News, Analysis & Features
02/20/15 Imagine walking up to a vending machine and having multiple screens wake up and present to you product information or videos that you actually want to see. Suppose the machine show...0
02/12/15 A heads up on some of the changes in a new modular operating system environment. Wind River...0
02/12/15 With 30 billion connected devices expected within five years and spanning automotive, consumer,...0
02/12/15 Low-power designs that also stand guard against passive, semi-invasive and invasive attacks...0
11/17/14 Security Advice from the US Department of Justice: Include “Back Doors” to enable Monitoring. How smart is this? By Alan Grau, Icon Labs In a recent statement issued by the U...0
11/12/14 Not just for plants, cross-pollination applies to know-how, too, and there may be no better example than what’s taking place among the mil-aero, medical, industrial and other markets as they seek to take on the complexities of security and safety for multicore systems....0
11/10/14 Coming to a meeting of minds on security, independent portability and virtualization will pave the way for IoT success....0
10/09/14 Two 32bit processor IPs have been released by Cortus, the company’s second generation of processor IP that takes a minimalist approach to the ‘third wave’ of applications. Caroline Hayes spoke to Roddy Urqhart, Vice President Sales & Marketing, Cortus....0
Kontron to demonstrate carrier grade NFV/SDN-enabled Application on the Symkloud Platform at Intel Developer Forum 09/10/14
New Artesyn Embedded Technologies Server Blade Optimized for Network Function Virtualization and Deep Packet Inspection Applications 09/10/14
North American Semiconductor Equipment Industry Posts March 2014 Book-to-Bill Ratio of 1.06 05/01/14
Global Chip Revenue Rises in 2013, Reversing Loss from Earlier Year; Memory and Wireless Lead the Way 05/01/14
The Embedded Software Store Expands Its Site in Support of CPU Architectures Beyond the ARM Architecture 04/21/14
Imagine walking up to a vending machine and having multiple screens wake up and present to you product...
Security Advice from the US Department of Justice: Include “Back Doors” to enable Monitoring. How...
While the main manufacturing flows are still focusing on optical lithography, eBeam and EUV are still...
Blogging has been something that slipped off my radar for the past year. Here’s a reboot to see if...
Red Hat Linux still isn't available on Microsoft's Azure cloud, but VMware's hypervisor should be there soon....
Linus Torvalds has decided to move the Linux kernel release from 3.19.x to 4.0 more from whimsy then from a serious need....
Blog Post: Exploring the MSP430 tool chain: Part 3 – Programming with the MSP430 Bootstrap Loader (BSL) / (TI E2E Community)
This is the third entry of a five-part series to help you learn more about our robust MSP430 MCU tool chain. Don’t miss Parts 1 and 2 on this blog from past weeks, because this week we focus on MSP430 target boards. The MSP430™ Bootstrap Loader (BSL) is a program built into each MSP430 microcontroller for the purpose...
(Original post by Leslie Hawthorn, CC-BY) And you should be, too. Full disclosure: I sit on the Board of the Open Source Initiative and am running for reelection in 2015. My board seat is a volunteer position and I receive no financial compensation for this work. For the first time ever, the Open Source Initiative (OSI)...
Recommended Technology Papers
DSP processing heavy lifting traditionally has been done by DSP chips and FPGAs, but these solutions and others created their own power consumption and development programming burdens. DSP Applications to Reap Benefits from Inclusion of AVX in Processors looks at how the inclusion of AVX technology in each core of the Intel 2nd Generation Core i7 processor eliminates the SWaP issues of previous DSP solutions while allowing developers to work within a familiar programming environment.
EECatalog on Facebook
Find Solutions for Your Project
Iconfidant SSH & SSL are source code products providing embedded security for VxWorks, Solaris and Linux based systems. Iconfidant allows network equipment vendors to easily add
Floodgate Packet Filter is an embedded firewall that allows networked devices to control the packets they process. Floodgate protects against potentially malicious attacks by filtering
Compatible Architectures: Cavium OCTEON/OCETON-II, Freescale QorIQ, Intel® x86, NetLogic XLR/XLS/XLP, Tilera TilePro64 6WINDGate™ is the Gold Standard in packet processing software
Wind River Datasheet Directory
Compatible Architectures: Cavium OCTEON/OCETON-II, Freescale QorIQ, Intel® x86, NetLogic XLR/XLS/XLP, Tilera TilePro64 6WINDGate™ is the Gold Standard in packet process
by Icon Labs
Floodgate Packet Filter is an embedded firewall that allows networked devices to control the packets they process. Floodgate protects against potentially malicious attacks by
by Icon Labs
Iconfidant SSH & SSL are source code products providing embedded security for VxWorks, Solaris and Linux based systems. Iconfidant allows network equipment vendors to eas