ePanorama.net
All about electronics and circuit design
https://blog.hackster.io/sifive-unveils-the-first-risc-v-based-arduino-a4d07fe7f21f “Arduino Cinque” is based on SiFive’s Freedom E310 — the industry’s first commercially available RISC-V core — running at 320MHz. Aside from the SoC, an onboard ESP32 chip provides support for 2.4GHz Wi-Fi and Bluetooth. →
http://www.edn.com/electronics-blogs/eye-on-iot-/4458410/Connected-lighting-may-be-the-IoT-killer-app?utm_content=buffer341aa&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer The business model for adding IoT connectivity to lighting promises positive return on investment. The push of government-mandated energy reductions is one factor. It is easier, he noted to meet regulatory standards if you can control the light bulb itself. Shutting down lights when rooms (or even sidewalks) are empty or remotely via phone →
http://www.edn.com/design/analog/4458402/Enhancing-drivers-eyes–senses-and-reflexes-with-creative-electronics?utm_content=buffer95f2f&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer Although we are not yet technically ready for autonomous vehicles (see this IEEE article: Hit the Brakes—We’re Not Ready for Autonomous Vehicles—I strongly agree), what we can have in the near-term is safety electronics in automobiles. Radar, LIDAR, and camera vision integration are becoming more affordable in modern automobiles. →
http://iotsummit.fi/ Arrow Electronics today organized a IoT Summit event focusing on the Internet in Helsinki. According to Andrew Bickley, who is responsible for marketing the company’s IoT solutions in Europe, IoT is moving from management speeches to implementation. And usually, customers need ready-made solutions. – companies that develop IoT-based services that do not understand the →
https://simplesecurity.sensedeep.com/web-developer-security-checklist-f2e4f43c9c56 Developing secure, robust web applications in the cloud is hard, very hard. If you think it is easy, you are either a higher form of life or you have a painful awakening ahead of you. Think twice before you launch your “proto-product”. Acknowledge that you are skipping many of critical security issues. At the very minimum, be honest with →
http://spectrum.ieee.org/automaton/robotics/industrial-robots/report-dangers-of-hacked-factory-robots The threats that a hacked industrial robot represent today go beyond safety concerns and include also industrial sabotage and blackmail. →
https://techcrunch.com/2017/05/16/what-to-expect-from-google-io-2017/?utm_source=tcfbpage&sr_share=facebook Google’s annual I/O developer conference starts on Wednesday. I ecpect it to be full of news and announcements. The next version of Google’s mobile OS – Android O will likely be revealed. Android is going to work beyond smartphones and tablets. Android O could bring additional VR features. Google pushes Wear and Wear-related tech and development →
https://techcrunch.com/2017/05/16/google-launches-cloud-service-to-manage-internet-of-things-data/?utm_source=tcfbpage&sr_share=facebook Google Cloud launched a new Internet of Things management service today called Google Cloud IoT Core that provides a way for companies to manage IoT devices and process data being generated by those devices. It works with Google’s software services like Google Cloud Dataflow, Google BigQuery, andGoogle Cloud Machine Learning Engine. Customers can work with third-party partners like ARM, Intel and →
http://spectrum.ieee.org/tech-talk/semiconductors/design/a-circuit-that-sees-radiation-strikes-could-keep-errors-at-bay For a short time, it looked like the worlds electronics would be safe (well, safer) from radiation. With the switch from planar transistors to FinFETs, ICs suddenly became naturally resistant (literally) to having their bits flipped by a neutron splashing into them and blasting lose a small cloud of charge. But two things are now →
https://opensource.com/business/16/6/managing-passwords-security-linux?sc_cid=7016000000127ECAAY Managing password and security related issues in Linux is important, but there are some simple steps you can take to make your system more secure. We’ve seen that there can be a large number of attempts to log on to a publicly accessible system. So, what can we do? There are a few things →