Design Guide for Portable Electronic Devices

The demand for portable electronic devices continues to increase with the popularity of smartphones, tablets and similar devices. These devices must be lightweight, rugged, responsive, and long battery life. The key to designing portable devices is implementing a large amount of functionality packed into a small space while minimizing power consumption and enabling sufficient performance. Circuit Optimization Portable device design starts with the selection of components, including the processor, meant for embedded circuitry. These components typically support low power operation, low power modes, and are available for many years. Engineers must know how to make the proper trade-offs to shrink...

Read More

Security: Forethought and Planning Avoids Problems

My wife and I were watching the news the other night and a story came up about the latest telemarketing scam that is making its way around the country. With this new scam, you answer your phone and a person who sounds like a telemarketer asks, “Can you hear me OK?” Most people instinctively say “yes” because they can in fact hear them OK. This is a pretty reasonable reaction, but it is also a predictable one. The scammer records your “yes,” then hangs up the phone and uses the recording to make over-the-phone purchases with a credit card or...

Read More

Modified COTS and the Super Bowl

I came on board to InHand Electronics just over a week ago and have spent a lot of my time familiarizing myself with the products and services we offer. Maybe it’s because the Super Bowl is this weekend or football is just always on my mind, but as I learned about InHand’s custom products I immediately thought of a story I read about the NFL. For years the NFL printed out pictures on the sidelines so players and coaches could review them and make game time adjustments. Over the past two seasons, someone realized we are in the 21st century...

Read More

Why Security Is Critical to The Success of The Internet of Things

The Internet of Things (IoT) connects machines, allowing remote control and data collection used to improve automation, real-time knowledge, efficiency, and convenience. The Industrial Internet of things (IIoT) is a class of the IoT where manufacturing and other critical infrastructure are interconnected for operational efficiency and to enable rapid response in case of problems. What used to be simple machines are now smart machines. However, remote access increases the number of security risks experienced by industrial facilities. IoT security and privacy is a hot-button issue due to the fact hackers can find vulnerabilities in connected devices and industrial equipment that...

Read More

Security Challenges Posed by Internet of Things

At one time, computers were the only devices connected to the internet. Not long after, smartphones connected through cellphone carriers. Wi-Fi enabled tablets and smartphones followed suit. Video game systems came with the capability to allow their users to play other players online, video streaming devices arose, and now people can control the lights or thermostats in their homes through mobile applications. The internet quickly became an Internet of Things (IoT). With it came IoT security challenges due to these devices being connected to the internet. Nowadays, it isn’t just the consumer facing security challenges. Those in the industrial world...

Read More

How to Develop Secure Internet of Things Devices

When referring to the Internet of Things (IoT), everything from Wi-Fi-enabled cars and Bluetooth-enabled fitness bands to streaming devices and smartphones come to mind. There are countless devices connected to the internet; the question is whether these are secure IoT devices? Security tends to be overlooked by some companies until there is a breach. A breach can be devastating. Factor in the Industrial Internet of Things (IIoT), which interconnects critical manufacturing, utility infrastructure, and other complex machinery, and the need for good security and privacy is emphasized even more. This is because IIoT transmits sensor data, allows remote control of...

Read More

Techniques to Protect Embedded Systems from Hacking

Cyber attacks on embedded systems are on the rise. Embedded systems control numerous commonly used devices, including tablets, medical devices, industrial instrumentation, automobiles, and more. For embedded system security, you can use a number of techniques to reduce vulnerabilities and provide protection against threats against embedded devices. Believing that embedded systems fell below the radar of serious hackers led to waves of attacks. Hackers can exploit these systems to steal intellectual property, copy designs, gain access to proprietary information about companies and their customers, utilize them as platforms to propagate further attacks, and even cause real world physical damage and...

Read More

Helpful Considerations for Remotely Updating an Embedded System

As complexity and functionality of embedded devices increases, the need for firmware updates has risen, whether to fix bugs, close security holes, add capability, or update the look and feel of a GUI. Increasingly these embedded devices are connected to networks, which enables remote embedded system updates from a central location as needed. To accomplish these remote updates reliably, while accounting for security and preventing problems from disabling these remote systems, certain considerations are important, including feature and security updates. Important Considerations It is important to account for the following when designing a mechanism for remote embedded system updates: Firmware...

Read More

Embedded Product Development: Follow These Three Steps

There are three important steps associated with embedded product development: choosing the hardware platform, selecting the operating system, and creating the application software. These steps have a major impact on costs, performance, product quality, product longevity, and time to market. Choosing the Right Hardware Platform Key to successful embedded product development is choosing the right hardware platform, starting with the processor and extending to peripheral components. These decisions can have a profound effect on costs, both engineering and recurring. To make the right selection, you need to consider several key factors. Hardware availability: Will the hardware you choose be available...

Read More

Two of the Top Embedded Circuit Boards for Industrial, Military, and Medical Use

Although there are many excellent embedded circuit boards on the market today, two, in particular, stand out for being among the most flexible and best fit for industrial, military, and medical purposes. InHand Fury-M6 Due to the compact size of this single board computer, it is an excellent choice for both industrial and military use. In a small 2” x 2.75” footprint, the Fury M-6 boasts a touchscreen interface, onboard LCD interface, eMMC flash memory, Wi-Fi, sensor connections, Bluetooth BLE, and battery management. In addition, stacking connectors bring out other interfaces and peripherals that can be accessed with a custom...

Read More