Latest Content

Design articles and white papers on industrial, retail, healthcare, smart city, automotive, surveillance, and communications.

  • Four steps to secure Linux-based systems

    Four steps to secure Linux-based systems

    Today’s connected devices are more vulnerable than ever to security threats, but the intricacies of today’s platforms can make it difficult for de...

    Read Article
  • Use Intelligent Systems for Smart Facility Management

    Use Intelligent Systems for Smart Facility Management

    Smart buildings, briefly defined as those that achieve significant energy savings and comfort-level improvements by taking advantage of improved techn...

    Read Article
  • ×

    Subscribe to our newsletter

    Country
    !
    Subscribed.
    Error - something went wrong!
  • 3 Maker Boards Go Professional

    3 Maker Boards Go Professional

    Boards like the Raspberry Pi are great for makers—but if you want to turn professional, you’ll need another solution. Enter the UP boards, which b...

    Read Article
  • Beyond Bitcoin: How Blockchains Secure the IoT

    Beyond Bitcoin: How Blockchains Secure the IoT

    Blockchains are a powerful way to protect IoT systems, but they are hard to implement within legacy systems. Here’s a look at how SPARKL is seamless...

    Read Article
  • Don't Make LTE Connectivity an Afterthought

    Don't Make LTE Connectivity an Afterthought

    Having a cellular connection to your IoT platform can simplify lots of the required functionality, including bug fixes, upgrades, and so on. But desig...

    Read Article
  • What If Embedded Systems Had Unlimited Storage?

    What If Embedded Systems Had Unlimited Storage?

    High-fidelity data storage at the edge, combined with modern data access APIs, frees architects from classic design constraints to develop more flexib...

    Read Article
  • Engineer in a Box: Deep-Learning AI for IoT Gateways

    Engineer in a Box: Deep-Learning AI for IoT Gateways

    As sensing nodes increase, it doesn’t take long for a trickle of data to become a stream, then a river, and soon a lake. Engineers tasked with manag...

    Read Article
  • Fog Gateways: The Cornerstone of IoT Security

    Fog Gateways: The Cornerstone of IoT Security

    Read White Paper
  • What Burns Power in Medical Wearables?

    What Burns Power in Medical Wearables?

    With the advent of wearables and portables, usability has become a key consideration for medical devices—and that means designers need to pay close...

    Read Article
  • Deploy Fast & Secure IoT Solutions with Insyde Software BlinkBoot and Intel® Firmware Support Package (Intel® FSP)

    Deploy Fast & Secure IoT Solutions with Insyde Software BlinkBoot and Intel® Firmware Support Package (Intel® FSP)

    Read White Paper
  • Cut the Cord with Power over Ethernet (PoE)

    Cut the Cord with Power over Ethernet (PoE)

    Summary: Power over Ethernet (PoE) enables the use of low-power peripherals without having to run new wires. The result is a simplified design install...

    Read Article
  • 7th Generation Intel® Core™ Processors Are All About Video

    7th Generation Intel® Core™ Processors Are All About Video

    The 4k video upgrade in the 7th generation Intel® Core™ processor family is a boon for video surveillance, digital signage, media transcoding, and...

    Read Article
  • 5G Needs Building-Block Hardware, Open-Source Software

    5G Needs Building-Block Hardware, Open-Source Software

    5G is coming down the pike faster than you may realize. Are you ready to support it? If you think it’s a simple upgrade from 4G, think again. Then r...

    Read Article
  • Understanding HPEC Computing in Aerospace and Defense Applications — The 10 Axioms

    Understanding HPEC Computing in Aerospace and Defense Applications — The 10 Axioms

    Read White Paper
  • Understanding Customers with Intelligent Retail Technology

    Understanding Customers with Intelligent Retail Technology

    Retailers want to understand their customers. But customer research can be time-consuming, expensive, and error-prone. Intelligent retail technology c...

    Read Article
  • Digital Signs Add Cameras, Multiply Security Risks

    Digital Signs Add Cameras, Multiply Security Risks

    Designed properly, digital signage can bolster retail sales, thanks to the latest server technology. But reducing or eliminating risks is the key.

    Read Article
  • Three Keys to an IoT Security Strategy

    Three Keys to an IoT Security Strategy

    For IoT applications, attacks are a fact of life. Hackers and bots will inevitably find your system and probe it for weaknesses. While every IoT appli...

    Read Article
  • Radisys and Intel Deliver Agile and Flexible Rack-Scale NFV Infrastructure for Communications Service Providers

    Radisys and Intel Deliver Agile and Flexible Rack-Scale NFV Infrastructure for Communications Service Providers

    Read White Paper
  • Rugged Design Starts with Smart Choices

    Rugged Design Starts with Smart Choices

    Rugged design is all about choosing the right components, chassis, and software.

    Read Article
  • Layer 7 Visibility For Virtual CPE

    Layer 7 Visibility For Virtual CPE

    Read White Paper
  • loading
    Loading More...