BLE v4.2: Creating Faster, More Secure, Power-Efficient Design—Part 3 (.PDF Download)

Nov. 2, 2016

Security is one of the most important aspects for any system that contains a user's private information. Examples range from exchange of health information with a fitness monitor, to exchange of confidential data/passwords in applications like payment solutions. Beyond data privacy concerns, an unsecure communication in the Internet of Things (IoT) space can lead to unintended operation of a system if an unauthorized device injects data into said system...

Register or Sign in below to download the full article in .PDF format, including high-resolution graphics and schematics when applicable.

Sponsored

Stricter guidelines imposed by version 3 of the IEC standard for harmonic current emissions push designers to embrace power-factor-correction methodologies.
The flyback topology is a versatile, widely used, switched-mode power-supply design with some interesting characteristics that brings performance and BOM advantages to many applications...
Significant complications arise when trying to get your power supply working from a wall outlet.
Login to download this article as a PDF file