Tuesday 11/10


Every year, surveys and polls reveal that embedded and IoT engineers are struggling to take advantage of technologies that could dramatically improve the security posture of their systems. The reasons cited include technical complexity, short time to market windows, and increased cost. In this episode of Embedded Toolbox, Shawn Prestridge, Global Field Applications Engineering Manager at IAR Systems, demonstrates how you can configure C-Trust in a matter of minutes to protect your application IP.

Watch Now


Combined, the companies plan to drive deployment of proven Industrial IoT first-to-market innovations in low power, wireless access and broadband, low-latency communication technologies, machine protocols, integrated sensors, and mobile applications to further scale the deployment of smart assets, durables and industrial consumables.
Read more


The Universal Broadband FR4 LTE/LPWA Antenna from Ethertronics, an AVX Group Company, is a surface-mount (SMT), internal (onboard) antenna that supports the 617 to 960 MHz, 863 to 928 MHz, 1710 to 2200 MHz, and 2500 to 2700 MHz frequency bands.

Read More

ECD-Product-of-the-Week-Badge copy.jpg

Real-Time Innovations (RTI) announced the availability of the Connext 6 ROS Middleware Wrapper (RMW) Layer, designed to bring the RTI Connext 6 to the latest release of the Robot Operating System (ROS 2).
Read more


The AR solution displays situational key information like ADAS alerts, navigational hints, point of interests (POIs), or pedestrian detection directly onto the road by augmenting the real world with computer-generated visual graphics.
Read more


How well do you understand the secure boot process?

If the answer is, "not well," tune into this episode of Embedded Toolbox, where IAR Systems? Global FAE Manager Shawn Prestridge shows how to spin up a secure boot manager on an NXP LPC5500 series development board with Arm TrustZone. Using a configuration wizard in the C-Trust extension of IAR?s Embedded Workbench IDE, Shawn keeps the native programming environment and development cycle intact while laying out the foundation for a secure end-to-end system.

Watch Now



View the latest
Embedded Products  |  Embedded News