ALU

Sponsored

2018 DTech International Design and Science Conference to kick off in Shunde to power industrial design

Reading Time: 3 minutes China’s Shunde is going to host the 2018 DTech International Design and Science Conference on Sunday, December 9. Original Link

See how Merck is accelerating the new ecological landscape at TechCrunch Shenzhen

Merck China will launch the Merck China Accelerator to explore China’s innovation ecosystem at TechCrunch Shenzhen. Original Link

Designing for EMI Testing: A Step-by-Step Guide

Solve your EMI problems more efficiently with oscilloscope solutions

Download this free white paper and learn how to analyze EMI for more efficient R&D and  improved time-to-market.

Key take-aways:

  • Understand the basic steps involved in EMI testing
  • Learn to use probes to discover an inteference signal
  • Discover how to analyze the interference behavior using a digital oscilloscope

Original Link

DDR Memory Test Challenges from DDR3 to DDR4 and DDR5

Prepare for DDR5 Test Challenges

DDR memory chip technology has progressed through two generations in the past 10 years, and the next generation is currently being defined. Each of these generations improved in speed, efficiency, and memory capacity. Don’t get left behind—stay up to date on the DDR memory challenges that lie ahead!

Download the “DDR Memory – Test Challenges from DDR3 to DDR4 and DDR5” white paper to get tips on testing and learn about the latest test equipment.

Original Link

Reveal Hidden Structures in Data

Learn how Quantum Insights implemented a sophisticated and complicated algorithm in record time with a minimum amount of debugging

Quantum Insights invented a novel way of revealing structures hidden in big, complex sets of data. Its challenge was to develop a GUI capable of displaying the animations that make the algorithm easy to use and, at the same time, support the complex underlying mathematics.  It used the symbolic computation tool Maple, and because of the way Maple’s interface works, Quantum Insights was able to quickly get a proof of concept in a matter of days, using interpreted code. In addition, they also successfully replaced the interpreted code with compiled code to make it possible to handle large datasets with the requisite speed. Finally, they were able to prototype the approach using Maple’s threads package.

Marvin Weinstein, the CEO of Quantum Insights will explain and demonstrate this novel approach in this webinar.

PRESENTERS:

Dr. Marvin Weinstein, CEO, Quantum Insights

Dr. Weinstein is a theoretical physicist who worked at the SLAC National Accelerator Laboratory at Stanford University for 42 years.  He specialized in non-perturbative methods in quantum field theory. His ground-breaking research in this area led to the development of a quantum mechanics-based method for mapping the density of data.  After being granted three patents related to the application of these quantum techniques to data analytics, Marvin retired from Stanford SLAC in 2013 to found Quantum Insights, a company at the cutting edge of precision medicine. Quantum Insights’ algorithms are built into a proprietary library called that Maple calls.

Dr. Samir Khan, Product Manager, Maplesoft

Dr. Khan graduated with a degree in Chemical Engineering from The University of Nottingham, and completed a PhD in Fluid Dynamics at Herriot-Watt University in Edinburgh. He has played several key roles in selling, supporting and marketing math and simulation software during his professional career, and has also consulted in thermo-fluid modeling and energy simulation. Dr. Khan is currently the Product Manager for Maple in professional markets.

        

Attendees of this IEEE Spectrum webinar have the opportunity to earn PDHs or Continuing Education Certificates!  To request your certificate you will need to get a code. Once you have registered and viewed the webinar send a request to webinarteam@ieeeglobalspec.com for a webinar code. To request your certificate complete the form here: https://innovationatwork.ieee.org/spectrum/
Attendance is free. To access the event please register.
NOTE: By registering for this webinar you understand and agree that IEEE Spectrum will share your contact information with the sponsors of this webinar and that both IEEE Spectrum and the sponsors may send email communications to you in the future.​

Original Link

5 Reasons Why You’re a Perfect Cyber Attack Target

While cyber attacks should never happen to anyone, there are certain reasons why targets become victims of these attacks.

hacking, cyber security, telecommunications

Do you believe you’re safe from cyber attacks?

Most people do. They believe that hackers won’t target them because hackers go for the “big fish”. Most people are wrong.

The truth is: not even small businesses are safe from cyber attacks. In fact, perusing through Barkly’s 5 cybersecurity statistics every small business should know in 2018 will show that not only are cyber attacks on small businesses possible, but they’re also quite common.

Likewise, not even individuals are 100% safe from cyber attacks. Hackmageddon’s June 2018 cyber attack statistics even show that 20% of cyber attacks are aimed at individuals.

These statistics are particularly worrisome especially when you factor in the average cost of recovering from cyber attacks — not to mention the loss of invaluable credibility and goodwill in the eyes of consumers and contacts.

Now, while cyber attacks should never happen to anyone, there are certain reasons why targets become victims of these attacks. Below you’ll find the most common ones as well as what you can do to avoid being targeted.

1. You Trust Default Security Software

“Prevention is better than cure.”

This should always be the case for cybersecurity. It’s always better to prevent an attack from happening rather than rely on a fool-proof recovery system. In the latter scenario, the damage would’ve already been done despite the ability to immediately recover. Prevention simply costs less in the long run.

That being said:

Most people often trust their computers’ or devices’ “out-of-the-box” security to be adequate. This is obviously a big mistake because default security software often lacks the sheer capability of dedicated third-party security software.

Firewall

Hackers will often look for networks that allow them to make FTP or telecom connections to exploit the computers in that network. Once inside, there’s no telling what damage these cyber criminals can cause.

You can prevent this by installing a firewall. Basically, a firewall works by preventing unrequested data (like malware) from entering your network. If your network were a building, then the firewall is the guard at the gate checking people’s credentials and whether or not they have a scheduled appointment within the building.

You can also use software called Fail2ban (Linux), wail2ban (Windows), and fail2web (Mac OS) — although you may find it easier if you simply modify Fail2ban’s text files for Mac OS. This software prevents hackers and bots from trying to enter a network by repeatedly trying to authenticate using different credentials. Fail2ban bolsters a firewall by making it ban addresses that have unsuccessfully attempted to log in a certain number of times.

Antivirus

Now, while a firewall prevents malware from coming into your network, what can you do about malware already on your hard drive? Simple: look for the best antivirus software. A good antivirus software will seek and destroy any and all malware that has infiltrated your hard drive. Even better is the fact that the best antiviruses today already have a built-in firewall!

Virtual Private Network

Saving the best for last, install the best VPN you can find. VPNs are renowned for their cybersecurity capabilities whether in the home or even for big businesses. VPNs work by hiding your true IP address and encrypting your online data.

You see: your online data is usually in the form of data packets. These packets contain plain text that’s easily readable by someone who knows what they’re doing — like cybercriminals, your government, and even your ISP. Once a hacker finds and records your online data, they then trace it back to your IP address and that’s when they’ll make their move.

But with a VPN active, the only thing these hackers will find in your online data packets will be encrypted jargon. Also, they won’t be able to trace who this data comes from since your true IP address is masked by the VPN.

That being said, not all VPNs are trustworthy. Avoid “free” VPNs as they’ve been known to sell user data. Instead, look for trustworthy VPN reviews to find the best VPN for you.

2. You Don’t Change Default Passwords

Did you know that devices and software often come with default passwords?

These default passwords are set so that users can easily guess them and they’re often the same, or similar, for all devices/software from the same manufacturer — and that’s the problem. Hackers know or can easily guess these default passwords and will use them when trying to attack targets.

This is why you should immediately change a default password into a strong one. Note the word “strong” because Preempt has stated that 35% of users have weak passwords. A strong password should not only be a long one but should also contain a mixture of upper and lower case letters, numbers, and symbols (if allowed).

You may, however, find it hard to remember strong passwords. In that case, you can simply use a password manager app. These apps also have the added bonus of generating strong passwords for you which makes them even more useful.

While on the subject of passwords, you should always turn on 2FA (2-factor authentication). Google reported that less than 10% of Gmail users use 2FA and that’s a bad sign. 2FA prevents hackers from accessing your accounts even if they’ve gotten a hold of your credentials if they can’t provide the second authentication via security number.

3. You Ignore Updates

Let’s be honest: sometimes we ignore software or app updates.

It’s nothing to be ashamed. Those updates just come at inopportune times and they slow down your device’s performance so you hold them off for later. But what if I told you that that’s exactly what hackers are hoping for.

