Melexis Microelectronic Integrated Systems N.V. and Atmel® Corporation have announced their innovative development kit, Yuma+, for contactless, highly secure RFID ...
Atmel is offering a $499 development kit for the AVR 32-based AP7000 family of 32-bit digital signal controllers. The STK1000 includes a production-ready AVR32-based single-board computer with Atmel’s ...
Atmel(R) (Nasdaq: ATML) announced today the availability of the ATA2270-EK1125-kHz RFID demo kit. This new kit enables the evaluation and prototyping of Atmel's wide portfolio of LF IDIC(R)s, which ...
Ieper, Belgium — Melexis Microelectronic Integrated Systems N.V. and Atmel Corp. have released their Yuma+ development kit for contactless, highly secure RFID transactions. Providing a fully turnkey ...
JTAGICE mkII (available separately) provides emulation. Application-ready C/C++ application software includes web, FTP, and Telnet servers, as well as libraries and utilities for playing video, sound ...
One of the best things about the holiday season is that it gives me a chance to work on some projects that I've been putting off, mostly because they require more than a few minutes of undivided ...
Atmel surprised everyone by bringing out a new 32-bit architecture. The STK1000 is the fastest way to get started with the new AVR32. Embedded Technology Editor Bill Wong takes a look at Atmel's ...
secure CryptoRF(R) chips, with 64-bit embedded cryptographic engines. Atmel's AVR(R) microcontroller and the Melexis MLX90121 reader IC.
Atmel(R) Corporation (Nasdaq: ATML), announced today the release of the AT88SC-DK1 development kit for its CryptoMemory(R), an advanced cryptographic family of memory products. Current CryptoMemory ...
Mouser Electronics, Inc. is now stocking the ATtiny104 Xplained Nano from Atmel. Designed as an evaluation kit for Atmel’s recently launched ATtiny102 and ATtiny104 8-bit AVR microcontrollers, the ...
Atmel has announced its Aris++ development kit with what it calls a Crypto Evaluation Studio tool suite for the design and evaluation of counterfeit-proofing embedded applications that are protected ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results