


As new technologies, capabilities, and manufacturing equipment come into play, the prototyping phase validates the functionality of a new product.
A successful prototyping plan builds the foundation for a successful product launch, and serves as a demonstration vehicle that the design is viable to customers, partners,...
Published: Jun 22, 2022



New-system electrical and mechanical design portions have historically been separate endeavors employing different CAD tools. Schematics and electrical components were separate from mechanical components, with physical interactions between the two decoupled.
But CAD tool advancement bridges the two aspects into one...
Published: Jun 22, 2022



Internet of Things (IoT) has emerged in the last years as one of the most relevant terms in our society. However, the advanced needs and concepts of interconnectivity are not new ideas when it comes to the defense and military community, given that the connected battlefield and the data fusion and integration using different...
Published: May 16, 2022



Compare your scores to industry peers for key industrial security protections
Attacks on Critical Infrastructure are on the rise. Organizations need to leverage modern industrial security practices to avoid preventable breaches and the costly downtime, damage and public safety risks they cause.
This quick self-assessment...
Published: Jun 23, 2022



Experts discuss top cybersecurity gaps and how to address them
Retired U.S. General Gregory Touhill (Director of the Software Engineering Institute’s CERT Division) and former Rockwell Automation CISO Dawn Cappelli sat down for a interview with ISMG’s Tom Field, SVP of Editorial, to discuss the 2022...
Published: Jun 22, 2022



Read the Rockwell Automation and ISMG research report: Cybersecurity Preparedness in Critical Infrastructure.
Critical Infrastructure organizations increasingly realize that downtime from cyberattack can be catastrophic. The Colonial Pipeline ransomware attack, for example, resulted in 5 days of downtime,...
Published: Jun 22, 2022



In the grand scheme of advanced driver assistance systems (ADAS) and autonomous implementation, replacing a driver requires many hardware and software considerations, not only in sensing technology and processing, but also in electromechanical systems to steer and brake the vehicle. The ADAS trend is leading to newer...
Published: Jul 01, 2022



Heavy equipment engineers need to continuously improve and optimize equipment designs, but how can they get product designs right sooner to meet both project and product targets? Predictive performance engineering has tremendous business potential and allows companies to unlock new levels of innovation and performance....
Published: Jun 07, 2022



Brakes are some of the most crucial safety components in automobiles. Used to slow a vehicle’s momentum before parking and avoid collisions and accidents, braking systems have undergone rapid development throughout the years. Automobile brakes have evolved from the mechanical drum brakes of the early 19th century...
Published: Jun 29, 2022



Companies in all verticals are being asked to deliver new software and services for differentiated, customized, and compelling experiences. Embedded Linux fuels this new connected intelligent systems paradigm.
Companies that achieve success will have clarity around how to develop, deploy, and service their intelligent...
Published: Jun 23, 2022



In this publication we will review the challenges that mode-agile (WARM) radar and EW threat emitters pose to traditional static threat library implementations in radar and EW systems, and consider the architecture of cognitive artificial intelligence (AI) and machine learning (ML) systems that can be used to deliver effective...
Published: Jun 15, 2022



This quick self-assessment tool lets you benchmark your cybersecurity preparedness score against results from a 2022 research survey of Critical Infrastructure security leaders.
Upon completion, you’ll receive a customized report with a recommended roadmap to help you identify, protect, detect, respond and recover...
Published: Jun 22, 2022



Developing embedded solutions can be a journey. Not all applications start at the same place in the journey or take the same development path, but a common theme applies to the steps involved.
This e-book will walk the reader through this journey and touch on key considerations throughout development.
Download...
Published: Jun 23, 2022