As you may know, updates often come with updates to security. This means that the manufacturer just recently found, or was made aware of, certain vulnerabilities in their product. Hackers know this and will swiftly race to find users of that product who have not yet updated their version of the software or app. Once they find one, they simply exploit the vulnerability that should have been solved by the security update and work from there.

This is why you should never ignore updates, no matter how untimely they may be. Additionally, you can simply turn on auto-updates to make them more convenient.  

4. You Click Random Links

“If it’s too good to be true, it most certainly is.”

Have you ever heard the story about the Nigerian prince who’s looking for someone they can give their vast wealth to?

I bet you have. I bet you’re also aware that unbelievable stories like that are just that — unbelievable. These stories were early examples of cyber attacks called “Phishing”.

Phishing attacks use social engineering and psychological tactics to get targets to click on a malicious link. Once clicked, these malicious links can contain anything from viruses that damage your computer to malware that cryptojack your whole network. One innocent click is all it takes.

The problem is hackers are really good at social engineering. They can even use AI to make phishing attacks for them.

You can try to avoid phishing attacks by learning to identify a phishing attempt. You can also avoid phishing attacks by using a fake email for websites that require it.

A better (more convenient) alternative, however, would be to use Open DNS. This is by far the best way to filter Web content and prevent access to malicious websites on your network.

It works by blocking websites known for attempting to infect visitors with malware or Command and Control Callback, preventing you from unknowingly visiting phishing sites via a phishing site database that’s updated daily, and by blocking suspicious websites that use IP addresses reserved only for internal networks.

5. You Connect to Public Wifi

This applies to individuals and the people running an enterprise.

Do you often go to the nearest coffee shop and connect to their wifi during your breaks? If you do, you’re unknowingly setting yourself up for a MitM (Man-in-the-middle) attack.

A hacker performs a MitM attack by exploiting an unencrypted network’s vulnerability. They then use this vulnerability to monitor the information traveling in and out from the users of that network. They can then use the login information or online shopping data they attain to get your banking credentials or credit card details.

Another danger of using public wifi are rogue hotspots. These hotspots pretend to be the legitimate hotspot by imitating the latter’s name. The problem is you never know who has set up these rogue hotspots and what data they monitor and record.

If you must connect to a public wifi (such as in the event of an emergency), make sure your laptop or device has a VPN which encrypts your data. You will still have to worry about the downtime before your VPN does connect.

Better yet: set your VPN to activate automatically every time your device goes online. This way, you won’t have to worry about the downtime before the VPN actually connects. You will find a noticeable drop in Internet speed, but this is a small price to pay for online security.

Recap and Final Thoughts

Never think that you’re 100% safe from cyber attacks. No one is too small to become a target. To lessen the likelihood of being the next victim, follow these steps:   

  1. Bolster your defenses with dedicated third-party security software.
  2. Immediately change default passwords into strong ones. Use 2FA.
  3. Install updates as you receive them. Turn on auto-updates if you can.
  4. If it’s too good to be true, it most often is. Learn to detect phishing attempts or use Open DNS.
  5. Beware of public wifi unless you use a VPN.

Now, after saying all of the foregoing, it’s always a good idea to have a backup plan — and that’s exactly what you need. Regularly make backups of your data and test restoring from those backups.

This way, you’re not only preventing a possible cyber attack, but you’re also prepared if it ever happens.

Original Link

Satellites and the Connected Car

2012 Tesla Model S digital screens. The central bottom touchscreen shows a google map view with live traffic updates, and the top screen shows teslamotors.com site. Credit: Steve Jurvetson

The world’s people buy more than 78 million cars every year. They shop for horsepower and acceleration, leg room and cargo space, and how many miles it can go on a tank of fuel or on a single charge. And every year, more of them want to know just how smart their car is.

The “connected car” is poised to make your time behind the wheel safer and more productive. Connected cars can stream music from your favorite web service, help you navigate, provide internet access and offer road-side assistance in an emergency. But that’s just the start.

2012 Tesla Model S digital screens. The central bottom touchscreen shows a google map view with live traffic updates, and the top screen shows teslamotors.com site. Credit: Steve Jurvetson
Credit: Steve Jurvetson

 A Computer on Wheels

Why does your car need to be connected? Behind the dashboard and under the hood, today’s cars contain over 100 million lines of computer code and process up to 25 gigabytes of data an hour. A high-end model has more computing power than a supercomputer from the year 2000.

There are already millions of connected cars on the road and some of them connect over the same cellular network your phone does. In 2016, for the first time, cellular connections for cars grew at a faster rate than new phone connections.

Those cellular connections are okay for the fun stuff – the music, the maps and the internet access. But when it comes to keeping you safe, there’s a problem. Cellular doesn’t go everywhere. You may get great service in a city or along a highway – but get out into the countryside, even in one of the world’s richest nations, and it’s another story. Drive in a developing nation, and the problem is even greater.

That’s why serious designers of the connected car are mixing cellular connectivity with satellite.

The Next Generation of Connected Car

The Kymeta Corporation is delivering the next generation of the connected car. The company has developed a service called KĀLO, making it possible to gain access to satellite connectivity to deliver seamless, global internet access. It works just like a cellular plan for your car but, because it can use satellite networks, it works even where there are no cell towers.

To connect to those satellites, Kymeta has developed the world’s first flat satellite terminal, called KyWay™, using revolutionary metamaterials. KyWay can be built right into the roof of a vehicle. Kymeta manufactures the terminals using liquid-crystal-filled glass panels on the same production lines as LCD TVs. Small, lightweight, and with no moving parts, they are still powerful enough to communicate with satellites thousands of miles overhead. The KĀLO service is being extended to support cellular-satellite connectivity.

Providing Safety and Security

Credit: Aron Urb
Credit: Aron Urb

So, what’s going on in your car that needs all the data a satellite can provide?

Your car runs on software, and that software needs to be updated regularly. Right now, that means taking your car to the repair shop. That costs manufacturers billions, and the inconvenience means that a lot of software never gets updated. With satellite, the update can be transmitted to millions of cars at the same time, ensuring that everyone on the road has the required safety enhancements.

Satellite updates aren’t just convenient; they’re also secure. We’ve all heard the scary stories about cars of the future being hacked. Satellite is secure because it touches just one place – your car – instead of traveling across the internet or phone network. That’s why the government turns to satellite to protect its most secure communications.

Security matters more every year, because cars are starting to drive themselves. Self-driving cars are a miraculous blend of computers and sensors – and one more vital component. Smart cars run on digital maps – incredibly detailed, always up-to-date maps of highways, streets, alleys, corners, sidewalks, stoplights and all the rest.

In a world of constant change, maps get out of date fast. Buildings rise and are torn down. Roads are closed and opened. Stop signs are replaced with stoplights. Only satellite can send cars the massive amounts of map data that will keep people safe when computers take the wheel.

The connected car got its start in 1996, when General Motors introduced its OnStar roadside assistance program. By 2015, OnStar had handled more than one billion requests from drivers. That’s why car shoppers are now looking not just for horsepower or leg room but for smarts as well. Kymeta is working today with satellite operators and automobile companies to make sure your next car will keep your passengers more entertained, get you where you want to go faster and keep you safer than ever before.

 Photos by Steve Jurvetson and Aron Urb. Used under Wikimedia Creative Commons license and Flickr Creative Commons license.

BSW-App-Logo3Produced for SpaceNews by Space & Satellite Professionals International

See more stories and videos of satellite making a better world at www.bettersatelliteworld.com

SpaceNews.com

Original Link

Speed Design of Digitally Controlled Power Converters

This white paper describes 10 proven ways that system-level simulation can improve your digital controller development for power converters.

This white paper describes 10 proven ways that system-level simulation can improve your digital controller development for power converters. Simulink® lets you test concepts against complex and varying power sources and electrical loads before you begin hardware-software integration testing.

Key Take-aways:

  • Learn how to conduct trade studies and optimization analyses to balance cost and performance
  • Understand how to validate your design with desktop and real-time simulations
  • Learn to generate C/C++ and HDL code from your model

Original Link

Network Analyzer Measurement Science poster

Get Updated Network Analysis Measurement Science Poster

This complimentary poster was just updated to guide you through the essentials on network analysis measurement science including S-parameters basics. It also includes common measurement applications and practical everyday tips. Develop accurate, dependable network analyzer-based test systems achieving high throughput, repeatability and reliability with the right balance of speed and performance.

