Embedded Computing Design

E-Letter
FEBRUARY 2018

 
 
 
 
 
 
This edition is sponsored by
 
NoLogo
Embedded World
NoLogo
 
 
 
 
img_185X240
BRANDON LEWIS
 
The release of Amazon FreeRTOS generated considerable excitement in the IoT market. But outside of another victory for free and open-source software, what does this say about the overall direction of software engineering, if anything?
 
 
 
 
 
img_185X240
 
 
ARVIND ANANTHAN, MATHWORKS
 
As each day passes, trends like artificial intelligence (AI), cloud computing, machine learning, and the Internet of Things (IoT) creep a little more into our daily lives. While the public at large may not be fully aware of the implications of these technological developments, industry experts have come to realize the profound impact that such emerging trends will have on dozens of industries, especially regarding medical care.
 
 
 
 
 
img_185X240
KEVIN KILFORD, DATASOUND LABORATORIES LTD
 
In many situations, system assemblers are finding that RS485 networks are unreliable or simply do not work. In a world of plug and play serial digital interfaces the integral sophistication of these long standing digital serial communication interfaces and protocols are commonly underestimated and this can sometimes lead to issues in the field leading to questions relating to the quality and reliability of the systems designed in.
 
 
 
 
 
 
 
JOHN CARBONE, EXPRESS LOGIC
 
Free is a good price, so the saying goes, so free, open source real time operating systems (RTOSs) might seem like a good deal. But they?re typically not worth the risks for developers of embedded and IoT devices such as home automation and wearable devices, medical instruments, and industrial control systems.
 
 
 
 
 
SPONSORED PRODUCT
X-ES
 
Extreme Engineering Solutions (X-ES)
 
Extreme Engineering Solutions? XPedite6370 is an NXP QorIQ LS2088A-Based 3U VPX-REDI Single Board Computer (SBC) with Eight ARM? Cortex?-A72 Cores
 
SPONSORED PRODUCT
Annapolis Micro Systems, Inc.
 
Annapolis Micro Systems, Inc.
 
8 & 16 TB OpenVPX Data Storage Solution
 
 
 
 
 
img_185X240
BRANDON LEWIS
 
AI and machine learning applications represent the next big market opportunity for embedded processors. However, conventional processing solutions were not designed to compute the neural network workloads that power many of these applications, necessitating new architectures that can meet the growing demand for intelligence at the edge.
 
 
 
 
 
img_185X240
 
 
SETH DELAND, MATHWORKS
 
Companies are looking for data scientists who have computer science skills, knowledge of statistics, and domain expertise relevant to their specific business problems. These types of candidates are proving elusive, but companies may find success by focusing on the latter.
 
 
 
 
 
 
MARK PITCHFORD, LDRA
 
The development cycle for traditional security markets is a largely reactive one, where coding is developed mostly on an informal agile basis, with no risk mitigation and no coding guidelines. The resulting executables are then subjected to performance, penetration, load, and functional tests to attempt to find the vulnerabilities that almost certainly result. The hope, rather than the expectation, is that all issues will be found and the holes adequately plugged.
 
 
 
 
 
img_185X240
TROY DAVIS, ENOCEAN
 
For developers, energy harvesting wireless sensors are of special interest as they offer flexible radio communication while eliminating the need for maintenance. Such sensors have seen a dramatic rise in interest, as they?re a reliable, easy to install technology that delivers the essential input data on which the whole IoT model depends.
 
 
 
 
 
img_185X240
 
 
MICHAEL BARR, BARR GROUP
 
A longitudinal study of survey data spanning almost a decade and a half shows that C remains the primary programming language of embedded software. In that time, C has actually gained market share from 50 percent to about 70 percent ? at the expense of assembly, C++, and Java.
 
 
 
 
 
img_185X240
AARON ALLSBROOK, CLEARBLADE
 
IoT and AI are both technologies trending rapidly in the industry today. Both represent huge transitions into capabilities that only a few years ago existed as science-fiction. While both stand alone, their value is multiplied when combined.
 
 
 
 
 
img_185X240
 
 
MICROCHIP TECHNOLOGY, INC.
 
Microchip is aggressively protecting its clients from the recently discovered vulnerabilities of Wi-Fi? Protected Access II (WPA2). Nearly all Wi-Fi devices in the world use WPA2 security in which a security vulnerability to a Key Reinstallation Attack (nicknamed ?KRACK?) was discovered in recent months. Since these critical security vulnerabilities appear in the standard definition, virtually all devices using WPA2 are affected.
 
 
 
 
 
Webcast
 
Security is Paramount in Medical
 

Sponsored by: LDRA, Wittenstein
Date: April 10, 2018 2:00 p.m. EDT
Register Now

 
For additional Webcasts, check out the Broadcast Archive.
 
 
 
Facebook
 
Twitter
 
Linkedin