Embedded - Home

Highlights

Avoid these five basic maintenance automation mistakes

As businesses race to realize the competitive advantages that predictive and prescriptive maintenance brings to their business, they need to avoid these five common implementation…

The case for device-based positioning in IoT tracking and location

Relying purely on the cellular network using 4G LTE and 5G device-based positioning can eliminate the hardware and software complexity in IoT device tracking and location.

Case study: optimizing PPA with RISC-V custom extensions in TWS earbuds

A look at using custom extensions in a RISC-V processor to enable power, performance and area (PPA) optimized true wireless stereo earbuds SoC design.

Enabling a secure edge in cloud-based AI with Google Anthos bare metal

Deployment of Google Anthos bare metal can help enable deployment of any containerized service to the mission critical edge without compromising security or performance. This article takes a look at how services such as Google Cloud Visual Inspection AI service can be implemented to provide a validated solution for secure, video-based quality inspection.

Optimizing thermistor-based temperature sensing systems: System design

Designing a thermistor-based temperature measurement system is a challenging, multistep process, but a combination of specialized hardware, software and development tools can ease this process….

Design

Protecting industrial control systems needs a proactive approach to firmware security

Staying ahead of rising firmware attacks

With IT security and visibility efforts still largely focused on the application layer, bad actors tend to seek easier ways to exploit system vulnerabilities, moving…

Tracing system vulnerabilities with a hardware bill of materials

A hardware bill of materials with security details of components would complement an SBOM to reveal the security of any electronic product. When you have…

Tackling programmable device security

The increasingly widespread use of FPGAs drives a growing need for securing intellectual property and sensitive data. The large-scale introduction of programmable digital devices has…

Development

Case study: optimizing PPA with RISC-V custom extensions in TWS earbuds

COM-HPC on Micro-ATX supports sustainable and scalable systems

First modular Micro-ATX compliant carrier board with COM-HPC interface now supports OEMs looking to develop designs lasting at least 7 years,

Neuromorphic sensing tech builds on pragmatic approach

Prophesee’s approach to commercializing its retina-inspired event-based sensors, and where the technology will go from here. What does “neuromorphic” mean today? “You will get 10…

Designing a portable system for in situ failure prediction in fuel cells

As PEM fuel cells get used in more transport vehicles like buses, cars, and light rail vehicles, it becomes increasingly important to predict failures using…

Advertisement

Industry

embedded news: AMD-based ECARX digital cockpit, lidar news and more

Supercharging battery technology for electric vehicles

An interview with the CEO of OneD Battery Sciences, which has developed a set of technologies that “supercharge” the amount of energy stored, speed of…

How battery-as-a-service can address key EV industry challenges

Setting up a BaaS framework seems simple and addresses a number of important EV challenges, but there are several issues that must be addressed to…

Volkswagen’s CARIAD and ST partner for next gen car SoC

Cooperation targets new generation of Volkswagen vehicles based on unified and scalable software platform, plus TSMC will manufacture the SoC wafers for ST, and CARIAD gets to secure chip supply for the Volkswagen Group’s cars years in advance.

Trends

embedded news: Arm and CEVA ship record chips, SOMs, and more

Avoid these five basic maintenance automation mistakes

As businesses race to realize the competitive advantages that predictive and prescriptive maintenance brings to their business, they need to avoid these five common implementation…

Protecting industrial control systems needs a proactive approach to firmware security

When we harden one ICS layer, attackers simply shift over to other tactics and targets, and embedded devices like sensors will be a key target in the next shift.

Supercharging battery technology for electric vehicles

An interview with the CEO of OneD Battery Sciences, which has developed a set of technologies that “supercharge” the amount of energy stored, speed of…