EEMBC Offers Benchmark for Bluetooth LE in IoT


The Embedded Microprocessor Benchmark Consortium is introducing the IoTMark-BLE benchmark, for certifying the performance of devices using the Bluetooth Low Energy wireless protocol for Internet of Things applications. It is the first in the group’s IoT-Connect benchmark series. EEMBC also is preparing the ULPBench 2.0 standard, which will test the ultra-low-power capabilities of connected... » read more

The Case For Narrowband-IoT


Cellular network-based Narrowband IoT (NB-IoT) is marching closer to reality as players across the ecosystem put forth silicon IP, software protocol stacks, carrier network software upgrades and more. The kicker came last year when the 3rd Generation Partnership Project (3GPP), the global cellular industry standards body, finalized a NB-IoT standard in its 'release 13.' With that, device mak... » read more

The Week In Review: IoT


Tools Google this week updated its Internet of Things platform, releasing a Developer Preview for Android Things, enabling application developers to create IoT devices running on the mobile Android operating system. “We incorporated the feedback from Project Brillo to include familiar tools such as Android Studio, the Android Software Development Kit (SDK), Google Play Services, and Google C... » read more

The Week In Review: Design


M&A Synopsys added to its software integrity and security business with the acquisition of services company Cigital and its 2015 spinout focused on tools, Codiscope. Cigital specializes in professional and managed services for identifying, remediating and preventing vulnerabilities in software applications. Terms of the deal were not disclosed. Tools Mentor Graphics rolled out a new pl... » read more

Securing IoE Gateways


When we talk about the [getkc id="260" comment="Internet of Everything"], (IoE) we have come to realize that it will really be made up of a lot of different “things. It will envelope everything from home automation to intelligent vehicles, to wearables, to industrial applications, military, infrastructure. The list is almost endless. And there is a lot of discussion about securing these “th... » read more