Original Link

Practical Guide to Maximizing DC Measurement Performance

Download this white paper to learn how to use a source measure unit (SMU) to perform DC measurements.

Download this white paper to learn how to use a source measure unit (SMU) to perform DC measurements. This guide explores best practices in the context of common measurement scenarios, so you learn when and where to most effectively apply the concepts covered.

Key take-aways:

  • Discover the fundamentals of DC measurement instruments
  • Learn how to set up and use SMUs
  • Understand the key best practices to mitigate various errors seen when taking DC measurements

Original Link

400GE is Revolutionary, Not Evolutionary

Learn how to accelerate from 100GE to 400GE in the data center.

Data centers need to be ready to support the computing and performance demands required by 5G and IoT. Learn how to accelerate from 100GE to 400GE in the data center using advanced signal modulation and coding techniques such as PAM4 and FEC.

Original Link

The Current State of Power Electronics

Highlights from APEC 2018 Plenary Sessions Granted Deeper Insight into Power Electronics

Dive in to the world of power electronics. Watch and listen as leaders from the industry share their insights on power electronics in science, technology, and even business. We’ve captured the essence of APEC 2018’s plenary sessions, which address the issues of immediate and long-term interests to the practicing power electronics engineer, in an easy-to-digest format. This summarized version highlights the words of distinguished professionals. Be prepared to learn:

  • Why power is an essential element of advanced science and applied technology
  • About the Vienna Rectifier, it’s needed improvements and suggested future development in rectifier technology
  • End user perspectives in moving from silicon (Si) such as MOSFETs and IGBTs to silicon carbide (SiC) power converter devices
  • An overview of wireless power transfer from power levels from micro-watts of far-field energy harvesting to kilo-watts level of near-field capacitive vehicle powering
  • About 3D power packaging using embedded electronic components and substrate technologies
  • Importance of technical power and business efficiency

After, a panel of engineers will discuss the importance of these insights where participants can engage and ask questions.

PRESENTERS:

       

John Blyler, Founder & CEO, JB Systems Media and Technology 

John Blyler is a technology professional with expertise in multi-discipline Systems Engineering, technical program life-cycle management (PLM), content development and customer-facing projects. He is an experienced physicist, engineer, manager, journalist, text-book author and professor who continues to speak at major conferences and before the camera. John has many years of experience leading interdisciplinary (mechanical-electronic, hardware-software) engineering teams in both the commercial and Mil/Aero, semiconductor and electronics industries. Additionally, he has served as an editor-in-chief for technical trade journals and the IEEE professional engineering society publications. He was the founding advisor and affiliate professor for Portland State University’s online graduate program in systems engineering. Finally, John has co-authored several books on systems engineering, RF-Wireless design, automotive hardware-software integration for Wiley, Elsevier, IEEE and SAE.

Bill Schweber

Bill Schweber is an electronics engineer who has written three textbooks on electronic communications systems, as well as hundreds of technical articles, opinion columns and product features. He has managed a number of technical websites for EE Times and was both the Executive Editor and Analog Editor for EDN. Bill has written and presented online courses on a variety of engineering topics. In addition, he has worked in marketing communications for Analog Devices, Inc., an analog and mixed-signal semiconductor company, and was associate editor of ADI’s respected technical journal. Bill has an MSEE from the University of Massachusetts and a BSEE from Columbia University. He’s a Registered Professional Engineer, and holds an Advanced Class amateur radio license.

Attendees of this IEEE Spectrum webinar have the opportunity to earn PDHs or Continuing Education Certificates!  To request your certificate you will need to get a code. Once you have registered and viewed the webinar send a request to gs-webinarteam@ieeeglobalspec.com for a webinar code. To request your certificate complete the form here: http://innovationatwork.ieee.org/spectrum/

Attendance is free. To access the event please register.
NOTE: By registering for this webinar you understand and agree that IEEE Spectrum will share your contact information with the sponsors of this webinar and that both IEEE Spectrum and the sponsors may send email communications to you in the future.​

Original Link

Fully Coupled Internal Space Charging Simulations with EMA3D-Internal

We provide a comprehensive demonstration of EMA3D-Internal, including aspects of geometry, environment, fully-coupled simulation, and post-processing.

EMA3D-Internal is a fully 3D internal space charging software tool.  It allows for a comprehensive internal space charging analysis to be performed almost entirely within a graphical user interface, including: sophisticated geometry import, development and meshing capabilities, simulation and post-processing.  The user can specify realistic, time dependent, radiation environments, such as what might be obtained using the AP9/AE9 framework. 

Recently, EMA3D-Internal has been improved to provide a fully-coupled simulation platform, such that the incident radiation environment is affected by the developing background electric fields within and around dielectric materials.  These background electric fields often act to reduce internal charging, as incident electrons tend to be repelled by the developing fields.  Quantifying the effects of the background electric fields is important for accurately assessing risk and making optimal design choices related to internal charging.  In this webinar, we give a comprehensive demonstration of EMA3D-Internal, including geometry development, environment specification, fully-coupled simulation, and post-processing for design applications.

PRESENTER:

       

Bryon Neufeld, PhD Senior Scientist/Program Manager

Bryon earned a PhD in theoretical nuclear and plasma physics from Duke University in 2009.  While at Duke he published multiple articles in the Physical Review on dense plasma systems, and received a Viewpoint recognizing him for excellent research by the American Physical Society.  After graduating from Duke, Bryon worked in the Theory Division at Los Alamos National Laboratory, where he was awarded a Director’s Funded Postdoctoral Fellowship.  At Los Alamos, he continued to work and publish across a wide array of projects related to hot plasmas and electromagnetic systems.  In addition to his technical degrees, Bryon has an MBA from Cornell University, where he graduated in the top 10% of his class.

Bryon joined EMA in 2013.  At EMA, Bryon has performed numerical simulation and model development for a number of electromagnetic effects projects, including lightning indirect effects, lightning direct effects, HIRF, and space charging.  He developed and executed simulation strategies to help determine the space charging risks for NASA’s Multi-Purpose Crew Vehicle’s FT-1 and EM-1 missions.  He has also developed computational tools to bridge near-field, table-top measurement data into a format compatible with EMA3D’s numerical simulation, which can in turn be used to extract the far-field EM emission pattern.  He has developed software tools to expand EMA3D’s abilities in the thermal effects of lightning and geometry export for space charging applications, and is the primary developer of EMA3D-Internal, EMA’s fully 3D internal space charging software tool.

Attendees of this IEEE Spectrum webinar have the opportunity to earn PDHs or Continuing Education Certificates!  To request your certificate you will need to get a code. Once you have registered and viewed the webinar send a request to gs-webinarteam@ieeeglobalspec.com for a webinar code. To request your certificate complete the form here: http://innovationatwork.ieee.org/spectrum/

Attendance is free. To access the event please register.
NOTE: By registering for this webinar you understand and agree that IEEE Spectrum will share your contact information with the sponsors of this webinar and that both IEEE Spectrum and the sponsors may send email communications to you in the future.​

Original Link

Your Power System Failed its Conducted EMI Test – Now What?

You just got your test results back from the conducted emissions test lab, and your product failed. Now What?

You just got your test results back from the conducted emissions test lab, and your product failed.

Now what? 

Power supply switching noise creates conducted emissions, as do other circuits with regular switching. This webinar suggests and reviews concepts that can be used as starting points to help divide and conquer your challenge. Attendees will narrow the field of focus of a complex system to a few components by learning the signatures that can help guide you during troubleshooting. 

The interpretation techniques can be used to help identify the source of the noise that is getting past the conducted emissions filter, and measured at the test lab. 

We will discuss current wave shapes vs. frequency, common mode vs. differential mode currents, and the corresponding components to control these currents in a conducted emissions filter. We will conclude with a special topic for regulated power supplies: when filters can interfere with power supply stability and cause the failing test result.

PRESENTERS:

  http://event.on24.com/event/18/16/28/8/rt/harry_vig_casual.jpg  Harry Vig, Application Engineer, Vicor Corporation

Mr. Harry Vig graduated from the University of Waterloo in Canada with a B.Sc. in Electrical Engineering in 1988. He has worked as a test engineer and design engineer in the fields of power electronics, opto-electronics, high speed networking, thermal controls and home theatre audio and video products.

