Solved

question regarding microcontrollers

Posted on 2004-04-10
6
253 Views
Last Modified: 2010-04-26
Where is a good place (online) to buy microcontrollers and embedded-SBCs?

I'm in the process of learning, and I wanted to buy something that has ethernet, and hopefully a processor speed of about 200MHz.  

Also, if anyone experienced in this field has any suggestions on good ways to learn more, that would be great :)
0
Comment
Question by:lwinkenb
6 Comments
 
LVL 14

Accepted Solution

by:
tmj883 earned 125 total points
ID: 10799785
0
 
LVL 6

Assisted Solution

by:HippyWarlock
HippyWarlock earned 125 total points
ID: 10799787
0
 
LVL 5

Assisted Solution

by:drelectro
drelectro earned 125 total points
ID: 10800357
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 5

Expert Comment

by:drelectro
ID: 10800367
Oh and digikey (www.digikey.com) are great for low to medium quantities of components as opposed to complete boards.
0
 
LVL 1

Assisted Solution

by:biglarryn
biglarryn earned 125 total points
ID: 10844248
Take a look at the rabbit series from Z-World. Programming done in Dynamic C and good rugged products. plenty fast for embedded projects but they are not PCs.
0
 
LVL 5

Author Comment

by:lwinkenb
ID: 10844530
Thanks for all the links everyone :)
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question