Week In Review: Auto, Security, Pervasive Computing


Pervasive computing, connectivity Semtech Corporation announced that it will acquire Sierra Wireless, an IoT services company. The acquisition will combine Semtech’s LoRa end nodes and cloud service with Sierra Wireless’ cellular capabilities. Telit will incorporate Thales’s cellular IoT products business under a new name Telit Cinterion, led by Telit. Telit Cinterion will be Californ... » read more

Startup Funding: March 2022


Semiconductor manufacturing, test, and inspection equipment startups did well in March. Investors funded a wide variety of equipment companies, including test equipment, materials handling, and those that make parts and components. In the manufacturing space, several companies developing manufacturing execution systems received funding, as well as a startup trying to prevent counterfeit parts f... » read more

Manufacturing Bits: July 13


Heterogenous III-V packaging At the recent 2021 IEEE 71st Electronic Components and Technology Conference (ECTC), a group presented a paper on the development of a wafer-level fan-out package using heterogenous III-V devices. This paper deals with the packaging of two III-V chips for use in RF transceiver applications in base stations. III-V Lab, CEA-Leti, Thales and United Monolithic Semic... » read more

System Bits: Feb. 6


Compressing data in vehicles As the number of cameras in automobiles is on the rise with the move to autonomous vehicles, internal vehicle networks are being pushed to their limits from the flood of data. While special compression methods reduce the amount of video data, they also exhibit a high degree of latency for coding. But now, Fraunhofer researchers have adapted video compression in su... » read more

Security For Embedded Electronics


The embedded systems market is expected to enjoy steady growth in the near future—provided those systems can be adequately secured. One of the biggest challenges for embedded devices and systems, especially those employed in the [getkc id="76" comment="Internet of Things"], is adequately protecting them from increasingly sophisticated hacking. This is a new tool for criminal enterprises, a... » read more

Newer posts →