BLE v4.2: Creating Faster, More Secure, Power-Efficient Design—Part 3 (.PDF Download)

Nov. 2, 2016

Security is one of the most important aspects for any system that contains a user's private information. Examples range from exchange of health information with a fitness monitor, to exchange of confidential data/passwords in applications like payment solutions. Beyond data privacy concerns, an unsecure communication in the Internet of Things (IoT) space can lead to unintended operation of a system if an unauthorized device injects data into said system...

Register or Sign in below to download the full article in .PDF format, including high-resolution graphics and schematics when applicable.

Sponsored

For electronics manufacturers grappling with formidable challenges, navigating the path to success requires adapting to the dynamic landscape of the industry. How can electronics...
From data converters to sensing, beginner to advanced – look to the Analog Design Journal for answers to your analog design questions. Some of the industry’s most knowledgeable...
This article examines the motor-monitoring challenge. It then presents a practical example of edge AI performing this function using analog, digital, and mixed-signal ICs from...
This webinar will demonstrateEravants VNA frequency extenders and their ability to perform full two-port S-parameter measurements of millimeter-wave components. The example ...