, identify issues and offer corrective actions.

    Read Article
  • Extra Power Also Means Extra Heat

    There are methods to determine how much of an issue heat is in your system, and some of them are quite complex.

    Read Article
  • Smoke Alarm System 2.0

    A typical smoke alarm is made up of a detector, a microcontroller with an algorithm, and additional components such as loudspeakers, LED indicators, or CO sensors.

    Read Article
  • How to Remotely Reset Your Serial SPI Memory Device, and Why

    The SPI is widely used to connect microcontrollers to peripherals and memory devices in embedded systems. In particular, it is frequently used for serial NOR flash that stores executable code.

    Read Article
  • A Funny Thing Happened on the Way …

    As integrated circuit design progressed from the early days of manual layout to complex SoCs and fully automated design systems, the end goal of the design effort was to reach tape out.

    Read Article
  • Make the Connection Between AI and the IoT

    Make the Connection Between AI and the IoT

    The bottom line is that combining AI and IoT can create efficiencies and/or increase profitability. What’s new and exciting is just what happens when you put these two powerful technologies together.

    Read Article
  • A Resilient Error Correction Scheme for 3D TLC NAND

    A Resilient Error Correction Scheme for 3D TLC NAND

    Due to the complexity of 3D structures, several kinds of errors can occur. Especially in high-capacity systems, these issues require NAND flash controllers and advanced error correction algorithms.

    Read Article
  • Choosing a Relay: Go Newer Solid State or Older Electromechanical?

    When embedded systems need to contact the outside world to sense strong signals, they often need electrical dilation on the I/O. The question is: Should I use a SSR to do this, or an EMR?

    Read Article
  • MPU Security Part 4: Dynamic Regions, Debug, and Conclusions

    This is the fourth part of a four-part series of articles presenting a unique product MPU Plus® and a methodology for using the Cortex-M MPU to achieve improved MCU security.

    Read Article
  • MPU Security Part 3: Partition Problems and Solutions

    This is the third part of a four-part series of articles presenting a unique product MPU Plus® and a methodology for using the Cortex-M MPU to achieve improved MCU security.

    Read Article
  • Technology to Optimize Screen Usability for Bright Environment

    Manufacturers use various techniques to fine-tune the LCD screen for such demanding applications. The right combination of applied techniques is the key to success.

    Read Article
  • IoT Security: Securing Resource-Constrained Devices

    The key to developing effective IoT security is to first consider who might want to compromise your system, what they might gain, and what you need to secure.

    Read Article
  • loading
    Loading More...