Ideal when lower power and size take priority over higher performance.
Low power and thermally efficient application performance in small-form-factor devices.
Exceptional compute, graphics, and media performance, along with enhanced security and I/O flexibility.
Discover some of the embedded products offered from our Solutions Alliance partners based on 4th generation Intel® Core™ processors with mobile Intel® QM87 and HM86 chipsets.
Discover some of the embedded products offered from our Solutions Alliance partners based on 4th generation Intel® Core™ processors with Intel® Q87 chipsets.
A low-power, small-footprint, single-port gigabit LAN on motherboard (LOM) network controller with integrated MAC and PHY.
Slim modem platforms for 2G/3G/LTE support enabling high-speed data and voice.
Support for a wide range of I/O interfaces, including Ethernet, USB, RS-232, RS-485, CAN, line out, PCI Express*, and SPI. These interfaces can also connect to modules supporting cellular, Bluetooth*, ZigBee*, Wi-Fi*, and other wireless technologies.
is the world's leading commercial real-time operating system (RTOS) and has been serving the needs of embedded systems of all shapes and sizes for more than 30 years.
is the leading commercial embedded Linux platform and the first to bring the advantages of open source to all industries.
offers a portfolio of software and testing products to support rapid and high-quality platform and application development for devices running the Android operating system.
Maintain the integrity of things by allowing only authorized code to run and authorized changes to be made. This security software automatically creates a dynamic whitelist of the "authorized code" on the system, which locks down the system to a known good baseline.
Unify security management through an open platform using McAfee ePO™—the most advanced, extensible, and scalable centralized security management software in the industry. This solution reduces the cost and complexity of security and compliance administration.
Prevent unauthorized access to data stored in the cloud using strong, hardware-based authentication. This tamper-proof solution operates in isolation from the operating system and provides a simple way for web sites and organizations to validate that a user is logging in from a trusted device.