Contents

July 30, 2014 - presented by

ICC Media

>> follow us on Twitter
>> Subscribe to this Newsletter

Chips & Components News
Tools & Software News
Boards & Modules News
KNOW-HOW (White Papers, Webinars & more)

SEMA Cloud: ADLINK's device to cloud strategy
This video introduces SEMA Cloud, ADLINK’s device to cloud solution. SEMA Cloud covers all parts of the infrastructure like device software, server infrastructure and end application.

ARM vs. x86: TQ offers both architectures in all performance classes
ARM or x86? It depends on the requirements of the application whether ARM or x86 is better suited. The real overlap is not too much.

Add counterfeit protection with Maxim's DeepCover secure authenticators
DeepCover Secure Authenticators implement advanced physical security to provide low-cost IP protection, clone prevention, and peripheral authentication.

New Sitara processor family brings higher performance with real-time processing
This Webtalk presents TI's new Sitara AM437x processor family which has up to 40 percent more system performance and is suited for applications such as industrial automation and industrial drives and all types of equipment providing a Human Machine Interface.

High Integrity C++ (HIC++) coding standard - for the production of high quality code
Download a copy of the HIC++ coding standard, one of the longest established and most widely adopted coding standards for the C++ language. This major update (V4.0) now covers C++'11 advice and consolidates other current coding best practices.

Achieving high-performance graphics and high energy efficiency for avionics systems
To achieve new levels of graphics performance, designers of avionics systems are increasingly transitioning away from FPGA and DSP platforms in favor of more versatile, higher-performing embedded GPUs. These are optimized to handle high-speed multimedia processing as well as the massive parallel processing.

Protecting your R&D investment with secure authentication
This paper explains the concept of authentication and specifically Maxim's solution in the form of secure authenticators to solve application requirements including intellectual property protection, embedded HW/SW license management, secure soft-feature and status setting, and tamper-proof data storage.

published by ICC Media.