 He is currently an Application Engineer at Vicor Corporation, helping customers use Vicor power electronics products successfully in their own designs.

  

Attendees of this IEEE Spectrum webinar have the opportunity to earn PDHs or Continuing Education Certificates!  To request your certificate you will need to get a code. Once you have registered and viewed the webinar send a request to gs-webinarteam@ieeeglobalspec.com for a webinar code. To request your certificate complete the form here: http://innovationatwork.ieee.org/spectrum/

Attendance is free. To access the event please register.
NOTE: By registering for this webinar you understand and agree that IEEE Spectrum will share your contact information with the sponsors of this webinar and that both IEEE Spectrum and the sponsors may send email communications to you in the future.​

Original Link

Shielding Effectiveness of Expanded Metal Foils

Careful circuit design can minimize EMI, but additional shielding measures are often required.

Expanded metal foils are versatile, effective EMI shielding materials. EMFs are formed from thin metal foils, creating a lightweight, strong and flexible sheet material. Expanded copper foil is commonly used for EMI shielding, but aluminum, nickel, Monel and stainless-steel foils can also be used when there are unique specifications.

Original Link

Increase Reliability and Efficiency in Power Converter Designs

Tips for better power conversion.

Efficiently create and debug power converter designs using wide-bandgap power devices for vehicle electrification and HEMS applications to maximize their full potential. Learn more by reading Keysight’s three-part application note series, Increasing Reliability and Efficiency in Next Generation Power Converter Designs:

  • Part 1 – Power Device and Component Evaluation
  • Part 2 – Design Software Simulation
  • Part 3 – Hardware Design and Debug

Original Link

How to Optimize the Scalability & Performance of a Multi-Core Operating System

Best Practices for Architecting a Scalable Real-Time Application on an SMP Platform

Many real-time operating systems (RTOS) users upgrade their hardware platforms expecting to improve application performance, but end up disappointed in the results.

In this white paper, we address why RTOS application performance sometimes fails to improve with a more powerful CPU, and more importantly, what you can do about it to ensure optimal scalability and performance.

Original Link

How to Create an IoT Edge System Prototype

Once a successful proof-of-concept has been established, what’s next?

Download this paper to learn how to model and simulate a pressure sensor, add in the supporting electronics, and develop the operational software.

Original Link

Get Tips to Build Your Power Supply Skill Set

More of today’s design problems are being caused by the systems that power them. Designs are placing higher demands on their power systems and so during the design phase, your power supply needs to be able to provide reliable power to your device under test. Learn expert tips in the “4 Ways to Build Your Power Supply Skill Set” eBook so you can better understand these issues and how to prevent them. 

Original Link

NI Announces New mmWave Radio Heads Targeted at 5G NR Research and System Prototyping

Advertisement

National Instruments

AUSTIN, Texas – July 10, 2018 – NI (Nasdaq: NATI), the provider of a software-defined platform that helps accelerate the development and performance of automated test and automated measurement systems, today announced two series of new millimeter wave (mmWave) radio heads for the mmWave Transceiver System. The new radio heads, which cover spectrum from 24.5 GHz to 33.4 GHz and 37 GHz to 43.5 GHz, are targeted at wireless researchers prototyping 5G New Radio (NR) systems.

As the first phase of 5G NR wraps up and the 3GPP finishes defining the communications protocol, the standards body also has identified specific frequency bands intended for 5G. Additionally, various regulatory bodies across the globe have begun the process of allocating spectrum for mmWave 5G mobile access. The coverage offered by these new radio heads enables researchers in countries like the United States, South Korea, Japan, Europe and China to quickly prototype 5G systems at the different frequency bands being considered.

NI provides engineers with the tools they need to prototype communications systems that help decrease the overall time to develop and introduce new technologies. In 2016, NI announced its mmWave Transceiver System, which features modular mmWave frequency software defined radio (SDR) technology designed for 5G and advanced wireless communications. Since then, NI has continued to release new mmWave radio heads to provide additional frequency coverage in line with the 3GPP. The new radio heads are completely compatible with the mmWave Transceiver System, including the baseband subsystem and software. They are also interchangeable with the previously released radio mmWave heads, which means the existing software can be reused with minimal changes.

The open, modifiable physical layer provided in the source code created using LabVIEW aligns with the Verizon 5G TF specification and Release 15 of 3GPP’s 5G NR specifications. It also pairs with the mmWave Transceiver System to offer researchers a flexible solution that operates as an over-the-air communications system out of the box. They can modify the source code for their specific research areas and use it for a wide range of applications including channel sounding, 5G NR algorithm development and optimization and beam steering algorithm research and test.  

“The commercialization of mmWave technology is accelerating, and there is a growing global consensus that it will be a critical technology to achieve the goals set forth by the 3GPP for 5G,” said Professor Theodore (Ted) Rappaport, founding director of NYU WIRELESS and the David Lee/Ernst Weber Professor of Electrical Engineering at the NYU Tandon School of Engineering. “While 28 GHz leads in early deployments, 39 GHz is another important frequency band that is being explored and is quickly gaining popularity. These new radio heads from NI will help us expand mmWave research and expedite commercialization.”

The new 24.5-33.4 GHz radio heads include the mmRH-3642, mmRH-3652 and mmRH-3602. The new 37-43.5 GHz radio heads include the mmRH-3643, mmRH-3653 and mmRH-3603. Find more information on the mmWave Transceiver System and configurations at http://www.ni.com/sdr/mmwave/

About NI

NI (ni.com) empowers engineers and scientists with a software-defined platform that incorporates modular hardware and an expansive ecosystem. This proven approach puts users firmly in control of defining what they need to accelerate their system design within test, measurement and control. NI’s solution helps build high-performance systems that exceed requirements, quickly adapt to change and ultimately improve the world.

Advertisement

Original Link

Improving Autonomous Vehicle Radars with Simulation

© Copyright 2018 IEEE — All rights reserved. Use of this Web site signifies your agreement to the IEEE Terms and Conditions.
A not-for-profit organization, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

Original Link

Characterizing High-Speed Coherent Optical Transmission Systems

Coherent optical transmission techniques have become the standard in fiber optical backbone networks. They come with new requirements along the whole communication link from the transmitter, through fiber cable and network elements to the receiver to be safe against signal distortions and link impairments. Learn what you need to consider.

Original Link

Selecting Common Mode Filter Chokes for High Speed Data Lines

High speed data interfaces like USB, HDBaseT™ and HDMI require careful consideration to ensure EMI-free communication. Of the many tools at the designer’s disposal, the common mode filter choke remains one of the most powerful. This paper discusses the benefits of common mode chokes and reviews the performance characteristics associated with their application.

Original Link

7 Things You Need to Know About 5G New Radio

Designing for 5G New Radio (NR) means dealing with new technologies, as they’re being defined. It’s easy to get lost in the buzz words as you try to focus–beamforming, over-air-testing, mmWave, numerology, and on and on. Keysight’s poster focuses on 7 things you need to know to win in 5G.

Original Link

How to Select the Right Materials for Industrial Enclosures

The enclosure material you select impacts the lifespan, functionality and performance of the components inside. What are the different protective specifications? In this technical paper, you’ll find field-tested recommendations on enclosure materials and learn how your enclosure is impacted by environmental considerations, modifications, strength and weight choices and climate control requirements.

Original Link

Low-Cost SBCs are Ideal for Industrial and Medical Applications

Advertisement

Figure 1

Industrial embedded computer system maker WinSystems has introduced a new series of single board computers (SBCs) in a NANO-ITX form factor. While measuring just 4.27 inches (120 mm) square, these ITX-N-3800 industrial SBCs offer robust I/O and expansion options, an extended operating temperature range, and abundant functionality for IIoT applications. The series is ideal for industrial control and medical applications, as well as others that require the ability to configure a complete system in a small, lightweight SBC. With their FCC and CE ratings, these SBCs are also well-suited to communications and digital signage applications.

The ITX-N-3800 series delivers midperformance processing through its low-power Intel® E3800 Atom™ (formerly Bay Trail) processor, which is available in single, dual and quad cores. The E3800 is a system-on-chip (SoC) specifically designed for embedded systems. For memory, the ITX-N-3800 also has a 204-pin SODIMM socket that supports up to 8GB of DDR3-LV System RAM and two high-speed SATA storage interfaces.

