eMMC vs SSD: Which to use, where and why?

By | Blog, SSD | No Comments

The issue of embedded Multimedia cards versus Solid State Drive (eMMC vs SSD) can be a consideration for PC or laptop storage, the designers of embedded systems requiring the storage of relatively large volumes of (local) data may be pondering the issue too. Both are solid state technologies. But which would you use, where and why? eMMC To set the…

Read More

Write-Once-Read-Many (WORM) tamper proof technology

By | Blog, Secure memory | No Comments

The chances are you know that WORM stands for write-once-read-many times. A WORM kit improves data security in the workplace and in your embedded systems. Data cannot be erased or manipulated once written to Flexxon’s Write-Once-Read-Many (WORM) SD cards and microSD cards, and in-built, unalterable data storage functions recognise the difference between a legal and an illegal action. Legal actions…

Read More

Why and Where to Use an Encrypted USB Memory Stick?

By | Blog, Secure memory | No Comments

The difference between an encrypted and unencrypted memory stick An encrypted USB drive and a memory stick (also known as a USB flash drive) are both portable storage devices that use USB technology to transfer data between computers. However, there are some important differences between the two technologies. Security: Encrypted USB drives offer greater security than memory sticks. Encrypted USB…

Read More

Why use NVMe SSD?

By | Blog, Non volatile memory | No Comments

  Non-volatile memory express (NVMe) is a storage protocol that allows users to get the most out of high-performance flash based solid-state drives (SSD). It is well suited to multicore processing, and many simultaneous I/O operations can be accommodated, which has made NVMe SSD extremely popular in data storage and processing centres, as well as high-end PCs for gaming applications, for…

Read More

Securing Your Data at the Hardware Level

By | Blog, Cyber Security, Secure memory, SSD, Uncategorized | No Comments

In part 1 of this securing embedded memory blog, we considered how your data is at risk and concluded that security needs to start at the hardware level. And as your IIoT’s data resides in memory, that’s the best place to start. Isolation through partitioning is key to securing embedded memory. Partitioning is also great for achieving higher reliability and…

Read More

What is a Value-Added Distributor?

By | Blog, Distributor | No Comments

Unfortunately, it’s a fact of life that most distributors are just a local presence for their suppliers. They take orders. And they hold some stock. Thankfully, in the B2B engineering sectors, it’s somewhat different as there is, quite rightly, an expectation that value should be added. So, what is a value-added distributor? And what exactly is the nature of that…

Read More
How secure is your data

How Secure Is Your Data?

By | Blog, Secure memory | No Comments

In our increasingly connected world, embedded systems, such as those at the heart of IoT and IIoT devices, need to carry sensitive data. Accordingly, if you’re an embedded systems designer, you’re advised (certainly by us) to not only make security a priority from the start but also to think beyond just software measures. Securing embedded memory is the ideal starting…

Read More

The best possible protection for the data and program files in your embedded system comes to Embedded World 2022 …

By | Blog | No Comments

If you’re an engineer and you need your data protected from the elements AND malicious threats, book a visit with our engineers at Embedded World 2022 now… Who are Nexus Industrial Memory? We provide specialist memory products, designed specifically for industrial systems and information security. Each product we supply addresses specific pain points that widely available products do not. Nexus…

Read More

Protecting IIoT Devices From Cyber Attacks

By | Blog, Cyber Security | No Comments

Industrial IoT (IIoT) is at the heart of Industry 4.0, facilitating easy connectivity for harnessing and interpreting data, which in turn helps manufacturers tailor their predictive maintenance programmes for greater efficiency. However, with so many systems and devices in different networks, security is becoming a growing concern. There are various motivations for cyberattacks, some focus on data theft (to acquire…

Read More

How to Accurately Pair Wireless Medical Devices with a Physical Token

By | Blog, Wireless medical devices | No Comments

The wireless revolution has changed lives for billions of people around the world, allowing us access to news, entertainment, education and assistance at the touch of a button, with no wires required. Occasionally, the wireless tech in our homes and businesses goes awry, and when it does, it’s usually a pretty minor inconvenience, where we have to restart the router,…

Read More