This edition is sponsored by
Design Articles
Secure firmware update considerations for ultra-low power MCUs

Bhargavi Nisarga, Texas Instruments and Luis Reynoso, Texas Instruments

In-field firmware updates are an increasingly popular feature in microcontroller-based (MCU-based) applications. These updates enable new firmware images to be downloaded onto a device’s memory, providing an effective way for product manufacturers to offer services and support to products that are already deployed in the field. The Internet of Things (IoT) era is driving increased connectivity in the embedded world, making this one of the most crucial features for today’s connected products, so long…

Continue Reading
Design Articles
Specifying switches for hazardous environments

Leslie Neill, Honeywell

In specifying switches as part of a wider device or system, design engineers have much to consider. Such choices are important regardless of the targeted use, but in hazardous environments, choosing the right switch becomes critical and can, quite literally, mean the difference between life and death. Explosions can occur to varying degrees of enormity: [...]

Continue Reading
Sponsored Product

WIN Enterprises

WIN Enterprises' PL-80630
View Product
Sponsored Product

Annapolis Micro Systems, Inc.

8 & 16TB OpenVPX Data Storage Solution
View Product
Sponsored Product

Extreme Engineering Solutions

Extreme Engineering Solutions' XPedite7676 is an Intel® Xeon® D Processor-Based 3U VPX-REDI SBC with Dual 10GbE and SecureCOTS™ and Xilinx Kintex® Ultrascale™ FPGA
View Product
Design Articles
Securing the edge with ARM TrustZone for v8-M

Abhijeet Rane, Sequitur Labs

ARM’s new 32-bit ARMv8-M architecture was introduced in 2015, adding TrustZone security extensions for Cortex-M microcontrollers (MCUs), among other features. As v8-M-based silicon comes to market, it’s essential that developers understand the architecture, the new capabilities it offers, and how to implement it in the design of connected edge devices that form the foundation of secure end-to-end systems.

Continue Reading
Design Articles
The IoT doesn't need PoCs

David Smith, MultiTech Systems

I have heard complaints from several Internet of Things (IoT) sales and business leaders about how proofs-of-concept (PoCs) are slowing them down. In some cases, they are just frustrated with how often they are told, “We need to do a PoC,” by a development team in response to a request to begin a new product [...]

Continue Reading
Sponsored Product

MEN Micro Inc

MEN Micro now offers the G25A, a high-performance multicore CPU platform based on Intel’s Xeon D-1500 System-on-a-Chip (SoC).
View Product
Sponsored Product

Intel Embedded Innovator

Intel Embedded Innovator
View Product
Sponsored Product

ACCES I/O Products

mPCIe-COM Series: 6 New PCI Express Mini Card, Multi-Port, Multi-Protocol, RS-232/422/485 Serial Communication Modules from ACCES I/O Products
View Product
Sister Publication Article
Rise of the logistics robots

David Lippincott Chassis Plans

Robot control systems have progressed from simple relay logic to highly sophisticated dedicated controllers. Current system algorithms for the more capable autonomous robots require the latest processor capability and often require custom computer system design. With the improved computational capabilities come additional robot capabilities, including completely autonomous operation in complex, dynamic environments.

Continue Reading
Design Articles
Z-Wave opens up as smart home connectivity battle closes in

Brandon Lewis, Technology Editor

As Internet of Things (IoT) concepts took hold and started to become realities a few years back, one of the first challenges realized was interoperability between wireless protocols. Different vertical markets and applications often employ different protocols tailored to the specific use case. Some of these protocols have been standardized; others have not. In all, the result has been extreme market fragmentation around wireless connectivity, as well as a great deal of confusion in…

Continue Reading
Design Articles
What’s new with the mbed OS?

Brandon Lewis, Technology Editor

The past 12 months for semiconductor IP firm ARM have been big. Really big. Let’s take a look at some of the highlights: The ARMv8-M architecture was introduced last November, bringing TrustZone-based hardware security to Cortex-M-class embedded and Internet of Things (IoT) devices This July, the company agreed to an acquisition by Japanese telco giant [...]

Continue Reading
Design Articles
Software forensics lay MS-DOS, CP/M controversy to rest

Brandon Lewis, Technology Editor

It’s often the case that success breeds controversy, particularly in the technology industry and especially with regards to software. Given the amount of code sharing and reuse that has occurred in since the beginnings of the tech industry itself, it’s not uncommon anymore to hear about legal actions being taken around copyright infringement or licensing issues.

Continue Reading
Design Articles
Building trust in a model-based automatic code generator

S. Tucker Taft AdaCore

How do you go about building trust in an automatic code generator used for safety-critical systems? For example, given a code generator that takes a real-time model for a flight control system represented in Simulink and Stateflow and turns it into MISRA C or the SPARK subset of Ada, what process could ensure that the [...]

Continue Reading
Sponsored Product

Innovative Integration

Combines an Zynq Z7045 SoC with FMC IO module in a compact, stand alone design -- download pricing & datasheets now!
View Product
Sponsored Product

Advantech

IIoT Provides Valuable Data to Feed a Subscription Service
View Product
Sponsored Product

American Portwell

High-performance Fan-less Embedded System with 6th Gen Intel Core
View Product
White Paper

Dell

Download white paper: Delivering an Efficient Internet of Things
Download PDF
SECTION: Upcoming E-Casts.  An E-cast is a live webcast that may have a single or multiple vendors. E-cast events are used to educate audiences about a problem/solution, from the vendor's perspective. The presentation is typically 45 minutes in duration with a 15-minute moderated Q&A session.
SYNOPSIS: A one-hour, live, moderated problem/solution technical webcast.
Using default time zone: America/New_York
Sponsored by: LDRA, Rogue Wave Software, Wind River, WinSystems
September 21st
2
pm  EDT
Registration: OPEN
For additional E-casts, check out the Broadcast Archive.

Click here to view this email as an HTML page.
Last updated: Mon, 11 Sep 2017 08:19:43 +0000



©2017 OpenSystems Media, LLC.
Thank you for reading this issue of E-Letter,
subject: "".

Please add subscriptions@news.embeddedcomputing.com to your address book to help ensure our emails reach your inbox.