Onboard I/O capabilities include dual Gigabit Ethernet ports, four USB 3.0 host ports, plus DisplayPort, VGA connector and LVDS video outputs. The ITX-N-3800 also offers PCle and Mini-PCle expansion slots. Additional interfaces include two USB 2.0 ports, one serial RS-232/422/485 serial channel, one high-definition audio port, eight general purpose input-output (GPIO) lines and a watchdog timer. Clear, vivid graphics are powered by the Intel low-power Gen7 graphics engine, supporting the simultaneous display of CRT/DisplayPort/LVDS video.

Designed for industrial environments, the ITX-N-3800 uses less than 10 watts of power and is rated for fanless operation in temperatures ranging from -40°C to +80°C. It supports Linux, Windows® 10 desktop, Windows 10 IoT and other x86-compatible real-time operating systems. Drivers for this NANO ITX industrial SBC series can be downloaded from the WinSystems website.

ABOUT WINSYSTEMS

Founded in 1982, WinSystems, Inc. designs and manufactures industrial single board computers (SBCs), I/O modules, and panel PCs designed to perform reliably in harsh environments with extended temperature operating ranges and resistance to shock and vibration. Product lines include rugged, compact standards such as 3.5-inch SBCs; PC/104, PC/104-Plus, EPIC, EBX and NANO-ITX form factors; COM Express carrier boards; and STD Bus products. These components are engineered for harsh, rugged environments, which include industrial IoT, automation/control, transportation management, energy management, Mil-COTS, medical and communications applications.

For more information, contact Technical Sales Director George Hilliard at sales@winsystems.com or 817-274-7553, ext. 125. Visit us online at www.WinSystems.com.

Advertisement

Original Link

Signal Analysis Measurement Fundamentals Optimize Noise Floor, Resolution Bandwidth, and More

A signal analyzer is an essential measurement tool used in all phases of the product life cycle. This “Measurement Fundamentals” note shares techniques to optimize your instrument attributes such as noise floor, resolution bandwidth, dynamic range, and sensitivity so you can can make the best measurements for your test application.

Original Link

Designing & Debugging RTOS Based IoT Applications

Embedded devices are being connected to the internet at a dizzying rate. Successfully creating an IoT device requires developers to master their RTOS and debugging techniques in addition to learning about internet connectivity. In this webinar, attendees will learn about advanced RTOS application design techniques using ThreadX that include how to properly manage memory, use event chaining and setup an embedded connection to Amazon Web Services (AWS). We will also use Percepio Tracealyzer to learn how to trace our IoT application to not just understand how it’s performing but also to debug the application. Attendees will learn how to create user events and monitor the state of their TCP/IP stack. 

This webinar will utilize hands-on demonstrations using ThreadX and Percepio Tracealyzer with source code being readily available for attendees.

PRESENTER:

 

 

Brad Rex, Product Marketing & Business Development Manager, Renesas

Brad Rex is product marketing and business development manager for the Renesas Synergy platform. He has 20 years of experience in embedded design and development, covering both hardware and software. Starting with ASIC design and verification, he moved on to directly supporting customer software development as both an applications and field applications engineer, successfully getting a wide variety of customers ranging from consumer, industrial and automotive into production. Brad holds an electrical engineering degree from The University of Arizona.

Attendees of this IEEE Spectrum webinar have the opportunity to earn PDHs or Continuing Education Certificates!  To request your certificate you will need to get a code. Once you have registered and viewed the webinar send a request to gs-webinarteam@ieeeglobalspec.com for a webinar code. To request your certificate complete the form here: http://innovationatwork.ieee.org/spectrum/

Attendance is free. To access the event please register.

NOTE: By registering for this webinar you understand and agree that IEEE Spectrum will share your contact information with the sponsors of this webinar and that both IEEE Spectrum and the sponsors may send email communications to you in the future.​

Original Link

GeekPwn 2018: So you think you can fool AI?

GeekPwn 2018: So you think you can fool AI? · TechNode

Original Link

Preventing and Eliminating Lightning Damage with Surge Arrestors

© Copyright 2018 IEEE — All rights reserved. Use of this Web site signifies your agreement to the IEEE Terms and Conditions.
A not-for-profit organization, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

Original Link

5 Things to Know About 5G New Radio

Learn about the recently specified New Radio physical layer implementation that makes the 5G future possible, including the waveforms, numerology, millimeter wave operation and multiuser MIMO and the concept of bandwidth parts for more efficient spectrum utilization.

Original Link

Digital Enterprises – How Product Analytics can be used to automate insights to create actionable intelligence

Trends in the Electronics Industry such as intelligent, connected devices are disrupting how enterprises develop products, bring them to market, and evolve them over time.  Successful digitization strategies require an integrated approach to this flow of ideation, realization and utilization. The transformation in the utilization phase is arguably the most dramatic, since it has been driving large increases in a solution’s value and even new business models. Increasingly, the data explosion from Advanced Manufacturing (Industry 4.0) and smarter more connected devices is complicating efforts to gain visibility to prod­uct and supply chain performance. Data is dispa­rate, out of context and often inaccessible. Yet, customers increasingly demand rapid resolu­tion of issues and innovation driven by their own product experiences.

In this webinar, the first in our series: Digital Enterprises – Electronics and Semiconductor Industry, we will focus on the role of product analytics in optimizing the utilization phase of an enterprise’s solution.  We’ll focus in on the following challenges and show you how to:

  • Close the loop between product design and performance
  • Discover emerging product trends to prevent recalls
  • Eliminate time and costs required to repeatedly consolidate and search big data
  • Empower data-driven decision making across the organization
  • Improve customer experience

You may think you’re doing this today, right? Well, our experience is that traditional analytics projects are failing to deliver on expectations while they consume excess time and budget. Please join us while we take a deeper dive into some of the new and fascinating areas and technological advances that are transforming the electronics industry.

PRESENTER:

       

Fram Akiki, Vice President, Electronics Industry – Siemens

Fram has over 30 years of experience in the electronics and semiconductor industry.  Prior to joining Siemens, Fram was an executive for 12 years with Qualcomm in their chipset division and 21 years with IBM in their microelectronics group. Fram holds a B.S. in Electrical and Computer Engineering from Clarkson University and a M.S. in Electrical Engineering and a M.B.A. in International Business from The University of Vermont.  He has authored a number of white papers, holds a patent on RFID/Cellular connectivity for the IoT market and is an adjunct instructor at Clarkson University.

    

PRESENTER:

       

Jeff  Spencer, Portfolio Development Executive – Siemens

Jeff Spencer is a Portfolio Development Executive at Siemens with over 22 years of industry experience in Big Data Analytics, 3D Design and Product Lifecycle Management.

      

Attendees of this IEEE Spectrum webinar have the opportunity to earn PDHs or Continuing Education Certificates!  To request your certificate you will need to get a code. Once you have registered and viewed the webinar send a request to gs-webinarteam@ieeeglobalspec.com for a webinar code. To request your certificate complete the form here: https://fs25.formsite.com/ieeevcep/form112/index.html

Attendance is free. To access the event please register.

Original Link

Mobile devices and cloud computing are revolutionizing interior design

Mobile devices and cloud computing are revolutionizing interior design · TechNode

Original Link

Sharpening your weapons in a digital world: A new approach to security at GeekPwn 2018

Sharpening your weapons in a digital world: A new approach to security at GeekPwn 2018 · TechNode

Original Link

Modeling the Etching of Nanostructures

To learn about modeling the etching of nanostructures, tune into this webinar featuring guest speaker Derek Bassett from Tokyo Electron America.

In semiconductor device manufacturing, the etching out of material in an acid bath in order to make various nanostructures is a basic and important process used throughout the industry.  The mathematical modeling of these kind of processes is an important tool, since it is difficult or sometimes impossible to directly observe the etching process in situ.

In this webinar, Derek will show how to build a model using Fick’s law and surface reactions and how to describe the etching of a solid material using a quasi-steady-state numerical simulation. He will show the modeling process live in the COMSOL Multiphysics® software as well as discuss how to take into account the change in shape of the simulation domain. Simulation results will be investigated, including the uniformity of etching of adjacent structures, how long it takes for the material to be etched, the depth of the resulting trench and effect on reactants’ diffusion, and the influence of different process conditions.

The webinar will conclude with a Q&A session.

