Microcontrollers
Scalability in SNAP Mesh Networks
It is projected that 100 billion new “uniquely identifiable objects” will be connected to the Internet...
2:1 MIPI CSI-2 Bridge Soft IP
In some cases, mobile Application Processors (AP) may not have enough interfaces to support the number...
The Past, Present and Future of Cybersecurity for Embedded Systems
The only system that's safe from cyberthreats is one that's never powered on. While this is an overstatement...
dB or not dB?
True or false: 30 dBm + 30 dBm = 60 dBm? Why does 1% work out to be -40 dB one time but then 0.1 dB or...
5 Reasons to Consider an Alternative to Linux for Your Medical Device
Medical device designers have become increasingly interested in the Linux® operating system (OS), largely...
Realtime Deembedding with the R&S®RTP
Deembedding, often a necessary and complex task, is made easier with an integrated hardware and software...
The Need for Security
With the recent rise of the Internet of Things (IoT), 14 billion devices are now connected. However,...
Flash Corruption: Software Bug or Supply Voltage Fault?
Flash memory is commonly used to store firmware in embedded systems. Occasionally, the firmware stored...
White Paper 1: The Need for Security
With the recent rise of the Internet of Things (IoT), 14 billion devices are now connected. However,...
Threat-based Analysis Method for IoT Devices
By all accounts, Internet of Things (IoT) devices are forecasted to become ubiquitous. These devices,...
Why Low Quiescent Current Matters for Longer Battery Life
Battery life is getting increased scrutiny as our devices continue to shrink but are still expected to...
Sign up for Electronic Pro Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.
