Staff Writer



Email: directiveconsulting1@gmail.com

Posts by Staff Writer:

How to Identify the I2C Slave Addressing Standard for Developers

It is common for embedded device developers and engineers to have questions about what slave address is needed to communicate with a given I2C (Inter-Integrated Circuit) device. There is no one-size-fits-all answer to this question. Some I2C slave devices use 7-bit addressing, some use 8-bit addressing, some use 10-bit addressing, and there a...

Learn How Industrial IoT Applications Are Impacting The Manufacturing Industry in 2019

Like everything else these days, the manufacturing world is using more technology to stay abreast of new trends and maintain a competitive edge. By 2020, Business Insider estimates that global manufacturers will invest around $70 billion on IoT technologies; this is in comparison to the $29 billion spent in 2015 on IoT solutions. Usi...

Impact Everyday Life: How Do Embedded Systems Work

Embedded systems engineering is full of opportunities to impact the everyday lives of people around the world. The global market for embedded systems continues to increase each year, with a recent report by analysts at Research and Markets projecting a global annual market growth rate of 6.5% CAGR up to 2024. With diverse applications in comm...

Sensor Networks: The Advantages and Disadvantages You Need To Know

In our data-driven society, innovators and engineers are looking at the Internet of Things (IoT) as an opportunity to introduce new data collection methods that will dramatically change how organizations learn about their surroundings and respond to threats and changes - and there's at least one new technology that's making an impact.

Of ...

Applications for Military Embedded Systems in 2019

The massive military defense budget of the United States ensures that it has access to the latest technology that uses embedded systems and computing to support troops in the battlefield. Embedded systems in military applications have different requirements than the ones we use in civilian life - they must be highly secure to prevent reverse ...

A Primer for Embedded Systems Security in 2019

Experts in computer and network security might be surprised to learn that embedded systems have significantly different security requirements than they are used to implementing. Embedded systems that are deployed into the field and expected to function for long periods of time with infrequent service need robust and reliable security featur...