Language: English | Deutsch | 中国的       Change Country
  • EEPROM
    Internal Oscillator
    D-to-A
    LCD Controller
    Any I2C
    ≥2
    ≥3
    Any CAN
    ≥2
    ≥3
    Any USB
    ≥2
    ≥3
    Any Ethernet
    ≥2
    ≥3
    Gb
    Any A-to-D
    10
    12
    >12
    Any PCI
    PCI-X
    PCIe
    Any DDR
    DDR1
    DDR2/3
    *Example: comparator security etc
    Reset
    Search
    What's new in the processor search engine?
  • Make your selections and choose "Search" below.
    Do you know the Tool order number?
    Enter all or part of the number here:
    Reset
    Search
  • Make your selections and choose "Search" below.
    Do you know the Tool order number?
    Enter all or part of the number here:


    Reset
    Search

Articles & Papers

Embedded Developer Magazine

Read the Articles

A Tale of Two Layerscapes

There are really two layerscapes- one is a software-based program and the other is an applications processor. One layerscape requires high-speed networking and communications technology to perform, and the other was designed to provide high-speed networking and communications for similar data-intensive applications.

Accelerating Code Development to Meet the Challenge of IoT Embedded Design

Now that more and more engineers are developing the embedded code that control Internet of Things (IoT) products, teams are under increased pressure to create better software in less time-- driven by the more frequent release cycles, higher costs and shorter delivery dates associated with the fiercely competitive global IoT market.

Software Security: Essential for Today's Connected Cars

Today's dream car will have hundreds of onboard sensors, more than fifty separate electronic control units (ECUs), about 100 million lines of code and, now, internet connectivity. All of this complexity is designed to not only optimize the performance of the engine, transmission, brakes, and steering, but also to enhance convenience and comfort. The flip side to this added functionality, however, is that connectivity opens the vehicle to new security concerns.

Designing with the Things in the Internet of Things

Reports predict that the resurgence of microcontroller sales in the coming years will be with MCUs that will potentially connect within the Internet of Things (IoT) and that the field is split between 8-bit and 32-bit devices. Wearables or smart homes might only require 8-bit MCUs, but once a gateway enters the picture, the application is sure to fall into the 32-bit MCU space.

The Growing Need to Protect Your Code and Your Organization

It is common for burrowing animals—moles, gophers, etc.—to build a second, secret tunnel to escape predators. We humans behave similarly, building secondary portals not only as a means of escape, but also as an entryway into our constructs—whether that takes the form of a door to the back porch or a backdoor embedded in code creating a point of access that could circumvent existing access controls.

Tap Tap Tech- The Internet of Things

The IoT has become a hot topic because it embodies the future that everyone always dreamed of. Yet, there are quite a few challenges to overcome. From a technical point of view, security is paramount, as many IoT products track very personal information. Also, you have all these devices trying to talk to each other but as of now, there are no real standards and communications are infrequently incompatible.

The GaN Power Revolution is Here

Over the past five years, GaN power FETs have shown to have an undisputed technical advantage over silicon. Starting with a fundamental materials’ limit advantage that is three orders of magnitude better than silicon, it was possible to construct initial devices that already had better electrical characteristics than the state-of –the-art silicon; GaN also showed much lower parasitic device capacitance values for the same device on-resistance.

Verifiable Security for the Embedded Internet of Things

The IoT is dragging embedded developers into the network security debate. Interconnectivity threatens user data and dependable solutions that minimize the risk to companies and their customers are now a requirement. As embedded devices become increasingly networked, there is a growing risk that poor software quality could affect the quality of the final product and the security of customers’ data.

Using SELinux and SMACK on Embedded Linux in Industrial and IoT Devices

Webinar Live on September 02, 2015 (10:00 AM US/PDT, 1:00 PM US/EDT) - The rapid growth in internet connected devices increases the opportunity for rogue elements to hack into systems and cause damage. This webinar will examine two tools available to embedded Linux system designers to develop robust devices intended for large-scale deployment in industrial and IoT connected systems. Register Now

Get Started with STM32F7

Webinar Live on September 01, 2015 (8:00 AM US/PDT, 11:00 AM US/EDT) - Do you need a drop-in replacement for your STM32F7 device with more power? With the STM32F7 Discovery board and MDK Version 5, learn how to set up a basic project, integrate STM32 Cube and test your debug connection. Learn how to find documentation and where to look for example projects. Register Now

5 Wireless Techonologies with 1 Architecture

On-Demand: Looking for the lowest power wireless connectivity solution? Learn how to use the new solutions in TI's new SimpleLink ultra-low power wireless MCU platform for very low power IoT (Internet of Things) and Industrial applications. This platform supports complete solutions for Bluetooth Smart, ZigBee,- ZigBee RF4CE, Sub-1 GHz, and 6LowPAN. This webinar will cover architecture, benefits of the platform, and how to get started evaluating and developing. Watch Now

Strategies to Develop Secure and Robust Embedded Devices

On-Demand:  In this webinar, learn a pragmatic approach to configuring a heterogeneous multicore ARM device built with ARM TrustZone technology and trade-offs of various implementations. Watch Now

Industry News