Wireless networks provide hackers avenue of attack

Easy Math That Explains Why Accurate IoT Current Measurement is Hard

by Keysight Technologies


The never-ending drive to increase IoT battery life is great for customers, but it poses extraordinary challenges for design engineers. As sleep mode currents edge ever-closer to zero, the challenge of making measurements across a wide dynamic range becomes increasingly difficult.


Read More...

Image Title

Two Radio Signals, One Chip, Open a New World for Wireless Communication

by Cornell University


Cornell engineers have devised a method for transmitting and receiving radio signals on a single chip, which could ultimately help change the way wireless communication is done. Separating the send and receive bands is difficult enough, but the problem is compounded by the ever-increasing number of bands in the latest devices, which handle everything wireless technology has to offer. From GPS to Bluetooth to Wi-Fi, each band requires a filter to stop the strong transmit signals from drowning out reception.

Read More...

IoT Dev Con

Featured Product

Jade™ 4-Channel 200 MHz A/D with DDC, Kintex UltraScale FPGA
  • Complete radar and software radio interface solution

  • Supports Xilinx Kintex UltraScale FPGAs

  • Four 200 MHz 16-bit A/Ds

  • Four multiband DDCs (digital downconverters)

  • Optional 5 GB of DDR4 SDRAM

  • Sample clock synchronization to an external system reference

  • LVPECL clock/sync bus for multimodule synchronization

  • PCI Express (Gen. 1, 2 & 3) interface up to x8

  • VITA 42.0 XMC compatible with switched fabric interfaces


Learn More...

Jade™ 4-Channel 200 MHz A/D with DDC, Kintex UltraScale FPGA
Image Title

Digi XBee Developer Competition

Submit your application before May 1, 2017


Win a FREE Digi XBee Developer Kit

Digi is looking for GREAT applications for the Digi XBee embedded modem and we reward great ideas. Announcing the Digi XBee Developer Competition -- giving engineering organizations the opportunity to win an empowering Digi XBee Developer Kit.

Submit your “best use” concept and we will choose ten (10) winners to receive a FREE Digi XBee Development Kit. Winners may choose from three different kits:

  1. Digi XBee Cellular LTE Cat 1 Development Kit
  2. Digi XBee ZigBee Cloud Kit
  3. Digi XBee ZigBee Mesh Kit

Applications must be submitted by May 1, 2017.  Ten winners will be selected by a panel of RTC Magazine Editors and Digi application engineers. Winners will be announced May 15, 2017

Winners will be selected based on the following criteria:

  1. The commercial viability of the application
  2. The Digi XBee contribution to the application
  3. Most creative use of Digi XBee products
Enter Now
Technical Resources

Managing Windows 10 IoT Devices

Microsoft
 

Digital transformation starts with creating your Internet of Things by building on the infrastructure you already have in place, using familiar devices and services in new ways, and incorporating the right technology. 

To be successful in your digital transformation, your business must choose a platform designed for the key attributes of intelligent devices. Intelligent devices must possess natural and intuitive user interfaces to enable ease of interaction for the users. They must have robust security with the systems they connect to and strong protection of the data stored on the device and the data transmitted to and from the device. In order to be able to communicate with a multitude of other devices effectively, an intelligent device must also be interoperable and service-enabled. And it has to be easy to deploy and manage without extra burden.

Download the Whitepaper

Windows 10 IoT Core Azure Connectivity and Security

Microsoft


Connecting devices and services raises an important question: Can I trust that the information comes from the right source and can only be read by the intended recipient? It is essential that the identity of the receiving device or service is trusted even if the data sent is not confidential. For example, if a process decision depends on data from a temperature sensor, then security measures must ensure the cloud service only accepts information from the trusted sensor and that the sensor has not been compromised. In some cases, malicious attackers may spoof the identity of devices like the temperature sensor. Thus, security measures must work to prevent the cloud service from receiving data from a stolen identity.

Download the Whitepaper