BLE v4.2: Creating Faster, More Secure, Power-Efficient Design—Part 3 (.PDF Download)

Nov. 2, 2016

Security is one of the most important aspects for any system that contains a user's private information. Examples range from exchange of health information with a fitness monitor, to exchange of confidential data/passwords in applications like payment solutions. Beyond data privacy concerns, an unsecure communication in the Internet of Things (IoT) space can lead to unintended operation of a system if an unauthorized device injects data into said system...

Register or Sign in below to download the full article in .PDF format, including high-resolution graphics and schematics when applicable.

Sponsored

Explore common applications, the difference between a coupled inductor and a transformer, how to choose a coupled inductor, and more.
Slide switches offer a compact, reliable way to control circuits with a simple sliding motion—ideal for low-power, space-constrained applications. This technical overview breaks...
Learn how Single Pair Ethernet (SPE) contributes to sustainability in industrial communication. This on-demand webinar explores how SPE reduces wiring, installation costs, and...
Wireless is no longer an add-on-it's central to the performance, scalability, and future-readiness of modern embedded systems.