Knowledge center

Discover our latest news, customer cases and publications.

Y-Circ-M-FA-PP-Socket News

Tight is Right: The M12 Push-Pull Connector Y-Circ M

Switch safely between Push-Pull and screw locking without compromising on tightness: the M12 Push-Pull with internal locking from Yamaichi relies on a double, independent sealing system for maximum reliability. The Y-Circ M system according to IEC 61076-2-012 is IP65 /...

July 16, 2024
Read more
Xjtag performance boost News

Boundary Scan Gets a Boost

    The world of electronics development just got a bit faster and more efficient with the release of XJTAG version 4.0. This major update to the popular boundary scan software suite promises significant improvements for engineers working on circuit...

June 19, 2024
Read more
Electronic Folders News

Managing enterprise-wide verification results

  In today's software-driven world, ensuring the security and integrity of your codebase is paramount. LDRAvault offers a comprehensive solution to address these concerns, empowering developers and organizations to streamline their Software Development Lifecycle (SDLC) while maintaining the highest quality...

June 19, 2024
Read more
ebook securing embedded systems Knowledge

eBook – Securing embedded & IoT systems

Embedded system security is vital to protect end users and organisations against numerous threats. With the increasing number of cyberattackstargeting embedded systems, ensuring the security of these systems has become more crucial than ever before. One of the main reasons...

June 19, 2024
Read more
embedded iot security Knowledge

6 types of security testing for embedded and IoT systems

    Security testing ensures the robustness and resilience of embedded systems against potential threats and vulnerabilities. As embedded systems become more prevalent in various industries, it is imperative for development teams to be well-versed in the different types of...

June 9, 2024
Read more
embedded and iot security tools Knowledge

4 proven strategies for secure embedded and IoT devices

Rather than merely reacting to threats, product development teams should anticipate and plan for potential vulnerabilities throughout the development process. This includes conducting a comprehensive risk assessment early on, identifying potential attack vectors, and developing mitigation strategies. One effective way...

May 14, 2024
Read more