Zenoh is an open-source platform that manages data in transit and at rest across the entire edge-to-cloud continuum, as well as facilitates computations on edge devices. Targeted applications include robotics, automotive, and IoT. Its low overhead makes it compatible with low-power or bandwidth-limited networks like LPWAN, LoWPAN, and Bluetooth Low Energy (BLE). Zenoh is primarily […]
Featured
How do AI agents and model context protocol work together?
An AI agent, combined with a model context protocol (MCP), can create more contextual AI systems that can perform a wide range of tasks, from automating processes to providing insights and interacting with users. MCP helps AI agents connect to data sources, enabling them to access information, collaborate with other systems, and make decisions based […]
What is the math of negative feedback and how is it used to ensure stability?
Negative feedback can create a control system where the output of a process is used to counteract any deviations from a desired set point, effectively “correcting” the system, bringing it back to equilibrium, and maintaining stable operation. It’s used in a variety of applications, including voltage regulation, temperature controllers, audio amplifiers, and operational amplifiers. This […]
What are the different key layers of IoT architecture? part 2
This second part of the FAQ discusses the three upper layers of the IoT architecture, which extend beyond the physical and network layers. The middleware layer processes and manages raw IoT data from connected devices. The application layer provides user interfaces and visualization tools. The business layer converts technical capabilities into actionable business outcomes. Part […]
What are the different key layers of IoT architecture? part 1
A layered Internet of Things (IoT) architecture provides modularity, scalability, and flexibility, allowing each layer to focus on specific tasks and technologies. This FAQ series covers the five-layer IoT architecture and explains why it is a commonly used framework. This first part focuses on the first two layers. IoT Architecture provides a structured framework for […]
Five challenges for developing next-generation ADAS and autonomous vehicles
ADAS and autonomous vehicles need new datacom architectures and new attitudes. The state of California requires autonomous vehicle manufacturers to annually document and report every manual intervention by test drivers, including the cause and the vehicle’s mileage. In less than five years, these reports have demonstrated significant improvements in miles per intervention for virtually every […]
What is the HPC memory wall and how can you climb over it?
The high-performance computing (HPC) memory wall generally refers to the growing disparity between processor speed and memory bandwidth. When processor performance outpaces memory access speeds, this creates a bottleneck in overall system performance, particularly in memory-intensive applications like artificial intelligence (AI). This article begins by exploring the conventional definition of the memory wall and then […]
What is the maths of positive feedback and how it is used in electronic systems?
Positive feedback is primarily used to rapidly amplify a desired change or signal, often in situations where a large response is needed, like triggering a process to reach a specific threshold quickly. It must be carefully managed due to its potential for instability and runaway effects. It’s used in digital electronics to force voltages away […]
What’s the relationship between Ohm’s Law and quantum mechanics?
Ohm’s Law is the classical physics explanation of the linear relationship between voltage, current, and resistance in a conductor. Quantum mechanics provides insights into the mechanisms behind this behavior, explaining why Ohm’s Law still holds true even on very small scales where quantum effects are significant. Ohm’s law is a macroscopic view of classical physical […]
What does a watchdog timer watch?
Watchdog timers (WDTs) watch MCU operations to ensure reliability, especially in embedded systems, robotics, medical devices, electric grid monitoring, deep space missions, and other critical applications. They are used to detect and correct MCU and software glitches without human intervention. The WDT monitors system operation by listening to signals from the MCU. The system software […]









