Whitepapers | Intelligent Systems Source

The IoT-enabled Enterprise: Reinventing Industries on a Global Stage


Reinventing Industries on a Global Stage

Download the Whitepaper

This isn’t your father’s business environment

The days of the 100-year-old company are over. Sure, some company names from the last century will still be recognizable. And values such as customer service, honesty, and integrity will never go out of style. But look closer at the most successful businesses in today’s environment, and you will see organizations that are constantly finding ways to reinvent themselves. Redefining standard operating procedures and practices. Changing the ways they engage customers. Improving how they add value through the products and services they offer. Everything.

Change is not surprising

Today’s businesses operate in the sort of dynamic environment not seen since the first industrial revolution. In fact, in most expert opinions, the pace of change today far outweighs anything our ancestors experienced. However, in addition to the speed of change, organizations also face a number of other challenging market dynamics including:

Hyper-informed (and sometimes misinformed) customers. With so much publicly available information on the Internet, customers have access to an almost unlimited supply of facts and opinions about their purchase decisions. By the time they engage your sales force, many buyers already have a pretty good idea of what a “solution” looks like.

Shrinking margins. The Internet also gives these buyers access to far more options than ever before. For example, the buyer of a common household appliance such as a dishwasher can go to the local showroom, buy online from a manufacturer, buy from a wholesaler half a world away, or even buy from a public auction site like eBay. The sheer number of options has put sellers under incredible price pressures.

Focus on experience. Regardless [...]

By |April 14th, 2017|Communications, Data Acquisition, Industrial, IoT / M2M, Networking, Whitepapers|Comments Off on The IoT-enabled Enterprise: Reinventing Industries on a Global Stage|

Digital transformation for the security sector


Security in the era of IoT

Download the Whitepaper

Whole industries are being invented and reinvented by the rapid digital transformation fueled by the Internet of Things (IoT). IoT enables infinite connections between actively communicating devices from the smallest sensors to the largest industry platforms.

Devices operate silently at the edge of the network, generating, consuming, and aggregating valuable data. These devices need robust security features to prevent their identities and data from becoming compromised. While the number, type, and applications of these devices evolve continuously, security standards haven’t kept pace. Without a framework in place to ensure devices are built with security features “engineered in,” every new device added to the ecosystem represents a potential new vulnerability. Deterring hostile attacks and data compromise requires a comprehensive, continuously evolving plan to assess every device, every component of the infrastructure, every member of the organization—even your customers.

By |April 5th, 2017|Security / Surveillance, Whitepapers|Comments Off on Digital transformation for the security sector|

Safe Guarding Mission Critical Data with Secure Solid State Drives


Today’s military sensor and other high-performing processing systems generate massive amounts of data. Just a few years ago, Defense Advanced Research Projects Agency (DARPA) released details of Autonomous Real-time Ground Ubiquitous Surveillance (ARGUS-IS), that used an 18 Giga-Pixel camera capable of generating image sensor data at a rate of more than 30 GB per second. While it is typical to compress or process a small portion of the image, there are advantages to saving the raw data for future analysis. Currently, NAND flash is the only practical storage media capable of storing such large amounts of data in realtime. For this reason, it’s not surprising that NAND flash, packaged as a Solid State Drive (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense applications.


By |March 20th, 2017|Avionics, Communications, Data Acquisition, Navigation / Guidance / Surveying, Networking, Security / Surveillance, Transporation, Transportation, Whitepapers, WP - Avionics|Comments Off on Safe Guarding Mission Critical Data with Secure Solid State Drives|

Innovation That Fits: Mercury High Density Secure Memory


To address the broad range of perils faced by the modern war fighter, defense electronics are growing increasingly sophisticated with additional sensor subsystems detecting, analyzing, and responding to potentially threatening scenarios. To do so, each of these subsystems requires data acquisition, digitization, processing, and storage modules. These highly complex subsystems together yield a massive volume of data to be processed in short periods of time. From a system-level architecture perspective, designers face a dilemma where they must integrate additional components and circuitry into a fixed allocation of board space. Missions requiring smaller and lighter weight form factors push the designer to the challenging goal of adding even more functionality while reducing overall system size and weight. In summary, many mission objectives can only be achieved with increasingly feature-rich electronic systems more tightly packed into the smallest of physical footprints.


Guidelines for Designing Embedded Systems with Windows 10 IoT Enterprise

This paper will focus on the techniques for creating a task-specific or industry-specific experience for users of your device. If you are planning to deploy applications using the Win32 application programming interface on your device, the techniques you have used in the past are still supported and available for your use. If you are planning to invest in building a Universal Windows Application (UWA), you will need to plan your application design carefully to ensure that the device when running your application cannot also be used as a general-purpose computing device. For information on developing Windows Universal applications: http://msdn.microsoft.com/en-us/windows/apps/ This paper will only address topics related to creating a task-specific experience. Other topics related to Windows 10 applications, such as provisioning, deployment, and development, will be addressed in other papers. The OEM agreement terms require that device usage be limited to a single purpose. Your goal will be to create an experience that immerses the user in your application on your device, and which does not allow the user to successfully use the device for general-purpose computing. There are a number of techniques you can use to help ensure the task-specific nature of your device. The scenarios to be reviewed in this paper include:
  • Application control
  • Customize the desktop
  • Logon experience
  • System control
  • By |February 21st, 2017|IoT / M2M, Networking, Whitepapers|Comments Off on Guidelines for Designing Embedded Systems with Windows 10 IoT Enterprise|

    Managing Windows 10 IoT Devices

    Digital transformation demands a user-centric operating system designed to scale across devices. It demands robust capabilities to control and protect the data and configuration settings for your devices. It demands a scalable approach to device management that provides a way to uniformly notify all applications and systems features of changes that may affect their operation or access to resources. As businesses transform, it will become not only impractical, but impossible, to manage each device individually via its own app or to manage small groupings of devices via disparate management stacks. It will become increasingly vital to have uniform management across environments – on-premises, service provider, and Azure. Success will hinge on deploying feature-rich devices on a converged, single platform for management, security, and application development.

    By |February 21st, 2017|IoT / M2M, Whitepapers|Comments Off on Managing Windows 10 IoT Devices|

    Windows 10 IoT Core Azure Connectivity and Security

    Connecting devices and services raises an important question: Can I trust that the information comes from the right source and can only be read by the intended recipient? It is essential that the identity of the receiving device or service is trusted even if the data sent is not confidential. For example, if a process decision depends on data from a temperature sensor, then security measures must ensure the cloud service only accepts information from the trusted sensor and that the sensor has not been compromised. In some cases, malicious attackers may spoof the identity of devices like the temperature sensor. Thus, security measures must work to prevent the cloud service from receiving data from a stolen identity.

    By |February 21st, 2017|Articles, Industrial, IoT / M2M|Comments Off on Windows 10 IoT Core Azure Connectivity and Security|

    Whitepaper | Data Acquisition in High Speed Ethernet & Fibre Channel Avionics Systems



    Data Acquisition in High Speed Ethernet & Fibre Channel Avionics Systems

    As avionics applications grow in complexity and sophistication, these systems are increasingly turning to the use of high speed serial data networks based on Ethernet and Fibre Channel to meet the ever increasing demand for data bandwidth. As these types of networks become more common in new avionics systems, new and unique solutions are required for flight test data acquisition. This paper addresses several of the key considerations which much be addressed when designing a flight test system for the acquisition of avionics Ethernet and Fibre Channel data.

    By |February 3rd, 2017|Whitepapers|Comments Off on Whitepaper | Data Acquisition in High Speed Ethernet & Fibre Channel Avionics Systems|

    Software Radio Handbook: 12th Edition

    Software-Defined Radio Handbook: 12th Edition

    SDR (Software-Defined Radio) has revolutionized electronic systems for a variety of applications including communications, data acquisition and signal processing.

    This handbook shows how DDCs (Digital Downconverters) and DUCs (Digital Upconverters), the fundamental building blocks of SDR, can replace legacy analog receiver and transmitter designs whileoffering significant benefits in performance, density and cost.

    In order to fully appreciate the benefits of SDR, conventional analog receiver and transmittersystems will be compared to their digital counterparts, highlighting similarities and differences.

    The inner workings of the SDR will be explored with an in-depth description of the internal structure and the devices used. Finally, some actual board- and system-level implementations and availableoff-the-shelf SDR products and applications based on such products will be presented.

    By |January 7th, 2017|Communications, Data Acquisition, Whitepapers|Comments Off on Software Radio Handbook: 12th Edition|

    Windows 10 IoT Security

    This whitepaper will discuss how the Windows 10 IoT product family – Windows 10 IoT Enterprise, Windows 10 IoT Mobile, and Windows 10 IoT Core – offers one platform designed for the security requirements of a range of device types. As the Internet of Things (IoT) continues to evolve, it becomes increasingly important to build devices on an IoT platform that correctly balances security needs, the user experience, and the resource constraints of diverse devices. Windows 10 IoT is that platform. Windows 10 IoT provides robust security capabilities through strong identities (both device identities and user identities), secured data, and secured connections. This paper will discuss key aspects of IoT security and how Windows 10 IoT empowers original equipment manufacturers (OEMs) to create secured devices that will delight customers.

    By |December 23rd, 2016|IoT / M2M, Networking, Whitepapers|Comments Off on Windows 10 IoT Security|