Latest In Depth Technology News

New Electronics brings you a selection of in depth Technology Articles, covering key issues and innovations within research & development, embedded design, power, communications design, test & measurement, programmable logic, system design and more.

Which protocols will succeed in the IIoT?

The Industrial Internet of Things (IIoT) promises to support a new era of smart industry. Founded on the notions of openness and interoperability, easy scalability and ‘Big Data’, it can help enterprises drive significant operational improvements across their various manufacturing and business processes.

Enabling the adaptable world

The intelligent connected world needs adaptable accelerated computing. As a result, more engineers are turning to FPGA as a Service providers via the cloud.

EMC basics and practical PCB design tips

Though often used as synonyms, Electromagnetic Compatibility (EMC) is really the controlling of radiated and conducted Electromagnetic Interference (EMI); and poor EMC is one of the main reasons for PCB re-designs. Indeed, an estimated 50% of first-run boards fail because they either emit unwanted EM and/or are susceptible to it.

Bringing on bioelectronics

As part of the UK’s Healthcare Technologies strategy, the Engineering and Physical Sciences Research Council launched a competition in 2016 to identify promising research projects addressing challenging issues. Among the eight winners, announced in 2017, were Dr Rylie Green of Imperial College London and Dr Frankie Rawson of the University of Nottingham. Dr Green’s efforts centre on implantable polymer bioelectronics for devices such as bionic eyes and cochlear implants. Her aim is to create a soft and flexible conducting polymer.

Bluetooth turns 20

In January 2018, the Bluetooth Special Interest Group (SIG) celebrated its 20th anniversary. Formed in 1998, the group was started with just a handful of companies who were looking to replace wire for mobile voice and data. Today, membership stands at more than 33,000 companies.

How do digital signatures and certificates provide protection for embedded systems?

When designing for security, the operating environment needs to determine the degree of robustness required. A security architecture must include not only the target device, but all endpoints and users within the overall system. While there are serial numbers, MAC addresses, white lists, and black lists - these designs are not foolproof. Most embedded hacks are accomplished by monitoring network traffic to reverse engineer commands, then replaying the same or modified version from somewhere else.

The best way to generate a negative voltage for your system

Modern active components, such as A/D and D/A converters and operational amplifiers, typically don’t require a negative supply voltage. Op amps in particular are available with rail-to-rail inputs and outputs, and in most cases, input and output voltage can swing to close enough to GND.

Subscribe to our Newsletter

Most popular