Numerical simulation of the change in shape from a phosphoric acid bath etching out horizontal disks in a nanodevice made of silicon nitride and silicon dioxide. From left to right: the liquid domain at the beginning of the etching process, liquid domain when the material removal is halfway through, and final liquid domain shape. The solid domain is not shown.

PRESENTERS:

 

Derek Bassett, Tokyo Electron

Derek Bassett graduated from Brigham Young University with a BS in chemical engineering in 2004 and earned his PhD in chemical engineering from the University of Texas in 2010. Since then, he has worked at Tokyo Electron in the Advanced Technology Group. His work involves modeling, designing experiments, and performing simulations in order to improve and optimize semiconductor production tools. Mostly, he focuses on the spraying, coating, etching, and drying of wafers and using fluid dynamics to better understand and optimize those processes.

Attendance is free. To access the event please register.

NOTE: By registering for this webinar you understand and agree that IEEE Spectrum will share your contact information with the sponsors of this webinar and that both IEEE Spectrum and the sponsors may send email communications to you in the future.​

Original Link

Broadband ADC with X-point switch – Un-paralleled Flexibility in Multi-channel RF applications

The AQ600 is a high speed, broadband analog to digital convertor comprised of four 12-bit, 1.5 Gsps cores linked to a flexible wideband cross point switch (CPS). The device offers an input signal bandwidth up to 8 GHz (extended bandwidth mode) enabling direct sampling in high order Nyquist zones.

The CPS allows the ADC cores to sample in either synchronous (in phase) or time interleaving modes. A high-performance clock and synchronization system manages fine timing both within the device and across multi-devices. Thus, designers gain a free-hand in operating the part as a 4-channel ADC at 1.5 Gsps, a 2-channel device sampling at 3 Gsps or combining all four channels to sample a single channel at 6 Gsps.

Output data is formatted for transmission using the ESIstream, low overhead, low latency, open source serial digital interface operating at up to 12 Gbps.

Key topics

  1. A quick architectural overview – What’s different about the AQ600?

  2. The benefits of an integrated high performance cross point switch

  3. Wideband operation enables high order Nyquist zone direct sampling

  4. Programmable device features – key controls and trimming facilitated by the SPI interface

  5. Where will it be used and why?

PRESENTER:

 

 

Mark Holdaway, electronic engineer and technical content producer

Mark’s career has revolved around analog ICs. Much of that time working on high performance, signal path applications. Formative years were spent as an application engineer with National Semiconductor (now part of TI) in the UK followed by a transfer to Munich as marketing manager.

He enjoyed a career defining stint as marketing director with start-up Xignal, successfully helping define and launch the first, multi-channel, continuous time delta sigma (CTDS) ADC for portable medical ultrasound.

Throughout his career, Mark has been driven to write about technology and today dedicates time crafting multimedia technical content. At Teledyne e2v he’s helping explain their innovative data convertors. Aspiring to clear communication and reduced cognitive loading, Mark takes George Bernard Shaw’s dictum to heart:

‘The single biggest problem with communication is the illusion that it has taken place.’

Getting the audience beyond that illusion remains his priority.

Attendees of this IEEE Spectrum webinar have the opportunity to earn PDHs or Continuing Education Certificates!  To request your certificate you will need to get a code. Once you have registered and viewed the webinar send a request to gs-webinarteam@ieeeglobalspec.com for a webinar code. To request your certificate complete the form here: https://fs25.formsite.com/ieeevcep/form112/index.html

Attendance is free. To access the event please register.

NOTE: By registering for this webinar you understand and agree that IEEE Spectrum will share your contact information with the sponsors of this webinar and that both IEEE Spectrum and the sponsors may send email communications to you in the future.​

Original Link

Crossing borders: China’s G5 Capital launches the Global Investors Alliance

Crossing borders: China’s G5 Capital launches the Global Investors Alliance · TechNode

Original Link

Optimizing BAW Filters for 5G Connectivity

This paper describes the challenges in using legacy CAE software for designing 5G-capable RF filters such as film bulk acoustic resonators. Discover OnScale’s advanced solver and cloud integration capabilities by reading this full-3D FBAR design study, with thousands of distinct models being solved in a matter of hours.

Original Link

SMPTE ST 2110: Structuring the Future of Broadcasting

Advertisement

Internet Protocol (IP) technology is the wave of the future for the broadcasting industry, providing more flexibility, scalability, and cost savings, plus increased mobility – IP networks have been deployed just about everywhere, including in the International Space Station and Antarctica. You may even be holding an IP device – your smart phone – in your hand right now.

However, until recently, vendors have been battling to control IP while end users simply wanted the industry to settle on one method of working. Agreeing to one set of standards is critical for the industry to move forward, and finally, those standards have been defined.

The Society of Motion Picture and Television Engineers (SMPTE®) has created the SMPTE ST 2110 Professional Media Over Managed IP Networks standards suite, a major contributing factor in the movement toward one common IP-based mechanism for the professional media industries. With this suite, manufacturers will be able to create products that work seamlessly together in an IP-based studio.

SMPTE President Matthew Goldman, Senior Vice president of Technology, TV and Media at Ericsson, says, “Radically altering the way professional media streams can be handled, processed and transmitted, SMPTE ST 2110 standards go beyond the replacement of SDI (serial digital interface) with IP to support the creation of an entirely new set of applications that leverage information technology (IT) protocols and infrastructure. The formal standardization of the SMPTE ST 2110 documents enables a broad range of media technology suppliers to move forward with manufacturing to meet the industry’s high demand for interoperable equipment based on the new suite of standards.”

SMPTE ST 2110 delivers unprecedented interoperability and provides a solid foundation expected to accelerate adoption of video over IP and help the industry grow at scale.

SMPTE Director of Standards Development Thomas Bause Mason says, “Thanks to the ST 2110 standards suite, every element that has been part of the traditional SDI studio can now be put into an IP studio.”

SMPTE ST 2110 is made up of a number of separate documents:

  • ST 2110-10: system overview and synchronization

  • ST 2110-20: uncompressed video format details

  • ST 2110-21: management of torrents of packets needed to carry an uncompressed video signal

  • ST2110-30: uncompressed PCM audio

  • ST 2110-40: carrying the all-important metadata over IP networks

Good Timing

The key to SMPTE ST 2110 is timing. The standards make it possible to separately route and break away streams of audio, video and ancillary data over professional IP networks in real-time for the purposes of live production, playout and other professional media applications. Each essence flow may be routed separately and accurately brought together again at the end point. The component flows are synchronized, so the essence streams are co-timed to one another while remaining independent.

This advance simplifies actions such as adding captions, subtitles, and teletext, as well as processing multiple audio languages and types.

“That opens the door to [many advantages], such as taking audios and sending them off independently into an audio sub-system, without the burden of all the video overhead of SDI; or taking a closed-captioning stream and sending it to a service in the Cloud over IP,” says Paul Briscoe, a member of the SMPTE ST 2110 Working Group and Principal Consultant at Televisionary Consulting. “ST 2110 allows us to replicate the existing systems we build today with SDI – to emulate them entirely. Essentially, we can take an SDI signal, fully transport it as independent essence streams over IP, and put it back together anywhere else and make another SDI.”

In other words, with SMPTE ST 2110 “we can now build highly efficient and flexible media systems, which move around and deal with only the essential pieces needed,” says Briscoe.

IEEE

Clocks defined in ST 2110-10.

Adoption Drives Changes

In an article written by Wes Simpson, he notes that manufacturers are more than willing to embrace the new standards, and outlines the changes that will be driven by the adoption of SMPTE ST 2110 for broadcasters. These include:

Common Timing: IEEE 1588 Precision Time Protocol allows devices to be driven by a common master clock at accuracies of better than 1 microsecond, providing complete video and audio synchronization across an entire facility.

Simplified Infrastructure: Say good bye to individual cable connections for each signal path. Using high-speed Ethernet, a single connection can support multiple uncompressed HD video along with hundreds of uncompressed audio signals.

Reduced Bandwidths: SMPTE ST 2110-20 signal with 1080p video occupies less than 2.67 Gbps, freeing up about 300 Mbps of bandwidth, almost enough capacity to carry one hundred audio signals. By sending only image pixels, the new standard moves to a system of only sending elementary signals, and removing the need for audio and metadata embedding and de-embedding.

