Nexus Logo industrial memory 180px tall

THE SAFE CHOICE FOR
INDUSTRIAL MEMORY AND DATA SECURITY

Search
Close this search box.

Nexus Knowledge Centre

TECHNICAL BLOGS

pencil

Future Trends in Industrial Memory Solutions: What to Expect

The dynamic digital landscape of today is marked by rapid changes, and staying up-to-date with the future trends and developments in industrial memory solutions can provide a significant competitive edge. As experts in memory products designed for people who require more than standard commercial memory,

pencil

Unlocking the Potential of IoT in Industrial Applications: Memory Solutions for Enhanced Connectivity and Performance

The Internet of Things (IoT) has revolutionised various industries by transforming how we collect, process, and share data. Industrial IoT applications, in particular, have experienced exponential growth over the past few years as manufacturers and operators have adopted IoT technology to enhance productivity, efficiency, and

pencil

Succeeding in Medical Device Design: The Importance of Reliable Memory Solutions

As medical technology advances rapidly, cutting-edge devices enable healthcare professionals to diagnose, monitor, and treat patients more effectively. From wearable health monitors to advanced diagnostic systems, these innovative medical devices rely on sophisticated hardware and software components and dependable memory solutions that ensure optimal performance,

pencil

A Proprietary Solution Provides High Security Beyond USBs

Data security is essential in sensitive environments such as hospitals, financial services and government organisations. USB-based malware attacks are not uncommon in today’s digital society and according to a new report from Mandiant, researchers say in the first half of this year they’ve seen a

pencil

Industrial Memory Solutions for Mission-Critical Applications: A Comprehensive Guide

In today’s fast-paced technological landscape, businesses across various industries often manage applications, systems, and processes regarded as mission-critical. These systems are essential to the functioning and continued success of an organisation, and as such, their reliability and performance cannot be compromised. A crucial factor in

pencil

A Comprehensive Guide to Industrial Memory Product Selection and Customisation

In an increasingly digitalised world, businesses are relying on efficient memory products to streamline their operations and improve their overall performance. With the increasing demand for customised solutions tailored to different industries, it is crucial for businesses to select and customise memory products that best

pencil

Make data invisible – Flexxon X-Mask™

In today’s digital age, data security has become a top priority for individuals and businesses alike. With the rise of cyber threats and data breaches, safeguarding sensitive information has become more crucial than ever before. Flexxon, a leading innovator in flash storage solutions, has taken

pencil

eMMC vs SSD: Which to use, where and why

  The issue of embedded Multimedia Card versus Solid State Drive (eMMC vs SSD) can be a consideration for PC or laptop storage, the designers of embedded systems requiring the storage of relatively large volumes of (local) data may be pondering the issue too. Both

pencil

Write-Once-Read-Many (WORM) tamper proof technology

The chances are you know that WORM stands for write-once-read-many times. A WORM kit improves data security in the workplace and in your embedded systems. Data cannot be erased or manipulated once written to Flexxon’s Write-Once-Read-Many (WORM) SD cards and microSD cards, and in-built, unalterable

pencil

Why and Where to Use an Encrypted USB Memory Stick?

The difference between an encrypted and unencrypted memory stick An encrypted USB drive and a memory stick (also known as a USB flash drive) are both portable storage devices that use USB technology to transfer data between computers. However, there are some important differences between

pencil

Why use NVMe SSD?

Non-volatile memory express (NVMe) is a storage protocol that allows users to get the most out of high-performance flash based solid-state drives (SSD). It is well suited to multicore processing, and many simultaneous I/O operations can be accommodated, which has made NVMe SSD extremely popular in

pencil

Securing Your Data at the Hardware Level

In part 1 of this securing embedded memory blog, we considered how your data is at risk and concluded that security needs to start at the hardware level. And as your IIoT’s data resides in memory, that’s the best place to start. Isolation through partitioning

pencil

What is a Value-Added Distributor?

Unfortunately, it’s a fact of life that most distributors are just a local presence for their suppliers. They take orders. And they hold some stock. Thankfully, in the B2B engineering sectors, it’s somewhat different as there is, quite rightly, an expectation that value should be

pencil

How Secure Is Your Data?

In our increasingly connected world, embedded systems, such as those at the heart of IoT and IIoT devices, need to carry sensitive data. Accordingly, if you’re an embedded systems designer, you’re advised (certainly by us) to not only make security a priority from the start

pencil

The best possible protection for the data and program files in your embedded system comes to Embedded World 2022 …

If you’re an engineer and you need your data protected from the elements AND malicious threats, book a visit with our engineers at Embedded World 2022 now… Who are Nexus Industrial Memory? We provide specialist memory products, designed specifically for industrial systems and information security.

pencil

How to Accurately Pair Wireless Medical Devices with a Physical Token

The wireless revolution has changed lives for billions of people around the world, allowing us access to news, entertainment, education and assistance at the touch of a button, with no wires required. Occasionally, the wireless tech in our homes and businesses goes awry, and when

pencil

How to Secure Embedded Memory

In an earlier blog I discussed the security challenges for embedded memory and stressed that making products, such as IoT-enabled devices, more secure should be taking a much higher priority than it currently is. And in another blog, I outlined how embedded memory might be

pencil

Cybersecurity in light of Russian turmoil

Open a newspaper, turn on the TV, head online for your daily dose of news, and there’s one subject that’s impossible to escape. And surprisingly, it’s nothing to do with a blonde, British Prime Minister. Instead, the tensions between Russia and Ukraine have taken over,

Want to find out more?

We would love to hear from you…

Request for Brochure

"*" indicates required fields

Name*

By submitting this form, you agree to Nexus sending you occasional details about our goods and services, and other value-added information.
For more details, please see our Privacy Notice.