Electronics Technology


GPS receiver gets aiding functionality

17 November 2004 Electronics Technology Access Control & Identity Management Information Security

An innovative 'aiding' functionality was added to the Antaris GPS technology, jointly developed by u-blox and Atmel, which now makes 'time to first fix' within four seconds a reality. The aiding parameters provide ephemeris, almanac, rough initial position, clock drift and time, satellite status and, if available, a precise time synchronisation signal. The aiding information is supplied from an external source, for example a base station. With this information, the GPS receiver has immediate knowledge of the satellites to search and track. The aiding feature is offered in the TIM-LP, TIM-LF and TIM-LC as well as on the Antaris GPS chipset.



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Impro announces Primo update
News & Events Access Control & Identity Management Integrated Solutions
Impro Technologies recently held a launch event in which it introduced a series of new products, from new readers through to its updated Primo access management software.

Read more...
Axon NPU powers smarter edge
RF Design AI & ML
The nRF54LM20B from Nordic Semiconductor is an ultra-low-power wireless SoC that combines advanced edge AI capabilities with robust radio connectivity and rich peripheral support.

Read more...
Compact Ka-band GaN PA
RF Design Telecoms, Datacoms, Wireless, IoT
The CMX90A705 from CML Microcircuits is a high-performance two-stage GaN power amplifier operating across 27,5 to 31 GHz and targeting Ka-band applications.

Read more...
Claude Mythos wake-up call
Technews Publishing AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
Nordic accelerates cellular IoT leadership
RF Design Telecoms, Datacoms, Wireless, IoT
The company unveiled its next-generation portfolio featuring Cat 1 bis, satellite NTN, and advanced LTE-M/NB-IoT with edge AI, delivering secure and resilient connectivity across billions of IoT devices.

Read more...
Compact cellular IoT SiP with GNSS
RF Design Telecoms, Datacoms, Wireless, IoT
Combining low-power connectivity, edge processing, and positioning capabilities in a compact module, Nordic’s nRF9151 targets applications such as asset tracking, smart metering, industrial monitoring, and smart city infrastructure.

Read more...
IO Ninja and Python working hand-in-hand
RF Design DSP, Micros & Memory
IO Ninja is a professional all-in-one terminal emulator, sniffer, and protocol analyser that runs natively on Windows, Linux, and macOS, and excels as a UI debugger for serial, network, USB, and all other forms of communication.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved