Modified COTS and the Super Bowl

I came on board to InHand Electronics just over a week ago and have spent a lot of my time familiarizing myself with the products and services we offer. Maybe it’s because the Super Bowl is this weekend or football is just always on my mind, but as I learned about InHand’s custom products I immediately thought of a story I read about the NFL. For years the NFL printed out pictures on the sidelines so players and coaches could review them and make game time adjustments. Over the past two seasons, someone realized we are in the 21st century...

Read More

Why Security Is Critical to The Success of The Internet of Things

The Internet of Things (IoT) connects machines, allowing remote control and data collection used to improve automation, real-time knowledge, efficiency, and convenience. The Industrial Internet of things (IIoT) is a class of the IoT where manufacturing and other critical infrastructure are interconnected for operational efficiency and to enable rapid response in case of problems. What used to be simple machines are now smart machines. However, remote access increases the number of security risks experienced by industrial facilities. IoT security and privacy is a hot-button issue due to the fact hackers can find vulnerabilities in connected devices and industrial equipment that...

Read More

Security Challenges Posed by Internet of Things

At one time, computers were the only devices connected to the internet. Not long after, smartphones connected through cellphone carriers. Wi-Fi enabled tablets and smartphones followed suit. Video game systems came with the capability to allow their users to play other players online, video streaming devices arose, and now people can control the lights or thermostats in their homes through mobile applications. The internet quickly became an Internet of Things (IoT). With it came IoT security challenges due to these devices being connected to the internet. Nowadays, it isn’t just the consumer facing security challenges. Those in the industrial world...

Read More

How to Develop Secure Internet of Things Devices

When referring to the Internet of Things (IoT), everything from Wi-Fi-enabled cars and Bluetooth-enabled fitness bands to streaming devices and smartphones come to mind. There are countless devices connected to the internet; the question is whether these are secure IoT devices? Security tends to be overlooked by some companies until there is a breach. A breach can be devastating. Factor in the Industrial Internet of Things (IIoT), which interconnects critical manufacturing, utility infrastructure, and other complex machinery, and the need for good security and privacy is emphasized even more. This is because IIoT transmits sensor data, allows remote control of...

Read More

Techniques to Protect Embedded Systems from Hacking

Cyber attacks on embedded systems are on the rise. Embedded systems control numerous commonly used devices, including tablets, medical devices, industrial instrumentation, automobiles, and more. For embedded system security, you can use a number of techniques to reduce vulnerabilities and provide protection against threats against embedded devices. Believing that embedded systems fell below the radar of serious hackers led to waves of attacks. Hackers can exploit these systems to steal intellectual property, copy designs, gain access to proprietary information about companies and their customers, utilize them as platforms to propagate further attacks, and even cause real world physical damage and...

Read More

Helpful Considerations for Remotely Updating an Embedded System

As complexity and functionality of embedded devices increases, the need for firmware updates has risen, whether to fix bugs, close security holes, add capability, or update the look and feel of a GUI. Increasingly these embedded devices are connected to networks, which enables remote embedded system updates from a central location as needed. To accomplish these remote updates reliably, while accounting for security and preventing problems from disabling these remote systems, certain considerations are important, including feature and security updates. Important Considerations It is important to account for the following when designing a mechanism for remote embedded system updates: Firmware...

Read More

Embedded Product Development: Follow These Three Steps

There are three important steps associated with embedded product development: choosing the hardware platform, selecting the operating system, and creating the application software. These steps have a major impact on costs, performance, product quality, product longevity, and time to market. Choosing the Right Hardware Platform Key to successful embedded product development is choosing the right hardware platform, starting with the processor and extending to peripheral components. These decisions can have a profound effect on costs, both engineering and recurring. To make the right selection, you need to consider several key factors. Hardware availability: Will the hardware you choose be available...

Read More

Two of the Top Embedded Circuit Boards for Industrial, Military, and Medical Use

Although there are many excellent embedded circuit boards on the market today, two, in particular, stand out for being among the most flexible and best fit for industrial, military, and medical purposes. InHand Fury-M6 Due to the compact size of this single board computer, it is an excellent choice for both industrial and military use. In a small 2” x 2.75” footprint, the Fury M-6 boasts a touchscreen interface, onboard LCD interface, eMMC flash memory, Wi-Fi, sensor connections, Bluetooth BLE, and battery management. In addition, stacking connectors bring out other interfaces and peripherals that can be accessed with a custom...

Read More

How to Customize a Tablet for Better Security

Android tablets are built on an open platform, unlike the iPad with its proprietary iOS, providing the opportunity for customization. One way that customization is possible is by enhancing security and reliability features. In fact, the security on an Android tablet can surpass the security on an iPad and other similar devices. For semi-custom and custom equipment, the Android tablet has become increasingly popular. It is commonly used for business, industrial, military, and medical applications. Examples of Customizable Security Features InHand Electronics can customize a tablet’s security and reliability features to meet difficult requirements, such as: HIPPA regulations for use...

Read More

A Commercial Tablet Just Won’t Cut It for Your Medical Application

It is tempting to want to purchase inexpensive, commercial off-the-shelf (COTS) tablets for use in medical facilities or to interface with medical equipment. Unfortunately, there are several technical, regulatory and security issues that could prevent you from doing that.  Technical issues, FDA, and HIPAA security rules are just three potential pot holes for COTS tablets. Custom Android tablets for medical applications can be the answer and Modified-COTS custom tablets can get you to market quickly and with lower costs. Medical Grade Tablet – Technical Issue There are many unique devices in hospitals and doctor’s offices that a tablet could communicate...

Read More