Building NFC Readers Choosing the Right Chip and Implementation Tips
Blog Post
Connected Devices and IoT

Building NFC Readers: Choosing the Right Chip and Implementation Tips

Wondering how to select near-field communication (NFC) readers for your IoT system development? From choosing the right NFC chip to a successful implementation, this third part of our NFC technology blog series, is full of pro tips to get you started.
NFC Reader Design Essentials Requirements for Tags and Receivers
Blog Post
Connected Devices and IoT

NFC Reader Design Essentials: Requirements for Tags and Receivers

In the second installment of our series on NFC technology, our engineer shares advice on defining design requirements for NFC readers and requirements for NFC tags and receivers. Learn how the availability of low-cost and extremely useful test gear have made implementation easier.
IoT Device management LinkedIn Live
Blog Post
Connected Devices and IoT

IoT Fleet Management: Custom Solutions, PaaS and Accelerators

Choosing the right IoT device management solution can make or break your project. Dive into our video and guide exploring custom solutions, PaaS options and the growing role of accelerators.
Wondering how to select near-field communication (NFC) readers for your IoT system development? From choosing the right NFC chip to a successful implementation, this third part of our NFC technology blog series, is full of pro tips to get you started.
In the second installment of our series on NFC technology, our engineer shares advice on defining design requirements for NFC readers and requirements for NFC tags and receivers. Learn how the availability of low-cost and extremely useful test gear have made implementation easier.
Choosing the right IoT device management solution can make or break your project. Dive into our video and guide exploring custom solutions, PaaS options and the growing role of accelerators.
Navigating Embedded Memory Security Challenges in Connected Car Systems
Blog Post
Automotive

Navigating Embedded Memory Security Challenges in Connected Car Systems

Have you ever wondered about the security implications of peripheral devices in modern automotive systems? This post explores the risks, the debate between hardware and software teams and proven strategies for protecting these critical components.
Video Our Visionary Approach to AI and Connected Solutions for Recurring Revenue
Blog Post
Connected Devices and IoT

Video: Our Visionary Approach to AI and Connected Solutions for Recurring Revenue

From transforming one-time sales into recurring revenue streams to harnessing the power of generative AI, this interview recap unveils a glimpse in our future of software engineering. Watch the video to discover how our expertise — combined with FPT's resources — opens doors to unprecedented innovation.
Counterfeit Protection Exploring the Role of NFC in the IoT
Blog Post
Connected Devices and IoT

Counterfeit Protection: Exploring the Role of NFC in the IoT

From enabling secure, tap-and-go transactions to driving innovative IoT applications, NFC is now a ubiquitous force in our lives. But as the threat of counterfeiting and gray market products looms large, learn how NFC technology combats these challenges.
Have you ever wondered about the security implications of peripheral devices in modern automotive systems? This post explores the risks, the debate between hardware and software teams and proven strategies for protecting these critical components.
From transforming one-time sales into recurring revenue streams to harnessing the power of generative AI, this interview recap unveils a glimpse in our future of software engineering. Watch the video to discover how our expertise — combined with FPT's resources — opens doors to unprecedented innovation.
From enabling secure, tap-and-go transactions to driving innovative IoT applications, NFC is now a ubiquitous force in our lives. But as the threat of counterfeiting and gray market products looms large, learn how NFC technology combats these challenges.
From GPTP to Buffer Overflow Ensuring Seamless Automotive Audio
Blog Post
Audio

From gPTP to Buffer Overflow: Ensuring Seamless Automotive Audio

Countless modern systems, including automotive and audio, depend on software to manage the intricate relationship between gPTP and PLL to eliminate buffer overflow or underflow. Explore how a simple change in clock signals raises concerns — and software’s crucial role in managing system complexity.
Digital Signal Processing Services in Big Data Analysis
Blog Post
Signal Processing

Accelerating Data Insights: Digital Signal Processing Services in Big Data Analysis

In an era driven by data, understanding the intricate relationship between big data and digital signal processing is crucial. This blog post delves into how DSP techniques transform how we analyze vast datasets, enabling organizations to make more informed decisions and gain valuable insights.
Colored sound wave on a black background, with pulses of blue green and red colors. Bright sound waves.
Blog Post
Signal Processing

Improving Signal-to-Noise Ratios: How DSP Services Boost Signal Quality

Dive into the world of signal quality optimization! This blog post from our digital signal processing services team discusses how DSP solutions can help you achieve precision and reliability.
Countless modern systems, including automotive and audio, depend on software to manage the intricate relationship between gPTP and PLL to eliminate buffer overflow or underflow. Explore how a simple change in clock signals raises concerns — and software’s crucial role in managing system complexity.
In an era driven by data, understanding the intricate relationship between big data and digital signal processing is crucial. This blog post delves into how DSP techniques transform how we analyze vast datasets, enabling organizations to make more informed decisions and gain valuable insights.
Dive into the world of signal quality optimization! This blog post from our digital signal processing services team discusses how DSP solutions can help you achieve precision and reliability.
How Connected Device Engineering Advances Smart Homes and Cities
Blog Post
Connected Devices and IoT

How Connected Device Engineering Advances Smart Homes and Cities

In the era of the Internet of Things and smart technologies, Cardinal Peak is your trusted partner in shaping the future. Our experts are dedicated to pushing the boundaries of what's possible with smart home and smart city IoT.
Artificial neuron in concept of artificial intelligence. Wall-shaped binary codes make transmission lines of pulses and/or information in an analogy to a microchip. Neural network and data transmission.
Blog Post
Signal Processing

Machine Learning meets DSP: Leveraging AI for Advanced Signal Processing Services

From predictive modeling in financial analytics to image recognition in healthcare and environmental monitoring, our informative blog post showcases diverse machine learning for signal processing applications. Dive in to navigate this exciting intersection of technologies.
Mobile App Security: Safeguarding User Data and Privacy
Blog Post
Security

Mobile App Security: Safeguarding User Data and Privacy

Staying ahead of bad actors and protecting your mobile app from vulnerabilities in the ever-evolving threats landscape remains difficult. Learn why mobile app security is important, the most common threats and best practices for enhancing your mobile app development.
In the era of the Internet of Things and smart technologies, Cardinal Peak is your trusted partner in shaping the future. Our experts are dedicated to pushing the boundaries of what's possible with smart home and smart city IoT.
From predictive modeling in financial analytics to image recognition in healthcare and environmental monitoring, our informative blog post showcases diverse machine learning for signal processing applications. Dive in to navigate this exciting intersection of technologies.
Staying ahead of bad actors and protecting your mobile app from vulnerabilities in the ever-evolving threats landscape remains difficult. Learn why mobile app security is important, the most common threats and best practices for enhancing your mobile app development.