Energy Harvesting Starting To Gain Traction


Tens of billions of IoT devices are powered by batteries today. Depending on the compute intensity and the battery chemistry, these devices can run steadily for short periods of time, or they can run occasionally for decades. But in some cases, they also can either harvest energy themselves, or tap into externally harvested energy, allowing them to work almost indefinitely. Energy harvesting... » read more

Why The IIoT Is Not Secure


The Internet of Things is famously insecure, but not because the technology to build it or secure it is immature. Likewise, severely insufficient security on the Industrial IoT suffers from a lack of will. Neither tech buyers nor providers have yet invested the same effort expended in other areas of the tech world to create and adopt steps that will make everyone safer, according to chipmakers ... » read more

Designing Hardware For Security


By Ed Sperling and Kevin Fogarty Cyber criminals are beginning to target weaknesses in hardware to take control of devices, rather than using the hardware as a stepping stone to access to the software. This shift underscores a significant increase in the sophistication of the attackers, as evidenced by the discovery of Spectre and Meltdown by Google Project Zero in 2017 (made public in Ja... » read more

Where Is Energy Harvesting?


With power management a top priority in sensor networks, why is energy harvesting—a proven technology with diverse energy sources—conspicuously absent from sensor designs that are the foundation of the Internet of Things? [getkc id="165" kc_name="Energy harvesting"] always has been a promising answer to the limits of battery power. The idea that a device can run for much longer periods o... » read more

IIoT Security Threat Rising


The rapid growth of the Industrial Internet of Things is raising questions about just how secure these systems are today, how to improve security, and who exactly should be responsible for that. These issues are interlaced with a shift in where a growing volume of data gets processed, the cost and speed of moving large amounts of data, and the increasing frequency and cost of attacks. "Di... » read more

Creating Software Separation For Mixed Criticality Systems


The continued evolution of powerful embedded processors is enabling more functionality to be consolidated into single heterogeneous multicore devices. Mixed criticality designs, those designs which contain both safety-critical and non-safety critical processes, can successfully leverage these devices and meet the regulatory requirements for IEC safety standards and the highest level of ISO. Thi... » read more