Home - Embedded.com

Highlights

Goodbye Sir Clive Sinclair

A tribute to Sir Clive Sinclair, an electronics industry inventor and entrepreneur who was part of an era that created a whole new generation of programmers and gamers.

Thread vs Bluetooth: the VHS vs Betamax of IoT connections?

Two low power radio internet protocols seek dominance in IoT, but is Thread vs Bluetooth looking like a similar battle to VHS vs Betamax in the 1980s?

Redefining firmware security

A review of potentially unaddressed vectors inherent in current platforms and a look at a potential solution for preventing firmware attacks and elevating platform security based on a trusted control/compute unit security processor.

Achieving full MCU partition isolation: Interrupts, debugging and hardware

Achieving full microcontroller (MCU) partition isolation is essential for achieving high security for MCU-based systems. This article wraps up a series on this complex topic…

Arcane, complex vulnerability disclosure programs hinder security

Most product vulnerabilities are now discovered not by the affected vendor, but by outside sources like third-party researchers, and they’re all over the map. Vulnerabilities…

Design

embedded news week: celebrating a visionary, and edge compute

Redefining firmware security

A review of potentially unaddressed vectors inherent in current platforms and a look at a potential solution for preventing firmware attacks and elevating platform security based on a trusted control/compute unit security processor.

ADLINK brings Ampere Altra SoCs to embedded with COM-HPC modules

ADLINK said its new COM-HPC Ampere Altra is world’s first 80-core Arm based COM-HPC module that eliminates power-performance limitations.

ChipDNA PUF security co-processor provides 30x lower power

New PUF technology based cryptographic controller is suitable for securing IoT nodes including medical and wearable devices, as well as long-term deployments in security-critical harsh environments.

Development

Goodbye Sir Clive Sinclair

10 criteria for selecting a code coverage tool

Code coverage is mandatory for safety-critical software development for good reason, but it is also a good method for anyone who wants to improve their…

QuickLogic has new automatic eFPGA creation tool

Based on the OpenFPGA IP generator, Australis tool enables users to generate customized IP for any foundry or process node within days.

Optimizing RTD temperature sensing systems: Wiring configurations

In this second article on resistance temperature detector (RTD) sensing system optimization, we discuss the three RTD wiring configurations and how they impact accuracy. This…

Industry

embedded news week: celebrating a visionary, and edge compute

SOAFEE architecture for embedded edge enables software defined cars

SOAFEE addresses software-defined needs of cars quickly and seamlessly, with a standardized framework enhancing proven cloud-native technologies that work at scale in real-time and with safety required for automotive.

ADLINK brings Ampere Altra SoCs to embedded with COM-HPC modules

ADLINK said its new COM-HPC Ampere Altra is world’s first 80-core Arm based COM-HPC module that eliminates power-performance limitations.

Blending hardware and software for better audio

Optimizing both hardware and software is essential to deliver quality sound systems but the complexity of state of the art audio systems makes implementation difficult….

Trends

embedded news week: celebrating a visionary, and edge compute

Goodbye Sir Clive Sinclair

A tribute to Sir Clive Sinclair, an electronics industry inventor and entrepreneur who was part of an era that created a whole new generation of programmers and gamers.

embedded news week: September kicks off event season

A roundup of some of the embedded news we’ve seen this week, covering products, funding, events and people news.

Arcane, complex vulnerability disclosure programs hinder security

Most product vulnerabilities are now discovered not by the affected vendor, but by outside sources like third-party researchers, and they’re all over the map. Vulnerabilities…

TI: Fundamentals of Embedded