Tim Hiller, Director of Engineering at Nuvation took part in Arm's Startup Day to discuss the variety of considerations to make in order to get your arm-based system to the market and in production successfully.
In this 15-minute Tech Talk Tim Hiller, Nuvation’s Director of Engineering, explores newer generation components that enable more processing within the edge device while retaining multi-year battery life.
With ever-increasing data comes an ever-increasing need for data security. Bad actors - cybersecurity adversaries trying to get to your data - are getting better and are keeping up with data security advancements.
Nuvation Engineering has designed and developed numerous electronics products. Over the course of these projects, we have identified several key considerations when deciding between Off the Shelf (OTS) hardware versus custom hardware.
Products designed for space are exposed to the some of the harshest environments. They must operate reliably under intense vibration, mechanical shock, wide temperature swings, a vacuum environment, and exposure to ionizing radiation.
Based on our experience performing hundreds of engineering design projects, our engineers have identified several key considerations that require special attention during the planning, design, and development of data acquisition systems.
Low-latency networks enable the efficient transfer of data between system components, which makes them the backbones of many control systems. When establishing the requirements for low-latency networks, a number of control theory parameters need to be determined.
Prototyping includes initial product testing, design optimization, and problem identification and resolution prior to volume production. Rapid prototyping can significantly shorten a new product’s time-to-market, but certain trade-off decisions must be made and production challenges anticipated.
It is important to consider system security in all aspects of product design. Designers often forget to consider physical attack vectors such as probing of external data lines. Without proper consideration and implementation, a system may be vulnerable to cyber-attacks.