Embedded - Home

Highlights

Essential practices for safely shipping sensitive electronics

Businesses shipping electronics should do all they can to prevent loss and damage, so here are eight of the best ways to protect these shipments….

The benefits of IoT security evaluation reuse

Stakeholders must come together to decide on a unified approach to certification, to increase efficiencies and ensure testing and evaluation is accessible. Editor’s Note: Ahead…

5 Steps To Designing An Embedded Software Architecture, Step 2

In this continuation of the article series, we explore the second step to designing an embedded software architecture: identifying and tracing data assets. Designing an…

Programming embedded systems: Functions and the Stack

Have you seen your stack lately? I mean, have you really looked at the stack memory and observed what exactly happens when a function is…

How to quickly evaluate data converters

This article explains how to record a macro and how to use it within Python and MATLAB environments to automate certain evaluation tasks without having…

Design

The benefits of IoT security evaluation reuse

Nvidia DPU brings hardware-based zero trust security

Nvidia’s latest DPU reflects that distributed-computing environments are here to stay —- and that hardware is key in implementing zero-trust security in the data center…

Securing V2X automotive communications

Advanced vehicle-to-everything (V2X) communication systems introduce more surface area for cyberattacks and damage the existing ecosystem, which can lead to serious repercussions. Cybersecurity is becoming…

TinyML-based endpoint devices face unique security threats

As TinyML adoption continues to grow, it’s important to be aware of various attacks that can negatively impact your TinyML development. With endpoint AI (or…

Development

Essential practices for safely shipping sensitive electronics

How to quickly evaluate data converters

This article explains how to record a macro and how to use it within Python and MATLAB environments to automate certain evaluation tasks without having…

Implementing functionally safe RTD systems: RTD design

This first article in a two-part series on implementing functionally safe RTD systems discusses resistance temperature detector (RTD) circuit design and safety certification considerations. In…

Designing a power-saving solenoid driver: Design concepts

The most common approach to drive a solenoid is to apply the required voltage in the solenoid coil but using a current regulated driver to…

Advertisement

Industry

Edge, zonal or central: getting the balance right for ADAS architectures

Radar detection software improves accuracy using less compute power

Teraki’s ML-detection software on Infineon Technologies’ microcontrollers delivers more points per object, leading to less false positives and increased safety compared to other radar processing techniques, such as CFAR.

Solar’s role in EV charging

Solar power may provide the means to offload stress from existing power grid infrastructure as EV adoption steadily grows. The world is experiencing an enormous…

Power supply design for primary cell powered patient monitors

Remote patient monitoring patches help doctors provide better care, but they pose challenges for power supply designers who must balance system performance and battery life…

Trends

Essential practices for safely shipping sensitive electronics

The benefits of IoT security evaluation reuse

Stakeholders must come together to decide on a unified approach to certification, to increase efficiencies and ensure testing and evaluation is accessible. Editor’s Note: Ahead…

Struggles and suggestions with master/slave terminology

Removing the use of Master/Slave terminology across the industry is doable, but I suspect it will take a long time and generate a lot of…

Technical challenges curb expectations for 5G

When reading about 5G, it can appear to be the cure to all of our problems. But the technology may not live up to the…