Whitepapers | Intelligent Systems Source


Software-Defined Radio Handbook

White Paper Download 

  Software Defined Radio has revolutionized electronic systems for a variety of applications that include communications, data acquisition and signal processing. Recently updated, this handbook shows how DDCs (Digital Downconverters), the fundamental building block of software radio, can replace legacy analog receiver designs while offering significant performance, density, and cost benefits.  
By |January 5th, 2018|Whitepapers|Comments Off on Software-Defined Radio Handbook|

OpenFog Security Requirements and Approaches

TECHNICAL CONSORTIUM PAPER – (This is not an RTC Exclusive) The emerging interconnection among mobile/IoT devices, Fog Nodes and Cloud servers are creating a multi-tier pervasive communication-computing in­frastructure that will one day embody billions of devices and span across elaborate hierarchies of administration and application domains. This novel infrastructure and its operation paradigms will give rise to new security challenges as well as new service opportunities. This paper provides an overview of the security landscape of OpenFog architecture as well as a survey of the functional requirements and the technical approaches currently being discussed in the OpenFog Security Workgroup. As a report of on-going work, this paper aims at stimulating further dialogue on Open­Fog Security and fostering future development of novel technologies and practices.  

                                                                                                                                                              I.  Introduction

With the deployment of Next Generation Mobile Networks (NGMNs), Internet of Things (IoTs) and Edge/Fog/Cloud Computing, the world is undergoing the largest overhaul of our information service infrastructure ever. This will drastically change the ways we live, work, move around, produce goods, provide services, interact with one another and protect our planet… Naturally, along with the foreseeable benefits come the potential problems. Information security and service trustworthiness have long been identified as the pre­eminent issues of our heavy dependency on the global information infrastructure. The pervasive presence of the smart devices and their physical vulnerability heighten our concerns. The increasingly devastating cyber-attacks [1,2] seem to confirm our worst nightmares. The sluggish responses of the product and service vendors towards these vulnerabilities and attacks often leave us feeling helpless. In OpenFog Consortium [3], we firmly believe that by inserting pervasive, trusted, on-demand computing services between the information providers and consumers, we can mitigate security risks and ensure service availability and responsiveness. In [...]

SMARC 2.0 – At the Heart of next Generation IoT Embedded Solutions


The SMARC™ (Smart Mobility Architecture) standard has in a matter of a few years become a major driving force behind the enablement of innovative ultra-low-power embedded computing technology solutions. Market demand and the disruptive influence of the Internet of Things (IoT) have already hastened the arrival of a new specification, SMARC 2.0. What are the implications for embedded systems designers and developers?

>>Download the Whitepaper here.


Low-power embedded architecture platform for Computer-on-Modules based on ARM and X86 technology

  • Creating mobile, embedded, connected solutions
  • Scalable building blocks
  • Optimized pin-out definition for versatile architectures
  • Ultra low-power, low-profile solutions
  • Constructed to withstand harsh industrial environments
By |October 13th, 2017|Communications, IoT / M2M, Networking, Whitepapers|Comments Off on SMARC 2.0 – At the Heart of next Generation IoT Embedded Solutions|

High data rates over the VPX infrastructure

New possibilities in data transfer using latest fundamental protocols. The VPX VITA 46 has been one of the first modular computer open standards to define a connector and backplane Infrastructure allowing data transfers at rates in excess of one gigabit per physical channel. Users of the VPX could benefit from the same level of performance for input/output, graphics, and more generally computer data exchanges, at least up to an acceptable wattage for the target environment. After having successfully addressed the 5 Gbits/s level for the PCI Express® gen2, VPX is now ready to adopt the higher data rates required by the latest version of two fundamental protocols: PCIe gen3 at 8 Gbits/s and Ethernet at 10 Gbits/s. Read more.

Whitepaper Highlights:

  • Transferring 10 Gbits/s over VPX backplanes: technical issues  and workarounds that could be encountered
  • Kontron advancements in delivering  the 10Gbits/s Technology over the VPX: The gen3 PCIe protocol operating at 8 Gbits/s and the Ethernet 10GBASE-KR links are successfully qualified at extended temperature environments
  • Keep up with the latest data rates available:  Kontron’s wide set of VPX modules takes advantage of these high data rates over the VPX backplane

Putting VPX and OpenVPX to Work Handbook

OpenVPX provides an effective method for describing VPX components, and also defines numerous “profiles” for boards, slots and backplanes that detail specific configurations of channels, interconnections and fabrics. By narrowing the field of configurations, these profiles boost reusability and interoperability between vendors.  OpenVPX presents a formal, well-organized system for defining all components in VPX systems.  

The IoT-enabled Enterprise: Reinventing Industries on a Global Stage


Reinventing Industries on a Global Stage

Download the Whitepaper

This isn’t your father’s business environment

The days of the 100-year-old company are over. Sure, some company names from the last century will still be recognizable. And values such as customer service, honesty, and integrity will never go out of style. But look closer at the most successful businesses in today’s environment, and you will see organizations that are constantly finding ways to reinvent themselves. Redefining standard operating procedures and practices. Changing the ways they engage customers. Improving how they add value through the products and services they offer. Everything.

