Articles

60GHz technology opens door to WiGig® and 5G applications

The 5th generation of mobile networks (or 5G) promise higher data rates and lower latency, and will support a higher…

9 years ago

Simplifying Sub-GHz IoT

The internet reached a major milestone a little over 10 years ago. Around 2004/5, according to Cisco, we reached the…

9 years ago

Taking the Risk Out of SW-Driven Networking SoCs

The massive adoption of software-driven networking (SDN) architectures has been driven by the upsurge of new markets such as cloud…

9 years ago

Next-gen MCUs enable better design techniques, add functionality and use less power

Deck The rise in popularity of portable, battery-powered applications over the years has pushed designers to add more features into…

9 years ago

5G – It’s Not Here Yet, but Closer Than You Think The race to define 5G may be ending, but the process to design and deploy 5G technology is just beginning

It’s all about 5G. No matter where you go who and you’re talking to, 5G is at the center of…

9 years ago

Stack based solutions for image processing at the Edge and Cloud

One of the beauties of image processing is its wide range of end applications from autonomous drones and cars, to…

9 years ago

A Perspective on the Definition of Value in the RF Supply Chain

Whether you’ve been in the RF and microwave world for five years or fifty years, we’ve seen the industry change…

9 years ago

Hardware-based trust provides key to IoT security

As the internet of things (IoT) develops, the issue of security is taking centre stage. The connectivity and protocol standardisation…

9 years ago

New-Tech Europe Magazine | July 2017

New-Tech Europe Magazine | July 2017

9 years ago

THE FUNDAMENTALS OF SECURE BOOT AND SECURE DOWNLOAD: HOW TO PROTECT FIRMWARE AND DATA WITHIN EMBEDDED DEVICES

Abstract: To ensure that the target embedded device runs only authorized firmware or uses only authorized configuration data, we need…

9 years ago