Global Sources
EE Times-India
Stay in touch with EE Times India
EE Times-India > Embedded

5 stories in 2015 you should know

Posted: 28 Dec 2015     Print Version  Bookmark and Share

Keywords:connected devices  RISC  CISC  timers  FETS 

It has been a good year for the electronics and manufacturing industries. News about Make in India, mergers and acquisitions, and the Internet of Things took the limelight almost every week of 2015.

We have seen how the initiatives of Prime Minister Narendra Modi lured some of the biggest foreign manufacturers to India to design and create their products in the country. The consolidating semiconductor industry also saw some of the biggest synergies this year. Finally, the nascent IoT is slowly making its dent in the electronics industry with the latest technologies being developed and standards being set.

However, there are stories equally important that did not get as much attention from our readers as those mentioned above. In case you have been busy, we have compiled five of the most interesting stories this year that you might have missed.

Tips for designing connected devices

The number of embedded devices connected to the internet is growing at a phenomenal rate. Some engineers have been designing connected devices for over a decade while others are just beginning to jump into the fray. Adding connectivity involves more than simply bolting on a radio, though, so here are five tips for building a connected device.

Tip #1 – Don't neglect security

A connected device poses a potentially high security risk over a traditional embedded system because it is connected to a web with billions of devices connected to it 24 hours a day, 7 days a week. The chances are that at some point someone or something will notice the device and attempt to gain access to it. From the very first requirement, security needs to be built into the design. Security can't be added at the end of the design cycle but instead should be a well thought out and executed plan. Developers should be considering encryption technology, authentication, and validation methods; all of which have proven examples and technologies that can be leveraged today.

1 • 2 • 3 • 4 • 5 Next Page Last Page

Comment on "5 stories in 2015 you should know"
*  You can enter [0] more charecters.
*Verify code:


Visit Asia Webinars to learn about the latest in technology and get practical design tips.


Go to top             Connect on Facebook      Follow us on Twitter      Follow us on Orkut

Back to Top