Change is not surprising

Today’s businesses operate in the sort of dynamic environment not seen since the first industrial revolution. In fact, in most expert opinions, the pace of change today far outweighs anything our ancestors experienced. However, in addition to the speed of change, organizations also face a number of other challenging market dynamics including:

Hyper-informed (and sometimes misinformed) customers. With so much publicly available information on the Internet, customers have access to an almost unlimited supply of facts and opinions about their purchase decisions. By the time they engage your sales force, many buyers already have a pretty good idea of what a “solution” looks like.

Shrinking margins. The Internet also gives these buyers access to far more options than ever before. For example, the buyer of a common household appliance such as a dishwasher can go to the local showroom, buy online from a manufacturer, buy from a wholesaler half a world away, or even buy from a public auction site like eBay. The sheer number of options has put sellers under incredible price pressures.

Focus on experience. Regardless [...]

By |April 14th, 2017|Communications, Data Acquisition, Industrial, IoT / M2M, Networking, Whitepapers|Comments Off on The IoT-enabled Enterprise: Reinventing Industries on a Global Stage|

Digital transformation for the security sector


Security in the era of IoT

Download the Whitepaper

Whole industries are being invented and reinvented by the rapid digital transformation fueled by the Internet of Things (IoT). IoT enables infinite connections between actively communicating devices from the smallest sensors to the largest industry platforms.

Devices operate silently at the edge of the network, generating, consuming, and aggregating valuable data. These devices need robust security features to prevent their identities and data from becoming compromised. While the number, type, and applications of these devices evolve continuously, security standards haven’t kept pace. Without a framework in place to ensure devices are built with security features “engineered in,” every new device added to the ecosystem represents a potential new vulnerability. Deterring hostile attacks and data compromise requires a comprehensive, continuously evolving plan to assess every device, every component of the infrastructure, every member of the organization—even your customers.

By |April 5th, 2017|Security / Surveillance, Whitepapers|Comments Off on Digital transformation for the security sector|

Safe Guarding Mission Critical Data with Secure Solid State Drives


Today’s military sensor and other high-performing processing systems generate massive amounts of data. Just a few years ago, Defense Advanced Research Projects Agency (DARPA) released details of Autonomous Real-time Ground Ubiquitous Surveillance (ARGUS-IS), that used an 18 Giga-Pixel camera capable of generating image sensor data at a rate of more than 30 GB per second. While it is typical to compress or process a small portion of the image, there are advantages to saving the raw data for future analysis. Currently, NAND flash is the only practical storage media capable of storing such large amounts of data in realtime. For this reason, it’s not surprising that NAND flash, packaged as a Solid State Drive (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense applications.


By |March 20th, 2017|Avionics, Communications, Data Acquisition, Navigation / Guidance / Surveying, Networking, Security / Surveillance, Transporation, Transportation, Whitepapers, WP - Avionics|Comments Off on Safe Guarding Mission Critical Data with Secure Solid State Drives|

Innovation That Fits: Mercury High Density Secure Memory


To address the broad range of perils faced by the modern war fighter, defense electronics are growing increasingly sophisticated with additional sensor subsystems detecting, analyzing, and responding to potentially threatening scenarios. To do so, each of these subsystems requires data acquisition, digitization, processing, and storage modules. These highly complex subsystems together yield a massive volume of data to be processed in short periods of time. From a system-level architecture perspective, designers face a dilemma where they must integrate additional components and circuitry into a fixed allocation of board space. Missions requiring smaller and lighter weight form factors push the designer to the challenging goal of adding even more functionality while reducing overall system size and weight. In summary, many mission objectives can only be achieved with increasingly feature-rich electronic systems more tightly packed into the smallest of physical footprints.


Guidelines for Designing Embedded Systems with Windows 10 IoT Enterprise

This paper will focus on the techniques for creating a task-specific or industry-specific experience for users of your device. If you are planning to deploy applications using the Win32 application programming interface on your device, the techniques you have used in the past are still supported and available for your use. If you are planning to invest in building a Universal Windows Application (UWA), you will need to plan your application design carefully to ensure that the device when running your application cannot also be used as a general-purpose computing device. For information on developing Windows Universal applications: http://msdn.microsoft.com/en-us/windows/apps/ This paper will only address topics related to creating a task-specific experience. Other topics related to Windows 10 applications, such as provisioning, deployment, and development, will be addressed in other papers. The OEM agreement terms require that device usage be limited to a single purpose. Your goal will be to create an experience that immerses the user in your application on your device, and which does not allow the user to successfully use the device for general-purpose computing. There are a number of techniques you can use to help ensure the task-specific nature of your device. The scenarios to be reviewed in this paper include:
  • Application control
  • Customize the desktop
  • Logon experience
  • System control
  • By |February 21st, 2017|IoT / M2M, Networking, Whitepapers|Comments Off on Guidelines for Designing Embedded Systems with Windows 10 IoT Enterprise|