News, Analysis & Features
07/18/16 Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using the flash manufacturer’s secure erase feature—since so many DoD documen...0
04/25/16 Highlights from SPIE Photonics, Accellera’s DVCon and Automotive panels focus on semiconductor's changing role in emerging markets....0
10/29/15 San Francisco, October 28, 2105 – Verizon today announced its global strategy to simplify...0
10/27/15 IDT today announced an agreement to acquire privately held ZMDI for total consideration of $310M in cash....0
09/22/15 GE-IP to be “spun out” to focus on rugged, COTS systems and positioned a notch or two removed from prime contractors....0
07/23/15 Two industry veterans in position to offer informed perspectives on security, scalability,...0
06/15/15 Clock jitter can adversely affect high-speed protocols such as Ethernet, PCI Express and USB...0
06/02/15 The increased connectivity in cars, medical devices and industrial automation has led to a review of safety standards, which developers need to meet....0
Chris A. Ciufo, Editor, Embedded Systems Engineering In this Part 2 of 2, I examine the subject of using...
By Alan Grau, Icon Labs On a daily basis, I have the opportunity to interact with a wide range of companies...
Blog Post: How to build a fully managed and scalable long-range network with low-power nodes / (TI E2E Community)
Connecting low power nodes to the Internet is possible today with a variety of different wireless technologies. Among all of them, the communication in the Sub-1 GHz band has the ability to reach the longest range and is better suited for indoor environments (office, building, home), at an overall lower system cost and...
Connection of PHP and mysql / (Consumerization: BYOD)
Hello DaniWeb Users;I'm not a good coder here please hold on me,My machine is linux ubuntu 14.04 and I install apache2 also the php5.I was trying to create a simple log in page here (no registration thing)So in mysql I just create 3 fields (user_id, username, password)This is my connection ......
Dell's fifth-generation open-source developer laptop isn't just good, it's great....
OVM is "Open" for Business / (Adam Sherer Blog)
Open things are just curiosities until the ecosystem figures out how to turn them into money. Java and Linux are good examples of that. When they first hit the "open" space, they were interesting technical solutions to interoperability (Java) and breaking the proprietary operating system monopoly (Linux). Its...
Recommended Technology Papers
DSP processing heavy lifting traditionally has been done by DSP chips and FPGAs, but these solutions and others created their own power consumption and development programming burdens. DSP Applications to Reap Benefits from Inclusion of AVX in Processors looks at how the inclusion of AVX technology in each core of the Intel 2nd Generation Core i7 processor eliminates the SWaP issues of previous DSP solutions while allowing developers to work within a familiar programming environment.
EECatalog on Facebook
Find Solutions for Your Project
Compatible Architectures: Cavium OCTEON/OCETON-II, Freescale QorIQ, Intel® x86, NetLogic XLR/XLS/XLP, Tilera TilePro64 6WINDGate™ is the Gold Standard in packet processing software
Floodgate Packet Filter is an embedded firewall that allows networked devices to control the packets they process. Floodgate protects against potentially malicious attacks by filtering
Iconfidant SSH & SSL are source code products providing embedded security for VxWorks, Solaris and Linux based systems. Iconfidant allows network equipment vendors to easily add
Wind River Datasheet Directory
Compatible Architectures: Cavium OCTEON/OCETON-II, Freescale QorIQ, Intel® x86, NetLogic XLR/XLS/XLP, Tilera TilePro64 6WINDGate™ is the Gold Standard in packet processing...
by Icon Labs
Floodgate Packet Filter is an embedded firewall that allows networked devices to control the packets they process. Floodgate protects against potentially malicious attacks by...
by Icon Labs
Iconfidant SSH & SSL are source code products providing embedded security for VxWorks, Solaris and Linux based systems. Iconfidant allows network equipment vendors to easily...