Security: Forethought and Planning Avoids Problems

My wife and I were watching the news the other night and a story came up about the latest telemarketing scam that is making its way around the country. With this new scam, you answer your phone and a person who sounds like a telemarketer asks, “Can you hear me OK?” Most people instinctively say […]

Read more

Modified COTS and the Super Bowl

I came on board to InHand Electronics just over a week ago and have spent a lot of my time familiarizing myself with the products and services we offer. Maybe it’s because the Super Bowl is this weekend or football is just always on my mind, but as I learned about InHand’s custom products I […]

Read more

Why Security Is Critical to The Success of The Internet of Things

The Internet of Things (IoT) connects machines, allowing remote control and data collection used to improve automation, real-time knowledge, efficiency, and convenience. The Industrial Internet of things (IIoT) is a class of the IoT where manufacturing and other critical infrastructure are interconnected for operational efficiency and to enable rapid response in case of problems. What […]

Read more

Security Challenges Posed by Internet of Things

At one time, computers were the only devices connected to the internet. Not long after, smartphones connected through cellphone carriers. Wi-Fi enabled tablets and smartphones followed suit. Video game systems came with the capability to allow their users to play other players online, video streaming devices arose, and now people can control the lights or […]

Read more

How to Develop Secure Internet of Things Devices

When referring to the Internet of Things (IoT), everything from Wi-Fi-enabled cars and Bluetooth-enabled fitness bands to streaming devices and smartphones come to mind. There are countless devices connected to the internet; the question is whether these are secure IoT devices? Security tends to be overlooked by some companies until there is a breach. A […]

Read more

Techniques to Protect Embedded Systems from Hacking

Cyber attacks on embedded systems are on the rise. Embedded systems control numerous commonly used devices, including tablets, medical devices, industrial instrumentation, automobiles, and more. For embedded system security, you can use a number of techniques to reduce vulnerabilities and provide protection against threats against embedded devices. Believing that embedded systems fell below the radar […]

Read more

Helpful Considerations for Remotely Updating an Embedded System

As complexity and functionality of embedded devices increases, the need for firmware updates has risen, whether to fix bugs, close security holes, add capability, or update the look and feel of a GUI. Increasingly these embedded devices are connected to networks, which enables remote embedded system updates from a central location as needed. To accomplish […]

Read more

Embedded Product Development: Follow These Three Steps

There are three important steps associated with embedded product development: choosing the hardware platform, selecting the operating system, and creating the application software. These steps have a major impact on costs, performance, product quality, product longevity, and time to market. Choosing the Right Hardware Platform Key to successful embedded product development is choosing the right […]

Read more

Two of the Top Embedded Circuit Boards for Industrial, Military, and Medical Use

Although there are many excellent embedded circuit boards on the market today, two, in particular, stand out for being among the most flexible and best fit for industrial, military, and medical purposes. InHand Fury-M6 Due to the compact size of this single board computer, it is an excellent choice for both industrial and military use. […]

Read more

How to Customize a Tablet for Better Security

Android tablets are built on an open platform, unlike the iPad with its proprietary iOS, providing the opportunity for customization. One way that customization is possible is by enhancing security and reliability features. In fact, the security on an Android tablet can surpass the security on an iPad and other similar devices. For semi-custom and […]

Read more