Whitepapers | Intelligent Systems Source


High-Speed Switched Serial Fabrics Improve System Design, 8th Edition

  Recently updated, this handbook reviews the development of high-speed gigabit serial fabrics as they address increasingly demanding applications for faster and faster data transfers.  

By |July 19th, 2018|Whitepapers|Comments Off on High-Speed Switched Serial Fabrics Improve System Design, 8th Edition|

Strategies for using Xilinx’s RFSoC

  Xilinx’s new RFSoC brings a powerful and unique solution for addressing some of the most demanding requirements of high bandwidth and high channel count system. This paper provides a look at how RFSoC compares to the current trends in A/D and D/A converters and the strategies for getting the most performance out of this new family of FPGAs.  

By |May 29th, 2018|Whitepapers|Comments Off on Strategies for using Xilinx’s RFSoC|

New Board Ignites the Power of RFSoC

  The Quartz(tm) Model 5950 8-Channel A/D & D/A RFSoC board offers a built-in dual 100GigE interface, 12 LVDS general purpose I/O pairs, innovative QuartzXM eXpress Module design, high-signal integrity connectors for RF inputs and outputs, pre-installed IP for DFRM, triggered waveform & radar chirp generator and more.  

By |May 24th, 2018|Whitepapers|Comments Off on New Board Ignites the Power of RFSoC|

Software-Defined Radio Handbook

White Paper Download 

  Software Defined Radio has revolutionized electronic systems for a variety of applications that include communications, data acquisition and signal processing. Recently updated, this handbook shows how DDCs (Digital Downconverters), the fundamental building block of software radio, can replace legacy analog receiver designs while offering significant performance, density, and cost benefits.  
By |January 5th, 2018|Whitepapers|Comments Off on Software-Defined Radio Handbook|

OpenFog Security Requirements and Approaches

TECHNICAL CONSORTIUM PAPER – (This is not an RTC Exclusive) The emerging interconnection among mobile/IoT devices, Fog Nodes and Cloud servers are creating a multi-tier pervasive communication-computing in­frastructure that will one day embody billions of devices and span across elaborate hierarchies of administration and application domains. This novel infrastructure and its operation paradigms will give rise to new security challenges as well as new service opportunities. This paper provides an overview of the security landscape of OpenFog architecture as well as a survey of the functional requirements and the technical approaches currently being discussed in the OpenFog Security Workgroup. As a report of on-going work, this paper aims at stimulating further dialogue on Open­Fog Security and fostering future development of novel technologies and practices.  

                                                                                                                                                              I.  Introduction

With the deployment of Next Generation Mobile Networks (NGMNs), Internet of Things (IoTs) and Edge/Fog/Cloud Computing, the world is undergoing the largest overhaul of our information service infrastructure ever. This will drastically change the ways we live, work, move around, produce goods, provide services, interact with one another and protect our planet… Naturally, along with the foreseeable benefits come the potential problems. Information security and service trustworthiness have long been identified as the pre­eminent issues of our heavy dependency on the global information infrastructure. The pervasive presence of the smart devices and their physical vulnerability heighten our concerns. The increasingly devastating cyber-attacks [1,2] seem to confirm our worst nightmares. The sluggish responses of the product and service vendors towards these vulnerabilities and attacks often leave us feeling helpless. In OpenFog Consortium [3], we firmly believe that by inserting pervasive, trusted, on-demand computing services between the information providers and consumers, we can mitigate security risks and ensure service availability and responsiveness. In [...]

SMARC 2.0 – At the Heart of next Generation IoT Embedded Solutions


The SMARC™ (Smart Mobility Architecture) standard has in a matter of a few years become a major driving force behind the enablement of innovative ultra-low-power embedded computing technology solutions. Market demand and the disruptive influence of the Internet of Things (IoT) have already hastened the arrival of a new specification, SMARC 2.0. What are the implications for embedded systems designers and developers?

>>Download the Whitepaper here.