Improved Versatility: SMPTE ST 2110 includes a robust mechanism for defining a wide range of video formats, including multiple bit depths, multiple colorimetry schemes, any conceivable frame rate, and other associated parameters. Separating the transport format from the video format gives broadcasters the ability to choose exactly the right format they need at each step along the broadcast chain, and still be able to transport every version over a common infrastructure.

SMPTE ST 2110 in Action

The SMPTE ST 2110 standards are already being embraced by the industry with tremendous results.

Sony and CenturyLink, Inc., recently completed a test to determine the operational latency of a long-distance Remote Integration (REMI) connection between New York and London. The entire REMI environment was built on the SMPTE ST 2110 standard with Sony IP equipment.

As part of the test, the companies simulated a live broadcast for a global news organization, resulting in the world’s first transatlantic SMPTE ST 2110 IP live transmission. The simulation yielded no discernable operational latency on the video sources, despite the significant distance between the switcher processor and control panel.

Typically, a news organization would need a control room and a switcher for every show. Now, that resource can be shared across multiple programs, and with IP, can be shared across multiple bureaus and locations.

NEP, technical production partner, recently launched the first mobile unit in North America designed and integrated specifically around SMPTE ST 2110. NEP created one of the most flexible mobile units ever for sports entertainment company, ESPN.

Dubbed EN3, the truck is NEP’s fourth to feature an IP router, but the first with a “classic” footprint. Joe Signorino, VP, Systems Integration, NEP U.S. Mobile Units, says previous versions “were primarily huge, five-truck systems. We always had an eye towards creating a more [classic] footprint and a lot quicker setup and strike. I think this unit helps define the near future for what we’ll be doing at NEP.”

Signorino elaborates on the EN3 origins, “When we started on this project [over a year ago], SMPTE 2110 was well on its way to completion of the video and audio portions of the standards. Obviously, we didn’t want to build something that we’d have to end up changing shortly, so we pushed several manufacturers to get on the bandwagon with us for a 2110 deployment and started getting more equipment connected via IP.”

One of the key things the company worked very closely on was the interface between the switcher and the router. Installing the IP router saved weight and space, and also reduced power needs, noise, and heat.

According to Signorino, IP “not only brings more flexibility but also scale, so you are able to scale the size of the system from one show to another and make something that is a lot larger than would be possible in an SDI-based system. That is certainly the case with EN3.”

IEEE

NEP EN3 is the first truck in North America in which the switcher is tied to the router via SMPTE ST 2110.

Game Changer

With the ever-growing demands of today’s audiences, SMPTE ST 2110 is a real game changer for the broadcasting industry, bringing top speed and quality to the forefront for a variety of projects.

“Professional media is a uniquely challenging field because of its real-time nature and high quality-of-service requirements, both of which consumers may take for granted,” says SMPTE President Matthew Goldman in a press release announcing the publication of SMPTE ST 2110-40. “The standardization of SMPTE ST 2110 documents provides broadcasters, producers, and media technology suppliers with the tools they need to meet these requirements while working in the IP realm.”

Created in a record-breaking two years, SMPTE ST 2110 will guide IP-based broadcasting for years to come. Of course, audiences will drive future hurdles to jump, leading to the continued iterations of innovation. But that’s all part of the game.

Resources

(21 Apr 2017). What SMPTE 2110 is exactly and why it matters for production. RedShark.

(9 Apr 2018). Sony and CenturyLink Complete World’s First Transatlantic SMPTE 2110 IP Live Transmission. CenturyLink.

Bevir, George. (18 Sept 2017). SMPTE approves ST 2110 standards suite for IP. IBC365.

Dachman, Jason. (8 May 2018). NEP Rolls Out Ultra-Flexible EN3 With SMPTE ST 2110 IP Core for ESPN. Sports Video Group.

Goldman, Michael. (Jan 2018). SMPTE ST 2110: IP Revolution’s Next Step. SMPTE Newswatch.

Pennington, Adrian. (2 Apr 2017). The future of SMPTE 2110 and beyond. Sports Video Group Europe.

Simpson, Wes. (18 Oct 2017). What SMPTE-2110 Means for Broadcasters. TV Technology.

Advertisement

Original Link

Doing field work: Hujiang EdTech’s CCtalk works with Harvard Business School

Doing FIELD work: Hujiang EdTech’s CCtalk works with Harvard

Original Link

GeekPwn2018: Robot agents enter the arena to do battle

GeekPwn2018: Robot agents enter the fray to do battle

Original Link

Contribute to Arm TechCon ‘18: Call for Papers Now Open

Advertisement

Internet entrepreneur and Dropbox co-founder Drew Houston once said, “A lot of really great, innovative things have happened when people just didn’t know it wasn’t supposed to be possible.”

That sums up the engineering spirit as we confront difficult challenges every day from the comfort of our cubicles.

Thankfully, today’s biggest challenges are also today’s biggest opportunities:

  • Artificial intelligence and machine learning
  • Internet of Things
  • Security
  • Functional safety
  • Automotive electronics and autonomous vehicles design

As engineers take on these challenges, questions arise, and we generally peek over the partition to seek an answer from a colleague. Or they email or call a friend. But that’s not always helpful.

There is one place, however, where the search for information and the spirit of possible really coalesce and fluoresce: conferences. In a world drowning in information, conferences and exhibitions remain one place where engineers can gather to share and learn information to overcome design challenges and architect the future.

Arm TechCon 2018 is just such a place. Arm TechCon 2018, the premier electronics-industry event, has an expanded mission, a new look and a new location this year. But most importantly, Arm TechCon 2018, to be held Oct ober 16-18, in San Jose, California, will be packed with people who just don’t know things aren’t supposed to be possible.

Working on AI and ML? What kind of processor will be best for optimal machine learning computation? What ethical and social constructs must we consider when building ML algorithms and using AI in general?

Developing an IoT system to unleash the untapped data in your enterprise? Find out how the industry will scale to a world where 1 trillion connected devices exist in a global data-generating lattice. Discover new ways to deploy and provision those devices and manage your system seamlessly.

How should you think about edge computing as we seek to capture and unleash more data for business insight? What compute capabilities are best deployed where? And how do we continue to ensure that solutions are power- and compute-efficient?

Are you awaking late at night worried about the next security breach and how to make your products and services impenetrable? It’s become clear in the past year that a concerted, industry effort is required to deliver the type of end-to-end security solutions that consumers will have confidence in, but how do we get there?

As design rapidly expands for semi- and completely autonomous vehicles what are the best platforms and functional safety approaches design teams need to consider?

ARm Techon Call for Papers

The town square for problem-solving

These are issues and questions confronting most engineers, and they’re issues that Arm TechCon continues to address as we approach this fall’s event. If you’re looking to contribute to this conversation by sharing your insights and learnings, we need your help. The Arm TechCon 2018 call for papers is now open until June 8.

Elevate your pride of ownership and cement the sense that you’re contributing to something greater than just yourself, your engineering team or your company by submitting a paper, panel or presentation proposal today.

This year, Arm TechCon has seven technical tracks covering the important areas of system and software design today:

  • Automotive, Industrial & Functional Safety
  • Connected Devices & Cloud Services
  • Edge Computing & Machine Learning
  • Embedded Software Development
  • High-Efficiency Systems
  • System Design Methodology
  • Trust & Security

Arm TechCon is the world’s largest event focused on Arm and its partners’ technologies and driving the innovation conversation forward. Submit your paper ideas and become one of the more than 100 speakers educating and informing the Arm community on a diverse range of real-world challenges facing software developers, hardware engineers, and executive managers.

In addition, if you’re in information-gathering mode–looking for the right answers to your design challenges–it’s never too early to register to attend Arm TechCon 2018.

When you walk into Arm TechCon this fall, a world will open before you: Keynotes from Arm executives and experts and industry visionaries; information and demos of the latest Arm-powered systems from around the world, panels and presentations and networking opportunities on which you really can’t put a value.

So, contribute and come join us to listen to and network with colleagues who just refuse to believe that some things aren’t supposed to be possible.

Advertisement

Original Link

Cyber Security in the Connected World

Key targets for cyber-attacks include software products, IoT-connected devices, and the data that gets exchanged across the networks. To best protect your assets and your customers’ privacy it’s critical you understand the potential threats, be up-to-date in the latest defensive techniques, and be prepared to stand vigilant against future attacks.

This webinar will provide critical information to keep you informed and to help address potential vulnerabilities affecting your products, assets, and customers.

