News, Analysis & Features
07/18/16 Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documen...0
04/25/16 Highlights from SPIE Photonics, Accellera’s DVCon and Automotive panels focus on semiconductor's changing role in emerging markets....0
10/29/15 San Francisco, October 28, 2105 – Verizon today announced its global strategy to simplify...0
10/27/15 IDT today announced an agreement to acquire privately held ZMDI for total consideration of $310M in cash....0
09/22/15 GE-IP to be “spun out” to focus on rugged, COTS systems and positioned a notch or two removed from prime contractors....0
07/23/15 Two industry veterans in position to offer informed perspectives on security, scalability,...0
06/15/15 Clock jitter can adversely affect high-speed protocols such as Ethernet, PCI Express and USB...0
06/02/15 The increased connectivity in cars, medical devices and industrial automation has led to a review of safety standards, which developers need to meet....0
Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using...
By Alan Grau, Icon Labs On a daily basis, I have the opportunity to interact with a wide range of companies...
What is the best way to check whether integer store only 2 byte data. / (Consumerization: BYOD)
Hi,I need to make sure my integer variable doesn't store more than 2 bytes. Usually i am writing programme on Linux machine where integer size is 4 byte. Each byte can take the values 0 through 255 (=2^8-1). So, two bytes can take the values 255*255=65535, so would it be ......
Wim Coekaerts, corporate VP of Microsoft Enterprise Open Source Group, came to LinuxCon preaching enable, integrate, release, and contribute instead of embrace, extend, and extinguish....
Out of the Trash and into the Class: Building a STEM Program by Re-Building Computers. / (Open Source Initiative blogs)
While many agree on the importance of extending resources to support Science, Technology, Engineering and Math (STEM) curricula within K12 education, there isn't always alignment on the best tools or techniques to, as the US Department of Education explains, equip students with the “knowledge and skills to solve tough...
System Realization Alliance -- An Industry Collaboration / (Steven Brown's Blog)
System Realization is a very broad topic. It encompasses all aspects of system design, from chips to chassis. In particular, innovations in software are driving changes in the value chain, as highlighted in the EDA360 industry vision document . In order to foster industry innovation and ease customer adoption challenges,...
Recommended Technology Papers
DSP processing heavy lifting traditionally has been done by DSP chips and FPGAs, but these solutions and others created their own power consumption and development programming burdens. DSP Applications to Reap Benefits from Inclusion of AVX in Processors looks at how the inclusion of AVX technology in each core of the Intel 2nd Generation Core i7 processor eliminates the SWaP issues of previous DSP solutions while allowing developers to work within a familiar programming environment.
EECatalog on Facebook
Find Solutions for Your Project
Compatible Architectures: Cavium OCTEON/OCETON-II, Freescale QorIQ, Intel® x86, NetLogic XLR/XLS/XLP, Tilera TilePro64 6WINDGate™ is the Gold Standard in packet processing software
Floodgate Packet Filter is an embedded firewall that allows networked devices to control the packets they process. Floodgate protects against potentially malicious attacks by filtering
Iconfidant SSH & SSL are source code products providing embedded security for VxWorks, Solaris and Linux based systems. Iconfidant allows network equipment vendors to easily add
Wind River Datasheet Directory
Compatible Architectures: Cavium OCTEON/OCETON-II, Freescale QorIQ, Intel® x86, NetLogic XLR/XLS/XLP, Tilera TilePro64 6WINDGate™ is the Gold Standard in packet processing...
by Icon Labs
Floodgate Packet Filter is an embedded firewall that allows networked devices to control the packets they process. Floodgate protects against potentially malicious attacks by...
by Icon Labs
Iconfidant SSH & SSL are source code products providing embedded security for VxWorks, Solaris and Linux based systems. Iconfidant allows network equipment vendors to easily...