BLE v4.2: Creating Faster, More Secure, Power-Efficient Design—Part 3 (.PDF Download)

Nov. 2, 2016

Security is one of the most important aspects for any system that contains a user's private information. Examples range from exchange of health information with a fitness monitor, to exchange of confidential data/passwords in applications like payment solutions. Beyond data privacy concerns, an unsecure communication in the Internet of Things (IoT) space can lead to unintended operation of a system if an unauthorized device injects data into said system...

Register or Sign in below to download the full article in .PDF format, including high-resolution graphics and schematics when applicable.

Sponsored

Power Topologies Handbook

Buy ICs, tools & software directly from TI. Request samples, enjoy faster checkout, manage orders online and more with your myTI account.

The Basics of Current Sensors

This article describes the advantages of open-loop sensors over closed-loop current sensors. Examples of LEM and Honeywell open-loop sensors are described.

A Designer's Guide to Lithium (Li-ion) Battery Charging

This designer's guide helps you discover how you can safely and rapidly charge lithium (LI-ion) batteries to 20%-70% capacity in about 20-30 minutes.

Smart Wireless Wall Clock with ForgeFPGA

Compact, low-cost clock design with a smooth transition of digits and automatic brightness adjustment.