Over the past two decades Nuvation Engineering has developed data acquisition systems for a wide range devices and market applications. Based on our experience performing hundreds of engineering design projects, our engineers have identified several key considerations that require special attention during the planning, design, and development of data acquisition systems.
Previous White Paper
New technology from Arm is blending DSP and ML features into a low-power general-purpose processor for the ...
Most Recent Flipbooks
Capturing IoT data about facilities performance is just the first step. The application of effective algorithms is key to implementing and capitalizing on a data analytics strategy.
Video analytics for critical operations at the edge presents numerous challenges, including computing resources, server deployment, and systems integration.
By leveraging powerful algorithms, deep learning technology, and intelligent analytics, the power of video has moved beyond security, providing a range of data that can help streamline operations.
IoT endpoints are a top target of cyberattacks. But centralized security architectures like PKI leave deployments susceptible to man-in-the-middle attacks. Blockchain at the edge could be the answer.
See how a commercial unit testing tool can make the most of your effort in testing safety-critical software. Download our whitepaper to learn more.
Prepare for a new and different way of testing. In this paper, we’ll explore some top tips for setting up labs and infrastructure—not just to address 2020’s immediate concerns, but to make...
A sensor device that triggers a certain function when an object is either present or not may sound simple. But in reality, there are numerous factors to consider in order to avoid false positive...
Trying to decide between Off the Shelf and custom hardware? Don't forget to consider these important factors!
OEMs looking to effectively improve their competitive position with new product introductions need to adopt a platform strategy for their products. Such a strategy allows manufacturers to develop an..
Stolen IP can be modified to include backdoors and side channels. The means modified Software IP can potentially enter safety-critical systems like a modern car. Here’s how to protect your connected..
From intense vibrations, mechanical shocks, wide temperature swings and so much more, designing for harsh environments requires extensive experience. But what could go wrong if you miss one of these..
The advent of new technologies—and the resulting rollout of value-added services—has brought about seismic shifts for digital signage networks.
Traditional parallel attached DRAM memory has presented a major roadblock for next-generation CPUs. Microchip’s serial memory controller delivers higher memory bandwidth and media independence to...
Deciding what hardware to use for your embedded GUI application? From understanding performance and storage requirements to estimating memory needs, you’ll be faced with quite a few important...
An autonomous vehicle can generate up to 20 TB of data per day—valuable info that needs to be saved. So how do you get HPEC storage into a space-constrained, harsh environment? The answer is fluid.
Can a recipe-like approach make it easier to develop industrial AI-enabled applications? When it comes to smart factory visual quality inspection applications, the answer is “definitely.” Read how.
Are you testing your proof of concept with realistic network conditions? If not, your IoT project is at risk. See how smarter simulators save the day.
With supply chain operators confronting especially challenging times, knowing more about the status of products, streamlining internal processes, and finding ways to reduce costs have become vital.
Multicore embedded systems are becoming increasingly common. This paper looks at using a hypervisor or multicore framework, or both, to control and mange a multicore system, which is a critical...