Ruggedized Hard Disk Drives Keep Data Safe In Harsh Environments

Conventional hard disk drives (HDDs) are designed to reliably operate in the hospitable physical surroundings of interior deployments, which are typically characterized by mild temperatures, stable humidity and modest levels of vibration. By contrast, outdoor and mobile storage environments can entail anything from sweltering heat or sub-zero frost to oppressive dampness and pounding vibration. And all may be encountered miles above sea level. So it’s no surprise that bringing the benefits of HDD-based storage to outdoor and mobile settings such as automotive, industrial PC, field computing, and military applications poses a formidable challenge to engineers.

Posted in: Application Briefs, Application Briefs, Electronics & Computers, Computer software / hardware, Durability

Cyber-Training Today’s Fighting Forces

Dramatic changes are taking place in the way U.S. service men and women prepare for their assignments. Since 9/11, the U.S. Department of Defense (DoD) is moving from a training cycle in which pre-deployment training events for units and staffs were predictable and occurred every 18-24 months, to one in which deployments are occurring every 10-to-12 months. The Department’s leadership views virtual simulation, where soldiers can experience a wider variety of realistic training scenarios more frequently, as one way to supplement live training to prepare its forces to go into harm's way

Posted in: Articles, Articles, Electronics & Computers, Computer simulation, Virtual reality, Defense industry, Education

Embedded Development and the .NET Micro Framework

The scenario:

You’ve been assigned the task of designing and producing an embedded device. You’ve been given time, cost and size constraints that impact your design. An initial analysis of the requirements leads you to the conclusion that a 32-bit processor with a relatively small amount of RAM and Flash are required. A bit of research shows that an ARM processor with 2MB of external Flash and 2MB of external RAM will meet your cost and size constraints.

Posted in: Articles, Articles, Electronics & Computers, Architecture, Embedded software, Product development

Embedded Security: Down to the Silicon

Embedded applications are increasingly going online. With the introduction of new embedded technologies that utilize a wide variety of communications options from Ethernet to Wi-Fi and ZigBee, there is a pressing need to secure these applications against the same problems that are inherent in any networked application.

Posted in: Articles, Articles, Electronics & Computers, Cyber security, Embedded software, Telecommunications systems, Wireless communication systems

Next-Gen Networks Drive AdvancedTCA Deployments

The evolution of technology and the never-ending thirst for higher bandwidth from industries and applications are pushing the limits of existing standards. The latest processors run faster and integrate more features, thus requiring greater power, more efficient cooling design, and a larger board size. The explosion of bandwidth in enterprise local-area networks (LANs) brought on by the deployment of gigabit Ethernet, 3G/WiMAX mobile communication, and wireless network systems and the growth of triple-play or multi-play network services, have all fueled the demand for servicing greater amounts of data traffic.

Posted in: Articles, Articles, Electronics & Computers, Computer software / hardware, Data exchange, Performance upgrades

Secure Your Embedded Wireless Network

Connecting devices like medical instruments, weigh scales, printers, sensors, and other embedded devices to wireless networks allows the user to gain unprecedented freedom and mobility without the need for cumbersome cabling. Traditionally, many of these devices have been confined to a certain area, and the applications have been prone to human error when used by someone to manually collect information and then transfer it to a computer.

Posted in: Articles, Articles, Electronics & Computers, Cyber security, Wireless communication systems

Encapsulated Video “Brick” Bolsters Video Surveillance Along Boarder

Increasingly dependent on continuous video monitoring and recording, even today's more sophisticated security surveillance systems are often plagued by reliability problems. In some ways, more complex video systems are susceptible to signal and other dependability problems simply because they are multifaceted. Systems integrators may know what cameras and recorders to use in a given situation, but they also need to consider how subcomponents could play a critical role under certain conditions. A noisy switch or incompatible distribution amplifier (DA) can compromise the integrity of a video security system yet go undiagnosed or even undetected until the horse is already out of the barn.

Posted in: Application Briefs, Application Briefs, Electronics & Computers, Imaging, Security systems, Surveillance