CryptoAuthentication™ device and managed LoRa join servers enable developers to deploy secure connected applications on LoRaWAN™ networks and to decrease device identity corruption with trusted authentication on connection to a network
For me, one of the most difficult components in embedded graphics designs is memory for frame buffers. This memory should be large, high speed and cheap. Unfortunately, compromises often need to be made in order to incorporate memory into embedded graphics designs. At best, these compromises turn into expensive nuisances that drive up cost and eat away at profitability. And worse case, it can cause the need to outsource the design or hire and train new talent in order to complete the design successfully. This article will discuss the considerations that can come with incorporating the high-density, high-performance memory required in embedded graphics applications using microcontrollers (MCUs) and how to minimize, and even eliminate, the potential impact of them.
Plug & Trust: The fast and easy way to deploy secure IoT connections
This ready-to-use solution provides a root of trust at the IC level and delivers proven, chip-to-cloud security right out of the box, so you can connect to IoT clouds and services, including AWS, IBM Watson IoT Platform and Google Cloud IoT Core, without writing security code or exposing keys.
Great initiative of Hungarian companies of world brands leading the international electronics industry: Robert Bosch Ltd., Texas Instruments Hungary Ltd. and Würth Elektronik Hungary Ltd. to develope the cooperation between industry and university youth.