New White Papers
Solution Provides a Platform for Secure Connections for the Internet of Things Ayla Networks, a leader in end-to-end cloud platforms for the Internet of Things (IoT), today announced
Analog cameras represent over 80 percent of the surveillance and low-cost recorder market, yet analog...
A lock with the key still in it isn’t much of a solution. Sadly, the security in many embedded devices...
The good news is that large amounts of IP go into the design of smart-card chips and RFID tags. The bad...
From the ultra-small 3D transistors described in papers at this month’s International Electron Devices...
Blog Post: Innovation in at the Driver’s Seat – Part I / (TI E2E Community)
C.P. Ravikumar, Texas Instruments The video “TI is driving the future of Automotive technology” is an inspiration to many technophiles. It is amazing to find so many applications of electronics to make driving a safer and a fun experience. The humble car key is likely to be replaced with finger print...
Today my guest is Erik Peterson, principal engineer at Mocana, on the topic of a new vulnerability in the GnuTLS library. Earlier this week, a Red Hat advisory warned that a vulnerability in the GnuTLS library makes it possible for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections...
Android devices found sold complete with malware out of the box / (Consumerization: BYOD)
Android-driven devices, including smartphones and tablets manufactured by the likes of Asus, LG, Motorola and Samsung, are being sold with pre-installed malware according to claims made by the CTO and Founder of Marble Security. David Jevans made the claim following complaints from a potential client that a mobile security...
Yes, GnuTLS has major security holes. So what? Almost no one uses it in ways where it could be vulnerable to fraud....
MLC flash-based SSDs that incorporate wear-leveling and power-protection schemes present superior performance storage for POS applications at a competitive price point.
The demand for faster response time, combined with consumers’ bottomless appetite for storage and higher resolution video, drives the need for faster wired interfaces like 10G USB and Thunderbolt 2.
MicroTCA is a low-cost, open-standard architecture increasingly being adopted in mil-sensor processing, RADAR, network security and other applications utilizing FPGAs.
The highly efficient architecture of FRAM-based MCUs simplify secure system design without compromising data integrity or reliability, all while lowering power consumption. Security
The RTOS of the future will give embedded systems manufacturers a competitive edge in the IoT by helping them bring industry-leading devices to market faster while reducing risks and development and maintenance costs.
A practical industrial wireless system may involve wireless components at the WAN, LAN or PAN level, and components must be selected based on the flow of data and the type of service required.
Business benefits have been constrained by the complexity of producing real-world applications, but this will change once operators and device manufacturers are freed to focus on their value-add.
The machine-to-machine (M2M) phenomenon is accelerating and is coming to just about any connected technology near you. Chris Ciufo, Senior Editor Similar to many
DO-178C makes room for modern programming practices to be adopted by avionics vendors, ushering in greater cost savings and easier-to-manage project schedules.
Inspired by a 2.5-inch disk drive, VITA 73's "MicroATR" box is really tiny...and rugged.
EECatalog on Facebook
Featured Product Briefs
Compatible Architectures: ARM, MIPS, Power, x86 TeamF1’s SecureF1rst CPE Gateway Solution (CGS) is a comprehensive turnkey software package enabling the next-generation of
Compatible Architectures: ARM, MIPS, Power, x86 Compatible Linux and Android OS: Embedded Linux TeamF1’s SecureF1rst Security Gateway Solution is a comprehensive turnkey software
Floodgate Defender provides firewall services to allow embedded devices control over the packets they process. Floodgate Defender protects against potentially malicious attacks by filtering
Supported Architectures: VME, VPX/OpenVPX, CompactPCI, PICMG 2.16, ATCA, AMC, PMC, XMC, CompactPCI, Ethernet, PCI Express, PMC/XMC, VME, VPX Elma’s family of embedded storage
Supported Architectures: VME, VPX/OpenVPX, CompactPCI, PICMG 2.16/VITA 31.1, CompactPCI, Ethernet, PCI Express, PMC/XMC, VME, VPX Elma’s family of Ethernet switches enable the