IoT Design Weekly ? 02.14.2019
Iot Design Newsletter

IoT Design Weekly, the industry source for products, news, and technologies supporting Internet of Things developers.


View our archive of past issues of the IoT Design E-newsletter.

IoT Design Weekly ? 02.14.2019

Features

How to Improve Voltage Reference Stability for Better IoT Sensor Accuracy
How to Improve Voltage Reference Stability for Better IoT Sensor Accuracy

Whenever you measure something, you need a reference to measure against. In an electronic system that measures voltage ? whether it?s a general-purpose instrument like a digital multimeter (DMM), a circuit that measures the voltage drop on a resistor to determine current, or a sensor interface that measures the output voltage from a specific type of sensor ? you need a voltage reference to ensure that your measured values are correct.

How Connectivity Solves the Technical Challenges of the Industrial IoT

Sponsor: RTI
Date: February 27, 2019 2:00 p.m. ET

Bring Determinism to V2X Networks with MEMS Timing
Bring Determinism to V2X Networks with MEMS Timing

Autonomous vehicle communications will encompass both the super-critical, like conversations between cars about who?s going where when, and the convenient, like streaming music. All must work reliably to ensure a safe, comfortable ride.

Blogs and Columns

Ingredients for an Industrial SSD
Ingredients for an Industrial SSD

Industrial IoT and Industry 4.0 are far closer than at the verge of the horizon, and they bring with them disruptive changes and a demand for reliable data storage.

Industry 4.0: Making the Most of Legacy Infrastructure Without Compromise
Industry 4.0: Making the Most of Legacy Infrastructure Without Compromise

Industry 4.0, with the IIoT at its heart, is set to become the biggest disruptor in manufacturing since the industrial revolution. According to IDC (International Data Corporation), global IoT spend will top $1.29 trillion in 2020, with manufacturing the single largest segment.

Square Banner Ad
Marketplace

SPONSORED: Heightened Security - Protect IP and Deploy Secure Connected Systems with New ATECC608A CryptoAuthentication Device
SPONSORED: Heightened Security - Protect IP and Deploy Secure Connected Systems with New ATECC608A CryptoAuthentication Device

From remote cyberattacks to the creation of counterfeit products, widespread security threats are affecting industries around the globe. When carried out, these threats can lead to substantial losses in service revenue, escalating recovery costs and, perhaps most significantly, irreparable damage to brand equity. Now more than ever, it is critical to implement robust security into new and existing designs to protect Intellectual Property (IP) and enable trusted authentication of connected devices.

Square Banner Ad
SPONSORED: Advantages to Using TLS 1.3: FASTER, More Efficient, More Secure
SPONSORED: Advantages to Using TLS 1.3: FASTER, More Efficient, More Secure

One significant difference you will notice is the reduced number of round-trips when performing a full handshake. Older versions of the TLS protocol require two complete round-trips before the client sends the application data.

SPONSORED: The Future of Music Is for Everyone?Even the Deaf
SPONSORED: The Future of Music Is for Everyone?Even the Deaf

For Mick Ebeling, CEO of Not Impossible Labs, the fact that the deaf can?t experience music in the same way as the hearing seemed absurd. While "hearing" music does involve the different parts of the ear, there are many other parts of the brain that play into our perception of music. People who are deaf still take in the sounds of music, just in a different format: as vibrations.

Placeholder Image