Case Studies.
Add Case Study
Our Case Study database tracks 18,926 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.
Download Excel
Filters
-
(2)
- (1)
- (1)
-
(1)
- (1)
-
(1)
- (1)
- (1)
- (1)
- (1)
- (1)
- (1)
- (1)
- (1)
- (1)
- (2)
Selected Filters
|
How Edge Computing Enables Predictive Maintenance of Valves
Solution approach for monitoring production-critical ultrapure water valves with the aim of detecting possible failures at an early stage and better planning maintenance processes.
|
|
|
Infineon Supports Savari for HSM
The V2X systems use a sophisticated Public Key Infrastructure (PKI)-based approach to facilitate trusted communication:V2X systems use Elliptical Curve Cryptography (ECC). Device must be able to securely and efficiently generate ECC keysThe random numbers generator must have high entropyRoot-certificates must be protected by usage of secured storageDevice must have tamper resistance, including physical attacksPrivate keys must have protection against side channel attacksPrivate keys must to be protected and used securely › V2X device are required to generate up to 40 messages per second. The signing latency must be low to support this frequency
|
|