Sort results by: Published date | Company name

Secure Boot Requirements and Capabilities in Embedded Systems [ Source: CPU Technology ]
May 2010- The No. 1 vulnerability source in embedded processors is the initial boot phase of the device. Solutions to the problem of insecure boot processes vary enormously depending on the protection requirements of the system. Rather than relying on solutions based on product name, engineers will learn to make more informed decisions on how much end-system security they need, and match that to the various secure boot capabilities on the market, according to CPU Technology.

[WHITE PAPER]
Read Abstract | Go to White Paper

Secure Anchor Point [ Source: CPU Technology ]
December 2009- As the world computing infrastructure becomes likewise complicated, network and system communications have significant problems in identifying who to trust. Corporate and government personnel enter systems through a variety of methods: remote access, wireless PDAs, laptops via VPN from public access points. Establishing trust includes the identity of hardware and processor nodes, the identity and authenticity of software instructions, and the identity and authenticity of system users. Describing and categorizing all of the different types ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Coverity Maintains Software Integrity of Sun Microsystems? Award-Winning Storage Products [ Source: Coverity ]
April 2010- For customers of Sun Microsystems’ long-term storage products, quality is rarely an issue. Sun is a global leader in network computing infrastructure solutions with well-known brands such as Java, Solaris, MySQL, and StorageTek.

In a highly competitive market, companies like Sun constantly need to increase quality and reliability, speed delivery, and reduce costs just to stay even with its rivals. Coverity Static Analysis is a great addition to help not only achieve these ...

[CASE STUDY]
Read Abstract | Go to Case Study

Schneider Electric Improves Product Quality While Saving Over 2,500 Engineering Hours with Coverity [ Source: Coverity ]
January 2010- Schneider Electric (Schneider) is a global leader in energy management, developing solutions to make energy safe, reliable, efficient, and productive from plant to plug.

Schneider Electric has adopted Coverity to improve product quality and software integrity while reducing development costs and re-focusing resources on innovation, benefits which have been realized within the development organization, across the company, and supported at the highest level within Schneider Electric management.

“We run the analysis ...

[CASE STUDY]
Read Abstract | Go to Case Study

Transmission Control Scheme for Fast RFID Object Identification [ Source: ETH Zurich ]
January 2008- The scheme specifically addresses characteristics of the RFID domain such as the strong capture effect. It also makes no restrictive assumptions on channel traffic. Experimental evidence and simulation results are presented showing that the proposed transmission control scheme performs well in practice. The results indicate that the time it takes to identify a large tag population can be reduced significantly when compared to existing approaches.

[WHITE PAPER]
Read Abstract | Go to White Paper

Building Smarter Products with Requirements Engineering [ Source: IBM ]
April 2010- Developing smarter products can be challenging; there are many benefits, however, including improving your customer's lives and helping drive your revenue goals. Managing successful smarter product projects hinges on adopting a requirements-driven development process — one that can help you prevent costly incompatibility failures, delayed product launches, and assist in managing complex, interdependent engineering tasks. Learn how in the Deliver smarter products with requirements engineering white paper.

[WHITE PAPER]
Read Abstract | Go to White Paper

Breaking The Flat File Barrier For Embedded Developers [ Source: ITTIA ]
November 2009- In this white paper, ITTIA notes that the demand for embedded devices is growing rapidly. Discover how embedded developers can break the performance, reliability, portability, and interoperability barriers of flat file formats through embedded database.

[WHITE PAPER]
Read Abstract | Go to White Paper

Performance Comparison -- ITTIA DB and SQLite [ Source: ITTIA ]
March 2010- ITTIA DB SQL is a lightweight database management system designed from the ground up to meet the requirements of embedded systems and devices. SQLite is an open source software library. This white paper examines the performance characteristics and technical capabilities of ITTIA DB and SQLite.

[WHITE PAPER]
Read Abstract | Go to White Paper

Benefits Of Embedded Database [ Source: ITTIA ]
May 2009- This white paper discusses the benefits of incorporating an embedded database into applications for embedded, intelligent, and mobile devices. An embedded database library is an inexpensive replacement for flat files that gives applications access to relational database features, such as transaction logging and indexed search, without the overhead of an enterprise database. Applications developed with an embedded database are scalable and protected from data loss by leveraging decades of data management expertise.

[WHITE PAPER]
Read Abstract | Go to White Paper

Mobile Multiplayer Gaming, Part 3: Multiplayer Games With Bluetooth [ Source: Sun Microsystems ]
January 2008- The focus of the mobile gaming industry, centers on the wide-area wireless capabilities of mobile devices. The ability to connect to anywhere in the world is what defines the wireless computing revolution. But gaming is fundamentally a social phenomenon, and it makes sense that one would want to challenge players within earshot. This paper published by Sun Microsystems expose the raw potential that Java technology and Bluetooth bring to mobile gaming. It gives as basic ...

[WHITE PAPER]
Read Abstract | Go to White Paper
View All