All Insights
-
Dealing with the illusion of security
At the Hot Chips conference in August, a panel of academics stated that a complete redesign of... Read More
-
Speeding up flash-based embedded applications
Flash provides an inexpensive and fast storage medium for MCU-based applications, but when... Read More
-
NASA’s InSight probe makes successful landing
Mars landers and rovers lead to questions about terraforming the Red Planet. Could we do this?... Read More
-
Leveraging FPGAs for deep learning
Mipsology's Zebra Deep Learning inference engine is designed to be fast, painless, and... Read More
-
Exploring the interplay between smart manufacturing and big data
Smart manufacturing builds on the historical conception of manufacturing as a process- and... Read More
-
Tearing into a Zigbee-based LED light
A Zigbee-enhanced LED light bulb yielded plenty of interesting design surprises, but didn't give... Read More
-
Making robot personal assistants ubiquitous
Personal robots have jumped from scifi to reality -- shipping today with more waiting in the... Read More
-
Increasing code flexibility using callbacks
Companies often support different product lines with a core platform, using callbacks to deliver... Read More
-
Why vehicle security may require a different approach
Vehicles are exposed to multiple attack surfaces that can enable hackers to take control of the... Read More
-
Portable software agents: A 'Goldilocks' approach to IoT connectivity
For certain types of projects, portable IoT software agents can provide an important middle-road... Read More
-
How embedded projects run into trouble: Jack’s Top Ten – Number One
In this series of articles I’ve listed the top nine reasons why, in my experience, projects... Read More
-
Avoiding failure with ISO 26262
If an automated vehicle crashes on the road, it may trigger a financial catastrophe not only for... Read More
-
Which electronic calculators do you like?
Do you have any suggestions for electronic calculators and solvers that you would like us to add... Read More
-
How embedded projects run into trouble: Jack’s Top Ten – Number Two
As we close in on the top reason firmware projects get into trouble, this week I’ll cover the... Read More
-
Swirling down the rabbit hole
No matter how much experience one might have, cutting corners on discipline always comes back to... Read More
-
How embedded projects run into trouble: Jack’s Top Ten – Number Three
They say trouble comes in threes, and the number three reason on my list of why projects go... Read More
-
The evolution of embedded devices: Addressing complex design challenges
We expect our devices to be smart, upgradable and accessible over the Internet and security is... Read More
-
How embedded projects run into trouble: Jack’s Top Ten – Number Four
In The Sign of Four we learn that Sherlock Holmes has a cocaine addiction. I have seen number 4... Read More
-
Designing security into the industrial IoT
Design engineers might have to implement security elements into a chip, software, or platform,... Read More
-
Tackling security vulnerabilities of the industrial IoT
Why is the IIoT so vulnerable to cyberattacks? We talked to industrial control systems and... Read More
Please confirm the information below before signing in.
{* #socialRegistrationForm *} {* firstName *} {* lastName *} {* displayName *} {* emailAddress *} {* addressCountry *} {* companyName *} {* ednembJobfunction *} {* jobFunctionOther *} {* ednembIndustry *} {* industryOther *}