
Embedded Insiders - Episode #31 - You’ve chosen MIPS? Uh-Oh!
Send a text The Embedded Insiders take a look at the news of the week. This week, we looked at some of the terminology used in the IoT, namely the Mist verses the Edge versus the Fog. What are all the...
10 Loka 20179min

Five Minutes With…John Glossner, President, HSA Foundation
Send a text I was only marginally aware of the work being done by the HSA Foundation, which stands for Heterogeneous System Architecture. So, my first question in this week’s Five Minutes with… to Joh...
3 Loka 20175min

Embedded Insiders – Episode #30 – How Open is Open and What is GE Thinking?
Send a text This week, the Embedded Insiders briefly consider ABB's acquisition of GE Industrial Solutions, and wonder if GE is going too digital. Then, the two discuss "open source". The term is wide...
29 Syys 201711min

Embedded Insiders Podcast – Episode #29 – Machine Learning: Fact or Fiction
Send a text A few weeks ago, the Embedded Insiders tackled the topic of artificial intelligence and machine learning. After further review, one of the Insiders called foul, saying that there’s nothing...
20 Syys 20177min

Embedded Insiders Podcast – Episode #28 – Secure Your Network, No Matter the Cost
Send a text As the old axiom goes, “if you have to ask the price, then you can’t afford it.” I’m here to say that nothing could be further from the truth when it comes to securing your network. In fac...
7 Syys 201713min

Embedded Insiders – Episode #27 – The Vicious Cycle of Electric Vehicles
Send a text The Embedded Insiders stumble upon an interesting question this week: Why haven't hybrid and electric vehicles been more successful? The capability to support these technologies has been a...
23 Elo 201712min

Embedded Insiders – Episode #26 – Keeping an eye on connected devices with data categorization
Send a text "Data classification" is helpful for analyzing information in IoT environments to support business intelligence applications, but it's also an elegant way of monitoring the behavior of dev...
9 Elo 201715min

Embedded Insiders – Episode #25 – Hacker Deception
Send a text A FireEye report recently found that the cyber threats that have penetrated an organization's network defenses have an average dwell time of almost 5 months before they are discovered and ...
4 Elo 20179min





















