The SAM R30 System in Package (SiP), a single-chip RF microcontroller (MCU), is now available from Microchip Technology Inc. (MCHP). The SAM R30 SiP incorporates an ultra-low power microcontroller with an 802.15.4 sub-GHz radio, providing multi-year battery life in a compact 5 mm package. The SAM R30 SiP delivers design flexibility and proven reliability all […]
IoT
IoT development kit adds modules for Bluetooth low energy (BLE), sub-GHz RF, and Wi-Fi
The new high-connectivity STM32L4 IoT Discovery kit (B-L475E-IOT01A) from STMicroelectronics gives flexibility for developers building IoT (Internet of Things) nodes by supporting multiple low-power wireless standards and Wi-Fi, while integrating a complete collection of motion, gesture, and environmental sensors, unavailable on other kits in the market. Designed to help promptly connect IoT devices to Cloud […]
Modulating 5G
The IoT will make heavy use of fifth-generation mobile networks that use a yet-to-be-determined modulation scheme. Here are the major contenders. LEE TESCHLER | EXECUTIVE EDITOR Fifth-generation mobile networks, abbreviated 5G, will form the telecommunications standards for the internet of things. Planners say 5G will have a higher capacity than the current 4G equipment partly […]
The case for multiprotocol, multiband connectivity in the IoT
Wireless protocols that are widely used in the IoT have a lot of common attributes. Multiprotocol SoCs able to run them all can simplify many kinds of wireless designs. TOM PANNELL, Senior Marketing Director, IoT Products| SILICON LABS We have many innate expectations for controlling the myriad devices and systems in our lives. When I enter […]
Thwarting hackers on the IoT
A few best practices can drastically improve the security of IoT devices and help maximize the benefits they provide. CHRISTOPHE TREMLET, SCOTT JONES MAXIM INTEGRATED The news back in March was certainly alarming – WikiLeaks announced it had internal CIA documents revealing that the spy agency had found a way to access Android and Apple […]
Building security into IoT and IIoT end devices
Tools, operating systems, platforms, and services help open new doors for developers building security into their connected, modern-day IoT infrastructure. WARREN KURISU | MENTOR GRAPHICS Industries increasingly rely on their connected devices and networks, and they are also becoming aware that they must deter or prevent cyber attacks. It is nearly impossible to field an […]
Better development systems for IoT apps
It can be tough for engineers to plan IoT systems around services based in the cloud. New generations of development systems simplify the task. WIREN PERERA ON SEMICONDUCTOR All indications are that after a long-protracted period of discourse and speculation, 2017 is going to be the year when the Internet of Things (IoT) finally begins […]
Will connected homes catch on? Reality doesn’t match the marketing.
Leland Teschler – Executive Editor lteschler@wtwhmedia.com On Twitter @DW_LeeTeschler Many of the applications envisioned as part of the internet of things revolve around connecting everyday home appliances to the cloud. As more of this kind of connected gadgetry has come onto the market, we are getting a better idea of what an IoT-connected home looks […]
Low-power embedded Flash for BLE now in production
Shanghai Huali Microelectronics Corporation (HLMC) and Cypress Semiconductor Corp.announced a new milestone for the combination of HLMC’s 55-nanometer low-power (LP) process technology and Cypress’ SONOS (Silicon Oxide Nitride Oxide Silicon) embedded Flash memory intellectual property (IP). HLMC’s customers have started early production of low-power embedded Flash aimed at Bluetooth Low Energy and Internet of Things […]
Server-side certificate management for authentication via public keys
Icon Labs, a leading provider of security solutions for IoT and edge devices, today announced the availability of the Floodgate Certificate Authority (CA). Floodgate CA is the server side portion of Icon Labs’ PKI solution and provides certificate management for companies choosing to implement their own certificate-based authentication using public key infrastructure. IoT security requires […]