Low-power embedded architecture platform for Computer-on-Modules based on ARM and X86 technology

  • Creating mobile, embedded, connected solutions
  • Scalable building blocks
  • Optimized pin-out definition for versatile architectures
  • Ultra low-power, low-profile solutions
  • Constructed to withstand harsh industrial environments
By |October 13th, 2017|Communications, IoT / M2M, Networking, Whitepapers|Comments Off on SMARC 2.0 – At the Heart of next Generation IoT Embedded Solutions|

High data rates over the VPX infrastructure

New possibilities in data transfer using latest fundamental protocols. The VPX VITA 46 has been one of the first modular computer open standards to define a connector and backplane Infrastructure allowing data transfers at rates in excess of one gigabit per physical channel. Users of the VPX could benefit from the same level of performance for input/output, graphics, and more generally computer data exchanges, at least up to an acceptable wattage for the target environment. After having successfully addressed the 5 Gbits/s level for the PCI Express® gen2, VPX is now ready to adopt the higher data rates required by the latest version of two fundamental protocols: PCIe gen3 at 8 Gbits/s and Ethernet at 10 Gbits/s. Read more.

Whitepaper Highlights:

  • Transferring 10 Gbits/s over VPX backplanes: technical issues  and workarounds that could be encountered
  • Kontron advancements in delivering  the 10Gbits/s Technology over the VPX: The gen3 PCIe protocol operating at 8 Gbits/s and the Ethernet 10GBASE-KR links are successfully qualified at extended temperature environments
  • Keep up with the latest data rates available:  Kontron’s wide set of VPX modules takes advantage of these high data rates over the VPX backplane

Putting VPX and OpenVPX to Work Handbook

OpenVPX provides an effective method for describing VPX components, and also defines numerous “profiles” for boards, slots and backplanes that detail specific configurations of channels, interconnections and fabrics. By narrowing the field of configurations, these profiles boost reusability and interoperability between vendors.  OpenVPX presents a formal, well-organized system for defining all components in VPX systems.  

The IoT-enabled Enterprise: Reinventing Industries on a Global Stage


Reinventing Industries on a Global Stage

Download the Whitepaper

This isn’t your father’s business environment

The days of the 100-year-old company are over. Sure, some company names from the last century will still be recognizable. And values such as customer service, honesty, and integrity will never go out of style. But look closer at the most successful businesses in today’s environment, and you will see organizations that are constantly finding ways to reinvent themselves. Redefining standard operating procedures and practices. Changing the ways they engage customers. Improving how they add value through the products and services they offer. Everything.

Change is not surprising

Today’s businesses operate in the sort of dynamic environment not seen since the first industrial revolution. In fact, in most expert opinions, the pace of change today far outweighs anything our ancestors experienced. However, in addition to the speed of change, organizations also face a number of other challenging market dynamics including:

Hyper-informed (and sometimes misinformed) customers. With so much publicly available information on the Internet, customers have access to an almost unlimited supply of facts and opinions about their purchase decisions. By the time they engage your sales force, many buyers already have a pretty good idea of what a “solution” looks like.

Shrinking margins. The Internet also gives these buyers access to far more options than ever before. For example, the buyer of a common household appliance such as a dishwasher can go to the local showroom, buy online from a manufacturer, buy from a wholesaler half a world away, or even buy from a public auction site like eBay. The sheer number of options has put sellers under incredible price pressures.

Focus on experience. Regardless [...]

By |April 14th, 2017|Communications, Data Acquisition, Industrial, IoT / M2M, Networking, Whitepapers|Comments Off on The IoT-enabled Enterprise: Reinventing Industries on a Global Stage|

Digital transformation for the security sector


Security in the era of IoT

Download the Whitepaper

Whole industries are being invented and reinvented by the rapid digital transformation fueled by the Internet of Things (IoT). IoT enables infinite connections between actively communicating devices from the smallest sensors to the largest industry platforms.

Devices operate silently at the edge of the network, generating, consuming, and aggregating valuable data. These devices need robust security features to prevent their identities and data from becoming compromised. While the number, type, and applications of these devices evolve continuously, security standards haven’t kept pace. Without a framework in place to ensure devices are built with security features “engineered in,” every new device added to the ecosystem represents a potential new vulnerability. Deterring hostile attacks and data compromise requires a comprehensive, continuously evolving plan to assess every device, every component of the infrastructure, every member of the organization—even your customers.

By |April 5th, 2017|Security / Surveillance, Whitepapers|Comments Off on Digital transformation for the security sector|