Latest Stories

News
Motion Control

Securing CAN Networks in Commercial Vehicles

Commercial road vehicles are the backbone of the modern consumer economy. Almost any business from construction, to energy, to online retail at some point relies on the delivery of goods by...

Briefs
Connectivity

Risk Management for Cybersecure Networked Medical Devices

For developers and manufacturers of networked medical devices, IT security is increasingly becoming a challenge. While the number of cyber threats is growing significantly,...

Briefs
Electronics & Computers

Researchers Demonstrate 40-Channel Optical Communication Link

It achieves 40 channels by combining a frequency comb light source based on a new photonic crystal resonator developed by the National Institute of Standards and Technology (NIST) with an optimized mode-division multiplexer.

Issue Archive
Energy

Magazine Archives

2022 September August July June May April March February January 2021 December November October ...

Articles
Communications

Transforming Battlespace Communications

The Russian invasion in Ukraine has certainly raised the security stakes and intensified the need for simultaneous communications streams over a single platform.

Articles
Power

Real-Time Processors Key to the Zonal E/E Revolution

OEMs face major challenges with their vehicle architectures as they become more complex and unwieldy. They also want to speed up their innovation cycles while supporting intelligent...

Technology Report
Connectivity

SAE and NREL Partner to Strengthen EV-Charging Cybersecurity

Members of the electric vehicle industry gathered at the National Renewable Energy Laboratory (NREL) in early April to evaluate enhanced cybersecurity for the connections...

Articles
Electronics & Computers

The Future of Managing Mission-Critical Systems

Adhering to functional safety standards is demanding in terms of both time and money.

Articles
Connectivity

Secure to the Core

One major concern for manufacturers is how safe and secure it is to open the OT network’s doors to the internet.

News
Data Acquisition

SAE WCX 2022: EV Cybersecurity Threats

With war in Europe, a waning pandemic and inflationary and supply pressures rampant, you’d think there was plenty to worry about. Those lucky enough to attend the 2022 SAE WCX panel...

Products
Connectivity

Product of the Month: April 2022 Tech Briefs

A new suite helps Ada developers build safe, secure software as well as meet internal security and quality procedures.

Briefs
Connectivity

Hacker-Resistant Cloud Software System

The system guarantees the security of virtual machines in the cloud.

News
Electronics & Computers

Survey Reveals Cyber, Quality Challenges of Vehicle Connectivity

Cybersecurity is viewed as the number one challenge to solve for next-generation vehicles, according to findings from a global survey of automotive industry insiders. The...

Application Briefs
Connectivity

Protecting the U.S. Electric Grid with Physics-Based Cybersecurity

The grid’s growing size and complexity increases vulnerability to cyberattacks.

Briefs
AR/AI

AI Technology Foils Cyberattacks

The technology is aimed at protecting physical targets, such as utilities and infrastructure.

Facility Focus
Connectivity

Facility Focus: The Embry-Riddle Aeronautical University

Learn about the aviation, space, cybersecurity, and engineering achievements happening at Embry-Riddle.

Features
Sensors/Data Acquisition

Is Healthcare Ready to Pick Up the Pace in Cybersecurity?

Healthcare organizations face very difficult choices in balancing patient protection with financial demands.

From the Editor
Regulations/Standards

From the Editor - Cybersecurity: Playbook for Threat Modeling Medical Devices

New best practices for understanding medical device security.

Products
Test & Measurement

New Products: December 2021 Aerospace & Defense Technology

Single-board systems, self-encrypting drives, custom capacitor assemblies, and more.

Videos
Software

Overheard in Tech Support: Cybersecurity

Security standards are evolving to meet the increasing number of attacks. Sealevel is actively addressing concerns from device, location and cyber perspectives – and our team is enjoying the...

Articles
Manned Systems

Defending the Heavy-Vehicle Cyber Domain

The COVID-19 pandemic has served as a stark reminder of trucking’s essential role in keeping the economy moving. Hacking commercial vehicles poses grave risks that should not be ignored;...

Question of the Week
Manufacturing & Prototyping

Will Stretchable Smartphones Catch On?

Our “5 Ws” feature this month highlighted skin-like electronic circuits being developed at Virginia Tech.

SAE Standards News
Regulations/Standards

SAE and ISO Publish Joint Automotive Cybersecurity Standard

The new standard that will help ensure that cybersecurity is entwined throughout the entire product lifecycle.

Features
Connectivity

Show Preview: MD&M West

MD&M West brings together medtech engineers, business leaders, and innovative thinkers to create life-changing medical devices.

News
Manned Systems

Precision Ag Aids Sustainability

Ten years ago, some “visionaries” at John Deere made a critical decision: that every one of its agricultural vehicles needed to be an IOT device that connected to the cloud. That way, agronomic and...

Supplements
Wearables

Summer 2021 Resource Guide

Our 2021 Resource Guide shows you the top manufacturers in materials, manufacturing, and a range of other medical-device categories.

News
Connectivity

ZF Hikes Performance of ProAI Supercompute Platform

Although multinational supplier ZF is widely recognized for conventional components such as its transmissions and braking systems, at April’s Auto Shanghai – one of the few major...

Products
Materials

New Products & Services: April 2021 Medical Design Briefs

Embedded antennas, fume hoods, computing nodes, and more.

News
Electronics & Computers

Automotive Cybersecurity Needs Serious Work

According to the BlackBerry 2021 Threat Report, which looks at cybersecurity threats of all types on a global basis, “modern automobiles are effectively insecure networks.” The authors...