NXP Awarded for Outstanding Secure MCU Solutions

NXP Awarded for Outstanding Secure MCU Solutions

Recently, NXP Semiconductors Shanghai Co., Ltd. (hereinafter referred to as “NXP”) was awarded the “Outstanding Secure MCU Solution” award for its LPC55S69 general-purpose microcontroller at the “2021 China MCU Outstanding Products and Solutions Selection” held by China Electronics News. With the exponential growth of network devices and the extension of intelligence, the “device-to-device” communication in … Read more

From Bootloader to OTA: Unlocking the Right Approach for Embedded Firmware Updates

From Bootloader to OTA: Unlocking the Right Approach for Embedded Firmware Updates

In the world of embedded development, firmware updates are undoubtedly a headache but an unavoidable challenge. To allow the development board to program firmware, we need to reserve a set of dedicated interface pins. These pins are used in the factory to program the software, but once the product is shipped, we need to find … Read more

Prevent Smart Home Surveillance: Don’t Let Your Data Run Wild

Prevent Smart Home Surveillance: Don't Let Your Data Run Wild

Today, smart home products such as smart doorbells, home surveillance cameras, robotic vacuum cleaners, and smart speakers are becoming increasingly common in households. In March this year, the “data scandal” involving smart homes was exposed, revealing that smart home devices have become “eavesdroppers,” turning into “surveillance tools” in an instant, with cloud cameras becoming “leakage … Read more

Discussion on Information Security Awareness During Cybersecurity Week: Wi-Fi Security

Discussion on Information Security Awareness During Cybersecurity Week Wi-Fi Security 01 Phishing Wi-Fi Risk Analysis In public places such as restaurants, shopping malls, train stations, and airports, free Wi-Fi hotspots are often deployed. However, attackers may create deceptive Wi-Fi hotspots. Once connected to these malicious hotspots, users may face risks such as information leakage and … Read more

Discussion on Information Security Awareness During Cybersecurity Week: Wi-Fi Security

Discussion on Information Security Awareness During Cybersecurity Week: Wi-Fi Security

Discussion on Information Security Awareness During Cybersecurity Week Wi-Fi Security 01 Phishing Wi-Fi Risk Analysis In public places such as restaurants, shopping malls, train stations, and airports, free Wi-Fi hotspots are often deployed. However, attackers may create misleading Wi-Fi hotspots. Once connected to these malicious hotspots, users may face risks such as information leakage and … Read more

ANet Smart Gateway: The Connection Hub and Empowerment Pioneer of Industrial IoT

ANet Smart Gateway: The Connection Hub and Empowerment Pioneer of Industrial IoT

Brief Introduction With the rapid development of Industry 4.0 and smart manufacturing, industrial IoT technology is profoundly changing the production and management models of traditional industries. As a core component of this transformation, the smart gateway is indispensable in device interconnection, data collection, and edge computing. The Role of Smart Gateways in IoT The smart … Read more

A Novel One-Dimensional Chaotic System for Image Encryption: A Study of a Bit-Level Image Encryption Algorithm Based on Chaotic Mapping with Matlab Code

A Novel One-Dimensional Chaotic System for Image Encryption: A Study of a Bit-Level Image Encryption Algorithm Based on Chaotic Mapping with Matlab Code

✅ Author’s Profile: A research enthusiast and Matlab simulation developer, skilled in data processing, modeling simulation, program design, complete code acquisition, paper reproduction, and scientific simulation. 🍎 Previous Review: Follow my personal homepage:Matlab Research Studio 🍊 Personal Motto: Investigate to gain knowledge, complete Matlab code and simulation consultation available via private message. 🔥 Content Introduction … Read more

Practical Java Encryption and Decryption Algorithms: Applications of AES, RSA, and ECC in Protecting Sensitive Data – Essential Security Knowledge for Architects

Practical Java Encryption and Decryption Algorithms: Applications of AES, RSA, and ECC in Protecting Sensitive Data - Essential Security Knowledge for Architects

Practical Java Encryption and Decryption Algorithms: Applications of AES, RSA, and ECC in Protecting Sensitive Data – Essential Security Knowledge for Architects As a Java engineer, I often encounter scenarios that require the protection of sensitive data. With the increasing risks of cybersecurity, personal information protection has become a hot topic. Whether it is passwords, … Read more

Essential Reading for Embedded Development: Functional Safety and Information Security

Essential Reading for Embedded Development: Functional Safety and Information Security

In modern society, embedded devices are ubiquitous, from smart homes in our daily lives to various industries such as industrial control and medical devices, the applications of embedded devices are endless. So, what are the differences between functional safety and information security in embedded devices, and how can we ensure their implementation in practical applications? … Read more

Using if-else in ECU Application Layer Model Development

Using if-else in ECU Application Layer Model Development

In the development of ECU (Electronic Control Unit) software, conditional judgment is key to implementing various control logics. SIMULINK, as a powerful graphical modeling tool, provides a rich set of functional modules for ECU application layer software development, among which the if-else structure is one of the commonly used methods for implementing conditional control. By … Read more