Design
Achieving full MCU partition isolation: Fundamentals
There is very little a hacker can do from inside of a partition that is fully isolated from the rest of the system. Achieving full…
Software supply chain remains vulnerable
The SolarWinds megahack underscores what security mavens have been warning about for years: The software supply chain is complex, vulnerable, somewhat invisible and insufficiently protected….
Multi-access edge computing standards combine to offset security threats
End-to-end Multi-access Edge Computing (MEC) security requires consideration of the impact on the elements coming from all stakeholders involved in the system and all available…
Development
How to generate a Bode plot with LTspice
For the development of dynamic systems in electrical engineering, control engineering, and even mechatronics, engineers must know the system’s frequency response, represented by the Bode…
LTE Cat-M1 IoT module connects directly to global cellular networks
New Renesas cellular IoT module uses Sequans hardware to support LTE Cat-M1 and enable direct connection to existing global mobile network infrastructure.
How to build better UX for IoT devices
Smartphones have created an interesting challenge for internet of things (IoT) development teams as consumers, industrial workers, medical professionals, and more desire a sophisticated mobile…
Hardware
How the IoT is shaping asset management solutions
Software
Software supply chain remains vulnerable
Industry
Minimizing device standby power
With IoT, connectivity becomes increasingly important as it allows maintaining proper communication and, as a result, standby consumption is turning into a real challenge. Smartphones…
Who are the key players in automotive cybersecurity?
This is the second in a series on automotive cybersecurity, providing perspectives on key cybersecurity developers and some perspectives on OEM and Tier 1 activities,…
Efforts target multiple automotive cybersecurity threats
The good news is that there is a growing number of automotive cybersecurity activities to secure in-vehicle hardware and software and cloud platforms. The automotive…
Trends
SLAM without a PhD
Industry leaders including Microsoft, Google and Facebook have all integrated Simultaneous Localization and Mapping (SLAM) technology into their AR/VR headsets using low power, embedded processors, so why can’t robot developers do the same?
Multi-access edge computing standards combine to offset security threats
End-to-end Multi-access Edge Computing (MEC) security requires consideration of the impact on the elements coming from all stakeholders involved in the system and all available…
Enabling telemetry for custom models in Intel DevCloud for the Edge
While edge computing has seen an exponential growth in the last few years, developers are experiencing issues in implementing AI and edge software solutions. Here’s…

Almost Done
Please confirm the information below before signing in.
{* #socialRegistrationForm *} {* firstName *} {* lastName *} {* displayName *} {* emailAddress *} By clicking "Sign In", you confirm that you accept our terms of service and have read and understand privacy policy.