PRESENTER:

 

 

Wayne Stewart, Director EWA-Canada, an Intertek Company

Wayne is a Director at EWA-Canada, an Intertek company.  During his 14 years with EWA-Canada and since graduating with a BASc in Computer Engineering, Wayne has cultivated experience across many areas of the cyber security domain, including intrusion detection, cryptography, vulnerability assessment, penetration testing, static code analysis, payment technologies, and product reviews.  During that time, Wayne has held a variety of roles including IT Security Specialist, Product Manager, and Lab Manager.

Attendees of this IEEE Spectrum webinar have the opportunity to earn PDHs or Continuing Education Certificates!  To request your certificate you will need to get a code. Once you have registered and viewed the webinar send a request to gs-webinarteam@ieeeglobalspec.com for a webinar code. To request your certificate complete the form here: https://fs25.formsite.com/ieeevcep/form112/index.html

Attendance is free. To access the event please register.

NOTE: By registering for this webinar you understand and agree that IEEE Spectrum will share your contact information with the sponsors of this webinar and that both IEEE Spectrum and the sponsors may send email communications to you in the future.​

Original Link

How to optimize filter designs for 5G mobile front-ends

Filters for 5G networks must operate to 6 GHz and beyond. Filter technologies like FBARs, SMRs, and TC-SAWs will help enable these advancements and create a new $20B market. However, the traditional design and optimization practices that are heavily reliant on trial-and-error prototyping will not be sustainable in this new, fast-paced market.

Consequently, industry leaders are adopting FEM approaches to virtually prototype devices and explore massive new design spaces to find optimal and robust solutions. In this webinar, we will discuss the overall 5G filter market, the need for new methods of design and optimization of RF filters, and demonstrate a technique to exploring expansive design spaces using OnScale Cloud.

PRESENTERS:

 

 

Gerry Harvey, VP of Engineering, OnScale

Dr. Harvey is a numerical scientist and engineer with 15 years of experience applying FEA/FEM approaches to complex engineering problems. An acoustics expert, Dr. Harvey supports hundreds of RF filter engineers who use OnScale every day for filter design optimization.

 

Ryan Diestelhorst, VP of Strategy, OnScale

Dr. Diestelhorst is an accomplished MEMS expert who has taken new MEMS technologies from university research to smartphone design-wins in record time. His approach to FEA modeling and simulation of MEMS devices is largely responsible for this success. Ryan’s passion is helping other engineers discover how to utilize the power of Cloud CAE to cut down cost, risk, and time-to-market of physical tape-outs.

Attendees of this IEEE Spectrum webinar have the opportunity to earn PDHs or Continuing Education Certificates!  To request your certificate you will need to get a code. Once you have registered and viewed the webinar send a request to gs-webinarteam@ieeeglobalspec.com for a webinar code. To request your certificate complete the form here: https://fs25.formsite.com/ieeevcep/form112/index.html

Attendance is free. To access the event please register.

NOTE: By registering for this webinar you understand and agree that IEEE Spectrum will share your contact information with the sponsors of this webinar and that both IEEE Spectrum and the sponsors may send email communications to you in the future.​

Original Link

Preparing transformers for the Internet of Energy – with Sensformer

The newly introduced Sensformer merges physics and information – turning transformers into info-hubs. A smart and robust IoT gateway securely transmits the minimum amount of required information to a cloud-based storage and visualization platform. In addition, the Sensformer provides an open platform that enables co-creation of customer-centric use cases and applications. Operators get a comprehensive and quick overview about their assets and can improve their operation by utilizing the offered visualization and analytics possibilities.

Today’s world is connected, and it is about time to also connect transformers digitally. This is what a completely new transformer product class is all about: the SensformerTM. No matter if you operate a transformer in a power generation plant, an industrial application or in the grid: Your assets will let you know their operational status and give an indication when abnormalities occur. The consequence: more transparency and flexibility at minimized risks and cost.

Transformers already are a vital and decisive part of power grids – no matter if conventional or digital. The SensformerTM will enable you to digitalize this important keystone of your grid. Now your transformers are connective!

In the Webinar you learn about the necessary sensors, the data transmission and data analysis app that can render the “black box” transformer transparent for you. Use your newly gained knowledge to simplify your asset management, enhance your operations and increase availability.

Are you interested in further information about the digitalization of energy systems? Download the Bloomberg whitepaper Digitalization of Energy Systems at: 

http://www.siemens.com/sensformer-download

PRESENTER:

       

Peter Vogel – Head of Innovations, Siemens Transformers

Peter Vogel is head of innovation sales at Siemens Transformers. Before, he was responsible for the sales of power and distribution transformers in the Asia-Pacific Region. He graduated his study in 2006 as a mechanical engineer. Afterwards he started to work at Siemens Power Service before joining the transformer business of Siemens in 2015.

                

Attendees of this IEEE Spectrum webinar have the opportunity to earn PDHs or Continuing Education Certificates!  To request your certificate you will need to get a code. Once you have registered and viewed the webinar send a request to gs-webinarteam@ieeeglobalspec.com for a webinar code. To request your certificate complete the form here: https://fs25.formsite.com/ieeevcep/form112/index.html

Attendance is free. To access the event please register.

NOTE: By registering for this webinar you understand and agree that IEEE Spectrum will share your contact information with the sponsors of this webinar and that both IEEE Spectrum and the sponsors may send email communications to you in the future.​

Original Link

Commercial Satcom Has What USSOCOM Needs to “Win-Transform-People”

Commercial Satcom Has What USSOCOM Needs to “Win-Transform-People”

The 2018 Special Operations Forces Industry Conference (SOFIC) is right around the corner, and if you attended last year, you’ll recognize this year’s theme: Win-Transform-People. For the second year, the conference will “emphasize the USSOCOM Commander’s vision to win the current fight, transform current capabilities and equipment for future threats, and focus on our greatest asset: operators and their families.” The satellite communications industry is at the ready to help the U.S. Special Operations Command realize this vision.

Assured communications enable the operator to make crucial decisions

Underlying all the USSOCOM Commander’s objectives is the extreme need for resiliency. Deb Woods, the U.S. Special Operations Command’s program executive officer for command, control, communications and computers, told National Defense:

“Assured communications enable the operator to make crucial decisions based on his sight picture of the battlefield derived from real-time enemy or friendly data. As net-centric warfare continues to evolve and our operators engage in disparate environments, assured communications become vital for success.”

While Woods and other USSOCOM officials are right to prioritize the need for resiliency and assured communications for special operations, these capabilities are already available to them. The majority of U.S. military intelligence, surveillance, and reconnaissance (ISR) data is carried over commercial satellite networks, and commercial satcom providers are continually evolving their networks to deliver state-of-the-art capabilities.

Consider, for example, the use of Class III UAVs for tactical ISR. In the past, the small antennas on these devices would have restricted bandwidth capabilities. Today, however, the Intelsat EpicNG high-throughput satellite platform provides dramatically greater performance for Class III UAVs, and allows much greater bandwidth using smaller antennas. Intelsat EpicNG enables throughput up to 5 times that of traditional satellites.

The USSOCOM can now take advantage of commercial innovations by procuring satellite connectivity as a managed service

The pace of technological innovation is constantly raising the bar of services available to the warfighter. Intelsat General is currently taking part in a study to help define the next generation of resilient ground architecture. The Wideband Communications Architecture Study (WCAS) is aimed at identifying flexible and efficient mechanisms to provide wideband transport and determining the operations management requirements needed to facilitate system control and situational awareness. Being at the “tip of the spear,” USSOCOM is typically the first to need such additional performance and flexibility.

Like Class III UAVs, rotary platforms do not require a runway and are thus highly versatile. To take advantage of helicopters for special operations and ISR missions, high data-rate sensors onboard helicopters must be able to connect to a centralized, teleport-based service.

Intelsat EpicNG can make this connection and allow for operations beyond a line-of-sight broadband service.

The USSOCOM can now take advantage of commercial innovations by procuring satellite connectivity as a managed service. This allows government and military customers to define the end service they require for specific missions and consume a defined service that meets their requirements. Subscription plans are available in gigabytes or by time on the network for guaranteed data rates.

With the availability of high-throughput satellites and flexible procurement models, USSOCOM can easily meet its requirements for resiliency and assured communications today. They simply need to take advantage of it.


Original Link

  • 1
  • 2
  • 4