BROWSE BY TECHNOLOGY










RTC SUPPLEMENTS


Industry Watch

Featured Article

Building out the Smart Grid (PART 3)

Not Your Traditional App Store: Four Smart Grid Applications

When the iPhone was first released, many questioned if it would work for the business user or be relegated to the consumer market.  The wealth of productivity and enterprise levelRead More...

Article Image

Building out the Smart Grid (PART 3)

Energy Harvesting Makes for a More Intelligent ‘Smart Grid’

High voltage electrical power transmission lines form the backbone of America’s power grid: a vital asset that demands intelligent management and oversight to protect againstRead More...

Article Image

Building out the Smart Grid

Help Wanted: Wind, Solar, and On-Grid Battery Storage [Part TWO of a Series]

The benefits of a design platform extend beyond the first development cycle.  Looking back at a smart phone, upgrading software is a fairly common and simple task.  About once a year,Read More...

Article Image

Security for the Internet of Things.

Security for the Internet of Things—Let’s Begin the Conversation.

Computer security has been a never-ending struggle over many years. The importance and urgency of security increases with the spread of technology and our dependence on it, with itsRead More...

Article Image

Security for the Internet of Things.

How PRPL is Addressing Security Requirements

When it comes to digital security, the world takes the matter seriously, and who wouldn’t? In today’s always connected world, data from our pocket phones reaches out and back to theRead More...

Article Image

Security for the Internet of Things.

Embedded Hardware & Software Partnerships Provide Critical Path to Closing IoT Security Loopholes

It is estimated that there could be between 25-50 billion connected devices by 2020, with more than six connected devices per person. The technologies that make up the Internet ofRead More...

Article Image

Security for the Internet of Things.

IoT Security – A Holistic Approach

I suspect many Internet of Things solution providers have a goal similar to ours – to maintain customer trust and confidence by ensuring the integrity, availability and confidentialityRead More...

Article Image

Security for the Internet of Things.

OT and IT Coexist in a Secure IIoT World

By 2020, Gartner predicts that there will be 26 billion connected devices. IBM estimates over 100 billion Internet of Things (IoT) devices in the next 20 years. With the rise inRead More...

Article Image

Security for the Internet of Things.

In IoT Security, We Trust

As we come to the end of another summer news cycle, cybersecurity once again saturates the headlines. The summer of 2015 saw cybersecurity vulnerabilities result in the recall of 1.4Read More...

Article Image

Security for the Internet of Things.

Basic Security Techniques Really Work

With the building wave of IoT products, services and media coverage, it’s no surprise that IoT security continues to make headlines. Some of the headlines are positive – companiesRead More...

Article Image

Security for the Internet of Things.

How to Secure IoT Through the Home Gateway

Just like a freight train barreling down the tracks, the Internet of Things can’t be stopped. Technologies that show promise to protect us and remove burdens from our lives areRead More...

Article Image

Security for the Internet of Things.

Securing SoCs in the IoT Era

I was recently at a luncheon where the topic of conversation was around the possibilities and promise of the IoT. Can a connected world ensure better health and wellness for theRead More...

Article Image

Security for the Internet of Things.

prpl is Pragmatic for Security

Most of the public discussion about security presents various aspects of the problems, or a high level view of risks/solutions, or an individual company’s solution to their slice ofRead More...

Article Image

Security for the Internet of Things.

Solving IoT Security Problems with New Generation of FPGAs

It can be extremely challenging to combat design cloning, reverse engineering or tampering in today’s IoT. FPGAs help by including security-focused features that add defense at theRead More...

Article Image

Processors vs. FPGAs

Intel Architecture versus the FPGA: The Battle of Time, Complexity and Cost

“Clay is fashioned into vessels; but it is on their empty hollowness that their use depends.” -- Tao Te Ching, Lao Tzu FPGAs have no intended function when you buy them; but they gainRead More...

Article Image

Chracterizing Solid State Drives

The Effects of Industrial Temperature on Embedded Storage

The ability to support ever-increasing amounts of data and higher functionality are definitely ongoing embedded system demands.  Exploding capacity requirements of tens or hundreds ofRead More...

Article Image

Small Board Prototyping

Creating an Application-Specific Operating System to Power an Arduino Robot

At Zeidman Technologies, we wanted to create a project using our SynthOS software tool, which automatically generates an optimized real-time operating system at the push of a button. Read More...

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 Next >>