Our blog focuses on sharing our experience and knowledge across a wide range of technologies and industries including hardware and software design, audio, video, internet of things, mobile application and signal processing technologies.
Virtually Live From CES
Cardinal Peak Culture
By Kate Bethurem
I’m writing this post from the comfort of my hotel room in Las Vegas, where I am attending my very first CES. I’ve been in the tech industry for a long time, both as an engineer and in business development, which probably makes it more surprising that this is my first time here — especially… View ArticleDetails
Welcome Mark Carrington to Cardinal Peak
Outsourced Engineering
By Howdy Pierce
I’m super excited to announce that Mark Carrington will be joining Cardinal Peak as president at the beginning of the year. Mark is a seasoned Silicon Valley executive who comes to Cardinal Peak with a wealth of relevant experience in finding solutions for customers and building successful world-class teams. I’m looking forward to working with… View ArticleDetails
An In-Depth Review of Deep Work
Outsourced Engineering
By Howdy Pierce
For the last couple of weeks I’ve been meaning to blog about a book I recently read, but I have been so inundated by my to-do list that I couldn’t find the time — or, more accurately, the discipline — to sit down and apply myself to writing this post. That’s ironic: The book in… View ArticleDetails
Is “Doing It All” All It’s Cracked Up To Be?
Outsourced Engineering
By Stefanie Diesi
The tech industry is constantly changing. New languages come in and out of style, and new WYSIWYG editors make GUI design easier than ever. Unlike app development and IoT, the embedded world has been largely isolated from these changes until now. Code for embedded devices is still written in C or occasionally C++, and the… View ArticleDetails
Security Best Practices: From IoT to HIPAA
Connected Devices and IoT
By Thomson Comer
A couple weeks ago, Kevin Gross posted about the myth of a hacker-proof IoT. His post gave a great high-level overview of ways to make the IoT as secure as possible, and it got me thinking about some more in-depth methods for attempting to attain the security we crave in the IoT industry, especially where… View ArticleDetails
The Myth of a Hacker-Proof IoT
Connected Devices and IoT
By Kevin Gross
I was recently invited to give a presentation on security for Internet of Things networking at infocomm 16. While I discussed the topic and scope with the organizers, I didn’t have a good catchy title prepared, so the organizers took it upon themselves to submit one for me: “Hacker-Proof IoT.” Easy, right? While I would… View ArticleDetails
LoRa and Semtech and Sigfox, Oh My
Connected Devices and IoT
By Pat French
In my previous post about Low-Power Wide-Area Network (LPWAN), we reviewed the various competing standards. In this post, I want to drill into LoRa a little deeper, as it is gaining a significant amount of market traction. In particular, I want to answer: who are the LoRa players and how do they fit together? LoRaWAN… View ArticleDetails