Infineon
Embedded World 2022 Best in Show Winners: Security - Story
June 17, 2022Winners have been chosen based on a 15-point rubric that considers solutions’ Design Excellence (5 points), Relative Performance (5 points), and Market Impact/Disruption (5 points).
Quantum Computers Are Coming. Beware - Story
June 17, 2022We’ve known for a long time that quantum computers are under development. Such computers may solve fundamental problems in the simulation of chemical reactions at the atomic and molecular levels, targeted design of medications, or innovative materials. But we’ve also known for a long time that such computers have the potential to crack many of the security techniques, especially of conventional cryptography, that are in use today.
Infineon OPTIGA TPM SLB 9672 - Product
June 16, 2022OPTIGA™ TPM SLB 9672 is a standardized, out-of-the-box TPM that provides a solid foundation for securely establishing the identity and software status of PCs, servers, and connected devices, and for protecting the integrity and confidentiality of data at rest and in transit.
Infineon OPTIGA Trust M Express - Product
June 16, 2022OPTIGA™ Trust M Express offers rock-solid security for IoT devices every step of the way from manufacturing through cloud provisioning to field deployment.
Infineon AIROC Cloud Connectivity Manager - Product
June 16, 2022Device cloud connectivity is difficult and time consuming because it requires Wi-Fi, embedded systems, antenna design, cloud configuration and coding experience.
Infineon Adds the AIROC™ CYW20820 Bluetooth® & Bluetooth® LE System on Chip - News
June 14, 2022Infineon Technologies AG is adding the AIROC™ CYW20820 Bluetooth® & Bluetooth® LE (low energy) system on chip (SoC) to its AIROC Bluetooth Portfolio. The AIROC CYW20820 Bluetooth & Bluetooth LE SoC is a Bluetooth 5.2 core spec compliant device for IoT applications.
Embedded World Product Showcase: Infineon Technologies OPTIGA Trust M Express - Story
June 14, 2022Networked devices that connect to the cloud and each other are inherently susceptible to cyberattack. To ensure built-in defenses are robust as possible, these systems must be protected from the time of manufacture until their decommissioning. This includes the unique identities that allow IoT devices to authenticate over PKI infrastructure.