Feature Article Archives » Page 52 of 96 » Electronicsmedia

Feature Article

Explores Connection between IoT & integral need for RF Technology

The Internet of Things (IoT) is delivering the promises of greater efficiency, improved production, enhanced and new services, and deeper levels of control and...
Meltdown, Spectre and secure micros

Secure Microcontrollers: Are They Safe from Spectre and Meltdown?

If you design embedded devices and rely on secure microcontrollers to protect digital assets and intellectual property (IP), you might be wondering whether the...
IoT Cybersecurity

IoT Cybersecurity: 5 Ways To Help Secure Your Application

In October 2016, the Internet of Things was at the center of one of the largest distributed denial of service (DDoS) attacks. A botnet called...
On Semiconductor

Why you should choose REAL Low Drop-Out (LDO) Regulators than IDEAL?

Voltage regulators are essential in applications whenever a stable supply voltage from an unstable or variable source is needed. Such sources can be from a...
SD-WAN- 400GbE

2018 Security Predictions by Juniper Networks

Network on the Hook to Secure Enterprise IoT IoT devices have been a cause for concern for consumers for the past several years now; however,...
CoolSiC

CoolSiC – Schottky diodes based on silicon carbide

Silicon carbide is considered to be among materials that could revolutionise electronics and power engineering. Compared to silicon, it provides a larger band gap...
Mr. Ashish Gulati, Country Head, Telit India

IoT trends in 2018

Many technology trends of 2017 would begin to take greater shape in 2018, which also includes Internet of Things (IoT).  With IoT products gaining...

How AI Finds Big Value in Big Data

Bots can augment human interaction, create greater business efficiencies, and remove friction from customer interactions. It’s a market that has already rolled up $24 billion in funding for...
smartphones_AI

10 Uses for Artificial Intelligence-Powered Smartphones

Artificial intelligence (AI) features will become a critical product differentiator for smartphone vendors that will help them to acquire new customers while retaining current users, according to...

Vulnerability Management: A guide for buyer

Exploiting weaknesses in browsers, operating systems, and other third-party software to infect end user systems is a common initial step for security attacks and...

Interview