Microchip is certainly one of the leaders in the embedded industry. The number of MCUs the company manufactures is staggering by just about any metric. So I thought hearing the company’s opinion of where our industry is headed would be appropriate.
- Embedded Security Webinar Series
- Machine Learning
- Power Electronics
- Dev Tools & OS
- Dev Kit Selector
- White Papers
- Upcoming Activities & Events
- Embedded Executive
While I won’t go into specifics, on average I’ve been able to make what I consider a reasonable living writ...
Most Recent Articles
Enterprises are rapidly adopting mobility solutions to improve business operations. They are continually making their processes efficient and lean with enterprise mobility solutions.
The Yocto Project, a collaboration under the auspicies of the Linux Foundation, is an open-source distribution that gives developers the ability to collaborate on projects involving embedded devices.
You need to be sure that the software you send to the plant is exactly the same as the software that gets installed into the manufactured products. No exceptions.
Most data acquisition systems require calibration, sometimes even more than once during a product’s lifetime.
A simple definition of a secure boot is that it’s a mechanism for ensuring the integrity of firmware and software running on a computing platform.
The market of Bluetooth low energy was estimated at $4.8 billion in the year 2019 and anticipated to grow at a CAGR of 19.7% during 2020-2024.
Technology is a force for both good and evil. Ethicists and public intellectuals constantly wrestle with how to ensure the tools we build help make the world a better place.
However, there’s a downside to this tsunami of IoT connected devices, which, as ResearchAndMarkets notes, will hit 25.1 billion in 2025, compared to 2017’s 7.5 billion.
The reality is that once you go through the process one time, if you follow the right steps the next installation is just a few clicks away.
Sequitur Labs has released the next generation of its EmSPARK product, version 2.0, which offers a comprehensive approach to embedded system security, specifically targeting Edge-based IoT devices.
Every year, cybercriminals steal approximately $40 billion from older adults (senior citizens aged 60 and over) in the United States.
Secure contexts are a must in industrial platforms, especially if it’s a “connected” platform.
The word “library” is used and abused in a variety of contexts. Its meaning here is well defined. A library file may be presented to the linker, along with relocatable object files.
You’ve spent months or even years creating IP that belongs to your company and/or its customers. In many cases, that IP is what makes you stand out from your competitors.
When making something awesome, it’s a good bet that you want the whole world to know about it. If you’d like people to appreciate just how interesting your device is, you’ll need to take good photos.
As the demand for increased functionality through advanced techniques such as data analytics and machine learning increases, the ability to handle software efficiently is vital to success.
Change Data Capture (CDC) is broadly defined as tracking changes in a database. The purposes of tracking changes are many and varied.
GNSS has been widely adopted as a method to track and trace large items such as ships, trucks, heavy equipment, cars and high-value freight.
This new paradigm of ubiquitous connectivity is inspiring manufacturers, from the largest automation OEMs to emerging businesses.
Over the past several years, 5G has transformed from a concept spoken about at conferences to a reality with numerous deployments being rolled out across the globe.