Highlights

Maxresdefault 654b9b49d6767
Software

Observability Framework Exposes DDS

The platform brings to light any issues that may be impacting a data distribution service (DDS).
Maxresdefault 65428a8ed7a77
Microcontrollers

The Cortex-M85 Makes Its Debut

Renesas’ RA8 family is based on the Arm Cortex-M85 with Helium machine-learning acceleration.
Maxresdefault 653a5830b88c2
Security

Why Quantum Cybersecurity is Imperative

QuProtect leverages quantum-safe cryptography for secure communications wherever data travels, with complete cryptographic control for adaptive protection against classical and...
Maxresdefault 653a57ebb807a
Quantum Computing

What’s So Special About Quantum Computing?

Quantum computers are in the process of significantly expanding computing power, which creates opportunities for improving cybersecurity.
Hqdefault 65391abd11e25
Machine Learning

The Future of AI for Simulation in Automotive Apps

What considerations should developers focus on when setting up AI and automotive simulations?
Maxresdefault 652985f99f3d3
Quantum Computing

Distributed System Solution Inspired by Quantum Information Theory

How does quantum theory and distributed communication go together? Read to find out.
Alexandersikov | dreamstime.com
Alexandersikov Dreamstime Xxl 126587946 T X
Security

Device Security by Design Series - Available On Demand

This series of webinars addresses the security aspects and recommendations for IoT device design.
Maxresdefault 6504a04456ce7
Machine Learning

AI Models and the Role of Simulation in the Auto Industry

This video focuses on interactions between AI and simulation, the specific benefits within the automotive industry, and how MathWorks tools and solutions support engineers.
Maxresdefault 6509f394e862a
Boards

A Look Inside AMD's Kria K24 System-on-Module

AMD’s Kria family of system-on-modules (SOMs) adds the compact K24 module to complement the K26 that targets intelligent motor control and applications like robotics.
Promo Alexandersikov Dreamstime Xxl 126587946 T X
Security

Multicore processors and hard real-time applications: Mixing oil and water

This Device Security by Design webinar discusses how to identify execution paths in the code base using static analysis plus dynamic measurement of worst-case execution times....