Search Articles

Search Results: FP

Terasic Unveils DE25-Nano: Agilex™ 5 FPGA Powerhouse Packs Edge Computing Muscle in Compact Form

Terasic Unveils DE25-Nano: Agilex™ 5 FPGA Powerhouse Packs Edge Computing Muscle in Compact Form

Terasic's DE25-Nano development board delivers next-gen Intel Agilex™ 5 FPGA performance with a 138K-logic element array, dual-cluster ARM Cortex processors, and 2GB LPDDR4 in the same footprint as its predecessor. Engineered for AI, embedded vision, and edge analytics, its production-ready I/O and daughter card ecosystem bridge prototyping to real-world deployment.
Aleph Secures $29M Series B to Cement AI-Native FP&A Leadership

Aleph Secures $29M Series B to Cement AI-Native FP&A Leadership

AI-powered FP&A platform Aleph has raised $29 million in Series B funding led by Khosla Ventures, bringing its total funding to $46 million. The investment fuels Aleph's mission to transform financial planning with an AI-native approach built on a unified data foundation, aiming to automate workflows and empower lean finance teams with unprecedented productivity gains.
Modos Paper Monitor: Revolutionizing E-Paper with Open-Source FPGA Power

Modos Paper Monitor: Revolutionizing E-Paper with Open-Source FPGA Power

Modos Tech unveils an open-hardware developer kit that transforms e-paper displays into low-latency monitors with 75Hz refresh rates. Built around a custom FPGA controller, the solution enables unprecedented control over electrophoretic displays while addressing long-standing ghosting and responsiveness limitations. This breakthrough opens new possibilities for eye-friendly computing interfaces.
Microsoft 365 Tightens Security: FPRPC File Access Blocked by Default in Windows Apps

Microsoft 365 Tightens Security: FPRPC File Access Blocked by Default in Windows Apps

Microsoft will soon disable insecure FPRPC file access protocols in Microsoft 365 Windows apps by default, forcing connections to modern secure alternatives. The change, rolling out in late August, gives admins new controls to manage legacy protocols while closing a decades-old security gap exploited in phishing and brute-force attacks.