This discussion takes a look at how electronics design tools have evolved and what new challenges these can now help solve. Elmar Dukek, EMEA VAR manager, and Sreekanth Tammana, country manager—India, Pakistan, Bangladesh and Sri Lanka, Altium Europe GmbH, speak with Dilin Anand from EFY
Do you love DIYing? Are you looking for new projects to make? Here's bringing, 9 DIY projects on health tech with complete schematics, block diagrams, design guide and source files. Go ahead and try your hands on! Happy making!
While this white paper focuses on implementing connectivity for IoT applications, it offers insights into the design of any application requiring embedded Internet connectivity. Key topics addressed include implementing IP connectivity, security, disparate node aggregation, power and cost.
In this interview, we take a look at what programmable SoCs powered by field programmable gate arrays (FPGAs) can offer a design engineer. Ramani Sundaresan, managing director, India, and Bryan Fletcher, global technical marketing director, Avnet Electronics Marketing, speak with Dilin Anand of EFY at the X-Fest 2014 event in Bengaluru
Altium Designer from Altium is a one-stop electronic design environment that integrates schematic capture, PCB design, FPGA design, embedded-software development and manufacturing file support into a single unified application. Ultimately, this can help you eliminate data-translation and synchronisation issues.
Far from the days of racing to catch-up with technologies, an era has now dawned where Indian start-ups are forerunners in trendy fields like the Internet of Things (IoT) and Big Data.
Start-up companies are not just important but essential to the growth of a nascent technology. These play a very unique role in the ecosystem, bringing in fresh, new ideas and radical perspectives. Listed in this feature are ten interesting Indian start-ups in the IoT and Big Data space.
By using two-factor authentication, it becomes more difficult for hackers to impersonate you and take over your account. With an increase in cyber attacks or exploitation of the first level, there is need for a second level of authentication that adds more security to services or contents like e-mail, bank accounts, social accounts, etc.