Contents

Aug 27, 2014 - presented by

ICC Media

>> follow us on Twitter
>> Subscribe to this Newsletter

Chips & Components News
Tools & Software News

Boards & Modules News
Know-how (White Papers, Webinars & more) 

Intelligent PLCs expand the Internet of Things
The emerging Internet of Things is creating new opportunities to optimize factory operations. The challenge is finding a way to transform isolated, fixed function equipment into a network of intelligent machines.

Innovation in high speed data converters and demystifying of high speed JESD interconnect
Increasing processing speed whilst ensuring desired precision is a challenge often faced by design engineers. This webinar will discuss such and many other issues in designing critical applications. The session will also explain the working of the JESD204B high speed SERDES link designed for high speed converters.

Protecting your R&D investment with SHA-256 authentication
During this webinar, participants will receive an overview of the Challenge-Response Authentication protocol and demonstrations on “How to set up an authentication system in four easy steps” and “How to integrate authentication into a new or existing design”.

How software development processes can ensure better security for companies
Dave Hughes discusses the implications for embedded engineering companies of the recent high profile SSL/TLS security problems.

ARM vs. X86 – Embedded Systems -an Interview with Vincenzo Difronzo, PSM at Advantech
Well known in the embedded market for its x86 solutions and wide range of products, Advantech already received a great feedback from the market for the Intel BayTrail solutions which are specifically developed for the IoT market.

EMA Cloud: ADLINK's device to cloud strategy
This video introduces SEMA Cloud, ADLINK’s device to cloud solution. SEMA Cloud covers all parts of the infrastructure like device software, server infrastructure and end application.

ARM vs. x86: TQ offers both architectures in all performance classes
ARM or x86? It depends on the requirements of the application whether ARM or x86 is better suited. The real overlap is not too much.

Add counterfeit protection with Maxim's DeepCover secure authenticators
DeepCover Secure Authenticators implement advanced physical security to provide low-cost IP protection, clone prevention, and peripheral authentication.

published by ICC Media.