Contents

Aug 20, 2014 - presented by

ICC Media

>> follow us on Twitter
>> Subscribe to this Newsletter

Chips & Components News
Tools & Software News
Boards & Modules News
KNOW-HOW (White Papers, Webinars & more)

Intelligent PLCs expand the Internet of Things
The emerging Internet of Things is creating new opportunities to optimize factory operations. The challenge is finding a way to transform isolated, fixed function equipment into a network of intelligent machines.

Protecting your R&D investment with SHA-256 authentication
During this webinar, participants will receive an overview of the Challenge-Response Authentication protocol and demonstrations on “How to set up an authentication system in four easy steps” and “How to integrate authentication into a new or existing design”.

Quantifying the cost of fixing vs preventing bugs 
This white paper helps you to quantify the cost savings bug prevention offers your organization, using formulas inspired by the book "How Google Tests Software".

How software development processes can ensure better security for companies
Dave Hughes discusses the implications for embedded engineering companies of the recent high profile SSL/TLS security problems.

ARM vs. X86 – Embedded Systems -an Interview with Vincenzo Difronzo, PSM at Advantech
Well known in the embedded market for its x86 solutions and wide range of products, Advantech already received a great feedback from the market for the Intel BayTrail solutions which are specifically developed for the IoT market.

EMA Cloud: ADLINK's device to cloud strategy
This video introduces SEMA Cloud, ADLINK’s device to cloud solution. SEMA Cloud covers all parts of the infrastructure like device software, server infrastructure and end application.

ARM vs. x86: TQ offers both architectures in all performance classes
ARM or x86? It depends on the requirements of the application whether ARM or x86 is better suited. The real overlap is not too much.

Add counterfeit protection with Maxim's DeepCover secure authenticators
DeepCover Secure Authenticators implement advanced physical security to provide low-cost IP protection, clone prevention, and peripheral authentication.

published by ICC Media.