person_outline
Social Media

search

Security

Mesh Networking Module from Silicon Labs Simplifies Thread and ZigBee Connectivity

Silicon Labs (NASDAQ: SLAB) has introduced a new family of Wireless Gecko modules focused on mesh networking applications with support for best-in-class ZigBee® and Thread software. Silicon Labs’ new MGM111 module is the first in this comprehensive family of multiprotocol modules based on the Mighty Gecko system-on-chip (SoC) device. The MGM111 module is supported by Silicon Labs’ reliable, secure and flexible mesh protocol stacks and the industry’s most advanced wireless software development tools. The module’s combination of onboard stacks, antenna options and RF regulatory certifications helps developers reduce cost, complexity and time to market for an array of mesh networking applications including home and building automation, connected lighting, smart metering, security systems and other IoT platforms.

Microchip Releases Industry’s First End-to-End Security Solution for IoT Devices Connected to Amazon Web Services’ Cloud

Microchip’s Pre-Configured ECC508 is the Simplest Way to Create Secure Mutually Authenticated IoT Connections with AWS

Microchip Technology Inc. (NASDAQ: MCHP), a leading provider of microcontroller, mixed-signal, analog and Flash-IP solutions, today announced the industry’s first end-to-end security solution for Internet of Things (IoT) devices that connect to Amazon Web Services IoT (AWS IoT). Microchip and AWS collaborated to develop this integrated solution to help IoT devices quickly and easily comply with AWS’s mutual authentication IoT security model. Using Microchip’s new security solution will help companies implement these security best practices from evaluation through production. The solution adds a high level of security, simplifies the supply chain, and is now one of the fastest ways to connect to the AWS Cloud.

3 Steps Electrical Engineers Should Take to Obtain the Best Electronic BoM Costs

To stay competitive in today’s extremely tough markets, electrical engineers have to not only be technically adept at designing in components that give their products a competitive edge, but they also have to know the best practices in assuring that the Bill of Material (BoM) costs are as low as possible.  As the electronic component BoM cost usually represents the single largest cost element of an end-product, being good at controlling these costs can give companies in saturated markets a competitive edge. 

The field applications engineers at SemiElectronics have come up with the 3 top items that engineers should pay attention to during design process and beyond to leverage the best BoM costs possible.

Semtech’s New μClamp® 3381P Provides Superior Protection from ESD and Electrical Overstress in Industrial and Consumer Data Interfaces

The 3.3V, surge rated μClamp3381P expands the MicroClamp platform providing protection for electronic devices from surge, EFT and ESD threats

Semtech Corporation (Nasdaq: SMTC), a leading supplier of analog and mixed-signal semiconductors, today announced the μClamp® 3381P, a single-line, 3.3V surge rated transient voltage suppression (TVS) device for safeguarding industrial and consumer interfaces against transient voltage threats.

International Standards Organizations Governing Electronic Products

With thousands of international standards organizations across the world, may aspects of life is subject to standardization, which is a good thing for most people.  Standardizing various processes and systems helps make life safer and even more productive.  The electronics industry, in particular, is subject to thousands of global standards, and hundreds of individual regulatory bodies that create, endorse, and support these standards.

As an electrical engineer working on electronic designs, it’s important to know about some of the international standards organizations that govern electronic products.  Here are some of the well-known organizations that we find engineers work with most frequently:

Z-Wave - Popular Wireless Protocol for Home Automation and Internet of Things Devices stars

As Internet of Things (IoT) becomes the new frontier in technology, all attention seems to be turning to wireless networks for home automation. One of the key players in remote home security and automation is without a doubt the Z-Wave protocol.

Z-Wave, also known as Zwave, is a communication protocol that uses RF signaling to connect and control devices used in home automation. It is a low bandwidth protocol, capable of sending short messages reliably, from one control unit to several slave nodes connected in a network. Z-Wave protocol is made of four layers:

Wireless Standards Governing Internet of Things (IoT) Connectivity

Internet of Things (IoT) is an evolving field of computer, software, and hardware engineering that aims to bring interconnectivity to devices and human beings.  Since it is not a new field, several wireless standards, or protocols, of connectivity, have been developed since the beginning of IoT.  Different groups and standards try to solve various problems.  Depending on the application, which will dictate various factors such as range, data requirements, security, power demands, and battery life will determine the choice of one or a combination of technologies.  Outlined below are some of the major wireless standards that electrical engineers can use in Internet of Things electronic design.

Transceiver Provides Reliable Radio Connections and Extended Battery Life for IoT and Other Wireless Applications

NORWOOD, Mass.—Analog Devices, Inc. (ADI) today introduced a low power, high performance, radio transceiver for battery powered applications. The new transceiver enables more reliable wireless radio connections with fewer retries and packet losses as well as longer battery lifetime. The ADF7030-1 features a highly sensitive receiver and superior immunity to signal interferences as well as low power modes, including the industry’s lowest current in sleep mode. Designed with ADI’s advanced radio technology, the transceiver is ideal for users of Internet of Things (IoT) devices, smart metering, security and building automation, industrial control, and wireless sensor networks.

Merits of Hardware Cryptography over Software Cryptography stars

Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.  Cryptography uses ciphers to encrypt the information and later decrypt the same information to the intended receiver only.  Modern cryptography is heavily based on complex mathematical analysis and computer science.  The algorithm is designed to ensure computational hardness assumptions making it almost impossible for the unintended recipient to break it.

STMicroelectronics Simplifies Design-In of State-of-the-Art Security for the IoT

STMicroelectronics (NYSE: STM), a global semiconductor leader serving customers across the spectrum of electronics applications, has announced a strong yet easy-to-use secure element to protect connected devices in the consumer and industrial Internet of Things (IoT) and to prevent cloning or copying of genuine products by ensuring authenticity.Certified to the highest security industry standards, the new STSAFE-A100 can be designed-in by developers without specialist security expertise thanks to comprehensive support ecosystem.

Consumer devices, home appliances, industrial assets, and infrastructure controllers are already connected to the internet or will be soon. Many of them are designed to be autonomous and unattended. They now need state-of-the-art electronic security to prevent hackers from counterfeiting, cloning, stealing information, or misusing the equipment. ST’s new STSAFE-A100 is a secure turnkey solution that brings the Company’s proven expertise in electronic securityfor applications such as banking, e-commerce, and identity protection to the IoT. As a secure element that provides authentication services and can be used in conjunction with an ordinary microcontroller, it features an embedded secure operating system and is certified to Common Criteria EAL5+[1], banking-level security-industry standards.

Subscribe to this RSS feed