Home page
We will be at Embedded World 2024 in Nuremberg, Germany!
Ignitarium is proud to be an exhibitor at Embedded World, being held on April 9 – 11, 2024, in Nuremberg, Germany. Walk into Booth #5-325A to watch our live demos in action.
We will be at Embedded World 2024 in Nuremberg, Germany! Read More »
We are now ISO/IEC 27001:2022 certified
We are proud to announce that Ignitarium is now an ISO/IEC 27001:2022 certified organization. ISO/IEC 27001:2022 is an internationally recognized information security standard that ensures that our products and services meet the needs of our clients…
Software Crypto Stack for Automotive ECUs
The increasing need for cyber security in Automotive domain was discussed in our previous blog, We investigated different mechanisms by which a hacker could exploit an ECU, like compromising the in-vehicle communication network, gaining unauthorized access to vehicle, tampering ECU firmware and rogue software updates.
Triangulation and Map Point Creation: A Fundamental Pillar of Visual SLAM
The second part of the Visual SLAM blog series discusses one of the key components in visual SLAM: the feature extraction pipeline, which includes triangulation and map point creation. These steps play a critical role in accurately estimating the robot’s pose and creating a map of the surrounding environment.
Triangulation and Map Point Creation: A Fundamental Pillar of Visual SLAM Read More »
We are an Associate Sponsor at IESA Vision Summit 2024
Ignitarium is proud to be a sponsor at the IESA Vision Summit 2024, being held on Jan 24 – 25, 2023, at Bangalore, India. Ignitarium’s VP of Automotive Technology, Sujeet Sreenivasan, will be a speaker at the panel discussion on ‘Delving into the future of Automotive Innovations through new age Semiconductor.
We are an Associate Sponsor at IESA Vision Summit 2024 Read More »
We are featured as a key ER&D player for Semiconductor, Automotive and AI domains in Zinnov Zones 2023
Ignitarium’s position as a premier provider of engineering R&D services across diverse domains has been fortified by the recent Zinnov Zones ratings.
Getting started with RISC-V Verification using SPIKE library
RISC-V is an open-source instruction set architect (ISA) based on reduced instruction set computing principles.
Getting started with RISC-V Verification using SPIKE library Read More »
Feature Extraction and Description Pipeline in Visual SLAM
This Series of blogs explores the exciting field of Feature based Visual Simultaneous Localization and Mapping (VSLAM). It also discusses the two state-of-the-art algorithms that are widely used in this area: RTAB-Map and ORB-SLAM3.
Feature Extraction and Description Pipeline in Visual SLAM Read More »
Cybersecurity for Automotive ECUs – An Introduction
One of the biggest challenges faced by OEMs today is automotive cyber security with the amount of hardware and software integrated into vehicles increasing significantly over the last few decades. There can be as many as 100 ECUs embedded in modern vehicles.
Cybersecurity for Automotive ECUs – An Introduction Read More »