17 November 2004Electronics Technology
Access Control & Identity Management
Information Security
An innovative 'aiding' functionality was added to the Antaris GPS technology, jointly developed by u-blox and Atmel, which now makes 'time to first fix' within four seconds a reality. The aiding parameters provide ephemeris, almanac, rough initial position, clock drift and time, satellite status and, if available, a precise time synchronisation signal. The aiding information is supplied from an external source, for example a base station. With this information, the GPS receiver has immediate knowledge of the satellites to search and track. The aiding feature is offered in the TIM-LP, TIM-LF and TIM-LC as well as on the Antaris GPS chipset.
Impro announces Primo update
News & Events Access Control & Identity Management Integrated Solutions
Impro Technologies recently held a launch event in which it introduced a series of new products, from new readers through to its updated Primo access management software.
Read more...Axon NPU powers smarter edge RF Design
AI & ML
The nRF54LM20B from Nordic Semiconductor is an ultra-low-power wireless SoC that combines advanced edge AI capabilities with robust radio connectivity and rich peripheral support.
Read more...Compact Ka-band GaN PA RF Design
Telecoms, Datacoms, Wireless, IoT
The CMX90A705 from CML Microcircuits is a high-performance two-stage GaN power amplifier operating across 27,5 to 31 GHz and targeting Ka-band applications.
Read more...Claude Mythos wake-up call Technews Publishing
AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.
Read more...If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.
Read more...Nordic accelerates cellular IoT leadership RF Design
Telecoms, Datacoms, Wireless, IoT
The company unveiled its next-generation portfolio featuring Cat 1 bis, satellite NTN, and advanced LTE-M/NB-IoT with edge AI, delivering secure and resilient connectivity across billions of IoT devices.
Read more...Compact cellular IoT SiP with GNSS RF Design
Telecoms, Datacoms, Wireless, IoT
Combining low-power connectivity, edge processing, and positioning capabilities in a compact module, Nordic’s nRF9151 targets applications such as asset tracking, smart metering, industrial monitoring, and smart city infrastructure.
Read more...IO Ninja and Python working hand-in-hand RF Design
DSP, Micros & Memory
IO Ninja is a professional all-in-one terminal emulator, sniffer, and protocol analyser that runs natively on Windows, Linux, and macOS, and excels as a UI debugger for serial, network, USB, and all other forms of communication.
Read more...NEC XON secures mobile provider’s hybrid identities NEC XON
Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.
Read more...Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.
While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.